[go: up one dir, main page]

CN109508520A - A kind of Security Login System of computer - Google Patents

A kind of Security Login System of computer Download PDF

Info

Publication number
CN109508520A
CN109508520A CN201811335084.9A CN201811335084A CN109508520A CN 109508520 A CN109508520 A CN 109508520A CN 201811335084 A CN201811335084 A CN 201811335084A CN 109508520 A CN109508520 A CN 109508520A
Authority
CN
China
Prior art keywords
module
information
terminal
input
output end
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811335084.9A
Other languages
Chinese (zh)
Inventor
徐尚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanchang Joy Enterprise Management Consulting Co Ltd
Original Assignee
Nanchang Joy Enterprise Management Consulting Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanchang Joy Enterprise Management Consulting Co Ltd filed Critical Nanchang Joy Enterprise Management Consulting Co Ltd
Priority to CN201811335084.9A priority Critical patent/CN109508520A/en
Publication of CN109508520A publication Critical patent/CN109508520A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a kind of Security Login Systems of computer, it is related to computer field, mainly solve the problems, such as that existing login system security performance is not high, including input module, information authentication module, signal transmission module, timer, control module and signal output module, the input terminal of the input module is connected with information authentication module, the output end of the information authentication module is connected with the input terminal of signal transmission module, the output end of the signal transmission module is connected with the input terminal of timer, the input module and the input terminal of information authentication module are connected with the output end of information storage module, the signal transmission module is connected with control module, the input terminal of the control module is connected with timer and human-computer interaction module respectively, the present invention can be improved the efficiency and enhancing user security of authentication, have simultaneously Self-locking function and warning function, and it is able to record the personal information of login.

Description

A kind of Security Login System of computer
Technical field
The present invention relates to computer field, the Security Login System of specifically a kind of computer.
Background technique
With the continuous development of science and technology with progress, computer application has also obtained unprecedented universal, either lives, gives pleasure to Fields, the computers such as happy, office, research and development, study suffer from very important effect, and human society is greatly facilitated in computer Progress and development.
With the popularization and application of computer, consequently also there are some problems: in enterprise, if computer is by other people It opens, steals the information such as the classified papers of company, and then bring loss to computer owner, this phenomenon bring consequence is in quotient Industry office, research and development etc. be in fields it is immeasurable, therefore, how to prevent non-computer owner from opening computer just seems to pass It is important.
Summary of the invention
The purpose of the present invention is to provide a kind of Security Login Systems of computer, to solve to mention in above-mentioned background technique Out the problem of.
To achieve the above object, the invention provides the following technical scheme:
A kind of Security Login System of computer, including input module, information authentication module, signal transmission module, timer, The input terminal of control module and signal output module, the input module is connected with information authentication module, the Information Authentication mould The output end of block is connected with the input terminal of signal transmission module, the output end of the signal transmission module and the input terminal of timer It is connected, the input terminal of the input module and information authentication module is connected with the output end of information storage module, the signal Transmission module is connected with control module, and the input terminal of the control module is connected with timer and human-computer interaction module respectively, institute The output end for stating human-computer interaction module is connected with logging modle, and the output end of the control module is connected with signal output module, The output end of the signal output module respectively with coding module, voice module, camera shooting terminal, associated terminal and logging modle phase Even, the coding module, voice module, camera shooting terminal, associated terminal and logging modle input terminal respectively with power supply module, people The output end of machine interactive module is connected.
As a further solution of the present invention: the input module includes identity information, phone number and face letter Breath etc..
As a further solution of the present invention: being registered when user uses for the first time by input module, body Part information can be stored in information storage module, while input identity information again, and information authentication module is by storing information The identity information stored in module carries out matching verifying, and verification result is sent at control module.
As a further solution of the present invention: the control module is DSP microprocessor, can be compiled by computer Journey operation.
As a further solution of the present invention: the input terminal of the human-computer interaction module and the output end of information storage module It is connected, the information stored in logging modle and information storage module can be read out respectively by human-computer interaction module, deleted It is operated except equal.
As a further solution of the present invention: the human-computer interaction module can for computer or can contact action it is aobvious Display screen.
As a further solution of the present invention: the coding module includes figure module, random code module, identifying code life At module and mobile phone terminal sending module, the figure module and random code module are connected with identifying code generation module, described to test The output end of card code generation module is connected with mobile phone terminal sending module, and institute's random code module random code can generate the close of ten bit bytes Code, ten bit byte passwords are the random combine of upper and lower case letter, number and common Chinese character, and a Chinese character is two bytes, close Code can be sent at mobile phone terminal sending module after generating by mobile phone terminal sending module, and the figure module includes different types of Pictorial information will need that variety classes graphical information is selected to be sent at mobile phone terminal sending module with written form, according to mobile phone The end received information of sending module carries out selection picture, and when input error, figure module can restart.
As a further solution of the present invention: the voice module includes Scene Simulation system, voice device and voice The output end of information-storing device, the Scene Simulation system and voice messaging storage device is connected with voice device, passes through Voice module can be realized the simple dialog with user, to remind some classified papers of user to forbid copy, leakage etc.;Institute Stating camera shooting terminal can play the role of acquiring portrait, and when being verified, camera shooting terminal starts verifying face letter automatically Breath;The associated terminal includes alarm terminal, mobile terminal and self-locking module, and the alarm terminal is connected with mobile terminal, When illegal login or inquiry classified papers, alarm terminal alarm, the mobile terminal can be mobile phone, pass through short message form It is sent at mobile terminal, while self-locking module starts, and makes computer that can not carry out any operation;Only backstage permission can solve It removes.
As a further solution of the present invention: a kind of login side for the Security Login System applying to the computer Method, steps are as follows:
S1, it is registered by input module, and inputs identity information login;
S2, it logs in specific software or checks classified papers, signal transmission module sends the signal to control module activation control Module issues corresponding control command, and coding module work generates identifying code;
S3, input identifying code, are verified, while camera shooting terminal starting acquisition figure information;
S4, confirmation figure information and login or search access right, and matched with account;
S5, portrait are detailed, log in or inquiry is recorded storage, and can be read again by human-computer interaction module.
Compared with prior art, the beneficial effects of the present invention are: the present invention can be improved the efficiency and enhancing of authentication User security, while there is self-locking function and warning function, and be able to record the personal information of login;
It is registered by input module, and inputs identity information login;It logs in specific software or checks classified papers, signal transmission Module sends the signal to control module activation control module and issues corresponding control command, and coding module work generates verifying Code;Identifying code is inputted, is verified, while camera shooting terminal starting acquisition figure information;Confirm figure information and login or Search access right, and matched with account;Portrait is detailed, log in or inquiry is recorded storage, and can be by human-computer interaction module again Secondary reading.
Detailed description of the invention
Fig. 1 is the principle of the present invention block diagram.
Fig. 2 is the block diagram of coding module in the present invention.
Fig. 3 is the block diagram of relating module in the present invention.
Fig. 4 is the block diagram of voice module in the present invention.
Fig. 5 is the block diagram of the login method of Security Login System in the present invention.
In figure: 1- input module, 2- information authentication module, 3- signal transmission module, 4- timer, 5- control module, 6- Signal output module, 7- coding module, 8- voice module, 9- camera shooting terminal, 10- associated terminal, 11- logging modle, 12- power supply Module, 13- human-computer interaction module, 14- information storage module, 15- Scene Simulation system, 16- voice device, 17- voice messaging Storage device, 18- alarm terminal, 19- mobile terminal, the self-locking module of 20-, 21- figure module, 22- random code module, 23- are tested Demonstrate,prove code generation module, 24- mobile phone terminal sending module.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
Please refer to Fig. 1~4, in the embodiment of the present invention, a kind of Security Login System of computer, including input module 1, Information authentication module 2, signal transmission module 3, timer 4, control module 5 and signal output module 6, the input module 1 Input terminal is connected with information authentication module 2, and the input module 1 includes identity information, phone number and facial information Deng the output end of the information authentication module 2 is connected with the input terminal of signal transmission module 3, the signal transmission module 3 and institute It states control module 5 to be connected, the output end of the signal transmission module 3 is connected with the input terminal of timer 4, the input module 1 It is connected with the output end of information storage module 14 with the input terminal of information authentication module 2, when user uses for the first time It is registered by input module 1, identity information can be stored in information storage module 14, while input identity information again, Information authentication module 2 is sent out verification result by carrying out matching verifying to the identity information stored in information storage module 14 It send to control module 5;
The control module 5 is DSP microprocessor, and operation, the input of the control module 5 can be programmed by computer End is connected with timer 4 and human-computer interaction module 13 respectively, the input terminal and information storage module of the human-computer interaction module 13 14 output end is connected, and the output end of the human-computer interaction module 13 is connected with logging modle 11, passes through human-computer interaction module 13 It the operation such as can be read out, delete to the information stored in logging modle 11 and information storage module 14 respectively;
Preferably, the human-computer interaction module 13 can for computer or can contact action display screen;
The output end of the control module 5 is connected with signal output module 6, the output end of the signal output module 6 respectively with Coding module 7, voice module 8, camera shooting terminal 9, associated terminal 10 and logging modle 11 are connected, the coding module 7, voice mould Block 8, camera shooting terminal 9, associated terminal 10 and logging modle 11 input terminal respectively with power supply module 12, human-computer interaction module 13 Output end is connected, and the coding module 7 includes figure module 21, random code module 22, identifying code generation module 23 and mobile phone Sending module 24 is held, the figure module 21 and random code module 22 are connected with identifying code generation module 23, the identifying code The output end of generation module 23 is connected with mobile phone terminal sending module 24, and 22 random code of institute's random code module can generate ten bit bytes Password, ten bit byte passwords are the random combine of upper and lower case letter, number and common Chinese character, and a Chinese character is two bytes, Password can be sent at mobile phone terminal sending module 24 after generating by mobile phone terminal sending module 24, and the figure module 21 includes not Congener pictorial information will need that variety classes graphical information is selected to be sent to mobile phone terminal sending module 24 with written form Place, carries out selection picture according to the received information of mobile phone terminal sending module 24, and when input error, figure module 21 can again Starting;
The voice module 8 includes Scene Simulation system 15, voice device 16 and voice messaging storage device 17, the scene The output end of simulation system 15 and voice messaging storage device 17 is connected with voice device 16, passes through voice module 8, Neng Goushi Now with the simple dialog of user, to remind some classified papers of user forbid copy, leakage etc.;The camera shooting terminal 9 can Play the role of acquiring portrait, when being verified, facial information is verified in starting to camera shooting terminal 9 automatically;The association is eventually End 10 includes alarm terminal 18, mobile terminal 19 and self-locking module 20, and the alarm terminal 18 is connected with mobile terminal 19, when When illegal login or inquiry classified papers, alarm terminal 18 is alarmed, and the mobile terminal 19 can be mobile phone, passes through short message shape Formula is sent at mobile terminal 19, while self-locking module 20 starts, and makes computer that can not carry out any operation;Only backstage permission energy It is enough to release.
Referring to Fig. 5, a kind of login method for the Security Login System for applying to the computer, steps are as follows:
S1, it is registered by input module 1, and inputs identity information login;
S2, it logs in specific software or checks classified papers, signal transmission module 3 sends the signal to the activation control of control module 5 Molding block 5 issues corresponding control command, and the work of coding module 7 generates identifying code;
S3, input identifying code, are verified, while camera shooting terminal starting acquisition figure information;
S4, confirmation figure information and login or search access right, and matched with account;
S5, portrait are detailed, log in or inquiry is recorded storage, and can be read again by human-computer interaction module 13.
Working principle: it is registered when user uses for the first time by input module 1, identity information can be stored in In information storage module 14, while identity information is inputted again, information authentication module 2 in information storage module 14 by storing Identity information carry out matching verifying, and verification result is sent at control module 5, logs in specific software or check secret File, signal transmission module 3 send the signal to control module 5 and control module 5 are activated to issue corresponding control command, encode mould The work of block 7 generates identifying code;Identifying code is inputted, is verified, while camera shooting terminal starting acquisition figure information;Confirm portrait letter Breath and login or search access right, and matched with account;Portrait is detailed, log in or inquiry is recorded storage, and can pass through Human-computer interaction module 13 is read again.
It is obvious to a person skilled in the art that invention is not limited to the details of the above exemplary embodiments, Er Qie In the case where without departing substantially from spirit or essential attributes of the invention, the present invention can be realized in other specific forms.Therefore, no matter From the point of view of which point, the present embodiments are to be considered as illustrative and not restrictive, and the scope of the present invention is by appended power Benefit requires rather than above description limits, it is intended that all by what is fallen within the meaning and scope of the equivalent elements of the claims Variation is included within the present invention.Any reference signs in the claims should not be construed as limiting the involved claims.
In addition, it should be understood that although this specification is described in terms of embodiments, but not each embodiment is only wrapped Containing an independent technical solution, this description of the specification is merely for the sake of clarity, and those skilled in the art should It considers the specification as a whole, the technical solutions in the various embodiments may also be suitably combined, forms those skilled in the art The other embodiments being understood that.

Claims (9)

1. a kind of Security Login System of computer, including input module (1), information authentication module (2), signal transmission module (3), timer (4), control module (5) and signal output module (6), the input terminal of the input module (1) and Information Authentication Module (2) is connected, and the output end of the information authentication module (2) is connected with the input terminal of signal transmission module (3), the signal The output end of transmission module (3) is connected with the input terminal of timer (4), which is characterized in that the input module (1) and information are tested The input terminal of card module (2) is connected with the output end of information storage module (14), the signal transmission module (3) and control mould Block (5) is connected, and the input terminal of the control module (5) is connected with timer (4) and human-computer interaction module (13) respectively, the people The output end of machine interactive module (13) is connected with logging modle (11), and the output end and signal of the control module (5) export mould Block (6) be connected, the output end of the signal output module (6) respectively with coding module (7), voice module (8), camera shooting terminal (9), associated terminal (10) and logging modle (11) are connected, and the coding module (7), camera shooting terminal (9), is closed at voice module (8) Join the input terminal of terminal (10) and logging modle (11) the output end phase with power supply module (12), human-computer interaction module (13) respectively Even.
2. the Security Login System of computer according to claim 1, which is characterized in that input module (1) packet Identity information, phone number and facial information are included.
3. the Security Login System of computer according to claim 2, which is characterized in that used for the first time as user When registered by input module (1), identity information can be stored in information storage module (14), while input body again Part information, information authentication module (2) are incited somebody to action by carrying out matching verifying to the identity information stored in information storage module (14) Verification result is sent at control module (5).
4. the Security Login System of computer according to claim 3, which is characterized in that the control module (5) is DSP microprocessor.
5. the Security Login System of computer according to claim 4, which is characterized in that the human-computer interaction module (13) input terminal is connected with the output end of information storage module (14), by human-computer interaction module (13) respectively to logging modle (11) and information storage module (14) in store information be read out, delete operation.
6. the Security Login System of computer according to claim 5, which is characterized in that the human-computer interaction module (13) for computer or can contact action display screen.
7. the Security Login System of computer according to claim 6, which is characterized in that coding module (7) packet Figure module (21), random code module (22), identifying code generation module (23) and mobile phone terminal sending module (24), the figure are included Shape module (21) and random code module (22) are connected with identifying code generation module (23), the identifying code generation module (23) Output end is connected with mobile phone terminal sending module (24), and institute random code module (22) random code can generate the password of ten bit bytes, and ten Bit byte password is the random combine of upper and lower case letter, number and common Chinese character, and a Chinese character is two bytes, and password generates After can be sent to by mobile phone terminal sending module (24) at mobile phone terminal sending module (24), the figure module (21) include difference The pictorial information of type will need that variety classes graphical information is selected to be sent to mobile phone terminal sending module (24) with written form Place, carries out selection picture according to mobile phone terminal sending module (24) received information, when input error, figure module (21) meeting Restarting.
8. the Security Login System of -7 any computers according to claim 1, which is characterized in that the voice module It (8) include Scene Simulation system (15), voice device (16) and voice messaging storage device (17), the Scene Simulation system (15) it is connected with voice device (16) with the output end of voice messaging storage device (17);When being verified, camera shooting Automatically facial information is verified in starting to terminal (9);The associated terminal (10) include alarm terminal (18), mobile terminal (19) and Self-locking module (20), the alarm terminal (18) are connected with mobile terminal (19), when illegal login or inquiry classified papers, Alarm terminal (18) alarm, the mobile terminal (19) are mobile phone, are sent at mobile terminal (19) by short message form, simultaneously Self-locking module (20) starting.
9. a kind of login method of the Security Login System of computer a method as claimed in any one of claims 1-8, which is characterized in that Steps are as follows:
S1, it is registered by input module (1), and inputs identity information login;
S2, it logs in specific software or checks classified papers, signal transmission module (3) sends the signal to control module (5) and swashs Control module (5) living issue corresponding control command, and coding module (7) work generates identifying code;
S3, input identifying code, are verified, while camera shooting terminal starting acquisition figure information;
S4, confirmation figure information and login or search access right, and matched with account;
S5, portrait are detailed, log in or inquiry is recorded storage, and are read again by human-computer interaction module (13).
CN201811335084.9A 2018-11-10 2018-11-10 A kind of Security Login System of computer Pending CN109508520A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811335084.9A CN109508520A (en) 2018-11-10 2018-11-10 A kind of Security Login System of computer

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811335084.9A CN109508520A (en) 2018-11-10 2018-11-10 A kind of Security Login System of computer

Publications (1)

Publication Number Publication Date
CN109508520A true CN109508520A (en) 2019-03-22

Family

ID=65748133

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811335084.9A Pending CN109508520A (en) 2018-11-10 2018-11-10 A kind of Security Login System of computer

Country Status (1)

Country Link
CN (1) CN109508520A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110321688A (en) * 2019-06-10 2019-10-11 许超贤 A kind of financial terminal and method for processing business preventing information leakage
CN113268718A (en) * 2021-04-12 2021-08-17 武汉晋鹏达信息技术有限公司 Computer information security monitoring system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104202162A (en) * 2014-08-12 2014-12-10 武汉理工大学 System for login based on mobile phone and login method
CN106998332A (en) * 2017-05-08 2017-08-01 深圳市牛鼎丰科技有限公司 Safe login method, device, storage medium and computer equipment
CN108694313A (en) * 2018-05-07 2018-10-23 襄阳市尚贤信息科技有限公司 A kind of computer user's identification system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104202162A (en) * 2014-08-12 2014-12-10 武汉理工大学 System for login based on mobile phone and login method
CN106998332A (en) * 2017-05-08 2017-08-01 深圳市牛鼎丰科技有限公司 Safe login method, device, storage medium and computer equipment
CN108694313A (en) * 2018-05-07 2018-10-23 襄阳市尚贤信息科技有限公司 A kind of computer user's identification system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110321688A (en) * 2019-06-10 2019-10-11 许超贤 A kind of financial terminal and method for processing business preventing information leakage
CN113268718A (en) * 2021-04-12 2021-08-17 武汉晋鹏达信息技术有限公司 Computer information security monitoring system

Similar Documents

Publication Publication Date Title
CN102457845B (en) Wireless traffic identity identifying method, equipment and system
US7747797B2 (en) Mass storage device with near field communications
CN100454321C (en) USB device with data memory and intelligent secret key and control method thereof
CN110347862B (en) Recording processing method, device, equipment, system and audio equipment
Hung et al. Design and implementation of a door lock control based on a near field communication of a smartphone
CN205121680U (en) Bluetooth lock system based on intelligent terminal
CN204904392U (en) Intelligent lock system is encrypted in high in clouds
CN205594622U (en) Computer storage system
CN101640881A (en) Method and system for remote control and mobile terminal
CN104699568A (en) Data backup method and terminal
CN109272325A (en) A kind of distributed block chain identity card
CN109508520A (en) A kind of Security Login System of computer
CN105554745A (en) Information management method and system
TWI271985B (en) Protect method thereof
CN106709534A (en) Anti-counterfeit verification system of electronic certificate
CN205788194U (en) A kind of high in the clouds and local secure storage data and the device of file
CN106971163A (en) One kind connects neck people recognition methods, device and system
CN103685743A (en) Voice-control authentication unlocking system and unlocking method thereof
JP3966070B2 (en) Device control system and portable terminal
CN204695301U (en) A kind of multi-functional encryption portable hard drive
CN109754356A (en) Checking method, system and the storage medium of electronics license based on layout files
CN105825590A (en) Umbrella management system with personal credit recording function
CN109088872A (en) Application method, device, electronic equipment and the medium of cloud platform with service life
CN104639318A (en) Communication client and method for protecting conversation content in communication application
CN111090887A (en) Conversation content destroying method and device based on instant chat tool

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190322

RJ01 Rejection of invention patent application after publication