[go: up one dir, main page]

CN113132354B - Working method for carrying out file processing optimization configuration by remotely logging in government affair data network - Google Patents

Working method for carrying out file processing optimization configuration by remotely logging in government affair data network Download PDF

Info

Publication number
CN113132354B
CN113132354B CN202110298068.2A CN202110298068A CN113132354B CN 113132354 B CN113132354 B CN 113132354B CN 202110298068 A CN202110298068 A CN 202110298068A CN 113132354 B CN113132354 B CN 113132354B
Authority
CN
China
Prior art keywords
government affair
character
user name
key
small
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110298068.2A
Other languages
Chinese (zh)
Other versions
CN113132354A (en
Inventor
杨琴
师铭
姚平波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing Yangcheng Big Data Technology Co ltd
Original Assignee
Chongqing Yangcheng Big Data Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing Yangcheng Big Data Technology Co ltd filed Critical Chongqing Yangcheng Big Data Technology Co ltd
Priority to CN202110298068.2A priority Critical patent/CN113132354B/en
Publication of CN113132354A publication Critical patent/CN113132354A/en
Application granted granted Critical
Publication of CN113132354B publication Critical patent/CN113132354B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Business, Economics & Management (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Tourism & Hospitality (AREA)
  • Computing Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Development Economics (AREA)
  • Computer Hardware Design (AREA)
  • Economics (AREA)
  • Power Engineering (AREA)
  • General Engineering & Computer Science (AREA)
  • Educational Administration (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Medical Informatics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention provides a working method for carrying out file processing and optimal configuration by remotely logging in a government affair data network, which comprises the following steps: s1, logging in a government affair data network by using a mobile handheld intelligent terminal; and S2, after the verification is passed, configuring files in the government affair cloud platform. The method and the system can safely log in the government affair cloud platform under the protection condition, and prevent the government affair cloud platform from being crashed due to log change under the condition of downtime or power failure.

