CN109409069A - Computer security login method and computer security entering device - Google Patents

Computer security login method and computer security entering device Download PDF

Info

Publication number
CN109409069A
CN109409069A CN201811289863.XA CN201811289863A CN109409069A CN 109409069 A CN109409069 A CN 109409069A CN 201811289863 A CN201811289863 A CN 201811289863A CN 109409069 A CN109409069 A CN 109409069A
Authority
CN
China
Prior art keywords
information
login authentication
user
computer security
authentication interface
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811289863.XA
Other languages
Chinese (zh)
Inventor
李冰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Henan Polytechnic Institute
Original Assignee
Henan Polytechnic Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Henan Polytechnic Institute filed Critical Henan Polytechnic Institute
Priority to CN201811289863.XA priority Critical patent/CN109409069A/en
Publication of CN109409069A publication Critical patent/CN109409069A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention provides a kind of computer security login method and computer security entering devices, wherein, computer includes mainframe box, starting key is provided on the mainframe box, the starting key upper surface is embedded with fingerprint identification module, for the fingerprint identification module for acquiring the finger print information of user when user presses the starting key and according to the identity information of collected finger print information identification user, the computer security login method includes: the current user identities information for obtaining the fingerprint identification module and sending;Obtain login authentication interface associated with the current user identities information;The login authentication interface is loaded and shows, so that the user carries out login authentication.According to the technical solution of the present invention, safety when computer uses is improved.

