Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Safety automatic login management system

An automatic login and management system technology, which is applied in the field of safe automatic login management system, can solve the problems of account security leakage, account number memory is cumbersome, etc., and achieve the effect of improving security and preventing leakage

Inactive Publication Date: 2018-03-20
浙江码博士防伪科技有限公司 +1
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The present invention provides a safe automatic login management system aiming at the problems of leakage of account security and tedious memory of multiple accounts in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety automatic login management system
  • Safety automatic login management system
  • Safety automatic login management system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0041] This embodiment takes Figure 1 to Figure 3 The application scenario shown (the computer inserted into the dedicated USB-Key is the management control center, and the smart camera is the managed smart device) is a specific example for further elaboration.

[0042] The specific implementation is as follows:

[0043] Step 1: Run the automatic login management system client on the computer (management control center) that inserts the exclusive USB-Key to generate a pair of public key and private key for the user, and save the private key in the USB-Key;

[0044] Step 2: The management control center is connected to the smart camera, and the current login password is changed to a randomly generated complex password;

[0045] Step 3: If step 2 fails, retry step 2, otherwise, encrypt the password and other login information randomly generated in step 2 with the public key generated in step 1, and upload the encrypted login information to the login information server;

[004...

Embodiment 2

[0049] By adopting the technical scheme of the present invention, secure and complex login information can be randomly generated for accounts or smart devices, and automatic login can be realized. In order to make the technical scheme of the present invention easier to understand, the following Figure 4 application scenarios (the mobile phone is the management control center, and the router is the managed smart device).

[0050] The specific implementation is as follows:

[0051] Step 1: Run the mobile phone to automatically log in to the management system APP, generate the public key and private key exclusive to the mobile phone, and save them in a password-protected local file;

[0052] Step 2: Scan the mobile phone to the router with the initial password through WIFI, log in to the router with the initial password, and change the current login password of the router to a randomly generated complex password;

[0053] Step 3. If step 2 fails, retry step 2. Otherwise, encry...

Embodiment 3

[0056] Below to Figure 5 to Figure 6 The application scenarios are further elaborated with specific examples.

[0057] Step 1: The user sends a request to the automatic login system to log in to a third-party application;

[0058] Step 2: The automatic login system decrypts the account information of the third-party application stored locally or in the cloud;

[0059] Step 3: The automatic login system evokes the third-party application, and transmits the decrypted account information to the third-party application. If the account information (such as password, etc.) needs to be updated, the current account information and the new account information can be transmitted to the third-party application at the same time. account information. In order to ensure the security of account information transmission, the information can be encrypted;

[0060] Step 4: After the third-party application is awakened, verify the current account information received. If the verification is ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of data safety, and discloses a safety automatic login management system. The safety automatic login management system comprises a configuration module, anencryption module and a decryption module; the configuration module comprises a cloud server configuration module and a management control center configuration module; the cloud server configurationmodule is used for receiving login information of intelligent equipment, which is added by a management control center; the management control center configuration module randomly generates a passwordby the management control center to configure to the intelligent equipment; the encryption module is used for carrying out encryption on the login information; and the decryption module is used for decrypting the login information. According to the invention, the safety password is automatically and randomly generated for a website or equipment, and account information is encrypted and saved by apublic key, so that a Hacker can be prevented from acquiring the account information by adopting a brute force attack or dictionary attack method, and safety of an account is greatly improved.

Description

technical field [0001] The invention relates to the technical field of data security, in particular to a safe automatic login management system. Background technique [0002] Symmetric encryption is the fastest and simplest encryption method, and the same secret key is used for encryption and decryption. On October 2, 2000, the National Institute of Standards and Technology (NIST--American National Institute of Standards and Technology) selected the Rijndael algorithm as the new Advanced Encryption Standard (AES--Advanced Encryption Standard). [0003] Asymmetric encryption provides a very secure method for data encryption and decryption. It uses a pair of keys, a public key and a private key. The private key can only be kept safely by one party and cannot be leaked, while the public key can be distributed to anyone who requests it. Asymmetric encryption uses one of this pair of keys to encrypt, and decryption requires the other key. For example, if you request a public k...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08H04W4/80G06K7/14
CPCG06K7/1417H04L9/0863H04L9/0869H04L63/0428H04L63/083
Inventor 祝国龙许田
Owner 浙江码博士防伪科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products