Description

Working method for carrying out file processing optimization configuration by remotely logging in government affair data network
Technical Field
The invention relates to the technical field of government affair platforms, in particular to a working method for carrying out file processing and optimal configuration by remotely logging in a government affair data network.
Background
With the continuous development of information technology, the information technology gradually enters the information era, and meanwhile, in recent years, with the continuous development of wireless communication technology and mobile internet technology, the information technology is further developed, and at the present stage, china already enters the internet plus era. Under such a background, the government of China gradually increases the construction strength of electronic government affairs, and new media of electronic government affairs, mobile government affairs and government affairs are gradually widely applied in actual work. Patent application No. 2018116461608, entitled "method and apparatus for identifying tampering behavior of system security log, storage medium, and computer device", discloses monitoring a system security log in real time by using a file system small filter driver in a kernel, and intercepting a monitored modification behavior of the system security log; according to the intercepted modification behavior of the system security log, acquiring path information and stack call information corresponding to the modification behavior; and judging whether the modification behavior is a system security log tampering behavior or not according to the path information and the stack calling information of the modification behavior. According to the method and the device, the real-time monitoring of the malicious tampering behaviors of the system security event records in the operating system can be realized by utilizing the small filtering driver of the file system in the kernel, meanwhile, the professional requirements on operation and maintenance personnel are reduced, the personnel cost is reduced, and the recognition accuracy of the malicious tampering behaviors of the system security event records in the operating system is higher.
Disclosure of Invention
The invention aims to at least solve the technical problems in the prior art, and particularly creatively provides a working method for performing file processing optimization configuration by remotely logging in a government affair data network.
In order to achieve the above object, the present invention provides a method for performing file processing optimization configuration work by logging in a government affair data network remotely, which comprises the following steps:
s1, logging in a government affair data network by using a mobile handheld intelligent terminal;
and S2, after the verification is passed, configuring files in the government affair cloud platform.
In a preferred embodiment of the present invention, step S1 includes the steps of:
s11, inputting a government affair login user name and a government affair login password by using the mobile handheld intelligent terminal;
and S12, after the government affair login user name and the government affair login password are processed, the processed government affair login user name and the processed government affair login password are sent to a government affair cloud platform.
In a preferred embodiment of the present invention, in step S12, the following operations are performed on the acquired government affairs login user name:
ε GALU =MD(GALU),
where the GALU represents a government affair login user name.
In a preferred embodiment of the present invention, in step S12, the following operations are performed on the acquired government affairs login password:
ε GALP =MD(GALP),
where the GALP represents a government login password.
In a preferred embodiment of the present invention, in step S2, the authentication method includes the steps of:
the first step, the government affair cloud platform judges whether the received government affair login user name exists in the government affair cloud platform:
if the received government affair login user name exists in the government affair cloud platform, listing the government affair login password corresponding to the government affair login user name in a form of a government affair login password library, wherein the government affair login password library comprises mu government affair login passwords, and mu is a positive integer greater than or equal to 2, and executing the next step;
if the received government affair login user name does not exist in the government affair cloud platform, the government affair cloud platform sends feedback information, and the feedback information indicates that the government affair login user name does not exist in the government affair cloud platform and applies for registering the government affair login user name;
secondly, judging whether the government affair login password exists in a government affair login password library:
if the government affair login password exists in the government affair login password library, the verification is passed;
and if the government affair login password does not exist in the government affair login password library, the verification fails and feedback information is sent, and the feedback information is that the government affair login password is wrong, and the correct government affair login password is required to be input again. A plurality of government affair login passwords are used for corresponding to a government affair login user name, so that multi-password login is realized, and the method is fast and efficient.
In a preferred embodiment of the present invention, step S2 includes the following steps:
s21, sending a control command for changing a government affair cloud platform log information file to a government affair cloud platform by using the mobile handheld intelligent terminal;
s22, the government affair cloud platform judges whether the government affair cloud platform receives a control command for changing the log information file of the government affair cloud platform:
if the government affair cloud platform receives a control command for changing the log information file of the government affair cloud platform, executing the next step;
if the government affair cloud platform does not receive the control command for changing the log information file of the government affair cloud platform, returning to the step S22;
s23, acquiring the government affair cloud platform log information file, and copying and pasting the acquired government affair cloud platform log information file to generate a government affair cloud platform log information file copy; a log safety lock is set for the generated government affair cloud platform log information file copy, under the condition of the log safety lock, other processes cannot access the government affair cloud platform log information file copy, and other processes do not comprise a control command process for changing the government affair cloud platform log information file, so that the integrity and the safety of the government affair cloud platform log information file copy can be ensured;
s24, changing the generated government affair cloud platform log information file copy by using the control command to obtain a government affair cloud platform log information file change copy; and cancel its log security lock;
and S25, replacing the government affair cloud platform log information file with the government affair cloud platform log information file change copy obtained in the step S24, and changing the government affair cloud platform log information file.
In conclusion, due to the adoption of the technical scheme, the government affair cloud platform can be safely logged in under the protection condition, and the government affair cloud platform is prevented from being crashed due to log change under the condition of outage or power failure.
Additional aspects and advantages of the invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention.
Drawings
The above and/or additional aspects and advantages of the present invention will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
FIG. 1 is a schematic block diagram of the process of the present invention.
FIG. 2 is a schematic representation of the present invention.
FIG. 3 is a schematic representation of the present invention.
FIG. 4 is a schematic representation of the present invention.
FIG. 5 is a schematic representation of the present invention.
FIG. 6 is a schematic representation of the present invention.
FIG. 7 is a schematic representation of the present invention.
FIG. 8 is a schematic representation of the present invention.
FIG. 9 is a schematic representation of the present invention.
FIG. 10 is a schematic representation of the present invention.
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the accompanying drawings are illustrative only for the purpose of explaining the present invention and are not to be construed as limiting the present invention.
The invention discloses a working method for carrying out file processing optimization configuration by remotely logging in a government affair data network, which comprises the following steps as shown in figure 1:
s1, logging in a government affair data network by using a mobile handheld intelligent terminal;
and S2, after the verification is passed, configuring files in the government affair cloud platform.
In a preferred embodiment of the present invention, step S1 includes the steps of:
s11, inputting a government affair login user name and a government affair login password by using the mobile handheld intelligent terminal;
