CN105450658B - A kind of system login method and device - Google Patents

A kind of system login method and device Download PDF

Info

Publication number
CN105450658B
CN105450658B CN201510944172.9A CN201510944172A CN105450658B CN 105450658 B CN105450658 B CN 105450658B CN 201510944172 A CN201510944172 A CN 201510944172A CN 105450658 B CN105450658 B CN 105450658B
Authority
CN
China
Prior art keywords
user
information
login
management server
identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510944172.9A
Other languages
Chinese (zh)
Other versions
CN105450658A (en
Inventor
徐波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Duoyi Network Co Ltd
Original Assignee
Guangzhou Duoyi Network Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Duoyi Network Co Ltd filed Critical Guangzhou Duoyi Network Co Ltd
Priority to CN201510944172.9A priority Critical patent/CN105450658B/en
Publication of CN105450658A publication Critical patent/CN105450658A/en
Application granted granted Critical
Publication of CN105450658B publication Critical patent/CN105450658B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0884Network architectures or network communication protocols for network security for authentication of entities by delegation of authentication, e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Computer And Data Communications (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The present invention relates to a kind of system login methods, comprising the following steps: inputs user information in system front end;The user information is sent to right management server by system front end, and the verifying of user information is carried out by the right management server, and verification result is sent to system front end;If being proved to be successful, interface channel is established by the system front end and system background server, carries out data interaction.Compared with the prior art, by the present invention in that being stored the account number cipher of user and authority information with a right management server, when logging in system by user, the verifying of user information is first carried out from right management server.When user password leakage occurs, service provider can cut off linking for permission server and real system in time, and due to that can not obtain the corresponding operation of the account from permission server, this account is exactly to be not present for system.Meanwhile the present invention also provides a kind of system login devices for realizing the above method.

