CN103023855A - Security login system based on hardware parameters of client computer - Google Patents

Security login system based on hardware parameters of client computer Download PDF

Info

Publication number
CN103023855A
CN103023855A CN2011102786087A CN201110278608A CN103023855A CN 103023855 A CN103023855 A CN 103023855A CN 2011102786087 A CN2011102786087 A CN 2011102786087A CN 201110278608 A CN201110278608 A CN 201110278608A CN 103023855 A CN103023855 A CN 103023855A
Authority
CN
China
Prior art keywords
user
module
hardware parameter
computer
login system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2011102786087A
Other languages
Chinese (zh)
Inventor
***
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhenjiang Yction Software Co Ltd
Original Assignee
Zhenjiang Yction Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhenjiang Yction Software Co Ltd filed Critical Zhenjiang Yction Software Co Ltd
Priority to CN2011102786087A priority Critical patent/CN103023855A/en
Publication of CN103023855A publication Critical patent/CN103023855A/en
Pending legal-status Critical Current

Links

Landscapes

  • Computer And Data Communications (AREA)

Abstract

The invention relates to a client security login system, in particular to a security login system based on hardware parameters of a client computer, and belongs to the technical field of communication. The security login system based on the hardware parameters of the client computer is characterized in that an acquisition module acquires user information and the user computer hardware parameters and encrypts the acquired information through an encryption module; a binding module binds the encrypted information and a user authority; a capturing module captures the hardware parameters of the current computer; a decryption module decrypts the encrypted user information and the computer hardware parameters; a checking module gradually checks the decrypted hardware parameters and the hardware parameters captured by the capturing module; and an input/output (I/O) module finishes data interaction between the security login system and a service system. By the security login system based on the hardware parameters of the client computer, the problems of relatively low automatic login security and low functionability in the prior art are solved.

