Login method based on confidential order of trusted equipment

A login method and password technology, applied in the field of system login, can solve problems such as user name + password no longer safe, security incidents, lack of security awareness of system manufacturers and users, etc.

Inactive Publication Date: 2016-04-06
HUNAN ANTVISION SOFTWARE
View PDF8 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] The continuous development of the information age has not only enriched people's network life, but also made the security situation of the Internet more and more severe. The traditional user name + password authentication method is no longer safe. The lack of security awareness of system manufacturers and users, It is easy to cause the user's password to be leaked, thus causing a security incident.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Login method based on confidential order of trusted equipment
  • Login method based on confidential order of trusted equipment
  • Login method based on confidential order of trusted equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] Such as figure 1 As shown in the present invention, a login method based on a trusted device password includes the following steps,

[0038] Step S101: the user device installs the password APP, and after logging into the APP, binds the device under the user's account to make it a trusted device, thereby obtaining the corresponding login password.

[0039] Step S102: Preliminary verification, the user completes the preliminary verification when entering the user name and password during the login process;

[0040] Step S103: Obtain the password of the trusted device; after the preliminary verification is completed, the system will send a unique password to the APP of the trusted device, and at the same time, the system will remind the user to enter the password displayed by the APP. Such as figure 2 As shown, the step S103 of obtaining the trusted device password specifically includes the following steps,

[0041] Step S31: Obtain the user Token of the APP;

[0042...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of system login, and particularly relates to a login method based on a confidential order of trusted equipment. The login method comprises the following steps: a step S101: user equipment installs a confidential order APP and binds the equipment under the account per se to make the equipment become trusted equipment after logging in the APP, so as to obtain a corresponding login confidential order; a step S102: primary verification: in a login process, a user completes primary verification when inputting a username and a password; a step S103: acquisition of the confidential order of the trusted equipment: after completing the primary verification, the system will send a unique confidential order to the APP of the trusted equipment, and meanwhile, the system will remind the user to input the confidential order displayed on the APP; and a step S104: confidential order verification: after the user opens the APP and inputs the corresponding confidential order, the system verifies the confidential order. By adopting the method, the information security of the user is further guaranteed by the confidential order provided by the APP, and meanwhile, the login state of the user can be reminded by the APP in real time, in order to avoid the stolen risk of the account.

Description

technical field [0001] The invention relates to the technical field of system login, in particular to a login method based on trusted device passwords. Background technique [0002] The continuous development of the information age has not only enriched people's network life, but also made the security situation of the Internet more and more severe. The traditional user name + password authentication method is no longer safe. The lack of security awareness of system manufacturers and users, It is easy to cause the user's password to be leaked, thus causing a security incident. [0003] With the rise of the mobile Internet, the popularity of smart phones has brought great convenience to people's lives. Mobile phones are no longer just a communication tool for phone calls and text messages, but have become an indispensable part of people's lives. The portable type is also inherently safe. If the mobile phone is also involved in the user's authentication process, it will undou...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0815H04L63/083
Inventor 覃璐
Owner HUNAN ANTVISION SOFTWARE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products