Computer security login system based on Internet of Things

A computer security and login system technology, which is applied in the field of computer security login, can solve problems such as potential safety hazards and login tampering, and achieve strong practicability and improved security effects

Inactive Publication Date: 2022-05-06
盐城幼儿师范高等专科学校
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In today's world, with the rapid development of Internet technology, the information security of the network is the most concerned content of the public, especially the important confidential information related to schools, enterprises, and banks, which is easy to be tampered with by hackers, which has great security. Therefore, a computer security login system based on the Internet of Things is proposed to solve the problem of computer information security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer security login system based on Internet of Things
  • Computer security login system based on Internet of Things
  • Computer security login system based on Internet of Things

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0028] Refer to attached Figure 1-3 , a computer security login system based on the Internet of Things, including a physical authentication terminal a, a digital authentication terminal b, a database, and an online cloud system;

[0029] The physical authentication terminal a uses physical security authentication equipment and methods to confirm...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a computer security login system based on the Internet of Things. The computer security login system comprises a physical authentication terminal; confirming the identity of the user by adopting equipment and a method for physical security authentication; a digital authentication terminal; a CA system authentication mode is adopted, and identity confirmation is carried out during login; a database; the memory is used for storing data of the physical authentication terminal and the digital authentication terminal; an online cloud system; the receiving module is used for receiving information transmitted by the physical authentication terminal and the digital authentication terminal. The system overcomes the defects in the prior art, is reasonable in design and compact in structure, adopts multiple modes to improve the security effect, adopts face recognition, fingerprint recognition and induction equipment recognition, and meanwhile, determines the identity information of a user through automatic video uploading formed by physical recognition, so that the security effect is improved. And then the identity information of the user is confirmed again in cooperation with the auditing of the database and the online cloud system and the digital certificate, so that the secure login is realized, and the practicability is very high.

Description

technical field [0001] The invention relates to the technical field of computer security login, in particular to a computer security login system based on the Internet of Things. Background technique [0002] The concept of the Internet of Things was proposed in 1999. The English name of the Internet of Things: physical authentication terminal anternet of Th physical authentication terminal angs (physical authentication terminal aOT), also known as Web of Th physical authentication terminal angs, is regarded as an application of the Internet Expansion and application innovation are the core of the development of the Internet of Things, and innovation centered on user experience is the soul of the development of the Internet of Things. In 2005, at the World Summit on the Information Society held in Tunisia, the International Telecommunication Union released the "Physical Authentication Terminal aTU Internet Report 2005: Internet of Things", formally proposing the concept of "...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/33G06F21/32G06F21/31
CPCG06F21/33G06F21/32G06F21/31
Inventor 孟伟东
Owner 盐城幼儿师范高等专科学校
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products