Description

A kind of Security Login System based on the client computer hardware parameter
Technical field
The present invention relates to a kind of client secure login system, especially a kind of Security Login System based on the client computer hardware parameter.The invention belongs to communication technical field.
Background technology
Along with the development of informationization technology, the increasing professional software systems that rely on are finished at present.But all service software system all need the user to input username and password when logining at every turn, can cause the use obstacle to certain customers, and the username and password assurance is the correct use of operation system and the safety of business datum, in case username and password is stolen, to cause immeasurable loss to the user, therefore need to make to guarantee safety by restriction for certain customers and partial function, therefore the mode for system login requires also just more and more higher.
The each accessing system of user all needs to input user name, password, and for the link that reduces username and password input with to part as the user's such as older problems such as Password Input obstacle, software vendor has also been released corresponding solution.Solve at present the user and login at every turn that need to input user name, password mainly be to realize by cookie, the file that is about to comprise the information such as user's username and password writes cookie, server end read the information of this cookie when the user logined at every turn, made the user finish automatic login.In addition, fail safe mainly still relies on based on network safety measure, such as: Network Isolation, network limits, hardware facility etc.
Use cookie to realize that there is following drawback in the automatic login of user.The one, most of browsers have the restriction of 4096 bytes to the size of Cookie, and this user profile that just means that cookie can preserve can be restricted.The 2nd, if the user has been forbidden the ability of browser or client device reception Cookie, cookie can't use.The fail safe of the 3rd, cookie is lower, the user can revise the cookie on its computer, this means and to cause potential risk or to cause depending on the application program failure of cookie fail safe, the automatic login of using simultaneously cookie to carry out, only can finish account, password writing function, function is used and can't be limited, and also is to use the risk of cookie further to improve.
The problem to be solved in the present invention provides the system schema of a kind of user security login, the user first during login system, and registered user name and password, the hardware parameter of system log (SYSLOG) subscriber computer, and the authority of binding this user is to this hardware parameter.When the user logined again, the hardware parameter of the subscriber computer by logging in first time record was confirmed to realize user's identity automatically login, and change the corresponding software system module over to according to user right.Even like this user's user name password loss, appropriator be user's the also function in the normally use system of computer not, thereby guaranteed the fail safe of business datum.
Summary of the invention
The object of the invention is to: the deficiency for above prior art exists provides a kind of Security Login System based on the computer hardware parameter, to overcome the low problem that reaches functional deficiency of automatic login security in the prior art.In order to reach above purpose, the present invention comprises following part:
Acquisition module--obtain user's log-on message and a series of hardware parameters of subscriber computer;
Encrypting module--the user computer hardware parameter of obtaining is encrypted;
The authority binding of binding module--the user computer hardware parameter after will encrypting and user's log-on message and user function software module;
Trapping module--catch a series of hardware parameters of the subscriber computer of the current login system of user;
Deciphering module--the user computer hardware parameter after the encryption of system database record is decrypted into series of computation machine hardware parameter;
The one by one verification of computer hardware parameter of user's secondary login system that correction verification module--series of computation machine hardware parameter after will deciphering and trapping module are caught;
The I/O module--finish the data interaction of Security Login System and operation system;
The hardware parameter of the subscriber computer after the log-on message of database--recording user and the encryption and user's authority.
The user uses step to be:
Step 1: after using the client-access system, by acquisition module, obtain user's log-on message and the hardware parameter of a series of subscriber computers.
Step 2: the user computer hardware parameter of catching is encrypted by encrypting module.
Step 3: by binding module, the user computer hardware parameter after encrypting and user's log-on message are recorded to database, and give the authority of the corresponding operating system module of user.
Step 4: during user's access system, by trapping module, catch a series of hardware parameters of subscriber computer.
Step 5: be decrypted by the user computer hardware parameter of deciphering module after with the encryption of data-base recording.
Step 6: the user computer hardware parameter of user's secondary login system being caught by correction verification module and the one by one verification of computer hardware parameter that has after the deciphering module deciphering.
So, by the present invention, the user can sign in to system automatically, and the while binds with the function in the operation system, in the situation of automatically login, has guaranteed the safety of business datum.
Embodiment
Embodiment one
Use Microsoft VisualStudio.Net developing instrument exploitation client operating software, use database management tools SqlServer2005 special-purpose on the market to set up the needed database of system, concrete mode is:
Acquisition module--obtain user's log-on message and a series of hardware parameters of subscriber computer;
Encrypting module--the user computer hardware parameter of obtaining is encrypted;
The authority binding of binding module--the user computer hardware parameter after will encrypting and user's log-on message and user function software module;
Trapping module--catch a series of hardware parameters of the computer of user's login system;
Deciphering module--the user computer hardware parameter after the encryption of system database record is decrypted into series of computation machine hardware parameter;
The one by one verification of computer hardware parameter of user's login system that correction verification module--series of computation machine hardware parameter after will deciphering and trapping module are caught;
The reading and writing of I/O module--completing user essential information, the user computer hardware parameter after encrypting and user's authority;
The hardware parameter of the subscriber computer after the log-on message of database--recording user and the encryption and user's authority mainly comprise:
User message table (users)--be used for the log-on message of recording user and the hardware parameter information of subscriber computer, comprise the computer hardware parameter behind user's the ID, user's user name, password, encryption.
Figure BSA00000576586600051
User right table (droit)--be used for recording user at the operating right of software systems, comprise permission ID, user ID, authority name, rights state.
Figure BSA00000576586600052
The user uses step to be:
Step 1: after using the client-access system, by acquisition module, obtain user's log-on message and the hardware parameter of a series of subscriber computers.
Step 2: the user computer hardware parameter of catching is encrypted by encrypting module.
Step 3: by binding module, the user computer hardware parameter after encrypting and user's log-on message are recorded to database, and give the authority of the corresponding operating system module of user.
Step 4: as user again during access system, by trapping module, catch a series of hardware parameters of subscriber computer.
Step 5: be decrypted by the user computer hardware parameter of deciphering module after with the encryption of data-base recording.
Step 6: the user computer hardware parameter of user's secondary login system being caught by correction verification module and the one by one verification of computer hardware parameter that has after the deciphering module deciphering.The failure of parameter verification is arranged, and then the user can't login system, only has the complete verification success just can enter system.
In addition to the implementation, the present invention can also have other execution modes.All employings are equal to the technical scheme of replacement or equivalent transformation formation, all drop on the protection range of requirement of the present invention.

Claims (2)

1. Security Login System based on the client computer hardware parameter is characterized in that: finish secure log according to the hardware parameter of subscriber computer and comprise such as lower module:
Acquisition module---obtain user's log-on message and a series of hardware parameters of subscriber computer;
Encrypting module---the user computer hardware parameter of obtaining is encrypted;
The authority binding of binding module---the user computer hardware parameter after will encrypting and user's log-on message and user function software module;
Trapping module---catch a series of hardware parameters of the subscriber computer of user's secondary login system;
Deciphering module---the user computer hardware parameter after the encryption of system database record is decrypted into series of computation machine hardware parameter;
The one by one verification of computer hardware parameter of the current login system of user that correction verification module---series of computation machine hardware parameter after will deciphering and trapping module are caught;
The I/O module---finish the data interaction of Security Login System and operation system;
The hardware parameter of the subscriber computer after the log-on message of database---recording user and the encryption and user's authority.
2. described a kind of Security Login System based on the client computer hardware parameter according to claim 1 is further characterized in that: finish secure log needs following steps according to the hardware parameter of subscriber computer:
Step 1: after using the client-access system, by acquisition module, obtain user's log-on message and the hardware parameter of a series of subscriber computers;
Step 2: the user computer hardware parameter of catching is encrypted by encrypting module;
Step 3: by binding module, the user computer hardware parameter after encrypting and user's log-on message are recorded to database, and give the authority of the corresponding operating system module of user;
Step 4: the user during access system, by trapping module, catches a series of hardware parameters of subscriber computer again;
Step 5: be decrypted by the user computer hardware parameter of deciphering module after with the encryption of data-base recording;
Step 6: the user computer hardware parameter of user's secondary login system being caught by correction verification module and the one by one verification of computer hardware parameter that has after the deciphering module deciphering.
CN2011102786087A 2011-09-20 2011-09-20 Security login system based on hardware parameters of client computer Pending CN103023855A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2011102786087A CN103023855A (en) 2011-09-20 2011-09-20 Security login system based on hardware parameters of client computer

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011102786087A CN103023855A (en) 2011-09-20 2011-09-20 Security login system based on hardware parameters of client computer

Publications (1)

Publication Number Publication Date
CN103023855A true CN103023855A (en) 2013-04-03

Family

ID=47971991

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011102786087A Pending CN103023855A (en) 2011-09-20 2011-09-20 Security login system based on hardware parameters of client computer

Country Status (1)

Country Link
CN (1) CN103023855A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104066203A (en) * 2014-06-20 2014-09-24 可牛网络技术(北京)有限公司 Method and system for generating identifier of mobile device, method for remotely controlling mobile device, and communication terminal
CN108881130A (en) * 2017-05-16 2018-11-23 ***通信集团重庆有限公司 The method of controlling security and device of session control information
CN110162941A (en) * 2019-04-12 2019-08-23 厦门天锐科技股份有限公司 A kind of terminal log-on message store method

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101388774A (en) * 2008-10-24 2009-03-18 焦点科技股份有限公司 Method for automatically authenticate and recognize customer identity between different customers and login
CN102006306A (en) * 2010-12-08 2011-04-06 广东高新兴通信股份有限公司 Security authentication method for WEB service

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101388774A (en) * 2008-10-24 2009-03-18 焦点科技股份有限公司 Method for automatically authenticate and recognize customer identity between different customers and login
CN102006306A (en) * 2010-12-08 2011-04-06 广东高新兴通信股份有限公司 Security authentication method for WEB service

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104066203A (en) * 2014-06-20 2014-09-24 可牛网络技术(北京)有限公司 Method and system for generating identifier of mobile device, method for remotely controlling mobile device, and communication terminal
CN108881130A (en) * 2017-05-16 2018-11-23 ***通信集团重庆有限公司 The method of controlling security and device of session control information
CN110162941A (en) * 2019-04-12 2019-08-23 厦门天锐科技股份有限公司 A kind of terminal log-on message store method

Similar Documents

Publication Publication Date Title
JP6941146B2 (en) Data security service
CN108076057B (en) Data security system and method based on block chain
KR101590076B1 (en) Method for managing personal information
CN103685282B (en) A kind of identity identifying method based on single-sign-on
US20140317681A1 (en) Cloud forensics
US9275257B2 (en) Secure communication architecture
JP6678457B2 (en) Data security services
CN103095847B (en) Cloud storage safety-ensuring method and system thereof
US9009469B2 (en) Systems and methods for securing data in a cloud computing environment using in-memory techniques and secret key encryption
CN106575342A (en) Kernel program including relational data base, and method and device for executing said program
CN103248618A (en) Secure file transmission system and method based on Linux adopting OpenSSL
CN106161710B (en) A kind of user account safety management system based on smart phone
CN106533693B (en) Access method and device of railway vehicle monitoring and overhauling system
KR101670496B1 (en) Data management method, Computer program for the same, Recording medium storing computer program for the same, and User Client for the same
CN103971059A (en) Cookie local storage and usage method
CN102821110B (en) A kind of password method for retrieving for audio/video storage device
WO2017137481A1 (en) A removable security device and a method to prevent unauthorized exploitation and control access to files
CN103023855A (en) Security login system based on hardware parameters of client computer
CN101408955A (en) Method and system determining obligation base on tactic
JP5678150B2 (en) User terminal, key management system, and program
Lakhe Practical Hadoop Security
CN110263008A (en) Terminal offline logs management system, method, equipment and storage medium
CN115643573A (en) Privileged account authentication method and system based on dynamic security environment
Rath et al. Design and application of a secure and flexible server-based mobile eID and e-signature solution
Vanitha et al. Data sharing: Efficient distributed accountability in cloud using third party auditor

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20130403