Description

A kind of system login method and device
Technical field
The present invention relates to a kind of system login method, especially a kind of system login side of certifiable user information safety Method;The invention further relates to a kind of devices for realizing above system login method.
Background technique
Existing system requires user and inputs account and password in login process, in system background server into After row verifying, login just can be carried out.Referring to Fig. 1, it is the connection schematic diagram of existing system login.Existing system login When, user first passes through the front end login interface input personal information such as user account and password of system.Then, by the login of front end The user information is transmitted to background server and verified by interface.It, will if being proved to be successful after the completion of background server verifying Data are transmitted to front end, carry out data interaction.
However, due in existing login system, since the login code key and data of system are stored within the same service In device, in this way when the log-on message of user leaks, the people illegally logged at this time can arbitrarily operate in systems. And at this point, can only carry out the modes such as the modification of password by user can avoid.
Summary of the invention
The invention reside in the shortcomings that overcoming the prior art with it is insufficient, a kind of safe system login method and device are provided.
The present invention is realized by following technical solution: a kind of system login method, comprising the following steps:
User information is inputted in system front end;
The user information is sent to right management server by system front end, carries out user's letter by the right management server The verifying of breath, and verification result is sent to system front end;
If being proved to be successful, interface channel is established by the system front end and system background server, carries out data interaction.
Compared with the prior art, by the present invention in that with a right management server, by the account number cipher and power of user Limit information is stored, and when logging in system by user, the verifying of user information is first carried out from right management server.As generation user When password is revealed, service provider can cut off linking for permission server and real system in time, even if then at this time There is account number cipher to carry out login system, due to that can not obtain the corresponding operation of the account from permission server, this account is to being Be not present for system, also cannot login system, therefore the safety of system can be improved.
As a further improvement of the present invention, described in the step of system front end inputs user information, user's letter Breath includes user's login account and login password.
As a further improvement of the present invention, the verifying for carrying out user information by the right management server is sent to In the step of system front end, the right management server include whether user's login account and password are matched carry out verifying and The corresponding identity of the account of user is verified.
As a further improvement of the present invention, the corresponding identity of the account of the user is respectively administrator's identity and operation Member's identity.
As a further improvement of the present invention, the system front end receives the identity information of right management server transmission Afterwards, the different operating right of user is assigned according to identity information.
The present invention also provides a kind of system login devices, including system front end, right management server and system background Server;
The system front end includes:
Receiving module, for receiving the information of user's input;
Information sending module, for user information to be sent to right management server;
Module is established in data transmission, for establishing and the data interaction of system background server;
The right management server includes:
Authentication module is sent to system front end for the verifying to user information, and by verification result.
Compared with the prior art, by the present invention in that with a right management server, by the account number cipher and power of user Limit information is stored, and when logging in system by user, the verifying of user information is first carried out from right management server.As generation user When password is revealed, service provider can cut off linking for permission server and real system in time, even if then at this time There is account number cipher to carry out login system, due to that can not obtain the corresponding operation of the account from permission server, this account is to being Be not present for system, also cannot login system, therefore the safety of system can be improved.
As a further improvement of the present invention, the received user information of the receiving module includes user's login account and steps on Record password.
As a further improvement of the present invention, the authentication module include whether user's login account and password are matched into Row is verified identity corresponding with the account to user and is verified.
As a further improvement of the present invention, the corresponding identity of the account of the user is respectively administrator's identity and operation Member's identity.
As a further improvement of the present invention, the system front end further includes that permission assigns module, for according to user's body Part information assigns the different operating right of user.
In order to better understand and implement, the invention will now be described in detail with reference to the accompanying drawings.
Detailed description of the invention
Fig. 1 is the connection schematic diagram of system login in the prior art.
Fig. 2 is the step flow chart of login method of the invention.
Fig. 3 is the connection schematic diagram of login system of the invention.
Fig. 4 is the connection block diagram of system front end of the invention.
Specific embodiment
Unsafe condition is be easy to cause in login system in order to solve user in the prior art, therefore, the present invention mentions A kind of system login method and system for solving the above problems is supplied, the present invention is described in detail below.
Referring to Fig. 2, it is the step flow chart of system login method of the invention.The present invention provides a kind of systems to step on Recording method, comprising the following steps:
S1: user information is inputted in system front end.
Specifically, in this step, the user information includes user's login account and login password.
S2: the user information is sent to right management server by system front end, is used by the right management server The verifying of family information, and verification result is sent to system front end.
In this step, the right management server includes verifying to whether user's login account and password match Identity corresponding with the account to user is verified.Wherein, the corresponding identity of the account of the user is respectively administrator's body Part and operator's identity.
Wherein, database is equipped in the right management server, for storing the corresponding relationship of user account password, with And the identity information of the user.And the identity information of user includes administrator's identity and operator's identity.The permission pipe Reason server verifies user information, if matched in user authentication information and database, what return was proved to be successful Information is to system front end.And if do not matched that in user information and database, the unsuccessful information of verifying is returned to system Front end, at this time login failed for user.Meanwhile the identity information of user is also returned to system front end.
S3: if being proved to be successful, interface channel is established by the system front end and system background server, carries out data friendship Mutually.
After the system front end receives the identity information of right management server transmission, user is assigned according to identity information Different operating rights.Such as: if user is administrator, the permission of every operation is assigned to the administrator.If user is behaviour Work person then assigns the permission for allowing to operate some interface to user.
It is respectively the company of the connection block diagram and system front end of present system entering device please refer to Fig. 3 and Fig. 4 Connect block diagram.The present invention also provides a kind of system login devices, including system front end 1, right management server 2 and system background Server 3.
The system front end 1 includes receiving module 11, information sending module 12, module 13 is established in data transmission and permission is assigned Give module 14.
The receiving module 11, for receiving the information of user's input.The received user information of receiving module includes User's login account and login password.
The information sending module 12, for user information to be sent to right management server 2;
Module 13 is established in the data transmission, for establishing and the data interaction of system background server 3;
Permission assigns module 14, for assigning the different operating right of user according to subscriber identity information.
The right management server 2 includes: authentication module, is sent out for the verifying to user information, and by verification result It send to system front end.Whether the authentication module includes matching to verify and to the account of user to user's login account and password Number corresponding identity is verified.The corresponding identity of the account of the user is respectively administrator's identity and operator's identity.
The course of work of system login device of the invention is introduced below:
Firstly, the information that user logs in system front end input user;The system front end can be computer terminal or The equipment such as mobile terminal;Then, the receiving module in system front end receives the information of user, and will be used by information sending module Family information is sent to right management server.
Database is equipped in the right management server, for storing the corresponding relationship of user account password, and this The identity information of user.And the identity information of user includes administrator's identity and operator's identity.The rights management clothes Business device verifies user information, if matched in user authentication information and database, returns to the information being proved to be successful To system front end.And if do not matched that in user information and database, return to the unsuccessful information of verifying to system front end, Login failed for user at this time.Meanwhile the identity information of user is also returned to system front end.
Meanwhile only retaining the personally identifiable information of user in right management server.Such as: such as " zhangsan@ Henhaoji.com-administrator ".And retain the corresponding operation of concrete power limit label in system front end, such as " administrator-is all The page/all operations ", " if several page/dry runs of operator-", do not retain specific account information.
Finally, after system front end receives identity information and the verification information of right management server, according to the body of user Part information assigns different operating rights to user.Such as: if user is administrator, every operation is assigned to the administrator Permission.If user is operator, the permission for allowing to operate some interface is assigned to user.Meanwhile the system front end be Background server of uniting carries out data connection, carries out data interaction.
Compared with the prior art, by the present invention in that with a right management server, by the account number cipher and power of user Limit information is stored, and when logging in system by user, the verifying of user information is first carried out from right management server.As generation user When password is revealed, service provider can cut off linking for permission server and real system in time, even if then at this time There is account number cipher to carry out login system, due to that can not obtain the corresponding operation of the account from permission server, this account is to being Be not present for system, also cannot login system, therefore the safety of system can be improved.
In addition, there are also the way of example that other are deformed by the present invention, for example the account number cipher of multiple systems can all be stored up It there are in the same right management server, can economize on resources in this way, the safety of system operation can also be provided.
The invention is not limited to above embodiment, if not departing from the present invention to various changes or deformation of the invention Spirit and scope, if these changes and deformation belong within the scope of claim and equivalent technologies of the invention, then this hair It is bright to be also intended to encompass these changes and deformation.

Claims (8)

1. a kind of system login method, comprising the following steps:
User information is inputted in system front end;
The user information is sent to right management server by system front end, carries out user information by the right management server Verifying, and verification result is sent to system front end, the right management server includes being to user's login account and password No matching carries out verifying identity corresponding with the account to user and verifies;
If being proved to be successful, interface channel is established by the system front end and system background server, carries out data interaction;
If verifying is unsuccessful, the unsuccessful information of verifying is returned to system front end, login failed for user.
2. system login method according to claim 1, it is characterised in that: the step in system front end input user information In rapid, the user information includes user's login account and login password.
3. system login method according to claim 2, it is characterised in that: the corresponding identity of the account of the user is respectively Administrator's identity and operator's identity.
4. system login method according to claim 3, it is characterised in that: the system front end receives rights management service After the identity information that device is sent, the different operating right of user is assigned according to identity information.
5. a kind of system login device, it is characterised in that: including system front end, right management server and system background service Device;
The system front end includes:
Receiving module, for receiving the information of user's input;
Information sending module, for user information to be sent to right management server;
Module is established in data transmission, for establishing and the data interaction of system background server;
The right management server includes:
Authentication module, for the verifying to user information, including whether user's login account and password are matched carry out verifying and The corresponding identity of the account of user is verified, and verification result is sent to system front end, if user information with it is described Match in right management server, then returns to the information that is proved to be successful to system front end;If user information and the permission It is not matched that in management server, then returns to the unsuccessful information of verifying to system front end, login failed for user.
6. system login device according to claim 5, it is characterised in that: the received user information of receiving module includes User's login account and login password.
7. system login device according to claim 6, it is characterised in that: the corresponding identity of the account of the user is respectively Administrator's identity and operator's identity.
8. system login device according to claim 7, it is characterised in that: the system front end further includes that permission assigns mould Block, for assigning the different operating right of user according to subscriber identity information.
CN201510944172.9A 2015-11-26 2015-12-16 A kind of system login method and device Active CN105450658B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510944172.9A CN105450658B (en) 2015-11-26 2015-12-16 A kind of system login method and device

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
CN2015108449066 2015-11-26
CN201510844906 2015-11-26
CN201510944172.9A CN105450658B (en) 2015-11-26 2015-12-16 A kind of system login method and device

Publications (2)

Publication Number Publication Date
CN105450658A CN105450658A (en) 2016-03-30
CN105450658B true CN105450658B (en) 2019-06-11

Family

ID=55560435

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510944172.9A Active CN105450658B (en) 2015-11-26 2015-12-16 A kind of system login method and device

Country Status (1)

