Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity verification method for BS application service binding hardware codes in offline state

An application service and authentication technology, which is applied in the authentication field of BS application service binding hardware code in offline state, which can solve the problem of restricting computers or other terminals to log in to the system, unable to meet application requirements, and limited browser read and write permissions, etc. question

Pending Publication Date: 2020-10-27
武汉市测绘研究院
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] To sum up, the problems existing in the prior art are: (1) In the prior art, users can log in at any terminal with the same user name and password, which cannot meet specific application requirements and specific environments, and restrict specific Computer or other terminal login system
The biggest disadvantage of this mode is that the normal operation of the app depends on the user's computer .NET environment. In addition, when the app is updated, it is necessary to upgrade and reinstall the new app on each computer terminal.
[0007] (3) Part of the app on the web side is developed using the B / S structure. Due to the limited read and write permissions of the browser itself, it is impossible to directly read the usb key information on the computer. Therefore, the web version of the online banking application needs to be developed based on the browser's ActiveX
It can be used by a specific user on a specific computer, and the verification is invalid in the following situations: ①Failure to log in with an incorrect user name or password; ②Fail to log in if you replace your own computer; ③Failure to log in without a USB key encryption lock connected to the computer; ④Use process Monitor the state of the encryption lock in the middle, and the system cannot continue to be used if it is not connected to the computer correctly

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity verification method for BS application service binding hardware codes in offline state
  • Identity verification method for BS application service binding hardware codes in offline state
  • Identity verification method for BS application service binding hardware codes in offline state

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] In order to make the objectives, technical solutions and advantages of the present invention clearer, the present invention will be further described in detail below with reference to the embodiments. It should be understood that the specific embodiments described herein are only used to explain the present invention, but not to limit the present invention.

[0048] In the prior art, users can log in at any terminal with the same user name and password, and it is impossible to log in to the system with a specific computer in a specific environment. Even if the hardware code of the terminal hardware computer, such as the MAC address, is entered in the background database in advance, because the web front end does not have the authority to read the system hardware address, the user name cannot be bound to the login hardware. In the prior art, some online banking apps on the PC side are developed using a C / S structure, which requires separate installation of the program of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of identity information verification, and discloses an identity verification method for BS application service binding hardware codes in an offline state.A server deployed by a B / S application is used for web applications in a non-internet environment and comprises a webpage and a database, and the database comprises user names, passwords and other relational database information; the Web front end is used for accessing a web application by a user; the local service installed at the user side is used for data interaction; and the encryption lock isused for writing 8k byte information and writing the user name, the password and the firmware information into the encryption lock in a fixed format in advance. By installing the developed service locally, the defect that a software encryption lock does not provide web api is overcome, the developed local service is the core of the whole idea of the invention, and the service runs on a user computer and plays a role in interacting with hardware information of a server and the user computer.

Description

technical field [0001] The invention belongs to the technical field of identity information verification, and in particular relates to an identity verification method for BS application service binding hardware codes in an offline state. Background technique [0002] At present, the prior art 1 adopts user name and password to authenticate the identity of the application system, which is the most common and relatively loose identity authentication method, and is used in various application systems developed based on the B / S architecture. The user logs in to the web page through the user name and password, and the web front end uploads the user name and password to the server, and compares it with the user name and password in the database. After the comparison is passed, the user can successfully log in to the system. [0003] Some of the two pairs of identity verification methods in the prior art use an encryption lock, namely usk key, as the identity verification of the ap...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/34G06F21/60G06F21/73
CPCG06F21/34G06F21/602G06F21/73
Inventor 白洁李江卫王祥周剑孙伟杨霞范清彪姚鹏吴多胡慧萍贾伟定
Owner 武汉市测绘研究院
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products