Login identity verification method and device

An identity verification method and login information technology, applied in the direction of digital data authentication, etc., can solve the problems of account security reduction, account and password leakage, etc., and achieve the effect of improving security

Pending Publication Date: 2022-03-25
GUANGDONG POWER GRID CO LTD +1
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention provides a login identity verification method and device, which solves the technical problem of the account login method of the existing OMS system. Due to the need for continuous login in each system, the account and password are easily leaked and the account security is reduced.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Login identity verification method and device
  • Login identity verification method and device
  • Login identity verification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060]The embodiment of the present invention provides a login identity verification method and device, which are used to solve the account login method of the existing OMS system. Due to the need for continuous login in each system, the account and password are easily leaked, resulting in reduced account security. technical problems.

[0061] In order to make the purpose, features and advantages of the present invention more obvious and understandable, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the following The described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a login identity verification method and device, and the method comprises the steps: returning a random verification code corresponding to user login information when an authentication system detects that any OMS system is inserted into a mobile key device and receives the forwarded user login information; after input information responding to the random verification code is received, verification information is read from the mobile secret key device; signing the input information by adopting the verification information to obtain signature data and verifying the signature data; if the verification is passed, generating a login success prompt and an authentication-free identifier corresponding to the user login information; and when the updated user login information forwarded by any OMS system is received again, judging whether a login success prompt is generated or not based on a verification result of the authentication-free identifier carried by the updated user login information. Therefore, unified login of a plurality of OMS systems is realized, and meanwhile, the security of the login account is improved through a multi-factor verification mode.

Description

technical field [0001] The present invention relates to the technical field of login verification, in particular to a login identity verification method and device. Background technique [0002] With the rapid development of the national economy, the scale of the power grid continues to expand. OMS (Order Management System, order management system) belongs to the category of power monitoring system. As an important support system for dispatching and running daily work, it is necessary to protect the security of the power monitoring system and dispatching data network. , Resist the destruction and attack of hackers, viruses, malicious codes, etc., prevent the collapse or paralysis of the power monitoring system, and the resulting power system accidents or large-scale power outages. [0003] In the current OMS system, the user information stored in each system is independent of each other. There are many systems to be used in the work, which leads to the need to log in once fo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/34G06F21/33G06F21/41G06F21/45
CPCG06F21/34G06F21/33G06F21/41G06F21/45
Inventor 余玉晗
Owner GUANGDONG POWER GRID CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products