and S12, after the government affair login user name and the government affair login password are processed, the processed government affair login user name and the processed government affair login password are sent to a government affair cloud platform.
In a preferred embodiment of the present invention, the method of inputting a government affair login user name in step S11 includes the steps of:
s111, judging whether the user name triggering command of government affair login is received:
if receiving a trigger command for inputting a government affair login user name, executing step S112;
if the input government affair login user name triggering command is not received, returning to the step S111;
s112, displaying a government affair login user name character input display frame on the mobile handheld intelligent terminal, wherein the government affair login user name character input display frame comprises government affair login user name character keys, all government affair login user name character keys are all characters input by the government affair login user name characters, and characters displayed on each government affair login user name character key are different and comprise one or any combination of numbers, capital letters and lowercase letters; the numbers include one or any combination of 0, 1, 2, 3, \8230 \ 8230;, 9, the capital letters include A, B, C, D, \8230;, Z, the lowercase letters include a, B, C, D, \8230;, Z, or any combination thereof; let α =2;
s113, if a certain character is displayed on a key after receiving the character input of the 1 st government affair login user name, if the key is triggered, the character displayed by the key is received, the number of all government affair login user name character keys in a character input display frame of the government affair login user name is counted and recorded as beta; the method comprises the steps of pressing a No. 1 key of a government affair login user name character, pressing a No. 2 key of the government affair login user name character, pressing a No. 3 key of a government affair login user name character, \8230 \\ 8230;, pressing a No. beta key of the government affair login user name character;
s114, acquiring characters displayed on a No. 1 key of a government affair login user name character, a No. 2 key of the government affair login user name character, a No. 3 key of the government affair login user name character, \8230 \ 8230;, and a No. beta key of the government affair login user name character, and performing the following operations:
Figure BDA0002985069660000031
wherein, MD 2 () A hash algorithm representing performing MD5 2 times;
MD 1 () Represents a hash algorithm for performing MD5 1 time;
MD () represents a hash algorithm for MD 5;
χ δ the character which is displayed on the delta th key of the character of the government affair login user name is shown; δ =1, 2, 3, \8230;, β;
ε δ,2 character x displayed on delta key of character of user name for government affairs login δ Performing 2 times of operation to obtain an operation value;
s115, all the calculationThe values are arranged from small to large or from large to small to obtain chi 1 ′、χ 2 ′、χ 3 ′、……、χ β '; wherein, χ 1 ' arranging the operation value at the 1 st bit from small to large or from large to small for all the operation values, and x 2 ' arranging the operation values in the 2 nd bit from small to large or from large to small for all the operation values, and x 3 ' is the calculation value of 3 rd bit arranged from small to large or from large to small, \ 8230; \ 8230;. χ β ' arranging the operation values at the beta-th bit from small to large or from large to small for all the operation values;
s116, arranging all the operation values in the 1 st bit of the operation values according to the descending or descending order 1 The corresponding characters are displayed on the No. 1 key of the government affair login user name characters, and all the calculated values are arranged into the calculated value x of the No. 2 bit from small to large or from large to small 2 The corresponding characters are displayed on the No. 2 key of the government affair login user name characters, and all the calculation values are arranged into the calculation value x of the No. 3 digit from small to large or from large to small 3 ' the corresponding character is displayed on the No. 3 key of the government affairs login user name character, \8230; \8230. All the operation values are arranged from small to large or from large to small in the operation value χ at the beta position β ' the corresponding character is displayed on the beta-th key of the government affair login user name character; from small to large as x 1 ′、χ 2 ′、χ 3 ′、……、χ β-2 ′、χ β-1 ′、χ β ' in turn equals ε β,2 、ε β-1,2 、ε β-2,2 、……、ε 3,2 、ε 2,2 、ε 1,2 Sequentially changing the characters from small to big β Displayed on the beta-th key, character χ β-1 Displayed on the beta-1 th key, character chi β-2 Displayed on the beta-2 key, the character of \8230;, the character of x 3 Displayed on the 3 rd key, character x 2 Displayed on the 2 nd key, character χ 1 Displayed on the 1 st key.
S117 displaying a certain character on the key, receiving the character displayed on the key if the key is triggered, and performing the following operations after receiving the alpha government affair login user name character input:
Figure BDA0002985069660000041
wherein, MD α+1 () Represents the hash algorithm for performing MD5 for alpha +1 times;
MD 1 () Represents a hash algorithm performed 1 time MD 5;
MD α () Representing a hash algorithm for performing MD5 a time;
MD α-1 () Represents the hash algorithm for performing MD5 a-1 times;
MD α-2 () Represents a hash algorithm for performing MD5 a-2 times;
Figure BDA0002985069660000042
represents a total of α + 1;
MD () represents a hash algorithm for MD 5;
χ δ a character indicating that displayed on the δ -th key of the government affairs login user name character in step S114; δ =1, 2, 3, \8230;, β;
ε δ,α+1 character x displayed on delta key of character of user name for government affairs login δ Carrying out alpha +1 times of operation to obtain a result value;
s118, arranging all the calculated values from small to large or from large to small to obtain the χ 1 ″、χ 2 ″、χ 3 ″、……、χ β "; wherein, χ 1 "is the result value in bit 1 arranged from small to large or from large to small for all result values, χ 2 "is the result value in the 2 nd bit arranged from small to large or from large to small for all result values, χ 3 "is the result value at the 3 rd bit arranged from small to large or from large to small, \8230;, χ β "is all result values are in the beta-th order from small to large or from large to smallThe result value of the bit;
s119, arranging the result values X at the 1 st bit from small to large or from large to small 1 "the corresponding character is displayed on the No. 1 key of the government affairs login user name character, all the result values are arranged in the No. 2 result value χ from small to large or from large to small 2 "the corresponding character is displayed on the 2 nd key of the government affair login user name character, all the result values are arranged in the 3 rd bit result value χ from small to large or from large to small 3 "the corresponding character is displayed on the No. 3 key of the government affair login user name character, \8230; \8230, all the result values are arranged from small to large or from large to small in the result value χ at the beta position β The corresponding character is displayed on the beta-th key of the government affair login user name character; α = α +1, and returns to step S117; until the government affair login user name character is input. From small to large as x 1 ″、χ 2 ″、χ 3 ″、……、χ β-2 ″、χ β-1 ″、χ β "in turn equals ε β,3 、ε β-1,3 、ε β-2,3 、……、ε 3,3 、ε 2,3 、ε 1,3 Then character x β Displaying on the beta-th key, and sequentially increasing the characters x from small to big β-1 Displayed on the beta-1 th key, character chi β-2 Displayed on the beta-2 key, the character of \8230;, the character of x 3 Displayed on the 3 rd key, character x 2 Displayed on the 2 nd key, character χ 1 Displayed on the 1 st key.
In a preferred embodiment of the present invention, step S110 is included before step S111, and step S110 includes steps S1101 to S1104;
s1101, all characters input by the government affair login user name characters are arranged and sequentially numbered, and are marked as A 1 、A 2 、A 3 、……、A β ;A 1 A 1 st digit character indicating the arrangement of all characters input from the characters of the government affairs registration user name, A 2 A 2 nd digit character indicating the arrangement of all characters input from the characters of the government affairs registration user name, A 3 Show thatThe 3 rd character after all characters input by the characters of the government affair login user name are arranged, \8230; \ 8230;, A β A beta-bit character which expresses all characters input by the government affair login user name characters are arranged;
s1102, performing the following operations on the arranged characters:
Figure BDA0002985069660000051
wherein, MD 1 () Represents a hash algorithm for performing MD5 1 time;
MD () represents a hash algorithm for MD 5;
A β′ a beta' -th digit character representing a result of arranging all characters input from the characters of the government affair login user name; beta' =1, 2, 3, \8230;, beta;
Figure BDA0002985069660000052
a beta' -th bit character A representing the arrangement of all characters input by the characters of the government affair login user name β′ Performing 1 operation to obtain a display value;
s1103, arranging all the display values from small to large or from large to small to obtain χ 1 ″′、χ 2 ″′、χ 3 ″′、……、χ β "; wherein, χ 1 "' is the display value of 1 st digit, χ 2 "' is the display value of 2 nd bit, χ, arranged from small to large or from large to small for all display values 3 "' is the display value in the 3 rd bit in the order from small to large or from large to small, \ 8230; \ 8230;. χ β "' is the display value of the beta bit of all display values arranged from small to large or from large to small;
s1104, arranging all display values from small to large or from large to small to display value χ at 1 st bit 1 The corresponding character of' is displayed on the No. 1 key of the government affairs login user name character, and all the characters are displayedThe display value χ with the 2 nd bit is arranged from small to large or from large to small 2 The character corresponding to' is displayed on the 2 nd key of the government affair login user name character, and all display values are arranged in the 3 rd bit display value χ from small to large or from large to small 3 The corresponding character of ""' is displayed on the No. 3 key of the government affairs login user name character, \8230, all the display values are arranged from small to large or from large to small in the display value χ at the beta position β The corresponding character of ""' is displayed on the beta-th key of the government affairs login user name character. From small to large as χ 1 ″′、χ 2 ″′、χ 3 ″′、……、χ β-2 ″′、χ β-1 ″′、χ β "' in turn equals
Figure BDA0002985069660000061
The characters A are sequentially changed from small to large β Displayed on the beta-th key, character A β-1 Displayed on the beta-1 th key, character A β-2 The letter A is displayed on the beta-2 key for displaying its letter 82308230 3 Displayed on the 3 rd key, character A 2 Displayed on the 2 nd key, character A 1 Displayed on the 1 st key.
A specific embodiment is given below, and the 1 st key of the government affair login user name character, the 2 nd key of the government affair login user name character, the 3 rd key of the government affair login user name character, the 4 th key of the government affair login user name character and the 5 th key of the government affair login user name character are sequentially arranged from left to right; all characters input by the characters of the government affair login user name are A, B, C, D and E, and the government affair login user name is BBCE.
The first step, arranging A, B, C, D and E as follows: B. a, D, C, E; namely A 1 、A 2 、A 3 、A 4 、A 5 B, A, D, C and E are sequentially and correspondingly formed; a. The 1 =B,A 2 =A,A 3 =D,A 4 =C,A 5 =E。
In the second step, the first step is that,
Figure BDA0002985069660000062
Figure BDA0002985069660000063
Figure BDA0002985069660000064
Figure BDA0002985069660000065
Figure BDA0002985069660000071
thirdly, arranging all the display values from small to large to obtain chi 1 ″′、χ 2 ″′、χ 3 ″′、……、χ β "' in turn corresponds to
Figure BDA0002985069660000072
Figure BDA0002985069660000073
The fourth step is that the first step is that,
Figure BDA0002985069660000074
the characters which correspond to the characters C, E, A, B and D in sequence are displayed on a 1 st key of a government affair login user name character, a 2 nd key of the government affair login user name character, a 3 rd key of the government affair login user name character, a 4 th key of the government affair login user name character and a 5 th key of the government affair login user name character correspondingly, as shown in figure 2.
Fifthly, if receiving the input of the 1 st government affair login user name character (namely B), performing the following operations:
Figure BDA0002985069660000075
Figure BDA0002985069660000076
Figure BDA0002985069660000077
Figure BDA0002985069660000081
Figure BDA0002985069660000082
all the calculated values are arranged from small to large to obtain the x 1 ″、χ 2 ″、χ 3 ″、……、χ β "sequentially correspond to ε 4,2 、ε 5,2 、ε 2,2 、ε 1,2 、ε 3,2
Sixth step,. Epsilon 4,2 、ε 5,2 、ε 2,2 、ε 1,2 、ε 3,2 The corresponding characters are B, D, E, C and A in sequence, and the characters B, D, E, C and A are displayed on a 1 st key of a government affair login user name character, a 2 nd key of the government affair login user name character, a 3 rd key of the government affair login user name character, a 4 th key of the government affair login user name character and a 5 th key of the government affair login user name character correspondingly, as shown in FIG. 3.
Seventhly, if the input of the 2 nd government affair login user name character (namely B) is received, the following operations are carried out:
Figure BDA0002985069660000083
or,
Figure BDA0002985069660000091
Figure BDA0002985069660000092
or,
Figure BDA0002985069660000093
Figure BDA0002985069660000094
or,
Figure BDA0002985069660000101
Figure BDA0002985069660000102
or is present in>
Figure BDA0002985069660000103
Figure BDA0002985069660000104
Or,
Figure BDA0002985069660000111
all the calculated values are arranged from small to large to obtain the x 1 ″、χ 2 ″、χ 3 ″、……、χ β "sequentially correspond to ε 3,3 、ε 2,3 、ε 5,3 、ε 4,3 、ε 1,3
Eighth step, ε 3,3 、ε 2,3 、ε 5,3 、ε 4,3 、ε 1,3 The characters corresponding to A, E, D, B and C in sequence are corresponding to the 1 st key of the characters of the government affair login user name and the government affair login user nameThe username character 2 nd key, the government login username character 3 rd key, the government login username character 4 th key, and the government login username character 5 th key are displayed as shown in fig. 4.
Ninthly, if the input of the 3 rd government affair login user name character (namely C) is received, the following operations are carried out:
Figure BDA0002985069660000112
or,
Figure BDA0002985069660000121
Figure BDA0002985069660000122
or is present in>
Figure BDA0002985069660000123
Figure BDA0002985069660000131
Or,
Figure BDA0002985069660000132
Figure BDA0002985069660000133
or,
Figure BDA0002985069660000141
Figure BDA0002985069660000142
or is present in>
Figure BDA0002985069660000143
All the calculated values are arranged from small to large to obtain the x 1 ″、χ 2 ″、χ 3 ″、……、χ β "in turn correspond to ε 4,4 、ε 1,4 、ε 3,4 、ε 5,4 、ε 2,4
Tenth step, ε 4,4 、ε 1,4 、ε 3,4 、ε 5,4 、ε 2,4 The corresponding characters are B, C, A, D and E in sequence, and the characters B, C, A, D and E are displayed on a 1 st key of a government affair login user name character, a 2 nd key of the government affair login user name character, a 3 rd key of the government affair login user name character, a 4 th key of the government affair login user name character and a 5 th key of the government affair login user name character correspondingly, as shown in FIG. 5.
As a tenth step, if the 4 th government affair login user name character (i.e. E) is received, the following operations are performed:
Figure BDA0002985069660000151
or, in conjunction with>
Figure BDA0002985069660000152
Figure BDA0002985069660000153
Or, in conjunction with>
Figure BDA0002985069660000161
Figure BDA0002985069660000162
Or is present in>
Figure BDA0002985069660000171
Figure BDA0002985069660000172
Or is present in>
Figure BDA0002985069660000181
Figure BDA0002985069660000182
Or, in conjunction with>
Figure BDA0002985069660000191
All the calculated values are arranged from small to large to obtain the x 1 ″、χ 2 ″、χ 3 ″、……、χ β "in turn correspond to ε 4,5 、ε 3,5 、ε 2,5 、ε 1,5 、ε 5,5
A twelfth step of e 4,5 、ε 3,5 、ε 2,5 、ε 1,5 、ε 5,5 The characters which correspond to the characters B, A, E, C and D in sequence are displayed on a 1 st key of a government affair login user name character, a 2 nd key of the government affair login user name character, a 3 rd key of the government affair login user name character, a 4 th key of the government affair login user name character and a 5 th key of the government affair login user name character correspondingly, and the characters B, A, E, C and D are shown in figure 6. The characters displayed by the input keys are different, and safety protection is enhanced.
And step thirteen, finishing the input of the characters of the 4-position government affair login user name.
In a preferred embodiment of the present invention, in steps S115, S118 and S1103, all of their calculated values are arranged from small to large;
or/and replacing the actual entered characters with other identical or different characters in the government entry username entry box, the other identical or different characters being all characters not including the government entry username character entry.
Another specific embodiment is given below, and the 1 st key of the government affair login user name character, the 2 nd key of the government affair login user name character, the 3 rd key of the government affair login user name character, the 4 th key of the government affair login user name character and the 5 th key of the government affair login user name character are sequentially arranged from left to right; all characters input by the characters of the government affair login user name are A, B, C, D and E, the government affair login user name is BBCE, and the displayed government affair login user name is replaced by.
The first step, arranging A, B, C, D and E as follows: B. a, D, C, E; namely A 1 、A 2 、A 3 、A 4 、A 5 B, A, D, C and E are sequentially and correspondingly formed; a. The 1 =B,A 2 =A,A 3 =D,A 4 =C,A 5 =E。
In the second step, the first step is that,
Figure BDA0002985069660000192
Figure BDA0002985069660000193
Figure BDA0002985069660000194
Figure BDA0002985069660000201
Figure BDA0002985069660000202
thirdly, arranging all the display values from small to large to obtain chi 1 ″′、χ 2 ″′、χ 3 ″′、……、χ β ' in turn corresponds to
Figure BDA0002985069660000203
Figure BDA0002985069660000204
The fourth step is that the first step is that,
Figure BDA0002985069660000205
