CN108462704A - Login validation method, device, computer equipment and storage medium - Google Patents

Login validation method, device, computer equipment and storage medium Download PDF

Info

Publication number
CN108462704A
CN108462704A CN201810163982.4A CN201810163982A CN108462704A CN 108462704 A CN108462704 A CN 108462704A CN 201810163982 A CN201810163982 A CN 201810163982A CN 108462704 A CN108462704 A CN 108462704A
Authority
CN
China
Prior art keywords
login
authentication
historical log
client
characteristic information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810163982.4A
Other languages
Chinese (zh)
Other versions
CN108462704B (en
Inventor
李波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN201810163982.4A priority Critical patent/CN108462704B/en
Priority to PCT/CN2018/081548 priority patent/WO2019165675A1/en
Publication of CN108462704A publication Critical patent/CN108462704A/en
Application granted granted Critical
Publication of CN108462704B publication Critical patent/CN108462704B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/082Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying multi-factor authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses a kind of login validation method, device, computer equipment and storage mediums, wherein the login validation method includes:The authentication request that client is sent is obtained, authentication request includes identity characteristic information and terminal identification information;If identity characteristic information by authentication, does not obtain historical log number corresponding with identity characteristic information and terminal identification information;If historical log number reaches certification frequency threshold value, the second verification mode is pushed to client.In this method, when identity characteristic information and the corresponding historical log number of terminal identification information reach certification frequency threshold value, the second verification mode is pushed to client, good user experience can be obtained to verify user in a manner of by another authentication, client brute force attack crack servers are prevented to reach, safety is logged in achieve the purpose that ensure.

Description

Login validation method, device, computer equipment and storage medium
Technical field
The present invention relates to authentication field more particularly to a kind of login validation method, device, computer equipment and storages Medium.
Background technology
It is realized generally by client input login password currently, establishing secure connection between client and server , there are security risks for such authentication mode.If malicious client takes Brute Force login password to server, have Server may be invaded, to cause information leakage.
The malicious attack of client in order to prevent, server are needed in user login services device, and setting prevents client The measure of malicious attack, but these measures need user to input much information login progress safety verification so that and user experience is poor, Particularly with the mobile terminal that information input is more inconvenient.
Invention content
A kind of login validation method of offer of the embodiment of the present invention, device, computer equipment and storage medium, it is current to solve User avoids the problem that malicious attack leads to information leakage when logging in.
In a first aspect, the embodiment of the present invention provides a kind of login validation method, including:
The authentication request that client is sent is obtained, authentication request includes identity characteristic information and terminal recognition letter Breath;
If identity characteristic information by authentication, does not obtain corresponding with identity characteristic information and terminal identification information Historical log number;
If historical log number reaches certification frequency threshold value, the second verification mode is pushed to client;
The secondary checking request that client is inputted based on the second verification mode is obtained, and is stepped on based on secondary checking request Record verification.
Second aspect, the embodiment of the present invention provide a kind of login authentication device, including:
Authentication request module is obtained, the authentication request for obtaining client transmission, authentication request packet Include identity characteristic information and terminal identification information;
Historical log number module is obtained, if for identity characteristic information not by authentication, is obtained special with identity Reference ceases and the corresponding historical log number of terminal identification information;
The second verification mode module is pushed, if reaching certification frequency threshold value for historical log number, push second is tested Card mode is to client;
Progress login authentication module, the secondary checking request inputted based on the second verification mode for obtaining client, and Login authentication is carried out based on secondary checking request.
Third aspect present invention provides a kind of computer equipment, including memory, processor and is stored in the storage In device and the computer program that can run on the processor, the processor are realized when executing the computer program such as this The step of inventing the login validation method.
Fourth aspect present invention provides a kind of computer readable storage medium, and the computer-readable recording medium storage has The step of computer program, the computer program realizes login validation method as described herein when being executed by processor.
Login validation method, device, computer equipment and storage medium provided in an embodiment of the present invention, by obtaining simultaneously Historical log number corresponding with identity characteristic information and terminal identification information truer can comprehensively judge to come from client The malicious attack at end;When identity characteristic information and terminal identification information historical log number reach certification frequency threshold value, push the Two verification modes verify user in a manner of by another authentication, client are prevented to reach to client Brute force attack crack servers log in safety to achieve the purpose that ensure.
Description of the drawings
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below by institute in the description to the embodiment of the present invention Attached drawing to be used is needed to be briefly described, it should be apparent that, the accompanying drawings in the following description is only some implementations of the present invention Example, for those of ordinary skill in the art, without having to pay creative labor, can also be according to these attached drawings Obtain other attached drawings.
Fig. 1 is a flow chart of login validation method in the embodiment of the present invention 1.
Fig. 2 is another particular flow sheet of login validation method in the embodiment of the present invention 1.
Fig. 3 is another particular flow sheet of login validation method in the embodiment of the present invention 1.
Fig. 4 is another particular flow sheet of login validation method in the embodiment of the present invention 1.
Fig. 5 is a functional block diagram of login authentication device in the embodiment of the present invention 2.
Fig. 6 is a schematic diagram of 4 Computer equipment of the embodiment of the present invention.
Specific implementation mode
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation describes, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair Embodiment in bright, the every other implementation that those of ordinary skill in the art are obtained without creative efforts Example, shall fall within the protection scope of the present invention.
Embodiment 1
Fig. 1 shows the flow chart of login validation method in the present embodiment.The present embodiment is applied is carrying out letter by internet Between the client and server for ceasing interaction, wherein client includes but not limited to browser and software login-port.This implementation Client in example is preferably this mobile terminal of smart mobile phone.Server is to receive the request of client and be based on the request Distribute the management end of application service.Following login validation method is using server as executive agent.As shown in Figure 1, the login authentication Method includes the following steps:
S10. the authentication request that client is sent is obtained, authentication request includes that identity characteristic information and terminal are known Other information.
Specifically, authentication request is that client needs to initiate to server when Connection Service device, for carrying out body The request of part verification.Authentication request includes identity characteristic information and terminal identification information, so that server is based on therein Identity characteristic information and terminal identification information verify identity, to determine that can the client establish secure connection with server.
Identity characteristic information is available to server to identify the information of user identity.Terminal identification information is available to The environmental information of the client for identification of server.
Specifically, server can first be based on the identity characteristic after the authentication request for receiving client transmission Information carries out authentication, if identity characteristic information by authentication, that is, executes step S50;If identity characteristic information is not led to Authentication is crossed, S20 is thened follow the steps.The method of authentication has very much, includes but not limited in the present embodiment:Based on shared The authentication of key, the authentication based on biological property and the authentication etc. based on public key encryption algorithm.This Step first passes through authentication request and carries out first time verification to the identity of user, preliminary to ensure that server and client side establishes company The safety connect.
If S20. identity characteristic information obtains and identity characteristic information and terminal identification information phase not by authentication Corresponding historical log number.
Specifically, historical log number is specific spy in the characteristic item for indicate identity characteristic information and terminal identification information Levy number most in the number of item login service device.For example, the characteristic item of identity characteristic information includes but not limited to register ID, The characteristic item of terminal identification information includes but not limited to device id and logs in IP, and registers ID, device id and log in IP three, The highest number of login service device number is exactly historical log number.Wherein, it was registered when registration ID is user login services device Can unique mark user identity information, such as user name, cell-phone number and identification card number etc..Device id is stepped on for client The unique production equipment number in the whole world of the hardware of record, for example, mobile phone device id be mobile phone production sequence number, desktop computer sets Standby ID can be the MAC Address etc. of network interface card.Log in the address or privately owned of used public network distribution when IP is client online IP address.
Further, going through for user login services device is investigated by two aspects of identity characteristic information and terminal identification information History login times, the case where can be more comprehensive and truly investigate user login services device.If for example, using the same registration ID, when by different smart mobile phone repeat logon servers, the login times of the registration ID recognized are most, it is thus determined that being Historical log number.If alternatively, when same smart mobile phone uses different registration ID repeat logon servers, the equipment that recognizes The login times of ID are most, it is thus determined that being historical log number.Or if different intelligent mobile phone is corresponded in different login IP Network under use different registration ID repeat logon servers when, recognize login IP login times maximum, it is thus determined that For historical log number.Therefore, its corresponding history is determined by the different situations of identity characteristic information and terminal identification information Login times are conducive to occur the case where preventing malicious client attack server to a certain extent, to avoid information leakage, To ensure information security.
The historical log number referred in the present embodiment can be the note within a preset period of time being recorded in server The most login times of number are determined as historical log number by volume ID, device id login times corresponding with IP is logged in.
If S30. historical log number reaches certification frequency threshold value, the second verification mode is pushed to client.
Wherein, certification frequency threshold value, which is the historical log number of identity characteristic information and terminal identification information, can log in clothes The maximum login times of business device.For example, certification frequency threshold value is 5, namely when historical log number is accumulated to 5, server is not Receive same type of authentication request again, then takes the second authentication mode.
Specifically, the second verification mode includes but not limited to:Sliding block, picture mosaic, letter and number etc., with artificial subjective sense The verification mode received.
The mode of authentication is forced to be switched to the second authentication mode with artificial subjective feeling, can effectively be judged The authenticity of client prevents client from invading server by the malicious way of Brute Force.
S40. obtain the secondary checking request that input based on the second verification mode of client, and be based on secondary checking request into Row login authentication.
Specifically, secondary checking request is the checking request that client is directed to that the second verification mode gives a response.
Server verifies the secondary checking request that client is sent, if for example, client is directed to graphical verification code In word beam back the secondary checking request with word, server judges the correctness of the word, to complete login authentication.This In embodiment, server is tested by the second checking request fed back based on the second authentication mode that client is sent log in Card, can avoid passing through Brute Force machine make client to server initiate malicious attack so that server be cracked into And lead to information leakage.
Preferably, after step slo, i.e., after the step of obtaining the authentication request that client is sent, this is stepped on It further includes following steps to record verification method:
If S50. identity characteristic information is by authentication, by authentication request, establishes safety with client and connect It connects.
It is to be appreciated that when the authentication request that server authentication is sent by client, illustrate that server can lead to The safety of the identity characteristic information of the stored validation of information client of database is crossed, and then safety can be established with client Connection.By this step, secure connection has been established with server in client, and server offer is further obtained convenient for client Specific business information.
Preferably, after step S20, that is, history corresponding with identity characteristic information and terminal identification information is being obtained After the step of login times, the method for the login authentication further includes following steps:
If S60. historical log number is not up to certification frequency threshold value, prompts client to retransmit authentication and ask It asks.
Specifically, certification frequency threshold value, which is the historical log number of identity characteristic information and terminal identification information, to log in The maximum login times of server.For example, certification frequency threshold value is 5, namely when historical log number is accumulated to 5, server No longer receive same type authentication request, then takes other authentication modes.
Further, historical log number does not reach the cognition frequency threshold value of server formulation, illustrates that server may be used also To receive the same type of authentication request of client transmission again, enhancing server is to the flexible of client certificate Property.Login validation method provided in an embodiment of the present invention, by obtaining and identity characteristic information and terminal identification information phase simultaneously Corresponding historical log number more really comprehensively can judge the malicious attack from client;When historical log number reaches When to certification frequency threshold value, push the second verification mode to client, in a manner of by another authentication to user into Row verification, client brute force attack crack servers are prevented to reach, and log in safety to achieve the purpose that ensure, and can obtain Good user experience is obtained, especially for the mobile terminal user that information input is more inconvenient.
In a specific embodiment, identity characteristic information includes registration ID, and terminal identification information includes device id and steps on IP is recorded, as shown in Fig. 2, in step S20, that is, obtains historical log corresponding with identity characteristic information and terminal identification information Number specifically comprises the following steps:
S21. the historical log data in preset time period are counted, are obtained respectively and registration ID, device id or login IP phases Corresponding first login times, the second login times and third login times.
Wherein, historical log data are to register ID, device id and the phase for logging in IP login service devices within a preset period of time Close data, including respective login times, login time etc..Server prestores all historical log data, each history Logon data be corresponding with registration ID, device id and log in IP, also with its login time associated storage.It is to be appreciated that first steps on Record number refers to the number for registering ID login service devices within a preset period of time, and the second login times refer to device id when default Between in section login service device number, third login times are the numbers for logging in IP login service devices within a preset period of time.This Preset time period in embodiment can be fallen since the time or current time in system for getting the authentication request The a period of time moved back could be provided as 1 day or 1 week.
S22. maximum value is chosen from the first login times, the second login times and third login times as historical log Number.
For example, registration ID, device id or corresponding first login times of login IP, the second login times and third login time Number be respectively 3,5 and 8, then historical log number be the corresponding third login times of historical log number, i.e., 8 times.
In order to which the client to login service device accomplishes all-around defense, need to investigate client login service from three angles The case where device.As shown in this example, corresponding first login times of registration ID only have 3 times, and the login IP that login IP is used It is used 8 times, the corresponding third login times of login IP is determined as historical log number due to safety concerns, so as to In the Prevention-Security to server is better achieved.The situation that accessing server by customer end is investigated by multi-angle, can be more Information security that is comprehensive and being effectively protected in server.
Preferably, after step s 22, i.e., from the first login times, the second login times and third login times After choosing the step of maximum value is as historical log number, which further includes:
If S23. historical log number is not up to certification frequency threshold value, make the first login times, the second login times and The corresponding number of three login times adds 1, and updates historical log number.
It is to be appreciated that server is connected to the authentication request namely the corresponding note of client of this client transmission Volume ID, device id and login IP are logged in once again, corresponding first login times, the second login times and third should be given to log in secondary Number plus 1, while updating corresponding historical log number.
For example, if certification frequency threshold value is 5, the history after authentication request three times is received for server below The record form of login times:
Register ID Device id Log in IP
Authentication request 1 0 1 1
Authentication request 2 1 1 0
Authentication request 3 0 1 1
Register ID Device id Log in IP Historical log number
1 3 2 3
At this point, historical log number is 3, not up to certification frequency threshold value 5.Therefore, when server receives four identity The record form of historical log number after checking request is changed to:
Register ID Device id Log in IP
Authentication request 1 0 1 1
Authentication request 2 1 1 0
Authentication request 3 0 1 1
Authentication request 4 1 1 1
Register ID Device id Log in IP Historical log number
2 4 3 4
For the client of all-around defense login service device, history of the present embodiment from registration ID, device id and login IP The case where logon data is set out, integrated survey accessing server by customer end more comprehensively and can be effectively protected server.And And timely updated historical log number according to the authentication request of accessing server by customer end, keep the true of server data Real validity.
In a specific embodiment, as shown in figure 3, before step S21, i.e., the history in statistics preset time period is stepped on Before the step of recording data, login validation method further includes following steps:
S70. the historical log data stored in the form of KEY-VALUE in REDIS databases are counted, by registration ID, equipment ID and IP is logged in as KEY, using the first login times, the second login times and third login times as corresponding VALUE。
Specifically, the present embodiment uses REDIS database purchase historical log data.REDIS is one high performance KEY-VALUE databases play good supplementary function to relational database.The type of REDIS intermediate values is not limited only to character string, Also support following abstract data type:Character string list, unordered unduplicated string assemble, orderly unduplicated character trail It is the Hash table of character string to close key, value all.The type of value determines the operation that value itself is supported.REDIS supports that difference is unordered, has The list of sequence, the advanced server end atomic operations such as intersection, union between unordered, orderly set.
The historical log data stored in the form of KEY-VALUE in the present embodiment, EDIS databases by registration ID, are set Standby ID and IP is logged in as KEY, using the first login times, the second login times and third login times as corresponding VALUE, as shown in the table.
Register ID First login times
X1 5
Device id Second login times
00-01-6C-06-A6-29 6
Log in IP Third login times
183.53.240.209 9
In this implementation, by KEY-VALUE forms store involved in authentication request to registration ID, device id and step on The historical log data of IP are recorded, it is concise, obtain corresponding log-on message in time conducive to server.
S80. the historical log data between current time in system and preset time period are obtained, are inquired using KEY-VALUE Mode obtains the first login times corresponding with registration ID, device id or login IP, the second login times and third and steps on respectively Record number.
Specifically, preset time period is the specified refresh data of server, by the period in relation to zeros data.In order to protect The timeliness of authentication request is held, server specifies preset time period to be zeroed out processing to the data of database purchase.In , can be by KEY corresponding data setting preset times end, such as 24 hours in the present embodiment, then every 24 hours by the number in KEY It is handled according to being zeroed out.
It is to be appreciated that registration ID, device id or login IP that server is stored according to KEY keys, can directly acquire opposite The VALUE that should be stored:First login times, the second login times and the corresponding concrete numerical value of third login times, it is simple and fast.
The present embodiment stores the registration arrived involved in authentication request by REDIS databases in the form of KEY-VALUE ID, device id and the historical log data for logging in IP, it is concise, obtain corresponding log-on message in time conducive to server;And And section is zeroed out processing, the timeliness of effective guarantee authentication request to the data in database at preset timed intervals.
In a specific embodiment, identity characteristic information includes registration ID and customer authentication code, as shown in figure 4, step In S20, even identity characteristic information specifically comprises the following steps not by authentication:
S24. it is based on registration ID, obtains corresponding server authentication code.
Specifically, registration ID when being user login services device it is registered can unique mark user identity information, such as User name, cell-phone number and identification card number etc..
Server authentication code includes but not limited to:Preserve in the server with the corresponding log-in passwords of registration ID or Identifying code etc..
Server registers the corresponding server authentication codes of ID, the customer authentication code that can be used for sending client by storage It is compared, to judge the authenticity of the corresponding identity of client, so that it is guaranteed that server and client side establishes the peace of connection Quan Xing.
If S25. authentication server identifying code and the matching of customer authentication code are inconsistent, identity characteristic information is not by testing Card.
It is to be appreciated that if authentication server identifying code and the matching of customer authentication code are inconsistent, server not can determine that visitor The authenticity at family end needs client to do further or re-start authentication namely this identity characteristic information is not led to Cross verification.
In the present embodiment the authenticity of client, simple and fast, reliability are verified by registering ID and server identifying code It is high.
Login validation method provided in an embodiment of the present invention is believed by obtaining simultaneously with identity characteristic information and terminal recognition The corresponding historical log number of manner of breathing more really comprehensively can determine the malicious attack from client;Only work as history Login times reach certification frequency threshold value, just push the second verification mode to client, can obtain good user experience, especially It is for the more inconvenient mobile terminal user of information input.
For the client of all-around defense login service device, the present embodiment also investigates client from multi-angle comprehensive and logs in clothes The case where business device, more comprehensively and can be effectively protected server.Also, according to the authentication of accessing server by customer end The historical log number that timely updates is asked, the real effectiveness of server data is kept.
The present embodiment stores the registration arrived involved in authentication request by REDIS databases in the form of KEY-VALUE ID, device id and the historical log data for logging in IP, it is concise, obtain corresponding log-on message in time conducive to server;And And section is zeroed out processing, the timeliness of effective guarantee authentication request to the data in database at preset timed intervals.
It should be understood that the size of the serial number of each step is not meant that the order of the execution order in above-described embodiment, each process Execution sequence should be determined by its function and internal logic, the implementation process without coping with the embodiment of the present invention constitutes any limit It is fixed.
Embodiment 2
Fig. 5 shows the functional block diagram with the one-to-one login authentication device of login validation method in embodiment 1.Such as Fig. 5 Shown, which includes obtaining authentication request module 10, obtains historical log number module 20, push second Verification mode module 30 and progress login authentication module 40.Wherein, authentication request module 10 is obtained, historical log time is obtained Digital-to-analogue block 20 pushes the realization function of the second verification mode module 30 and progress login authentication module 40 and is logged in embodiment and tested The corresponding step of card method corresponds, and to avoid repeating, the present embodiment is not described in detail one by one.
Authentication request module 10 is obtained, the authentication request for obtaining client transmission, authentication request Including identity characteristic information and terminal identification information.
Historical log number module 20 is obtained, if not passing through authentication, acquisition and identity for identity characteristic information Characteristic information and the corresponding historical log number of terminal identification information.
It pushes the second verification mode module 30 and pushes second if reaching certification frequency threshold value for historical log number Verification mode is to client.
Progress login authentication module 40, the secondary checking request inputted based on the second verification mode for obtaining client, And login authentication is carried out based on secondary checking request.
Preferably, login authentication device further includes establishing secure connection module 50.
Secure connection module 50 is established, if for identity characteristic information by authentication, by authentication request, Secure connection is established with client.
Preferably, login authentication device further includes retransmitting authentication request module 60.
Authentication request module 60 is retransmitted, if being not up to certification frequency threshold value for historical log number, is carried Show that client retransmits authentication request.
Preferably, identity characteristic information includes registration ID, and terminal identification information includes device id and login IP.
It further includes statistical history logon data unit 21 and selection historical log number to obtain historical log number module 20 Unit 22.
Statistical history logon data unit 21, for counting the historical log data in preset time period, respectively obtain with It registers ID, device id or logs in corresponding first login times of IP, the second login times and third login times.
Historical log time counting unit 22 is chosen, is used for from the first login times, the second login times and third login times Middle selection maximum value is as historical log number.
Preferably, it further includes update historical log time counting unit 23 to obtain historical log number module 20.
Update historical log time counting unit 23 makes first to step on if being not up to certification frequency threshold value for historical log number Record number, the second login times and the corresponding number of third login times add 1, and update historical log number.
Preferably, login authentication device further includes statistical history logon data module 70 and acquisition historical log data module 80。
Statistical history logon data module 70, for counting the history stored in the form of KEY-VALUE in REDIS databases Logon data using registration ID, device id and logs in IP as KEY, the first login times, the second login times and third is logged in Number is respectively as corresponding VALUE.
Historical log data module 80 is obtained, for obtaining the historical log between current time in system and preset time period Data obtain the first login time corresponding with registration ID, device id or login IP using KEY-VALUE inquiry modes respectively Number, the second login times and third login times.
Preferably, identity characteristic information includes registration ID and customer authentication code.
It further includes obtaining server authentication code unit 24 and not verified unit 25 to obtain historical log number module 20.
Server authentication code unit 24 is obtained, for based on registration ID, obtaining corresponding server authentication code.
Not verified unit 25, if matching inconsistent, identity for authentication server identifying code and customer authentication code Characteristic information is not verified.
Embodiment 3
The present embodiment provides a computer readable storage medium, computer journey is stored on the computer readable storage medium Sequence realizes login validation method in embodiment 1 when the computer program is executed by processor, no longer superfluous here to avoid repeating It states.Alternatively, realizing the work(of each module/unit in login authentication device in embodiment 2 when the computer program is executed by processor Can, to avoid repeating, which is not described herein again.
It is to be appreciated that the computer readable storage medium may include:The computer program code can be carried Any entity or device, recording medium, USB flash disk, mobile hard disk, magnetic disc, CD, computer storage, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), electric carrier signal and telecommunications letter Number etc..
Embodiment 4
Fig. 6 is the schematic diagram for the computer equipment that one embodiment of the invention provides.As shown in fig. 6, the calculating of the embodiment Machine equipment 90 includes:Processor 91, memory 92 and it is stored in the calculating that can be run in memory 92 and on processor 91 Machine program 93.The step of processor 91 realizes login validation method in above-described embodiment 1 when executing computer program 93, such as scheme Step S10 to S40 shown in 1.Alternatively, processor 91 realizes each mould in above-mentioned each device embodiment when executing computer program 93 The function of block/unit, such as authentication request module 10 is obtained shown in Fig. 5, obtains historical log number module 20, push the Two verification mode modules 30 and the function of carrying out login authentication module 40.
It is apparent to those skilled in the art that for convenience of description and succinctly, only with above-mentioned each work( Can unit, module division progress for example, in practical application, can be as needed and by above-mentioned function distribution by different Functional unit, module are completed, i.e., the internal structure of described device are divided into different functional units or module, more than completion The all or part of function of description.
Embodiment described above is merely illustrative of the technical solution of the present invention, rather than its limitations.Although with reference to aforementioned reality Applying example, invention is explained in detail, it will be understood by those of ordinary skill in the art that:It still can be to aforementioned each Technical solution recorded in embodiment is modified or equivalent replacement of some of the technical features;And these are changed Or replace, the spirit and scope for various embodiments of the present invention technical solution that it does not separate the essence of the corresponding technical solution should all It is included within protection scope of the present invention.

Claims (10)

1. a kind of login validation method, which is characterized in that including:
The authentication request that client is sent is obtained, the authentication request includes identity characteristic information and terminal recognition letter Breath;
If identity characteristic information by authentication, does not obtain and the identity characteristic information and the terminal identification information phase Corresponding historical log number;
If the historical log number reaches certification frequency threshold value, the second verification mode is pushed to client;
Obtain the secondary checking request that input based on second verification mode of client, and be based on the secondary checking request into Row login authentication.
2. login validation method as described in claim 1, which is characterized in that it is described acquisition with the identity characteristic information and After the step of terminal identification information corresponding historical log number, the login validation method further includes:
If the historical log number is not up to the certification frequency threshold value, prompts client to retransmit authentication and ask It asks.
3. login validation method as described in claim 1, which is characterized in that the identity characteristic information includes registration ID, institute It includes device id and login IP to state terminal identification information;
The acquisition historical log number corresponding with the identity characteristic information and the terminal identification information, including:
The historical log data in preset time period are counted, are obtained and the registration ID, the device id or the login respectively Corresponding first login times of IP, the second login times and third login times;
It is chosen from first login times, second login times and the third login times described in maximum value conduct Historical log number.
4. login validation method as claimed in claim 3, which is characterized in that it is described from first login times, it is described After choosing the step of maximum value is as the historical log number in second login times and the third login times, this is stepped on Recording verification method further includes:
If the historical log number is not up to the certification frequency threshold value, first login times, described second is made to log in Number and the corresponding number of the third login times add 1, and update the historical log number.
5. login validation method as claimed in claim 3, which is characterized in that the history in the statistics preset time period is stepped on Before the step of recording data, the login validation method further includes:
The historical log data stored in the form of KEY-VALUE in REDIS databases are counted, by registration ID, device id and login IP is as KEY, using first login times, second login times and the third login times as corresponding VALUE;
The historical log data between current time in system and preset time period are obtained, are distinguished using KEY-VALUE inquiry modes Obtain corresponding with the registration ID, the device id or the login IP the first login times, the second login times and the Three login times.
6. login validation method as described in claim 1, which is characterized in that in the authentication that the acquisition client is sent After the step of request, the login validation method further includes:
If identity characteristic information is by authentication, by the authentication request, secure connection is established with client.
7. login validation method as described in claim 1, which is characterized in that the identity characteristic information includes registration ID and visitor Family identifying code;
If the identity characteristic information not by authentication, including:
Based on the registration ID, corresponding server authentication code is obtained;
If verifying the server authentication code and customer authentication code matching being inconsistent, the identity characteristic information does not pass through Verification.
8. a kind of login authentication device, which is characterized in that including:
Authentication request module is obtained, the authentication request for obtaining client transmission, the authentication request packet Include identity characteristic information and terminal identification information;
Historical log number module is obtained, if for identity characteristic information not by authentication, is obtained special with the identity Reference ceases and the corresponding historical log number of the terminal identification information;
The second verification mode module is pushed, if reaching certification frequency threshold value for the historical log number, push second is tested Card mode is to client;
Progress login authentication module, the secondary checking request inputted based on second verification mode for obtaining client, and Login authentication is carried out based on the secondary checking request.
9. a kind of computer equipment, including memory, processor and it is stored in the memory and can be in the processor The computer program of upper operation, which is characterized in that the processor realized when executing the computer program as claim 1 to The step of any one of 7 login validation method.
10. a kind of computer readable storage medium, the computer-readable recording medium storage has computer program, feature to exist In the step of realization login validation method as described in any one of claim 1 to 7 when the computer program is executed by processor Suddenly.
CN201810163982.4A 2018-02-27 2018-02-27 Login validation method, device, computer equipment and storage medium Active CN108462704B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201810163982.4A CN108462704B (en) 2018-02-27 2018-02-27 Login validation method, device, computer equipment and storage medium
PCT/CN2018/081548 WO2019165675A1 (en) 2018-02-27 2018-04-02 Login verification method and apparatus, computer device, and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810163982.4A CN108462704B (en) 2018-02-27 2018-02-27 Login validation method, device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN108462704A true CN108462704A (en) 2018-08-28
CN108462704B CN108462704B (en) 2019-08-06

Family

ID=63216595

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810163982.4A Active CN108462704B (en) 2018-02-27 2018-02-27 Login validation method, device, computer equipment and storage medium

Country Status (2)

Country Link
CN (1) CN108462704B (en)
WO (1) WO2019165675A1 (en)

Cited By (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108900557A (en) * 2018-09-12 2018-11-27 北京英视睿达科技有限公司 Login method and system
CN109617901A (en) * 2018-12-29 2019-04-12 上海点融信息科技有限责任公司 Determine the method and device thereof of white list
CN109815669A (en) * 2019-01-14 2019-05-28 平安科技(深圳)有限公司 Authentication method and server based on recognition of face
CN110276183A (en) * 2019-06-19 2019-09-24 同盾控股有限公司 Reversed Turing verification method and device, storage medium, electronic equipment
CN110322250A (en) * 2019-05-22 2019-10-11 深圳壹账通智能科技有限公司 The recognition methods of inactive users courses of action, device, equipment and storage medium
CN110753036A (en) * 2019-09-27 2020-02-04 苏州浪潮智能科技有限公司 Method and system for client quick authentication under CS framework
CN110781466A (en) * 2019-10-22 2020-02-11 京信通信系统(中国)有限公司 Equipment safety management method and device, computer equipment and storage medium
CN111062010A (en) * 2019-11-08 2020-04-24 支付宝(杭州)信息技术有限公司 Identity verification method, device and equipment
CN111181927A (en) * 2019-12-13 2020-05-19 福建天泉教育科技有限公司 Login method and server
CN111241139A (en) * 2020-01-15 2020-06-05 平安医疗健康管理股份有限公司 Data statistical method, device, computer equipment and storage medium
CN112613020A (en) * 2020-12-31 2021-04-06 中国农业银行股份有限公司 Identity verification method and device
WO2021072866A1 (en) * 2019-10-16 2021-04-22 平安科技(深圳)有限公司 Information authentication method and device, computer apparatus, and storage medium
WO2021082023A1 (en) * 2019-11-02 2021-05-06 游戏橘子数位科技股份有限公司 Method for forcibly changing a password
CN113099453A (en) * 2021-03-30 2021-07-09 厦门理工学院 Authentication method, device and equipment for access server and readable storage medium
CN113806712A (en) * 2020-06-11 2021-12-17 马上消费金融股份有限公司 Authentication processing method, processing device and computer readable storage medium
CN113965345A (en) * 2021-09-08 2022-01-21 福建库克智能科技有限公司 Identity recognition method and device, electronic equipment and storage medium
CN114745360A (en) * 2022-03-28 2022-07-12 慧之安信息技术股份有限公司 Online registration method based on open source protocol stack eXosip
CN114978749A (en) * 2022-06-14 2022-08-30 中国电信股份有限公司 Login authentication method and system, storage medium and electronic equipment
CN115766164A (en) * 2022-11-08 2023-03-07 云南电网有限责任公司信息中心 Unified authentication management's automation instrument sharing platform
CN116029811A (en) * 2022-12-23 2023-04-28 杭州快付连接科技有限公司 Bank marketing business digital management system, intelligent equipment and storage medium
CN116028909A (en) * 2023-02-24 2023-04-28 深圳市赛柏特通信技术有限公司 Security office control method, system and medium
CN116094848A (en) * 2023-04-11 2023-05-09 中国工商银行股份有限公司 Access control method, device, computer equipment and storage medium
CN116800544A (en) * 2023-08-21 2023-09-22 成都数智创新精益科技有限公司 User authentication method, system and device and medium
CN117118749A (en) * 2023-10-20 2023-11-24 天津奥特拉网络科技有限公司 Personal communication network-based identity verification system
WO2024001109A1 (en) * 2022-06-27 2024-01-04 中国电信股份有限公司 Authentication method and system based on owner number login, device, and storage medium
CN112613020B (en) * 2020-12-31 2024-05-28 中国农业银行股份有限公司 Identity verification method and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150089621A1 (en) * 2013-09-24 2015-03-26 Cellco Partnership (D/B/A Verizon Wireless) Secure login for subscriber devices
CN104539604A (en) * 2014-12-23 2015-04-22 北京奇虎科技有限公司 Website protection method and device
CN105654303A (en) * 2015-12-31 2016-06-08 拉扎斯网络科技(上海)有限公司 High-risk user recognition method and device

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104144419B (en) * 2014-01-24 2017-05-24 腾讯科技(深圳)有限公司 Identity authentication method, device and system
US9514294B1 (en) * 2015-11-12 2016-12-06 International Business Machines Corporation Accessing a computing resource
CN107438049B (en) * 2016-05-25 2020-03-17 百度在线网络技术(北京)有限公司 Malicious login identification method and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150089621A1 (en) * 2013-09-24 2015-03-26 Cellco Partnership (D/B/A Verizon Wireless) Secure login for subscriber devices
CN104539604A (en) * 2014-12-23 2015-04-22 北京奇虎科技有限公司 Website protection method and device
CN105654303A (en) * 2015-12-31 2016-06-08 拉扎斯网络科技(上海)有限公司 High-risk user recognition method and device