Description

Computer security login method and computer security entering device
Technical field
The present invention relates to field of computer technology, in particular to a kind of computer security login method and a kind of meter Calculation machine secure login device.
Background technique
In order to guarantee that computer login security, traditional login mode are usually display after user starts starting key Screen directly displays fixed verifying interface, user's validation information on verifying interface, although this login authentication mode exists The authentication of user is realized to a certain extent, but is easy to be pried through by other people to verification information, and then substantially reduce safety Property.
Summary of the invention
The present invention is based at least one above-mentioned technical problem, proposes a kind of new computer security login scheme, Improve safety when computer uses.
In view of this, the computer includes mainframe box the invention proposes a kind of new computer security login method, Starting key is provided on the mainframe box, the starting key upper surface is embedded with fingerprint identification module, the fingerprint recognition Module is for acquiring the finger print information of user when user presses the starting key and being identified according to collected finger print information The identity information of user, the computer security login method include: the active user for obtaining the fingerprint identification module and sending Identity information;Obtain login authentication interface associated with the current user identities information;It loads and shows that the login is tested Interface is demonstrate,proved, so that the user carries out login authentication.
In the technical scheme, user needs to start power on button in booting, embedding during pressing power on button The fingerprint identification module being located on power on button can acquire and identify the identity information of user, be recognized according to fingerprint identification module Current user identities information, obtain login authentication associated with current user identities information interface, and it loaded Show that when different user booting logs in, corresponding login authentication interface is not identical, even if other people peep for user login validation Verification information to active user is not available yet, and substantially increases safety.
In the above-mentioned technical solutions, it is preferable that obtain login associated with the current user identities information described Before the step of verifying interface, further includes: be pre-stored multiple subscriber identity informations and each subscriber identity information and step on Incidence relation between record verifying interface;The acquisition login authentication interface associated with the current user identities information Step specifically includes: according to the pre-stored incidence relation, searching login associated with the current user identities information Verify interface.
In any of the above-described technical solution, it is preferable that further include: detecting the user in login authentication circle When the number of validation information reaches pre-determined number on face, warning note is carried out.
In the technical solution, still authentication failed after inputting the verification information of pre-determined number illustrate to be switched in the presence of malice Situation, carries out warning reminding at this time, excludes security risk in time convenient for related personnel.
In any of the above-described technical solution, it is preferable that the step of progress warning note includes: carry out audio alert Prompt;And/or warning message is sent to designated terminal associated with the computer.
According to the second aspect of the invention, a kind of computer security entering device is proposed, the computer includes host Case is provided with starting key on the mainframe box, and the starting key upper surface is embedded with fingerprint identification module, and the fingerprint is known Other module is for acquiring the finger print information of user when user presses the starting key and being known according to collected finger print information The identity information of other user, the computer security entering device includes: first acquisition unit, for obtaining the fingerprint recognition The current user identities information that module is sent;Second acquisition unit, it is associated with the current user identities information for obtaining Login authentication interface;Processing unit is tested for loading and showing the login authentication interface so that the user log in Card.
In the technical scheme, user needs to start power on button in booting, embedding during pressing power on button The fingerprint identification module being located on power on button can acquire and identify the identity information of user, be recognized according to fingerprint identification module Current user identities information, obtain login authentication associated with current user identities information interface, and it loaded Show that when different user booting logs in, corresponding login authentication interface is not identical, even if other people peep for user login validation Verification information to active user is not available yet, and substantially increases safety.
In the above-mentioned technical solutions, it is preferable that further include: storage unit, for being pre-stored multiple subscriber identity informations, with And the incidence relation between each subscriber identity information and login authentication interface;The second acquisition unit is used for: according to The pre-stored incidence relation searches login authentication interface associated with the current user identities information.
In any of the above-described technical solution, it is preferable that further include: alarm unit, for detecting that the user exists When the number of validation information reaches pre-determined number on the login authentication interface, warning note is carried out.
In the technical solution, still authentication failed after inputting the verification information of pre-determined number illustrate to be switched in the presence of malice Situation, carries out warning reminding at this time, excludes security risk in time convenient for related personnel.
In any of the above-described technical solution, it is preferable that the alarm unit is specifically used for: carrying out audio alert prompt; And/or warning message is sent to designated terminal associated with the computer.
By above technical scheme, safety when computer uses is improved.
Detailed description of the invention
Fig. 1 shows the schematic flow diagram of the computer security login method of embodiment according to the present invention;
Fig. 2 shows the schematic block diagrams of the computer security entering device of embodiment according to the present invention.
Specific embodiment
To better understand the objects, features and advantages of the present invention, with reference to the accompanying drawing and specific real Applying mode, the present invention is further described in detail.It should be noted that in the absence of conflict, the implementation of the application Feature in example and embodiment can be combined with each other.
In the following description, numerous specific details are set forth in order to facilitate a full understanding of the present invention, still, the present invention may be used also To be implemented using other than the one described here other modes, therefore, protection scope of the present invention is not by described below Specific embodiment limitation.
Fig. 1 shows the exemplary flow of the computer security login method of embodiment according to the present invention.
As shown in Figure 1, computer includes mainframe box in the present embodiment, starting key is provided on the mainframe box, it is described Starting key upper surface is embedded with fingerprint identification module, and the fingerprint identification module is used for when user presses the starting key It acquires the finger print information of user and identifies the identity information of user according to collected finger print information, the computer security logs in Method includes:
Step 102, the current user identities information that the fingerprint identification module is sent is obtained.
Step 104, login authentication interface associated with the current user identities information is obtained.
Step 106, the login authentication interface is loaded and shows, so that the user carries out login authentication.
In the technical scheme, user needs to start power on button in booting, embedding during pressing power on button The fingerprint identification module being located on power on button can acquire and identify the identity information of user, be recognized according to fingerprint identification module Current user identities information, obtain login authentication associated with current user identities information interface, and it loaded Show that when different user booting logs in, corresponding login authentication interface is not identical, even if other people peep for user login validation Verification information to active user is not available yet, and substantially increases safety.
In the above-mentioned technical solutions, it is preferable that obtain login associated with the current user identities information described Before the step of verifying interface, further includes: be pre-stored multiple subscriber identity informations and each subscriber identity information and step on Incidence relation between record verifying interface;The acquisition login authentication interface associated with the current user identities information Step specifically includes: according to the pre-stored incidence relation, searching login associated with the current user identities information Verify interface.
In any of the above-described technical solution, it is preferable that further include: detecting the user in login authentication circle When the number of validation information reaches pre-determined number on face, warning note is carried out.
In the technical solution, still authentication failed after inputting the verification information of pre-determined number illustrate to be switched in the presence of malice Situation, carries out warning reminding at this time, excludes security risk in time convenient for related personnel.
In any of the above-described technical solution, it is preferable that the step of progress warning note includes: carry out audio alert Prompt;And/or warning message is sent to designated terminal associated with the computer.
Fig. 2 shows the schematic block diagrams of the computer security entering device of embodiment according to the present invention.
As shown in Fig. 2, the computer security entering device 200 includes: first acquisition unit 202, second acquisition unit 204 and processing unit 206.
Wherein, first acquisition unit 202 is used to obtain the current user identities information that the fingerprint identification module is sent;The Two acquiring units 204 are for obtaining login authentication interface associated with the current user identities information;Processing unit 206 is used In loading and showing the login authentication interface, so that the user carries out login authentication.
In the technical scheme, user needs to start power on button in booting, embedding during pressing power on button The fingerprint identification module being located on power on button can acquire and identify the identity information of user, be recognized according to fingerprint identification module Current user identities information, obtain login authentication associated with current user identities information interface, and it loaded Show that when different user booting logs in, corresponding login authentication interface is not identical, even if other people peep for user login validation Verification information to active user is not available yet, and substantially increases safety.
In the above-mentioned technical solutions, it is preferable that further include: storage unit 208, for being pre-stored multiple user identity letters Breath and the incidence relation between each subscriber identity information and login authentication interface;The second acquisition unit 204 is used In: according to the pre-stored incidence relation, search login authentication interface associated with the current user identities information.
In any of the above-described technical solution, it is preferable that further include: alarm unit 210, for detecting the user When the number of validation information on the login authentication interface reaches pre-determined number, warning note is carried out.
In the technical solution, still authentication failed after inputting the verification information of pre-determined number illustrate to be switched in the presence of malice Situation, carries out warning reminding at this time, excludes security risk in time convenient for related personnel.
In any of the above-described technical solution, it is preferable that the alarm unit 210 is specifically used for: carrying out audio alert and mention Show;And/or warning message is sent to designated terminal associated with the computer.
The technical scheme of the present invention has been explained in detail above with reference to the attached drawings, and technical solution of the present invention proposes a kind of new Computer security login scheme improves safety when computer uses.
It is merely a preferred embodiment of the present invention, is not intended to restrict the invention, for the technology of this field described in upper For personnel, the invention may be variously modified and varied.All within the spirits and principles of the present invention, made any to repair Change, equivalent replacement, improvement etc., should all be included in the protection scope of the present invention.

Claims (8)

1. computer security login method, which is characterized in that the computer includes mainframe box, is provided with out on the mainframe box Machine key, the starting key upper surface are embedded with fingerprint identification module, and the fingerprint identification module is used to press institute in user The finger print information of user is acquired when stating starting key and the identity information of user, the meter are identified according to collected finger print information Calculation machine safe login method includes:
Obtain the current user identities information that the fingerprint identification module is sent;
Obtain login authentication interface associated with the current user identities information;
The login authentication interface is loaded and shows, so that the user carries out login authentication.
2. computer security login method according to claim 1, which is characterized in that in the acquisition and the current use Before the step of family identity information associated login authentication interface, further includes:
It is pre-stored being associated between multiple subscriber identity informations and each subscriber identity information and login authentication interface System;
The step of acquisition login authentication interface associated with the current user identities information, specifically includes:
According to the pre-stored incidence relation, login authentication interface associated with the current user identities information is searched.
3. computer security login method according to claim 1, which is characterized in that further include:
When detecting that number of the user in validation information on the login authentication interface reaches pre-determined number, carry out Warning note.
4. computer security login method according to claim 3, which is characterized in that the step of the progress warning note Include:
Carry out audio alert prompt;And/or
Warning message is sent to designated terminal associated with the computer.
5. a kind of computer security entering device, which is characterized in that the computer includes mainframe box, is arranged on the mainframe box There is starting key, the starting key upper surface is embedded with fingerprint identification module, and the fingerprint identification module in user for pressing The finger print information of user is acquired when pressing the starting key and the identity information of user, institute are identified according to collected finger print information Stating computer security entering device includes:
First acquisition unit, the current user identities information sent for obtaining the fingerprint identification module;
Second acquisition unit, for obtaining login authentication interface associated with the current user identities information;
Processing unit, for loading and showing the login authentication interface, so that the user carries out login authentication.
6. computer security entering device according to claim 5, which is characterized in that further include:
Storage unit, for being pre-stored multiple subscriber identity informations and each subscriber identity information and login authentication circle Incidence relation between face;
The second acquisition unit is used for:
According to the pre-stored incidence relation, login authentication interface associated with the current user identities information is searched.
7. computer security entering device according to claim 5, which is characterized in that further include:
Alarm unit, for detecting that user number of validation information on the login authentication interface reaches pre- When determining number, warning note is carried out.
8. computer security entering device according to claim 7, which is characterized in that the alarm unit is specifically used for:
Carry out audio alert prompt;And/or
Warning message is sent to designated terminal associated with the computer.
CN201811289863.XA 2018-10-31 2018-10-31 Computer security login method and computer security entering device Pending CN109409069A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811289863.XA CN109409069A (en) 2018-10-31 2018-10-31 Computer security login method and computer security entering device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811289863.XA CN109409069A (en) 2018-10-31 2018-10-31 Computer security login method and computer security entering device

Publications (1)

Publication Number Publication Date
CN109409069A true CN109409069A (en) 2019-03-01

Family

ID=65471031

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811289863.XA Pending CN109409069A (en) 2018-10-31 2018-10-31 Computer security login method and computer security entering device

Country Status (1)

Country Link
CN (1) CN109409069A (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102855428A (en) * 2011-06-30 2013-01-02 联想(北京)有限公司 Security control method of computer and computer
CN103312796A (en) * 2012-05-31 2013-09-18 微软公司 Logon interface selection for calculating environment user login
US20140109203A1 (en) * 2000-09-05 2014-04-17 Strikeforce Technologies, Inc. Multichannel device utilizing a centralized out-of-band authentication system (cobas)
CN103761463A (en) * 2014-01-13 2014-04-30 联想(北京)有限公司 Information processing method and electronic device
CN104363226A (en) * 2014-11-12 2015-02-18 深圳市腾讯计算机***有限公司 Method, device and system for logging in operating system
CN106454422A (en) * 2016-07-01 2017-02-22 江苏省公用信息有限公司 Fingerprint recognition-based IPTV program recommending method and apparatus
CN106911963A (en) * 2017-01-04 2017-06-30 乐视控股(北京)有限公司 Method for information display and device in a kind of terminal device
CN107168740A (en) * 2017-05-15 2017-09-15 广东虹勤通讯技术有限公司 A kind of control method of terminal and its operating system

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140109203A1 (en) * 2000-09-05 2014-04-17 Strikeforce Technologies, Inc. Multichannel device utilizing a centralized out-of-band authentication system (cobas)
CN102855428A (en) * 2011-06-30 2013-01-02 联想(北京)有限公司 Security control method of computer and computer
CN103312796A (en) * 2012-05-31 2013-09-18 微软公司 Logon interface selection for calculating environment user login
CN103761463A (en) * 2014-01-13 2014-04-30 联想(北京)有限公司 Information processing method and electronic device
CN104363226A (en) * 2014-11-12 2015-02-18 深圳市腾讯计算机***有限公司 Method, device and system for logging in operating system
CN106454422A (en) * 2016-07-01 2017-02-22 江苏省公用信息有限公司 Fingerprint recognition-based IPTV program recommending method and apparatus
CN106911963A (en) * 2017-01-04 2017-06-30 乐视控股(北京)有限公司 Method for information display and device in a kind of terminal device
CN107168740A (en) * 2017-05-15 2017-09-15 广东虹勤通讯技术有限公司 A kind of control method of terminal and its operating system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
王春东: "《信息安全管理》", 30 April 2008 *

Similar Documents

Publication Publication Date Title
US20240143842A1 (en) System and method for validating authorship of an electronic signature session
WO2015135406A1 (en) Method and system for authenticating biological characteristics of user
US7983452B2 (en) Using a surface based computing device for verification of an identification document
US20180189583A1 (en) Trusted mobile biometric enrollment
CN107026836B (en) Service implementation method and device
US20160072819A1 (en) Determination method for identifying user authority based on fingerprints in a mobile terminal and system employing the same
WO2019090834A1 (en) Express cabinet pickup method and apparatus based on voiceprint
CN102622549B (en) Electronic seal implementation system and method
WO2018094584A1 (en) Payment and identity authentication system based on biometric feature recognition
US20160197917A1 (en) Method and apparatus for authenticating user by using information processing device
US20190260589A1 (en) Identity validity verification method, apparatus and system
CN104378211A (en) Identity authentication method and device
CN107908940B (en) Fingerprint identification method and terminal equipment
CN105721425B (en) information processing method and electronic equipment
CN112671806B (en) User authentication method, user authentication equipment and user authentication system
JP2019507451A (en) Security chip, biometric feature identification method, and biometric feature template registration method
CN111882425B (en) Service data processing method, device and server
JP2011034497A (en) Handwriting collation system, handwriting collation method and handwriting collation program
JP5422326B2 (en) Biometric authentication device
CN107992733B (en) Intelligent terminal and safety unlocking method thereof
CN109409069A (en) Computer security login method and computer security entering device
CN108959894A (en) A kind of implementation method and device, computer readable storage medium, terminal of fingerprint control booting
CN105404803B (en) Operation responding device and operation response method for terminal device
JP2014134986A (en) Biological authentication method
Busch Facing the future of biometrics: Demand for safety and security in the public and private sectors is driving research in this rapidly growing field

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190301

RJ01 Rejection of invention patent application after publication