the characters which correspond to the characters C, E, A, B and D in sequence are displayed on a 1 st key of a government affair login user name character, a 2 nd key of the government affair login user name character, a 3 rd key of the government affair login user name character, a 4 th key of the government affair login user name character and a 5 th key of the government affair login user name character correspondingly, as shown in figure 1.
Fifthly, if receiving the input of the 1 st government affair login user name character (namely B, which shows x), the following operations are carried out:
ε 1,2 =297e7ca127d2eef674c119331fe30dff,
ε 2,2 =1925294ef4492da4b990901ebab5396e,
ε 3,2 =7fc56270e7a70fa81a5935b72eacbe29,
ε 4,2 =01b7c90b02081ae53119957e0697b081,
ε 5,2 =0c554e24da6263f40dbc6aabe26f354d,
all the calculated values are arranged from small to large to obtain the x 1 ″、χ 2 ″、χ 3 ″、……、χ β "sequentially correspond to ε 4,2 、ε 5,2 、ε 2,2 、ε 1,2 、ε 3,2
Sixth step,. Epsilon 4,2 、ε 5,2 、ε 2,2 、ε 1,2 、ε 3,2 The corresponding characters are B, D, E, C and A in sequence, and the characters B, D, E, C and A correspond to a 1 st key of a government affair login user name character, a 2 nd key of the government affair login user name character, a 3 rd key of the government affair login user name character and government affair loginThe username character 4 th key, and the government entry username character 5 th key, as shown in fig. 7.
Seventhly, after receiving the input of the 2 nd government affair login user name character (namely B, showing), the following operations are carried out:
ε 1,3 =dc79ebf62a4e1174b800dede4387db83,
ε 2,3 =085604d6283a0e8684d73e9b97444c90,
ε 3,3 =01484f32e1eae8c021a3bd2fb3d1062f,
ε 4,3 =d1670092d8ba29909a5522d369f6b87c,
ε 5,3 =0e578f3df143ddbf9bea0b80a26fcfdc,
all the calculated values are arranged from small to large to obtain the x 1 ″、χ 2 ″、χ 3 ″、……、χ β "sequentially correspond to ε 3,3 、ε 2,3 、ε 5,3 、ε 4,3 、ε 1,3
Eighth step,. Epsilon 3,3 、ε 2,3 、ε 5,3 、ε 4,3 、ε 1,3 The characters corresponding to the characters A, E, D, B and C in sequence are displayed on a 1 st key of a government affair login user name character, a 2 nd key of the government affair login user name character, a 3 rd key of the government affair login user name character, a 4 th key of the government affair login user name character and a 5 th key of the government affair login user name character, as shown in FIG. 8.
Ninthly, if the input of the 3 rd government affair login user name character (namely, C, displayed is) is received, the following operations are carried out:
ε 1,4 =287e1bad918671acbed1fee599cd505e,
ε 2,4 =74545c8c2974ec7b75e37e1f4638e632,
ε 3,4 =5eed7cf4fa6ac7f52226d3af23b5be2b,
ε 4,4 =1597dd3950b6ec77f0962b26ea6ca4a5,
ε 5,4 =71827e65d14efba2a7d2afc6f22240e5,
all the calculated values are arranged from small to large to obtain the chi 1 ″、χ 2 ″、χ 3 ″、……、χ β "sequentially correspond to ε 4,4 、ε 1,4 、ε 3,4 、ε 5,4 、ε 2,4
Tenth step, ε 4,4 、ε 1,4 、ε 3,4 、ε 5,4 、ε 2,4 The characters which correspond to the characters B, C, A, D and E in sequence are displayed on a 1 st key of a government affair login user name character, a 2 nd key of the government affair login user name character, a 3 rd key of the government affair login user name character, a 4 th key of the government affair login user name character and a 5 th key of the government affair login user name character correspondingly, and the characters B, C, A, D and E are shown in figure 9.
As a tenth step, upon receiving the 4 th government entry username character (i.e., E, shown), the following operations are performed:
ε 1,5 =f38ea8b5a97c3bf1f9f123a40659cec1,
ε 2,5 =71aa778898173c34d7d2faf7302500c2,
ε 3,5 =34df0b4fb03ed989d3d2a61e1b45ee67,
ε 4,5 =2cc52748677ae83a4badc0cfc620c82b,
ε 5,5 =f7d556efacd347eb42d2f9bc19d25180,
all the calculated values are arranged from small to large to obtain the x 1 ″、χ 2 ″、χ 3 ″、……、χ β "sequentially correspond to ε 4,5 、ε 3,5 、ε 2,5 、ε 1,5 、ε 5,5
A twelfth step of e 4,5 、ε 3,5 、ε 2,5 、ε 1,5 、ε 5,5 The characters which correspond to the characters B, A, E, C and D in sequence are displayed on a 1 st key of a government affair login user name character, a 2 nd key of the government affair login user name character, a 3 rd key of the government affair login user name character, a 4 th key of the government affair login user name character and a 5 th key of the government affair login user name character correspondingly, and the characters B, A, E, C and D are displayed on a 1 st key of the government affair login user name character, a 2 nd key of the government affair login user name character, a 3 rd key of the government affair login user name character, a 4 th key of the government affair login user name character and a 5 th key of the government affair login user name character correspondingly as shown in the figureShown at 10.
And step thirteen, finishing the input of the characters of the user name for logging in the 4-bit government affairs.
In a preferred embodiment of the present invention, the method of inputting a government affairs login password in step S11 includes the steps of:
s111, judging whether the receiving of the government affair login password triggering command:
if receiving the trigger command of inputting the government affair login password, executing the step S112;
if the government affair login password input triggering command is not received, returning to the step S111;
s112, displaying a government affair login password character input display frame on the mobile handheld intelligent terminal, wherein the government affair login password character input display frame comprises government affair login password character keys, all government affair login password character keys are all characters input by the government affair login password characters, and characters displayed on each government affair login password character key are different and comprise one or any combination of numbers, capital letters and lowercase letters; the numbers comprise 0, 1, 2, 3, 8230, 9, upper case letters comprise A, B, C, D, 8230, Z, lower case letters comprise a, B, C, D, 8230, Z or any combination; let ζ =2;
s113, counting the number of all government affair login password character keys in a display frame for inputting the government affair login password characters and recording the number as psi after receiving the input of the 1 st government affair login password character; the key is the 1 st key of the government affairs login password character, the 2 nd key of the government affairs login password character, the 3 rd key of the government affairs login password character, \8230 \ 8230;, the psi th key of the government affairs login password character;
s114, acquiring characters displayed on a No. 1 key of a government affair login password character, a No. 2 key of the government affair login password character, a No. 3 key of the government affair login password character, \8230 \ 8230;, and a No. psi key of the government affair login password character, and performing the following operations:
Figure BDA0002985069660000221
wherein, MD 2 () A hash algorithm representing performing MD5 2 times;
MD 1 () Represents a hash algorithm performed 1 time MD 5;
MD () represents a hash algorithm for MD 5;
τ ξ a character indicating a character displayed on a xi key of a government affair login password character; ξ =1, 2, 3, \8230;, ψ;
Figure BDA0002985069660000222
character tau displayed on the xi key of the character of the government affairs login password ξ Performing 2 times of operation to obtain an operation value;
s115, arranging all the operation values from small to large or from large to small to obtain tau 1 ′、τ 2 ′、τ 3 ′、……、τ β '; wherein, tau 1 ' the operation value at bit 1 is arranged from small to large or from large to small for all operation values, tau 2 ' the operation value at the 2 nd bit is arranged from small to large or from large to small for all the operation values, τ 3 ' is the calculation value of 3 rd bit arranged from small to large or from large to small for all calculation values, \8230;. Tau. ψ ' arranging operation values at the psi-th bit from small to large or from large to small for all operation values;
s116, arranging all the operation values from small to large or from large to small to be in the operation value tau of the 1 st bit 1 ' the corresponding character is displayed on the No. 1 key of the government affairs login password character, and all the operation values are arranged into the operation value tau at the No. 2 bit from small to large or from large to small 2 ' the corresponding character is displayed on the No. 2 key of the government affairs login password character, all the calculated values are arranged from small to large or from large to small to be at the calculated value tau of the No. 3 bit 3 ' the corresponding character is displayed on the No. 3 key of the government affairs login password character, \8230;, all the operation values are arranged from small to large or from large to small in the operation value tau at the psi-th digit ψ ' the corresponding character is displayed on the psi th key of the government affair login password character;
s117, upon receiving input of the ζ th government affair login password character, performs the following operations:
Figure BDA0002985069660000231
wherein, MD ζ+1 () Represents a hashing algorithm for performing MD5 +1 times;
MD 1 () Represents a hash algorithm performed 1 time MD 5;
MD ζ () A hash algorithm representing MD5 performed ζ times;
MD ζ-1 () A hash algorithm representing MD5 performed ζ -1 time;
MD ζ-2 () A hashing algorithm representing performing ζ -2 times MD 5;
Figure BDA0002985069660000232
represents a total of ζ + 1;
MD () represents a hash algorithm for MD 5;
τ ξ a character indicating that displayed on the ξ -th key of the government affairs login password character in step S114; ξ =1, 2, 3, \8230;, ψ;
Figure BDA0002985069660000233