Cited By (35)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108900557B (en) * 2018-09-12 2023-09-22 国际商业机器(中国)投资有限公司 Login method and system
CN108900557A (en) * 2018-09-12 2018-11-27 北京英视睿达科技有限公司 Login method and system
CN109617901A (en) * 2018-12-29 2019-04-12 上海点融信息科技有限责任公司 Determine the method and device thereof of white list
CN109815669A (en) * 2019-01-14 2019-05-28 平安科技(深圳)有限公司 Authentication method and server based on recognition of face
CN110322250A (en) * 2019-05-22 2019-10-11 深圳壹账通智能科技有限公司 The recognition methods of inactive users courses of action, device, equipment and storage medium
CN110276183A (en) * 2019-06-19 2019-09-24 同盾控股有限公司 Reversed Turing verification method and device, storage medium, electronic equipment
CN110753036A (en) * 2019-09-27 2020-02-04 苏州浪潮智能科技有限公司 Method and system for client quick authentication under CS framework
WO2021072866A1 (en) * 2019-10-16 2021-04-22 平安科技(深圳)有限公司 Information authentication method and device, computer apparatus, and storage medium
CN110781466A (en) * 2019-10-22 2020-02-11 京信通信系统(中国)有限公司 Equipment safety management method and device, computer equipment and storage medium
WO2021082023A1 (en) * 2019-11-02 2021-05-06 游戏橘子数位科技股份有限公司 Method for forcibly changing a password
CN111062010A (en) * 2019-11-08 2020-04-24 支付宝(杭州)信息技术有限公司 Identity verification method, device and equipment
CN111181927B (en) * 2019-12-13 2021-12-28 福建天泉教育科技有限公司 Login method and server
CN111181927A (en) * 2019-12-13 2020-05-19 福建天泉教育科技有限公司 Login method and server
CN111241139A (en) * 2020-01-15 2020-06-05 平安医疗健康管理股份有限公司 Data statistical method, device, computer equipment and storage medium
CN111241139B (en) * 2020-01-15 2022-09-30 深圳平安医疗健康科技服务有限公司 Data statistical method, device, computer equipment and storage medium
CN113806712A (en) * 2020-06-11 2021-12-17 马上消费金融股份有限公司 Authentication processing method, processing device and computer readable storage medium
CN112613020A (en) * 2020-12-31 2021-04-06 中国农业银行股份有限公司 Identity verification method and device
CN112613020B (en) * 2020-12-31 2024-05-28 中国农业银行股份有限公司 Identity verification method and device
CN113099453A (en) * 2021-03-30 2021-07-09 厦门理工学院 Authentication method, device and equipment for access server and readable storage medium
CN113965345A (en) * 2021-09-08 2022-01-21 福建库克智能科技有限公司 Identity recognition method and device, electronic equipment and storage medium
CN114745360A (en) * 2022-03-28 2022-07-12 慧之安信息技术股份有限公司 Online registration method based on open source protocol stack eXosip
CN114745360B (en) * 2022-03-28 2023-10-17 慧之安信息技术股份有限公司 Online registration method based on open source protocol stack eXosip
CN114978749A (en) * 2022-06-14 2022-08-30 中国电信股份有限公司 Login authentication method and system, storage medium and electronic equipment
CN114978749B (en) * 2022-06-14 2023-10-10 中国电信股份有限公司 Login authentication method and system, storage medium and electronic equipment
WO2024001109A1 (en) * 2022-06-27 2024-01-04 中国电信股份有限公司 Authentication method and system based on owner number login, device, and storage medium
CN115766164A (en) * 2022-11-08 2023-03-07 云南电网有限责任公司信息中心 Unified authentication management's automation instrument sharing platform
CN116029811A (en) * 2022-12-23 2023-04-28 杭州快付连接科技有限公司 Bank marketing business digital management system, intelligent equipment and storage medium
CN116029811B (en) * 2022-12-23 2023-09-15 杭州快付连接科技有限公司 Bank marketing business digital management system, intelligent equipment and storage medium
CN116028909B (en) * 2023-02-24 2023-12-19 深圳市赛柏特通信技术有限公司 Security office control method, system and medium
CN116028909A (en) * 2023-02-24 2023-04-28 深圳市赛柏特通信技术有限公司 Security office control method, system and medium
CN116094848A (en) * 2023-04-11 2023-05-09 中国工商银行股份有限公司 Access control method, device, computer equipment and storage medium
CN116094848B (en) * 2023-04-11 2023-06-27 中国工商银行股份有限公司 Access control method, device, computer equipment and storage medium
CN116800544B (en) * 2023-08-21 2023-11-24 成都数智创新精益科技有限公司 User authentication method, system and device and medium
CN116800544A (en) * 2023-08-21 2023-09-22 成都数智创新精益科技有限公司 User authentication method, system and device and medium
CN117118749A (en) * 2023-10-20 2023-11-24 天津奥特拉网络科技有限公司 Personal communication network-based identity verification system

Also Published As

Publication number Publication date
WO2019165675A1 (en) 2019-09-06
CN108462704B (en) 2019-08-06

Similar Documents

Publication Publication Date Title
CN108462704B (en) Login validation method, device, computer equipment and storage medium
CN105007280B (en) A kind of application login method and device
US9407622B2 (en) Methods and apparatus for delegated authentication token retrieval
US9491155B1 (en) Account generation based on external credentials
US8806591B2 (en) Authentication risk evaluation
CN105871838B (en) A kind of log-in control method and customer center platform of third party's account
CN104717261B (en) A kind of login method and desktop management equipment
CN105246073B (en) The access authentication method and server of wireless network
US20130239173A1 (en) Computer program and method for administering secure transactions using secondary authentication
CN110401655A (en) Access control right management system based on user and role
CN103986584A (en) Double-factor identity verification method based on intelligent equipment
CN105162775A (en) Logging method and device of virtual machine
CN104901970B (en) A kind of Quick Response Code login method, server and system
CN109861968A (en) Resource access control method, device, computer equipment and storage medium
CN109831310B (en) Identity verification method, system, equipment and computer readable storage medium
CN109067785A (en) Cluster authentication method, device
CN105262588A (en) Log-in method based on dynamic password, account number management server and mobile terminal
CN112651011A (en) Login verification method, device and equipment for operation and maintenance system and computer storage medium
CN105022939B (en) Information Authentication method and device
CN105337967B (en) Realize that user logs in method, system and the central server of destination server
CN106161348A (en) A kind of method of single-sign-on, system and terminal
US20220191202A1 (en) Consent-based authorization system
CN105162774A (en) Virtual machine login method and device used for terminal
CN106331003A (en) Method and device for accessing application portal system on cloud desktop
CN102833247A (en) Method for anti-sweeping ciphers in user login system and device thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant