User logging-in method under system control

A login method and user technology, applied in the field of network systems, can solve problems such as user account theft, and achieve the effects of high security, strong flexibility and strong practicability

Inactive Publication Date: 2016-11-23
安徽天达网络科技有限公司
View PDF4 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

The technical effect of this patented invention compared to previous methods was that they combined advanced technologies like encryption algorithms (crypto) for securely storing data on their own devices or making them difficult-to-reuse without being copiedrighted. This makes sure users are really who they claim to belong back into an authorized account when needed again.

Problems solved by technology

This patented technical solution describes how it prevents unauthorised individuals accessing an electronic identifier called their own personal identification number (PIN) when they connect them through different ways like entering passwords at home or connecting devices wirelessly over wireless networks such as WiFi hotspots.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User logging-in method under system control
  • User logging-in method under system control

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0029] like figure 1 As shown, the present invention provides a system control user login method, comprising the following steps:

[0030] In step S100, the user logs in to the system from the system login interface, and proceeds to step S101.

[0031] Step S101, the user chooses, the system confirms the login method, whether it is USB Key login or username / password login, if the user chooses USB Key login, go to step S102, if the user chooses username / password l

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a user logging-in method under system control. The method comprises: a user logs in a system; the system determines whether the logging in is realized by means of manual inputting or USB Key; if the logging in is realized by using a USB Key, the information in the USB Key is read by the system and the user inputs card number and password information, so that the user can log in the system without being limited by an IP and an Mac address; and after USB Key acknowledge, the system sends a random short-message verification code to the user, the user inputs the verification code and can not log in the system until the verification code is correct, and the system checks the correctness of the verification code and thus the logging in is done successfully. And if the logging in is realized by the manual logging in way, the user inputs a user name and a password; after the information is checked to be correct, the system sends a random short-message verification code to the user; the user inputs the verification code and can not log in the system until the verification code is correct, and the system checks the correctness of the verification code and thus the logging in is done successfully. Compared with the prior art, the method has advantages of high practicability, security and flexibility.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner 安徽天达网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products