character tau displayed on the xi key of the character of the government affairs login password ξ The result value obtained by zeta +1 operation;
s118, arranging all the operation values from small to large or from large to small to obtain tau 1 ″、τ 2 ″、τ 3 ″、……、τ ψ "; wherein, tau 1 "all result values are arranged from small to large or from large to small in the 1 st bit, τ 2 "is the result value at the 2 nd bit is arranged from small to large or from large to small for all result values, τ 3 Is all the resultsThe values are arranged from small to large or from large to small at the result value of bit 3, \ 8230; \8230;. Tau ψ "arranging the result values at the ψ -th bit for all the result values from small to large or from large to small;
s119, arranging the result values tau at the 1 st bit from small to large or from large to small 1 "the corresponding character is displayed on the 1 st key of the government affair login password character, all the result values are arranged from small to large or from large to small in the 2 nd bit result value tau 2 "the corresponding character is displayed on the 2 nd key of the government affair login password character, all the result values are arranged from small to large or from large to small in the result value tau at the 3 rd bit 3 "corresponding characters are displayed on the No. 3 key of the government affairs login password character, \8230;, all result values are arranged from small to large or from large to small in the result value tau at the psi position ψ "the corresponding character is displayed on the psi key of the government affairs login password character; ζ = ζ +1, return to step S117; until the government affair login password character is input.
In a preferred embodiment of the present invention, step S110 is included before step S111, and step S110 includes steps S1101 to S1104;
s1101, arranging all characters input by the government affair login password characters, sequentially numbering the characters, and marking as B 1 、B 2 、B 3 、……、B β ;B 1 A 1 st digit character, B, representing the arrangement of all characters entered by the government affairs login password character 2 2 nd digit character, B, indicating the arrangement of all characters entered by the government affairs login password character 3 The 3 rd character representing the arrangement of all characters inputted by the government affair login password character, \8230; \8230, B β A beta-bit character representing that all characters input by the government affair login password character are arranged;
s1102, performing the following operations on the arranged characters:
Figure BDA0002985069660000241
wherein, MD 1 () Represents a hash algorithm performed 1 time MD 5;
MD () represents a hash algorithm for MD 5;
B β "a β" bit character indicating that all characters input by the government affairs login password character are arranged; beta' =1, 2, 3, \8230;, beta;
Figure BDA0002985069660000242
a beta-digit character B for indicating the arrangement of all the characters input by the government affairs login password character β "presentation value obtained by performing 1 operation;
s1103, arranging all the presentation values from small to large or from large to small to obtain tau 1 ″′、τ 2 ″′、τ 3 ″′、……、τ β "; wherein, tau 1 "' is the presentation value at bit 1, τ, with all presentation values arranged from small to large or from large to small 2 "' is the presentation value at position 2 in descending order or ascending order of all presentation values, τ 3 "' is the presentation value of the 3 rd bit in the descending order or descending order of presentation values, \8230;. Tau. β "' is the presentation value at the beta-th position of all presentation values arranged from small to large or from large to small;
s1104, arranging all the presentation values in a 1 st bit presentation value tau from small to large or from large to small 1 The character corresponding to' is displayed on the No. 1 key of the government affairs login password character, and all the presentation values are arranged from small to large or from large to small to be in the 2 nd presentation value tau 2 The character corresponding to' is displayed on the 2 nd key of the government affairs login password character, and all the presentation values are arranged from small to large or from large to small to be at the 3 rd bit presentation value tau 3 "' is displayed on the No. 3 key of the government code character, \8230; \8230, and all the presentation values are arranged from small to large or from large to small at the presentation value tau at the beta position β "' corresponds to display of charactersOn the beta key of the government login password character.
In a preferred embodiment of the present invention, in steps S115, S118, and S1103, all of the calculation values thereof are arranged from large to small;
or/and replacing the actual input character with another same or different character in the government login password input box, wherein the other same or different character is the whole character which does not comprise the input of the government login password character.
In a preferred embodiment of the present invention, in step S12, the following operations are performed on the acquired government affairs login user name:
ε GALU =MD(GALU),
wherein, MD () represents the hash algorithm for MD 5;
GALU represents a government login user name;
ε GALU representing the government affair login user name GALU which is processed to obtain the processed government affair login user name;
or/and in step S12, the following operations are carried out on the acquired government affair login password:
ε GALP =MD(GALP),
wherein, MD () represents the hash algorithm for MD 5;
GALP represents government login password;
ε GALP the GALP is processed to obtain the processed government affairs login password.
Or/and in step S2, the verification method comprises the steps of:
the first step, the government affair cloud platform judges whether the received government affair login user name exists in the government affair cloud platform:
if the received government affair login user name exists in the government affair cloud platform, listing the government affair login password corresponding to the government affair login user name in a form of a government affair login password library, wherein the government affair login password library comprises mu government affair login passwords, and mu is a positive integer greater than or equal to 2, and executing the next step;
if the received government affair login user name does not exist in the government affair cloud platform, the government affair cloud platform sends feedback information, and the feedback information indicates that the government affair login user name does not exist in the government affair cloud platform and applies for registering the government affair login user name;
secondly, judging whether the government affair login password exists in a government affair login password library:
if the government affair login password exists in the government affair login password library, the verification is passed;
and if the government affair login password does not exist in the government affair login password library, the verification fails and feedback information is sent, and the feedback information is that the government affair login password is wrong, and the correct government affair login password is required to be input again.
In a preferred embodiment of the present invention, step S2 includes the following steps:
s21, sending a control command for changing a government affair cloud platform log information file to a government affair cloud platform by using the mobile handheld intelligent terminal;
s22, the government affair cloud platform judges whether the government affair cloud platform receives a control command for changing the log information file of the government affair cloud platform:
if the government affair cloud platform receives a control command for changing the log information file of the government affair cloud platform, executing the next step;
if the government affair cloud platform does not receive the control command for changing the log information file of the government affair cloud platform, returning to the step S22;
s23, acquiring a government affair cloud platform log information file, and copying and pasting the acquired government affair cloud platform log information file to generate a government affair cloud platform log information file copy; a log safety lock is set for the generated government affair cloud platform log information file copy, under the condition of the log safety lock, other processes cannot access the government affair cloud platform log information file copy, and other processes do not comprise a control command process for changing the government affair cloud platform log information file, so that the integrity and the safety of the government affair cloud platform log information file copy can be ensured;
s24, changing the generated copy of the government affair cloud platform log information file by using the control command of the government affair cloud platform log information file, and obtaining a changed copy of the government affair cloud platform log information file; and cancel its log security lock;
and S25, replacing the government affair cloud platform log information file with the government affair cloud platform log information file change copy obtained in the step S24, and changing the government affair cloud platform log information file.
While embodiments of the invention have been shown and described, it will be understood by those of ordinary skill in the art that: various changes, modifications, substitutions and alterations can be made to the embodiments without departing from the principles and spirit of the invention, the scope of which is defined by the claims and their equivalents.

Claims (5)

1. A working method for carrying out file processing optimization configuration by remotely logging in a government affair data network is characterized by comprising the following steps:
s1, logging in a government affair data network by using a mobile handheld intelligent terminal; the method for logging in the government affair data network by utilizing the mobile handheld intelligent terminal comprises the following steps:
s11, inputting a government affair login user name and a government affair login password by using the mobile handheld intelligent terminal; the method for inputting the government affair login user name by using the mobile handheld intelligent terminal comprises the following steps:
s111, judging whether the user name triggering command of government affair login is received:
if receiving the trigger command of inputting the government affair login user name, executing step S112;
if the input government affair login user name triggering command is not received, returning to the step S111;
s112, displaying a government affair login user name character input display box on the mobile handheld intelligent terminal, wherein the government affair login user name character input display box comprises government affair login user name character keys, all government affair login user name character keys are all characters input by the government affair login user name characters, and characters displayed on each government affair login user name character key are different and comprise one or any combination of numbers, capital letters and lowercase letters; the numbers include one or any combination of 0, 1, 2, 3, \8230 \ 8230;, 9, the capital letters include A, B, C, D, \8230;, Z, the lowercase letters include a, B, C, D, \8230;, Z, or any combination thereof; let α =2;
s113, if a character is displayed on a key after receiving the character input of the 1 st government affair login user name, if the key is triggered, the character displayed by the key is received, counting the number of all the government affair login user name character keys in the character input display frame of the government affair login user name, and recording the number as beta; the method comprises the steps of pressing a No. 1 key of a government affair login user name character, pressing a No. 2 key of the government affair login user name character, pressing a No. 3 key of a government affair login user name character, \8230 \\ 8230;, pressing a No. beta key of the government affair login user name character;
s114, acquiring characters displayed on a No. 1 key of a government affair login user name character, a No. 2 key of the government affair login user name character, a No. 3 key of the government affair login user name character, \8230 \ 8230;, and a No. beta key of the government affair login user name character, and performing the following operations:
Figure FDA0003879005630000021
wherein, MD 2 () A hash algorithm representing performing MD5 2 times;
MD 1 () Represents a hash algorithm performed 1 time MD 5;
MD () represents a hash algorithm for MD 5;
χ δ the character which is displayed on the delta th key of the character of the government affair login user name is shown; δ =1, 2, 3, \8230;, β;
ε δ,2 character x displayed on delta key of character of user name for government affairs login δ Performing 2 times of operation to obtain an operation value;
s115, arranging all the operation values from small to large or from large to small to obtain the χ 1 ′、χ 2 ′、χ 3 ′、……、χ β '; wherein, χ 1 ' arranging the operation value at the 1 st bit from small to large or from large to small for all operation values, χ 2 ' is all operationsThe operation value, x, of the 2 nd bit is arranged from small to large or from large to small 3 ' is the calculation value of 3 rd bit arranged from small to large or from large to small, \8230;, χ β ' arranging the operation values at the beta-th bit from small to large or from large to small for all the operation values;
s116, arranging all the operation values in the 1 st bit of the operation values according to the descending or descending order 1 ' the corresponding character is displayed on the No. 1 key of the government affairs login user name character, and all the calculated values are arranged in the No. 2 calculated value x from small to large or from large to small 2 The corresponding characters are displayed on the No. 2 key of the government affair login user name characters, and all the calculated values are arranged in the No. 3 calculated value x from small to large or from large to small 3 ' the corresponding character is displayed on the No. 3 key of the government affair login user name character, \8230; \8230, all the operation values are arranged from small to large or from large to small and positioned at the beta-th operation value χ β ' the corresponding character is displayed on the beta-th key of the government affair login user name character; from small to large as x 1 ′、χ 2 ′、χ 3 ′、……、χ β-2 ′、χ β-1 ′、χ β ' in turn equals ε β,2 、ε β-1,2 、ε β-2,2 、……、ε 3,2 、ε 2,2 、ε 1,2 The characters are arranged from small to big in sequence β Displayed on the beta-th key, character χ β-1 Displayed on the beta-1 th key, character chi β-2 Is displayed on the beta-2 key for displaying character \8230, 8230, character chi 3 Displayed on the 3 rd key, character x 2 Displayed on the 2 nd key, character χ 1 Displayed on the 1 st key;
s117, displaying a certain character on the key, receiving the character displayed on the key if the key is triggered, and performing the following operations after receiving the input of the alpha government affair login user name character:
Figure FDA0003879005630000031
wherein, MD α+1 () Represents the hash algorithm for performing MD5 for alpha +1 times;
MD 1 () Represents a hash algorithm performed 1 time MD 5;
MD α () A hash algorithm representing performing MD5 a time;
MD α-1 () Represents the hash algorithm for performing MD5 a-1 times;
MD α-2 () Represents a hash algorithm for performing MD5 a-2 times;
Figure FDA0003879005630000032
represents a total of α + 1;
MD () represents a hash algorithm for MD 5;
χ δ a character indicating that displayed on the δ -th key of the government affairs login user name character in step S114; δ =1, 2, 3, \8230;, β;
ε δ,α+1 character x displayed on delta key of character of user name for government affairs login δ Carrying out alpha +1 times of operation to obtain a result value;
s118, arranging all the calculated values from small to large or from large to small to obtain the χ 1 ″、χ 2 ″、χ 3 ″、……、χ β "; wherein, χ 1 "is the result value in bit 1 arranged from small to large or from large to small for all result values, χ 2 "is the result value in the 2 nd bit arranged from small to large or from large to small for all result values, χ 3 "is the result value in the 3 rd bit arranged from small to large or from large to small, \ 8230; \ 8230;. χ β "is the result value at the beta-th position in all the result values arranged from small to large or from large to small;
s119, arranging the result values X at the 1 st bit from small to large or from large to small 1 "the corresponding character is displayed on the 1 st key of the government affairs login user name character, and all the result values are changed from small to large orArranging the result value χ at the 2 nd bit from large to small 2 "the corresponding character is displayed on the 2 nd key of the government affair login user name character, all the result values are arranged in the 3 rd bit result value χ from small to large or from large to small 3 "the corresponding character is displayed on the No. 3 key of the government affair login user name character, \8230; \8230, all the result values are arranged from small to large or from large to small in the result value χ at the beta position β "the corresponding character is displayed on the beta-th key of the government affair login user name character; α = α +1, and returns to step S117; until the government affair login user name character is input; from small to large as χ 1 ″、χ 2 ″、χ 3 ″、……、χ β-2 ″、χ β-1 ″、χ β "in turn equals ε β,3 、ε β-1,3 、ε β-2,3 、……、ε 3,3 、ε 2,3 、ε 1,3 X, then character β Displaying on the beta-th key, and sequentially increasing the characters x from small to big β-1 Displayed on the beta-1 th key, character chi β-2 Is displayed on the beta-2 key for displaying character \8230, 8230, character chi 3 Displayed on the 3 rd key, character x 2 Displayed on the 2 nd key, character χ 1 Displayed on the 1 st key;
and S2, after the verification is passed, configuring files in the government affair cloud platform.
2. The method for performing file processing optimization configuration work on the remote login government affairs data network according to claim 1, wherein in step S12, the following operations are performed on the obtained government affair login user name:
ε GALU =MD(GALU),
where the GALU represents a government affair login user name.
3. The method for performing file processing optimization configuration work on the remote login government affairs data network according to claim 1, wherein in step S12, the following operations are performed on the obtained government affairs login password:
ε GALP =MD(GALP),
where the GALP represents a government login password.
4. The method for performing file processing optimization configuration work on the remote login government affairs data network according to claim 1, wherein in the step S2, the verification method comprises the following steps:
the first step, the government affair cloud platform judges whether the received government affair login user name exists in the government affair cloud platform:
if the received government affair login user name exists in the government affair cloud platform, listing the government affair login password corresponding to the government affair login user name in a form of a government affair login password library, wherein the government affair login password library comprises mu government affair login passwords, and mu is a positive integer greater than or equal to 2, and executing the next step;
if the received government affair login user name does not exist in the government affair cloud platform, the government affair cloud platform sends feedback information, and the feedback information indicates that the government affair login user name does not exist in the government affair cloud platform and applies for registering the government affair login user name;
secondly, judging whether the government affair login password exists in a government affair login password library:
if the government affair login password exists in the government affair login password library, the verification is passed;
and if the government affair login password does not exist in the government affair login password library, the verification fails and feedback information is sent, and the feedback information is that the government affair login password is wrong, and the correct government affair login password is required to be input again.
5. The method for performing file processing optimization configuration work on the remote login government affairs data network according to claim 1, wherein the step S2 comprises the following steps:
s21, sending a control command for changing a government affair cloud platform log information file to a government affair cloud platform by using the mobile handheld intelligent terminal;
s22, the government affair cloud platform judges whether the government affair cloud platform receives a control command for changing the log information file of the government affair cloud platform:
if the government affair cloud platform receives a control command for changing the log information file of the government affair cloud platform, executing the next step;
if the government affair cloud platform does not receive the control command for changing the log information file of the government affair cloud platform, returning to the step S22;
s23, acquiring the government affair cloud platform log information file, and copying and pasting the acquired government affair cloud platform log information file to generate a government affair cloud platform log information file copy; a log safety lock is arranged on the generated government affair cloud platform log information file copy, under the condition of the log safety lock, other processes cannot access the government affair cloud platform log information file copy, and other processes do not comprise a control command process for changing the government affair cloud platform log information file, so that the integrity and the safety of the government affair cloud platform log information file copy can be ensured;
s24, changing the generated copy of the government affair cloud platform log information file by using the control command of the government affair cloud platform log information file, and obtaining a changed copy of the government affair cloud platform log information file; and cancel its log security lock;
and S25, replacing the government affair cloud platform log information file with the government affair cloud platform log information file change copy obtained in the step S24, and changing the government affair cloud platform log information file.
CN202110298068.2A 2021-03-19 2021-03-19 Working method for carrying out file processing optimization configuration by remotely logging in government affair data network Active CN113132354B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110298068.2A CN113132354B (en) 2021-03-19 2021-03-19 Working method for carrying out file processing optimization configuration by remotely logging in government affair data network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110298068.2A CN113132354B (en) 2021-03-19 2021-03-19 Working method for carrying out file processing optimization configuration by remotely logging in government affair data network

Publications (2)

Publication Number Publication Date
CN113132354A CN113132354A (en) 2021-07-16
CN113132354B true CN113132354B (en) 2023-04-07

Family

ID=76773622

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110298068.2A Active CN113132354B (en) 2021-03-19 2021-03-19 Working method for carrying out file processing optimization configuration by remotely logging in government affair data network

Country Status (1)

Country Link
CN (1) CN113132354B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114640471A (en) * 2022-03-21 2022-06-17 重庆市规划和自然资源信息中心 Centralized government affair office client safety operation and maintenance method based on domestic operating system

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050234909A1 (en) * 2004-04-15 2005-10-20 International Business Machines Corporation Method, computer program product, and data processing system for source verifiable audit logging
CN103368728A (en) * 2013-07-18 2013-10-23 百度在线网络技术(北京)有限公司 Safe logging-in method, system and device
US9552615B2 (en) * 2013-12-20 2017-01-24 Palantir Technologies Inc. Automated database analysis to detect malfeasance
CN105138362B (en) * 2015-08-20 2018-09-07 浪潮(北京)电子信息产业有限公司 The method and device of user configuration is preserved under a kind of Linux system
CN109104314B (en) * 2018-08-20 2022-02-25 郑州云海信息技术有限公司 Method and device for modifying log configuration file
CN109816356A (en) * 2019-03-26 2019-05-28 广东长盈科技股份有限公司 A kind of IT application in government affairs management system
CN110674493B (en) * 2019-09-29 2021-05-14 重庆市筑智建信息技术有限公司 BIM system login verification method and system

Also Published As

Publication number Publication date
CN113132354A (en) 2021-07-16

Similar Documents

Publication Publication Date Title
EP1472583B1 (en) Method for supporting single sign on
US4694492A (en) Computer communications security control system
US9197652B2 (en) Method for detecting anomalies in a control network
CN100452908C (en) System and method for preventing software and hardware with communication condition / function from being embezzled
EP3094948B1 (en) Web-based recorder configuration utility
JP2005526311A (en) Method and apparatus for monitoring a database system
US20160219069A1 (en) Method for detecting anomalies in network traffic
CN113132354B (en) Working method for carrying out file processing optimization configuration by remotely logging in government affair data network
US20210075812A1 (en) A system and a method for sequential anomaly revealing in a computer network
CN111431726A (en) Algorithm authorization method, device, computer equipment and storage medium
CN117938464A (en) Time sequence attack alarm prediction method and system based on situation awareness
CN109711677A (en) A kind of anti-human-equation error free isolated operation system of power plant and method
CN111404889A (en) Auditing method and device and client
CN113179246B (en) Working method for carrying out government affair data fusion safety through four-in-one network
CN114037286B (en) A method and system for detecting sensitive data of power dispatch automation based on big data
CN113591044B (en) Intrusion protection system based on identity recognition
CN101425896B (en) Network account ciphering method
WO2018138793A1 (en) Attack/abnormality detection device, attack/abnormality detection method, and attack/abnormality detection program
CN119314241A (en) Intelligent lock management method and system
CN113961904A (en) Screen unlocking method, device, electronic device and readable medium
CN110851874A (en) Method for realizing data desensitization by using matrix replacement
CN109514561A (en) A kind of robot logs in and backstage login control system
CN111770100B (en) Method and system for verifying safe access of external equipment to Internet of things terminal
CN114386077A (en) Electronic bidding document multilayer encryption and decryption system for electronic bidding
CN113162916A (en) Working method for executing smart city operation instruction through big data platform

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant