CN105450658B - A kind of system login method and device - Google Patents
A kind of system login method and device Download PDFInfo
- Publication number
- CN105450658B CN105450658B CN201510944172.9A CN201510944172A CN105450658B CN 105450658 B CN105450658 B CN 105450658B CN 201510944172 A CN201510944172 A CN 201510944172A CN 105450658 B CN105450658 B CN 105450658B
- Authority
- CN
- China
- Prior art keywords
- user
- information
- login
- management server
- identity
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0884—Network architectures or network communication protocols for network security for authentication of entities by delegation of authentication, e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
- Computer And Data Communications (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The present invention relates to a kind of system login methods, comprising the following steps: inputs user information in system front end;The user information is sent to right management server by system front end, and the verifying of user information is carried out by the right management server, and verification result is sent to system front end;If being proved to be successful, interface channel is established by the system front end and system background server, carries out data interaction.Compared with the prior art, by the present invention in that being stored the account number cipher of user and authority information with a right management server, when logging in system by user, the verifying of user information is first carried out from right management server.When user password leakage occurs, service provider can cut off linking for permission server and real system in time, and due to that can not obtain the corresponding operation of the account from permission server, this account is exactly to be not present for system.Meanwhile the present invention also provides a kind of system login devices for realizing the above method.
Description
Technical field
The present invention relates to a kind of system login method, especially a kind of system login side of certifiable user information safety
Method;The invention further relates to a kind of devices for realizing above system login method.
Background technique
Existing system requires user and inputs account and password in login process, in system background server into
After row verifying, login just can be carried out.Referring to Fig. 1, it is the connection schematic diagram of existing system login.Existing system login
When, user first passes through the front end login interface input personal information such as user account and password of system.Then, by the login of front end
The user information is transmitted to background server and verified by interface.It, will if being proved to be successful after the completion of background server verifying
Data are transmitted to front end, carry out data interaction.
However, due in existing login system, since the login code key and data of system are stored within the same service
In device, in this way when the log-on message of user leaks, the people illegally logged at this time can arbitrarily operate in systems.
And at this point, can only carry out the modes such as the modification of password by user can avoid.
Summary of the invention
The invention reside in the shortcomings that overcoming the prior art with it is insufficient, a kind of safe system login method and device are provided.
The present invention is realized by following technical solution: a kind of system login method, comprising the following steps:
User information is inputted in system front end;
The user information is sent to right management server by system front end, carries out user's letter by the right management server
The verifying of breath, and verification result is sent to system front end;
If being proved to be successful, interface channel is established by the system front end and system background server, carries out data interaction.
Compared with the prior art, by the present invention in that with a right management server, by the account number cipher and power of user
Limit information is stored, and when logging in system by user, the verifying of user information is first carried out from right management server.As generation user
When password is revealed, service provider can cut off linking for permission server and real system in time, even if then at this time
There is account number cipher to carry out login system, due to that can not obtain the corresponding operation of the account from permission server, this account is to being
Be not present for system, also cannot login system, therefore the safety of system can be improved.
As a further improvement of the present invention, described in the step of system front end inputs user information, user's letter
Breath includes user's login account and login password.
As a further improvement of the present invention, the verifying for carrying out user information by the right management server is sent to
In the step of system front end, the right management server include whether user's login account and password are matched carry out verifying and
The corresponding identity of the account of user is verified.
As a further improvement of the present invention, the corresponding identity of the account of the user is respectively administrator's identity and operation
Member's identity.
As a further improvement of the present invention, the system front end receives the identity information of right management server transmission
Afterwards, the different operating right of user is assigned according to identity information.
The present invention also provides a kind of system login devices, including system front end, right management server and system background
Server;
The system front end includes:
Receiving module, for receiving the information of user's input;
Information sending module, for user information to be sent to right management server;
Module is established in data transmission, for establishing and the data interaction of system background server;
The right management server includes:
Authentication module is sent to system front end for the verifying to user information, and by verification result.
Compared with the prior art, by the present invention in that with a right management server, by the account number cipher and power of user
Limit information is stored, and when logging in system by user, the verifying of user information is first carried out from right management server.As generation user
When password is revealed, service provider can cut off linking for permission server and real system in time, even if then at this time
There is account number cipher to carry out login system, due to that can not obtain the corresponding operation of the account from permission server, this account is to being
Be not present for system, also cannot login system, therefore the safety of system can be improved.
As a further improvement of the present invention, the received user information of the receiving module includes user's login account and steps on
Record password.
