Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for securely logging in computer communication based on internet

A technology of communication security and login method, applied in the fields of instruments, digital data authentication, electronic digital data processing, etc., can solve the problems of account information and login passwords being easily stolen by others, low security of computing login, etc., to enhance the difficulty of cracking , the effect of convenient calculation and operation, and improved security

Inactive Publication Date: 2019-01-15
河北地质大学
View PDF5 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

During the process of inputting account information and login password, the user enters character information through the keyboard. During this process, the account information and login password are easily stolen by others. The thief can obtain the corresponding computer access rights through the stolen account information and login password. , resulting in less secure compute logins

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for securely logging in computer communication based on internet
  • Method and system for securely logging in computer communication based on internet

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0035] Embodiment 1: Internet-based computer communication security login method, such as figure 1 and figure 2 shown, including the following steps:

[0036] Step 1: Input the user identity information and encrypted verification code through the user login access unit 1 , and transmit the user identity information to the first processing unit 12 and the encrypted verification code to the second processing unit 15 .

[0037] Step 2: after the first processing unit 12 retrieves the login access matching information stored in the storage unit 11, it is judged whether the user identity information matches the login access comparison information; if it is judged to be yes, a dynamic verification code is sent to the dynamic verification unit 13 Generate a command; if the judgment is no, it will display that the user login and access failed.

[0038] Step 3: After receiving the dynamic verification code generation command, the dynamic verification unit 13 generates a dynamic veri...

Embodiment 2

[0046] Embodiment 2: Internet-based computer communication security login system, such as figure 2 As shown, it includes a user login access unit 1 , a storage unit 11 , a first processing unit 12 , a dynamic verification unit 13 , a verification conversion unit 14 , a second processing unit 15 and a login authorization unit 16 .

[0047] Such as figure 2 As shown, the user login access unit 1 is used to input user identity information and encrypted verification code, and transmit the user identity information to the first processing unit 12 and the encrypted verification code to the second processing unit 15 .

[0048] Such as figure 2 As shown, the storage unit 11 stores login access matching information.

[0049] Such as figure 2 As shown, the first processing unit 12 is used to determine whether the user identity information matches the login access comparison information after calling the login access matching information; If it is not, it will display that the user...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a computer communication safety login method and a computer communication safety login system based on Internet. The invention relates to the technical field of computer login,which solves the problem that a stealer can obtain corresponding computer access authority through stealing account information and login password, and leads to low security of calculation login. Thetechnical scheme comprises the following steps: inputting user identity information and encrypted authentication code; judging whether the user identity information matches the login access comparison information; generating a dynamic verification code; converting the dynamic authentication code into an encryption standard code; judging whether the encryption verification code matches the encryption standard code; issuing login authorization permission commands; after receiving the login authorization permission command, the computer is allowed to log in, which has the effect of improving thesecurity of the computer communication login.

Description

technical field [0001] The invention relates to the technical field of computer login, more specifically, it relates to a computer communication security login method and system based on the Internet. Background technique [0002] With the application of computers becoming more and more common, the number of computer users continues to rise, and the application level continues to improve. Computers have the characteristics of fast calculation speed, high calculation accuracy, strong logical operation ability, large storage capacity, and high degree of automation, and are widely used in the fields of Internet, communication, and multimedia. [0003] At present, in the process of computer login, in order to verify the identity of the user, the user needs to enter account information and login password to obtain access to the computer. During the process of inputting account information and login password, the user enters character information through the keyboard. During this...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/41
CPCG06F21/41G06F2221/2141
Inventor 赵卫华张永华
Owner 河北地质大学
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products