Country Link
CN (1) CN105450658B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106060044A (en) * 2016-05-31 2016-10-26 乐视控股(北京)有限公司 Divided server system and communication method based on the same
CN106250731A (en) * 2016-07-21 2016-12-21 广东芬尼克兹节能设备有限公司 A kind of user authority control method and system
CN109492382B (en) * 2018-10-22 2022-08-23 黄超 Single input box login verification method
CN112086099A (en) * 2019-06-14 2020-12-15 上海观轶教育科技有限公司 Student-leaving teaching guidance management system and method
CN110378087A (en) * 2019-07-24 2019-10-25 四川爱创科技有限公司 Self-service terminal management method and system
CN112287313A (en) * 2019-07-24 2021-01-29 鸿富锦精密电子(天津)有限公司 Device authentication system and method
CN112738084A (en) * 2020-12-28 2021-04-30 放宠(无锡)网络科技有限公司 User login system and method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007128134A (en) * 2005-11-01 2007-05-24 Dainippon Printing Co Ltd Card authentication system
CN101478571A (en) * 2009-01-19 2009-07-08 北京中星微电子有限公司 Network video monitoring system and system user authentication method thereof
CN102143188A (en) * 2011-04-10 2011-08-03 上海擎龙通信技术有限公司 Control system based on cloud computing encryption storage service
CN102480354A (en) * 2010-11-30 2012-05-30 北大方正集团有限公司 Unified authentication service system and method for unified authentication
CN104135389A (en) * 2014-08-14 2014-11-05 华北电力大学句容研究中心 SSH protocol operation and maintenance auditing system and method based on proxy technology

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4992332B2 (en) * 2006-08-03 2012-08-08 富士通株式会社 Login management method and server
US20110023099A1 (en) * 2008-03-31 2011-01-27 Seunghyun Kim User terminal with identity selector and method for identity authentication using identity selector of the same
CN103001803A (en) * 2012-12-10 2013-03-27 上海斐讯数据通信技术有限公司 Method and system for achieving right management in network management
CN103916366A (en) * 2012-12-31 2014-07-09 中国移动通信集团公司 Login method, maintenance terminal, data management service equipment and login system
CN104243458B (en) * 2014-09-01 2018-03-13 广州博冠信息科技有限公司 A kind of safe online game login method and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007128134A (en) * 2005-11-01 2007-05-24 Dainippon Printing Co Ltd Card authentication system
CN101478571A (en) * 2009-01-19 2009-07-08 北京中星微电子有限公司 Network video monitoring system and system user authentication method thereof
CN102480354A (en) * 2010-11-30 2012-05-30 北大方正集团有限公司 Unified authentication service system and method for unified authentication
CN102143188A (en) * 2011-04-10 2011-08-03 上海擎龙通信技术有限公司 Control system based on cloud computing encryption storage service
CN104135389A (en) * 2014-08-14 2014-11-05 华北电力大学句容研究中心 SSH protocol operation and maintenance auditing system and method based on proxy technology

Also Published As

Publication number Publication date
CN105450658A (en) 2016-03-30

Similar Documents

Publication Publication Date Title
CN105450658B (en) A kind of system login method and device
CN107079034B (en) Identity authentication method, terminal equipment, authentication server and electronic equipment
CN107948204B (en) One-key login method and system, related equipment and computer readable storage medium
CN108616360B (en) User identity verification and registration method and device
CN102497635B (en) Server, terminal and account password acquisition method
CN105592065B (en) A kind of Website logging method and its login system based on SMS
CN104954383A (en) Application program login method and system
CN103581105A (en) Login verification method and login verification system
CN107086979B (en) User terminal verification login method and device
CN107113613B (en) Server, mobile terminal, network real-name authentication system and method
CN102868702B (en) System login device and system login method
CN103986584A (en) Double-factor identity verification method based on intelligent equipment
CN104717224B (en) A kind of login method and device
CN104243458A (en) Secure online game logging-in method and system
CN105262748A (en) Wide area network user terminal identity authentication method and system
CN105099676A (en) User login method, user terminal and server
CN103560883A (en) Safety identification method, between android application programs, based on user right
CN101202631A (en) System and method for identification authentication based on cipher key and timestamp
CN101841814B (en) Terminal authentication method and system
CN105743650A (en) Mobile office identity authentication method, platform and system, and mobile terminal
CN105323094A (en) Safety management method based on equipment identification and system thereof
CN107819766B (en) Security authentication method, system and computer readable storage medium
CN107483477B (en) Account management method and account management system
CN105119716A (en) Secret key negotiation method based on SD cards
CN104917718A (en) Method and terminal for fast authentication of mobile terminal user and application server

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 510535 3, 1 building, 90 ho he road, Luogang District, Guangzhou, Guangdong.

Applicant after: Guangzhou Duoyi Network Co., Ltd.

Address before: 510535 3, 1 building, 90 ho he road, Luogang District, Guangzhou, Guangdong.

Applicant before: Guangzhou Baiyun Bio-Tech Co., Ltd.

GR01 Patent grant
GR01 Patent grant