As a further improvement of the present invention, the authentication module include whether user's login account and password are matched into
Row is verified identity corresponding with the account to user and is verified.
As a further improvement of the present invention, the corresponding identity of the account of the user is respectively administrator's identity and operation
Member's identity.
As a further improvement of the present invention, the system front end further includes that permission assigns module, for according to user's body
Part information assigns the different operating right of user.
In order to better understand and implement, the invention will now be described in detail with reference to the accompanying drawings.
Detailed description of the invention
Fig. 1 is the connection schematic diagram of system login in the prior art.
Fig. 2 is the step flow chart of login method of the invention.
Fig. 3 is the connection schematic diagram of login system of the invention.
Fig. 4 is the connection block diagram of system front end of the invention.
Specific embodiment
Unsafe condition is be easy to cause in login system in order to solve user in the prior art, therefore, the present invention mentions
A kind of system login method and system for solving the above problems is supplied, the present invention is described in detail below.
Referring to Fig. 2, it is the step flow chart of system login method of the invention.The present invention provides a kind of systems to step on
Recording method, comprising the following steps:
S1: user information is inputted in system front end.
Specifically, in this step, the user information includes user's login account and login password.
S2: the user information is sent to right management server by system front end, is used by the right management server
The verifying of family information, and verification result is sent to system front end.
In this step, the right management server includes verifying to whether user's login account and password match
Identity corresponding with the account to user is verified.Wherein, the corresponding identity of the account of the user is respectively administrator's body
Part and operator's identity.
Wherein, database is equipped in the right management server, for storing the corresponding relationship of user account password, with
And the identity information of the user.And the identity information of user includes administrator's identity and operator's identity.The permission pipe
Reason server verifies user information, if matched in user authentication information and database, what return was proved to be successful
Information is to system front end.And if do not matched that in user information and database, the unsuccessful information of verifying is returned to system
Front end, at this time login failed for user.Meanwhile the identity information of user is also returned to system front end.
S3: if being proved to be successful, interface channel is established by the system front end and system background server, carries out data friendship
Mutually.
After the system front end receives the identity information of right management server transmission, user is assigned according to identity information
Different operating rights.Such as: if user is administrator, the permission of every operation is assigned to the administrator.If user is behaviour
Work person then assigns the permission for allowing to operate some interface to user.
It is respectively the company of the connection block diagram and system front end of present system entering device please refer to Fig. 3 and Fig. 4
Connect block diagram.The present invention also provides a kind of system login devices, including system front end 1, right management server 2 and system background
Server 3.
The system front end 1 includes receiving module 11, information sending module 12, module 13 is established in data transmission and permission is assigned
Give module 14.
The receiving module 11, for receiving the information of user's input.The received user information of receiving module includes
User's login account and login password.
The information sending module 12, for user information to be sent to right management server 2;
Module 13 is established in the data transmission, for establishing and the data interaction of system background server 3;
Permission assigns module 14, for assigning the different operating right of user according to subscriber identity information.
The right management server 2 includes: authentication module, is sent out for the verifying to user information, and by verification result
It send to system front end.Whether the authentication module includes matching to verify and to the account of user to user's login account and password
Number corresponding identity is verified.The corresponding identity of the account of the user is respectively administrator's identity and operator's identity.
The course of work of system login device of the invention is introduced below:
Firstly, the information that user logs in system front end input user;The system front end can be computer terminal or
The equipment such as mobile terminal;Then, the receiving module in system front end receives the information of user, and will be used by information sending module
Family information is sent to right management server.
Database is equipped in the right management server, for storing the corresponding relationship of user account password, and this
The identity information of user.And the identity information of user includes administrator's identity and operator's identity.The rights management clothes
Business device verifies user information, if matched in user authentication information and database, returns to the information being proved to be successful
To system front end.And if do not matched that in user information and database, return to the unsuccessful information of verifying to system front end,
Login failed for user at this time.Meanwhile the identity information of user is also returned to system front end.
Meanwhile only retaining the personally identifiable information of user in right management server.Such as: such as " zhangsan@
Henhaoji.com-administrator ".And retain the corresponding operation of concrete power limit label in system front end, such as " administrator-is all
The page/all operations ", " if several page/dry runs of operator-", do not retain specific account information.
Finally, after system front end receives identity information and the verification information of right management server, according to the body of user
Part information assigns different operating rights to user.Such as: if user is administrator, every operation is assigned to the administrator
Permission.If user is operator, the permission for allowing to operate some interface is assigned to user.Meanwhile the system front end be
Background server of uniting carries out data connection, carries out data interaction.
