Dynamic user login password interaction method and equipment

A dynamic password and password technology, applied in the field of network security, can solve problems such as user loss, and achieve the effect of not easy security leakage and strong protection.

Active Publication Date: 2014-05-28
OPZOON TECH
View PDF9 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

will cause great loss to users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dynamic user login password interaction method and equipment
  • Dynamic user login password interaction method and equipment
  • Dynamic user login password interaction method and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in combination with specific embodiments and with reference to the accompanying drawings. It should be understood that these descriptions are exemplary only, and are not intended to limit the scope of the present invention. Also, in the following description, descriptions of well-known structures and techniques are omitted to avoid unnecessarily obscuring the concept of the present invention.

[0041] figure 1 The flow of the method for user login dynamic password interaction of the present invention is shown.

[0042] refer to figure 1 ,Such as figure 1 As shown, the user login dynamic password interaction method of the present invention comprises the following steps:

[0043] Receive the device user's request to obtain a random code after logging in as an administrator.

[0044] Specifically, the administ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a dynamic user login password interaction method and equipment. The method comprises the following steps of receiving a request for acquiring a random code after an equipment user logins as?an administrator, generating the random code and providing the random code to the equipment user, generating and storing a first login password corresponding to the random code, receiving the user login request, carrying out password authentication and comparing whether a second login password inputted by the user and the first login password are consistent, and allowing the user login if the second login password is consistent with the first login password, and denying the user login if the second login password is not consistent with the first login password, wherein the second login password is the login password converted from the random code and acquired from the equipment supplier when the equipment user sends the random code to the equipment supplier. When the method and the equipment are used, protection on login equipment is strong, and the safety leakage phenomenon is not likely to happen.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a method and device for user login dynamic password interaction. Background technique [0002] Today is the era of rapid Internet development, and various network products emerge in an endless stream, and the supported user login methods include console port, SSH, HTTP, TELNET and other methods. Users can log in to the device in various ways to view and configure the device. However, the protection of the landing equipment is not strong, and security leaks are prone to occur. [0003] The existing technology usually provides a fixed user name and password. Through the user name and password, the user can remotely log in to the device or the background of the device through SSH, TELNET, etc., check the operation status of the device, and modify the configuration of the device. Especially entering the background program may have a huge impact. [0004] When the user nam...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/00
Inventor 赵众
Owner OPZOON TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products