Compared with the prior art, by the present invention in that with a right management server, by the account number cipher and power of user
Limit information is stored, and when logging in system by user, the verifying of user information is first carried out from right management server.As generation user
When password is revealed, service provider can cut off linking for permission server and real system in time, even if then at this time
There is account number cipher to carry out login system, due to that can not obtain the corresponding operation of the account from permission server, this account is to being
Be not present for system, also cannot login system, therefore the safety of system can be improved.
In addition, there are also the way of example that other are deformed by the present invention, for example the account number cipher of multiple systems can all be stored up
It there are in the same right management server, can economize on resources in this way, the safety of system operation can also be provided.
The invention is not limited to above embodiment, if not departing from the present invention to various changes or deformation of the invention
Spirit and scope, if these changes and deformation belong within the scope of claim and equivalent technologies of the invention, then this hair
It is bright to be also intended to encompass these changes and deformation.
Claims (8)
1. a kind of system login method, comprising the following steps:
User information is inputted in system front end;
The user information is sent to right management server by system front end, carries out user information by the right management server
Verifying, and verification result is sent to system front end, the right management server includes being to user's login account and password
No matching carries out verifying identity corresponding with the account to user and verifies;
If being proved to be successful, interface channel is established by the system front end and system background server, carries out data interaction;
If verifying is unsuccessful, the unsuccessful information of verifying is returned to system front end, login failed for user.
2. system login method according to claim 1, it is characterised in that: the step in system front end input user information
In rapid, the user information includes user's login account and login password.
3. system login method according to claim 2, it is characterised in that: the corresponding identity of the account of the user is respectively
Administrator's identity and operator's identity.
4. system login method according to claim 3, it is characterised in that: the system front end receives rights management service
After the identity information that device is sent, the different operating right of user is assigned according to identity information.
5. a kind of system login device, it is characterised in that: including system front end, right management server and system background service
Device;
The system front end includes:
Receiving module, for receiving the information of user's input;
Information sending module, for user information to be sent to right management server;
Module is established in data transmission, for establishing and the data interaction of system background server;
The right management server includes:
Authentication module, for the verifying to user information, including whether user's login account and password are matched carry out verifying and
The corresponding identity of the account of user is verified, and verification result is sent to system front end, if user information with it is described
Match in right management server, then returns to the information that is proved to be successful to system front end;If user information and the permission
It is not matched that in management server, then returns to the unsuccessful information of verifying to system front end, login failed for user.
6. system login device according to claim 5, it is characterised in that: the received user information of receiving module includes
User's login account and login password.
7. system login device according to claim 6, it is characterised in that: the corresponding identity of the account of the user is respectively
Administrator's identity and operator's identity.
8. system login device according to claim 7, it is characterised in that: the system front end further includes that permission assigns mould
Block, for assigning the different operating right of user according to subscriber identity information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510944172.9A CN105450658B (en) | 2015-11-26 | 2015-12-16 | A kind of system login method and device |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2015108449066 | 2015-11-26 | ||
CN201510844906 | 2015-11-26 | ||
CN201510944172.9A CN105450658B (en) | 2015-11-26 | 2015-12-16 | A kind of system login method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105450658A CN105450658A (en) | 2016-03-30 |
CN105450658B true CN105450658B (en) | 2019-06-11 |
Family
ID=55560435
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510944172.9A Active CN105450658B (en) | 2015-11-26 | 2015-12-16 | A kind of system login method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105450658B (en) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106060044A (en) * | 2016-05-31 | 2016-10-26 | 乐视控股(北京)有限公司 | Divided server system and communication method based on the same |
CN106250731A (en) * | 2016-07-21 | 2016-12-21 | 广东芬尼克兹节能设备有限公司 | A kind of user authority control method and system |
CN109492382B (en) * | 2018-10-22 | 2022-08-23 | 黄超 | Single input box login verification method |
CN112086099A (en) * | 2019-06-14 | 2020-12-15 | 上海观轶教育科技有限公司 | Student-leaving teaching guidance management system and method |
CN110378087A (en) * | 2019-07-24 | 2019-10-25 | 四川爱创科技有限公司 | Self-service terminal management method and system |
CN112287313A (en) * | 2019-07-24 | 2021-01-29 | 鸿富锦精密电子(天津)有限公司 | Device authentication system and method |
CN112738084A (en) * | 2020-12-28 | 2021-04-30 | 放宠(无锡)网络科技有限公司 | User login system and method |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2007128134A (en) * | 2005-11-01 | 2007-05-24 | Dainippon Printing Co Ltd | Card authentication system |
CN101478571A (en) * | 2009-01-19 | 2009-07-08 | 北京中星微电子有限公司 | Network video monitoring system and system user authentication method thereof |
CN102143188A (en) * | 2011-04-10 | 2011-08-03 | 上海擎龙通信技术有限公司 | Control system based on cloud computing encryption storage service |
CN102480354A (en) * | 2010-11-30 | 2012-05-30 | 北大方正集团有限公司 | Unified authentication service system and method for unified authentication |
CN104135389A (en) * | 2014-08-14 | 2014-11-05 | 华北电力大学句容研究中心 | SSH protocol operation and maintenance auditing system and method based on proxy technology |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4992332B2 (en) * | 2006-08-03 | 2012-08-08 | 富士通株式会社 | Login management method and server |
US20110023099A1 (en) * | 2008-03-31 | 2011-01-27 | Seunghyun Kim | User terminal with identity selector and method for identity authentication using identity selector of the same |
CN103001803A (en) * | 2012-12-10 | 2013-03-27 | 上海斐讯数据通信技术有限公司 | Method and system for achieving right management in network management |
CN103916366A (en) * | 2012-12-31 | 2014-07-09 | 中国移动通信集团公司 | Login method, maintenance terminal, data management service equipment and login system |
CN104243458B (en) * | 2014-09-01 | 2018-03-13 | 广州博冠信息科技有限公司 | A kind of safe online game login method and system |
-
2015
- 2015-12-16 CN CN201510944172.9A patent/CN105450658B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2007128134A (en) * | 2005-11-01 | 2007-05-24 | Dainippon Printing Co Ltd | Card authentication system |
CN101478571A (en) * | 2009-01-19 | 2009-07-08 | 北京中星微电子有限公司 | Network video monitoring system and system user authentication method thereof |
CN102480354A (en) * | 2010-11-30 | 2012-05-30 | 北大方正集团有限公司 | Unified authentication service system and method for unified authentication |
CN102143188A (en) * | 2011-04-10 | 2011-08-03 | 上海擎龙通信技术有限公司 | Control system based on cloud computing encryption storage service |
CN104135389A (en) * | 2014-08-14 | 2014-11-05 | 华北电力大学句容研究中心 | SSH protocol operation and maintenance auditing system and method based on proxy technology |
Also Published As
Publication number | Publication date |
---|---|
CN105450658A (en) | 2016-03-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105450658B (en) | A kind of system login method and device | |
CN107079034B (en) | Identity authentication method, terminal equipment, authentication server and electronic equipment | |
CN107948204B (en) | One-key login method and system, related equipment and computer readable storage medium | |
CN108616360B (en) | User identity verification and registration method and device | |
CN102497635B (en) | Server, terminal and account password acquisition method | |
CN105592065B (en) | A kind of Website logging method and its login system based on SMS | |
CN104954383A (en) | Application program login method and system | |
CN103581105A (en) | Login verification method and login verification system | |
CN107086979B (en) | User terminal verification login method and device | |
CN107113613B (en) | Server, mobile terminal, network real-name authentication system and method | |
CN102868702B (en) | System login device and system login method | |
CN103986584A (en) | Double-factor identity verification method based on intelligent equipment | |
CN104717224B (en) | A kind of login method and device | |
CN104243458A (en) | Secure online game logging-in method and system | |
CN105262748A (en) | Wide area network user terminal identity authentication method and system | |
CN105099676A (en) | User login method, user terminal and server | |
CN103560883A (en) | Safety identification method, between android application programs, based on user right | |
CN101202631A (en) | System and method for identification authentication based on cipher key and timestamp | |
CN101841814B (en) | Terminal authentication method and system | |
CN105743650A (en) | Mobile office identity authentication method, platform and system, and mobile terminal | |
CN105323094A (en) | Safety management method based on equipment identification and system thereof | |
CN107819766B (en) | Security authentication method, system and computer readable storage medium | |
CN107483477B (en) | Account management method and account management system | |
CN105119716A (en) | Secret key negotiation method based on SD cards | |
CN104917718A (en) | Method and terminal for fast authentication of mobile terminal user and application server |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: 510535 3, 1 building, 90 ho he road, Luogang District, Guangzhou, Guangdong. Applicant after: Guangzhou Duoyi Network Co., Ltd. Address before: 510535 3, 1 building, 90 ho he road, Luogang District, Guangzhou, Guangdong. Applicant before: Guangzhou Baiyun Bio-Tech Co., Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant |