CN111723357A - Login verification method and device - Google Patents

Login verification method and device Download PDF

Info

Publication number
CN111723357A
CN111723357A CN201910217532.3A CN201910217532A CN111723357A CN 111723357 A CN111723357 A CN 111723357A CN 201910217532 A CN201910217532 A CN 201910217532A CN 111723357 A CN111723357 A CN 111723357A
Authority
CN
China
Prior art keywords
commodity
login
information
verification
verification code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910217532.3A
Other languages
Chinese (zh)
Inventor
张之硕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Jingdong Century Trading Co Ltd
Beijing Jingdong Shangke Information Technology Co Ltd
Original Assignee
Beijing Jingdong Century Trading Co Ltd
Beijing Jingdong Shangke Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Jingdong Century Trading Co Ltd, Beijing Jingdong Shangke Information Technology Co Ltd filed Critical Beijing Jingdong Century Trading Co Ltd
Priority to CN201910217532.3A priority Critical patent/CN111723357A/en
Publication of CN111723357A publication Critical patent/CN111723357A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The embodiment of the invention provides a login verification method and a login verification device. And the terminal equipment displays a login interface and displays the thumbnail of the commodity in a commodity display frame on the login interface. Then, the terminal equipment identifies the verification code input by the login person in the verification code input box and submits the verification code to the server, so that the server verifies whether the login person is legal or not according to the verification code submitted by the login person and the verification code corresponding to the commodity information. In the process, the commodity recommendation is carried out by effectively utilizing the huge flow of the input verification code, the user is forced to browse the commodity description information, the commodity exposure rate and the order placing rate are increased while the safety is improved. Meanwhile, when the login user is an illegal login user, the whole verification process cannot be simulated, so that the server can effectively identify whether the login user is legal or not, and the safety is improved.

Description

Login verification method and device
Technical Field
The embodiment of the invention relates to the technical field of internet, in particular to a login verification method and device.
Background
At present, a completely automatic public television test to tell computers and humans apart from each other (CAPTCHA) technology is introduced into system login to tell whether a user or a computer is logged in a system, so as to prevent malicious password cracking, ticket swiping, and the like.
In the CAPCTCHA technology, a user is required to input an authentication code in a login process, or the user does not need to input the authentication code during initial login, but if the password is input incorrectly for many times in the login process of the user, a system pushes an authentication code input interface to the user so as to force the user to input the authentication code. The verification code is generated in advance and can be a character verification code, a graph verification code, a sliding verification code or a short message verification code and the like.
However, when the verification code is a character verification code or a graphic verification code, the image recognition accuracy is higher and higher with the development of the deep learning technology, so that the character verification code and the graphic verification code are easy to crack, and the system cannot recognize whether the user or the computer is logged in before.
Disclosure of Invention
The embodiment of the invention provides a login verification method and a login verification device, which aim to effectively identify an illegal login user.
In a first aspect, an embodiment of the present invention provides a login verification method, including:
sending a data stream for generating a login interface to a terminal device, wherein the data stream comprises commodity information, the commodity information is used for login verification, and the login interface comprises: a verification code input frame and a commodity display frame;
receiving a login authentication request message sent by the terminal equipment, wherein the login authentication request message carries an authentication code input by a login user in the authentication code input box;
and judging whether the verification code is the verification code corresponding to the commodity information or not so as to verify whether the login user is legal or not.
In one possible design, the commodity information includes a thumbnail of a commodity and the commodity description information.
In one possible design, the merchandise information includes a thumbnail of the merchandise; after sending the data stream for generating the login interface to the terminal device, the method further includes:
receiving a commodity description information request message sent by the terminal equipment, wherein the commodity description information request message is generated by the terminal equipment detecting that the loggers click the thumbnails;
and sending a data stream for generating an interface for displaying the commodity description information to the terminal equipment.
In one possible design, the determining whether the verification code corresponding to the commodity information is a verification code corresponding to the commodity information to verify whether the login user is legal includes:
judging whether the verification code is consistent with a preset attribute in the commodity description information;
if the verification code is consistent with the preset attribute, determining that the login user is a legal login user, and if the verification code is inconsistent with the preset attribute, determining that the login user is an illegal login user.
In a possible design, after sending the data stream for generating the login interface to the terminal device, the method further includes:
receiving an operation request message sent by the terminal equipment, wherein the operation request message is generated by the terminal equipment according to the operation behavior of the login user on the commodity information;
and caching the corresponding relation between the loggers and the commodities corresponding to the commodity information according to the operation request message.
In a feasible design, after caching the correspondence between the registrant and the product corresponding to the product information according to the operation request message, the method further includes:
if the login verification is successful, the corresponding relation between the login person and the commodity is persisted;
and if the login verification fails, deleting the corresponding relation between the login user and the commodity.
In one possible design, the determining whether the verification code is the verification code corresponding to the merchandise information to verify whether the login user is legal further includes:
and sending a login verification response message to the terminal equipment, wherein the login verification response message is used for indicating login verification success or login verification failure to the terminal equipment.
In a second aspect, an embodiment of the present invention provides a login verification method, including:
receiving a data stream sent by a server and used for generating a login interface, wherein the data stream comprises commodity information, the commodity information is used for login verification, and the login interface comprises: a verification code input frame and a commodity display frame;
displaying the login interface according to the data stream, and displaying the commodity corresponding to the commodity information in the commodity display frame according to the commodity information;
identifying a verification code input by a login user in the verification code input box, wherein the verification code is obtained by the login user operating the commodity displayed in the commodity display box;
and sending a login verification message to the server, wherein the login verification request message carries the verification code.
In one possible design, the commodity information includes a thumbnail of a commodity and the commodity description information; the displaying the login interface according to the data stream, and displaying the commodity corresponding to the commodity information in the commodity display frame according to the commodity information further includes:
judging whether the loggers click the thumbnails displayed in the commodity display frames or not;
and if the fact that the loggers click the thumbnails is detected, displaying the description information in the display frame.
In one possible design, the merchandise information includes a thumbnail of the merchandise; the displaying the login interface according to the data stream, and displaying the commodity corresponding to the commodity information in the commodity display frame according to the commodity information further includes:
detecting that the loggers click the thumbnails displayed in the commodity display frames;
sending a commodity description information request message to the server;
receiving a data stream which is sent by the server and generates an interface for displaying the commodity description information;
and displaying the interface of the commodity description information.
In a feasible design, after displaying the login interface according to the data stream and displaying a commodity corresponding to the commodity information in the commodity display frame according to the commodity information, the method further includes:
generating an operation request message according to the operation behavior of the login user on the commodity information;
and sending the operation request message to the server.
In one possible design, after sending the login verification message to the server, the method further includes:
and receiving a login authentication response message sent by the server, wherein the login authentication response message is used for indicating login authentication success or login authentication failure to the terminal equipment.
In a third aspect, an embodiment of the present invention provides a login authentication apparatus, including:
a sending unit, configured to send a data stream used for generating a login interface to a terminal device, where the data stream includes commodity information, the commodity information is used for login verification, and the login interface includes: a verification code input frame and a commodity display frame;
a receiving unit, configured to receive a login authentication request message sent by the terminal device, where the login authentication request message carries an authentication code input by a login user in the authentication code input box;
and the processing unit is used for judging whether the verification code is the verification code corresponding to the commodity information so as to verify whether the login user is legal.
In one possible design, the commodity information includes a thumbnail of a commodity and the commodity description information.
In one possible design, the merchandise information includes a thumbnail of the merchandise; the receiving unit is further configured to receive a commodity description information request message sent by the terminal device after the sending unit sends the data stream for generating a login interface to the terminal device, where the commodity description information request message is generated by the terminal device detecting that the loggers click the thumbnails;
the sending unit is further configured to send a data stream for generating an interface for displaying the commodity description information to the terminal device.
In one feasible design, the verification code corresponding to the commodity information is a preset attribute in the commodity description information, and the processing unit is configured to determine whether the verification code is consistent with the preset attribute in the commodity description information; if the verification code is consistent with the preset attribute, determining that the login user is a legal login user, and if the verification code is inconsistent with the preset attribute, determining that the login user is an illegal login user.
In a feasible design, the receiving unit is further configured to receive an operation request message sent by the terminal device after the sending unit sends the data stream for generating a login interface to the terminal device, where the operation request message is generated by the terminal device according to an operation behavior of the registrant on the commodity information;
the processing unit is further configured to cache a corresponding relationship between the registrant and the commodity corresponding to the commodity information according to the operation request message.
In a feasible design, the processing unit is further configured to, after caching the corresponding relationship between the registrant and the commodity corresponding to the commodity information according to the operation request message, persist the corresponding relationship between the registrant and the commodity if login verification is successful; and if the login verification fails, deleting the corresponding relation between the login user and the commodity.
In a feasible design, the sending unit is further configured to send a login verification response message to the terminal device after the processing unit determines whether the verification code is the verification code corresponding to the commodity information to verify whether the login user is legal, where the login verification response message is used to indicate to the terminal device that login verification is successful or login verification is failed.
In a fourth aspect, an embodiment of the present invention provides a login authentication apparatus, including:
a receiving unit, configured to receive a data stream sent by a server and used to generate a login interface, where the data stream includes commodity information, the commodity information is used for login verification, and the login interface includes: a verification code input frame and a commodity display frame;
the display unit is used for displaying the login interface according to the data stream and displaying the commodity corresponding to the commodity information in the commodity display frame according to the commodity information;
the processing unit is used for identifying the verification code input by the login user in the verification code input box, wherein the verification code is obtained by the login user operating the commodity displayed in the commodity display box;
and the sending unit is used for sending a login verification message to the server, wherein the login verification request message carries the verification code.
In one possible design, the commodity information includes a thumbnail of a commodity and the commodity description information;
the processing unit is used for judging whether the loggers click the thumbnails displayed in the commodity display frame or not after the display unit displays the login interface according to the data stream and displays the commodities corresponding to the commodity information in the commodity display frame according to the commodity information; and if the fact that the loggers click the thumbnails is detected, triggering the display unit to display the description information in the display frame.
In one possible design, the merchandise information includes a thumbnail of the merchandise; the processing unit is used for detecting that the loggers click the thumbnails displayed in the commodity display frame after the display unit displays the login interface according to the data stream and displays the commodities corresponding to the commodity information in the commodity display frame according to the commodity information;
the sending unit is also used for sending a commodity description information request message to the server;
the receiving unit is further configured to receive a data stream, which is sent by the server and used for generating an interface for displaying the commodity description information;
the display unit is also used for displaying an interface of the commodity description information.
In a feasible design, the processing unit is further configured to generate an operation request message according to an operation behavior of the registrant on the commodity information after the display unit displays the login interface according to the data stream and displays the commodity corresponding to the commodity information in the commodity display frame according to the commodity information;
the sending unit is further configured to send the operation request message to the server.
In a feasible design, the receiving unit is further configured to receive a login authentication response message sent by the server after the sending unit sends the login authentication message to the server, where the login authentication response message is used to indicate that login authentication succeeds or login authentication fails to the terminal device.
In a fifth aspect, an embodiment of the present invention provides a terminal device, which includes a processor, a memory, and a computer program stored in the memory and executable on the processor, where the processor executes the computer program to implement the method according to the first aspect or the various possible implementations of the first aspect.
In a sixth aspect, an embodiment of the present invention provides a server, including a processor, a memory, and a computer program stored on the memory and executable on the processor, wherein the processor, when executing the program, implements the method according to the first aspect or the various possible implementations of the first aspect.
In a seventh aspect, an embodiment of the present invention provides a storage medium, where instructions are stored, and when the instructions are executed on a computer, the computer is caused to execute the method according to the first aspect or the various possible implementations of the first aspect.
In an eighth aspect, embodiments of the present invention provide a storage medium having stored therein instructions, which, when run on a computer, cause the computer to perform a method as described above in the second aspect or in various possible implementations of the second aspect.
In a ninth aspect, embodiments of the present invention provide a computer program product, which when run on a computer, causes the computer to perform the method according to the first aspect or the various possible implementations of the first aspect.
In a tenth aspect, embodiments of the present invention provide a computer program product, which when run on a computer, causes the computer to perform the method according to the second aspect or the various possible implementations of the second aspect.
According to the login verification method and device provided by the embodiment of the invention, when a login user logs in the server on the terminal equipment, the server pushes the login interface to the terminal equipment, and the login interface comprises the verification code input frame and the commodity display frame. And the terminal equipment displays a login interface and displays the thumbnail of the commodity in a commodity display frame on the login interface. Then, the terminal equipment identifies the verification code input by the login person in the verification code input box and submits the verification code to the server, so that the server verifies whether the login person is legal or not according to the verification code submitted by the login person and the verification code corresponding to the commodity information. In the process, the commodity recommendation is carried out by effectively utilizing the huge flow of the input verification code, the user is forced to browse the commodity description information, the commodity exposure rate and the order placing rate are increased while the safety is improved. Meanwhile, when the login user is an illegal login user, the whole verification process cannot be simulated, so that the server can effectively identify whether the login user is legal or not, and the safety is improved. In addition, the verification code library is not required to be generated for various commodities, so that the generation cost of the verification code is saved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 is a schematic application environment diagram of a login authentication method according to an embodiment of the present invention;
fig. 2 is a flowchart of a login authentication method according to an embodiment of the present invention;
fig. 3 is a schematic interface diagram of a terminal device in a login authentication method according to an embodiment of the present invention;
fig. 4 is a schematic interface diagram of a terminal device in another login authentication method according to an embodiment of the present invention;
fig. 5 is a system structure diagram of a login authentication method according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of a login authentication apparatus according to an embodiment of the present invention;
fig. 7 is a schematic structural diagram of another login authentication device according to an embodiment of the present invention;
fig. 8 is a schematic structural diagram of another login authentication device according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In order to distinguish whether the current system is logged in legally or illegally, a verification code library, such as a character verification code library, a graph verification code library, a sliding verification code library or a short message verification code, is generated by training in advance. Taking the verification code as a character verification code as an example, when a login user tries to log in, the server pushes a verification code input interface carrying a target verification code to the terminal equipment, and the user inputs and submits the verification code in the verification code input box. And then, the server compares whether the verification code submitted by the user is the target verification code, if so, the login verification is successful, and the login of the login person is allowed, otherwise, the login of the login person is refused. With the development of deep learning technology, the image recognition precision is higher and higher, so that the character verification code is easy to crack, and the system cannot recognize whether the user or the computer is logged in before.
When the verification code is the image verification code and the login of the login user is attempted, the server pushes an input interface carrying the image verification code to the terminal equipment, a plurality of images are displayed on the interface, the user is prompted to click the target image, whether the user clicks the target image or not is determined according to the clicking operation of the user, if yes, the login verification is successful, the login of the login user is allowed, and if not, the login of the login user is refused. In this process, the user is required to recognize the image authentication code by the naked eye, but many images are difficult to recognize.
And when the verification code is a sliding verification code, the server pushes an interface carrying the sliding verification code to the terminal equipment to prompt the user to slide an icon and the like, if the sliding track of the icon is the same as the target track, the login verification is successful, the login of the login user is allowed, and otherwise, the login of the login user is refused. In the process, the user is required to identify the sliding icon by naked eyes and operate the sliding icon, and the process is complicated.
When the verification code is a short message verification code, certain short message cost is required.
In short, the above login authentication processes all have disadvantages. In view of this, embodiments of the present invention provide a login verification method, which uses commodity description information as a verification code to prevent the verification code from being broken, thereby improving login security and increasing commodity exposure rate.
The login verification method provided by the embodiment of the invention can be applied to a scene that whether a login person is legal or not needs to be verified. For example, the registrant logs in the scenes of various systems. For example, please refer to fig. 1.
Fig. 1 is a schematic application environment diagram of a login authentication method according to an embodiment of the present invention. Referring to fig. 1, a terminal device establishes a network connection with a server, and when the terminal device uses the server, the server pushes a login interface to the terminal device, where the login interface includes a verification code input box and a commodity display box. The terminal equipment displays a login interface, and thumbnails of the commodities are displayed in a commodity display frame on the login interface. Then, the user clicks the thumbnail to acquire the commodity description information, inputs the description information into the verification input box and submits the description information to the server. The server judges whether the verification code input by the user is consistent with the verification code corresponding to the commodity information or not, and if so, the login person is determined to be a legal login person; otherwise, the registrant is considered to be an illegal registrant. The terminal device may be, for example, a computer, a notebook, a mobile phone, and the like of a user, and the embodiment of the present invention is not limited. The server may be, for example, a server corresponding to the system that the registrar is attempting to log on.
Next, a login authentication method according to an embodiment of the present invention will be described in detail with reference to fig. 1. For example, please refer to fig. 2.
Fig. 2 is a flowchart of a login authentication method according to an embodiment of the present invention. The embodiment describes the login authentication method in detail from the perspective of interaction between a server and a terminal device, and includes:
101. and the server sends the data stream for generating the login interface to the terminal equipment.
Accordingly, the terminal device receives the data stream.
The data stream includes commodity information, the commodity information is used for login verification, and the login interface includes: a verification code input box and a commodity display box.
In this step, when a logger logs in the server on the terminal device, the logger sends a login request message to the server, and the server determines the commodity and then returns a data stream for generating a login interface to the terminal device. For example, a user inputs a website address and the like of a server on the terminal device and sends the website address and the like to the server, and the server pushes a login interface to the terminal device, wherein the login interface comprises an authentication code input box and a commodity display box. In addition, the login interface may include other interface elements, such as an account number input box, a password input box, a login button, a cancel button, and the like, in addition to the two interface elements, namely the verification code input box and the commodity display box.
In this step, the commodity determined by the server may be a commodity recommended by a general recommendation system and most matched with the user, may also be random, or may be determined according to a preset rule. For example, the server randomly selects one commodity from the net red commodities; for another example, the server acquires a browsing record of the user corresponding to the account according to the account input by the login user in the account input box, and randomly selects one commodity from a plurality of commodities browsed by the user within a period of time recently; as another example, the server randomly selects an item from the user's shopping cart.
102. And the terminal equipment displays the login interface according to the data stream, and displays the commodity corresponding to the commodity information in the commodity display frame according to the commodity information.
In this step, the terminal device displays the login interface and displays the goods in the goods display frame on the login interface.
103. And the terminal equipment identifies the verification code input by the login person in the verification code input box, wherein the verification code is obtained by the operation of the login person on the commodity displayed in the commodity display box.
In this step, the registrant obtains the verification code according to the commodity displayed in the commodity display frame, and inputs the verification code in the verification code input frame, and the terminal device identifies the verification code. The verification code is not directly displayed on the login interface, and the login user cannot directly obtain the verification code from the login interface displayed in step 102, and needs to click on the commodity in the commodity display frame to obtain the verification code. Because the commodity is massive, the description information of the price, the production place and the like of the commodity is also massive, and the machine simulates and pre-judges the human behavior according to the basic service method. Therefore, when the login user is an illegal login user, such as a machine, the correct verification code cannot be entered in the verification code entry box because the user cannot know the verification code. Only when the login user is a human, the user can click on the commodity in the commodity display frame and obtain the verification code.
104. And the terminal equipment sends a login verification message to the server, wherein the login verification request message carries the verification code.
Correspondingly, the server receives the login authentication request message carrying the authentication code.
105. And the server judges whether the verification code is the verification code corresponding to the commodity information or not so as to verify whether the login user is legal or not.
In this step, the server determines whether the verification code entered and submitted by the login user through the verification code input box is the same verification code as the verification code corresponding to the commodity information. If the two are the same identifying code, the login person is determined to be a legal login person; if the two are not the same verification code, the login user is determined to be an illegal login user.
According to the login verification method provided by the embodiment of the invention, when a login user logs in the server on the terminal equipment, the server pushes the login interface to the terminal equipment, and the login interface comprises the verification code input frame and the commodity display frame. And the terminal equipment displays a login interface and displays the thumbnail of the commodity in a commodity display frame on the login interface. Then, the terminal equipment identifies the verification code input by the login person in the verification code input box and submits the verification code to the server, so that the server verifies whether the login person is legal or not according to the verification code submitted by the login person and the verification code corresponding to the commodity information. In the process, the commodity recommendation is carried out by effectively utilizing the huge flow of the input verification code, the user is forced to browse the commodity description information, the commodity exposure rate and the order placing rate are increased while the safety is improved. Meanwhile, when the login user is an illegal login user, the whole verification process cannot be simulated, so that the server can effectively identify whether the login user is legal or not, and the safety is improved. In addition, the verification code library is not required to be generated for various commodities, so that the generation cost of the verification code is saved. Meanwhile, the commodity recommendation is carried out by effectively utilizing the huge flow of the input verification code, the user is forced to browse the commodity description information, the commodity exposure rate is increased, and the order placing rate is increased.
The above-described login authentication method will be described in detail below using two embodiments. For example, see fig. 3 and 4.
Fig. 3 is a schematic interface diagram of a terminal device in a login authentication method according to an embodiment of the present invention. Referring to fig. 3, in the present embodiment, the commodity information includes a thumbnail of a commodity and commodity description information.
As shown in fig. 3 (a), the login interface typically includes interface elements such as an account number input box, a password input box, a verification code generation button, a product display box, a prompt box, a login button, and a cancel button. After the login user inputs the account and the password on the interface, the login user clicks the verification code generation button to obtain the interface shown in (b) of fig. 3. And the prompt language in the prompt box prompts the user how to perform login verification. For example, the prompt language in the prompt box may be: and clicking a verification code generation button to generate a verification code, clicking the verification code to acquire the description information, and inputting the commodity amount in a verification code input box to finish verification.
As shown in fig. 3 (b), a thumbnail of one product is displayed in the product display frame. The registrant clicks on the thumbnail image to obtain the interface shown in fig. 3 (c).
As shown in fig. 3 (c), description information of the amount of money, the place of origin, and the like of the article is displayed in the article display frame. Of course, only the amount of money may be displayed, and embodiments of the invention are not limited.
As shown in fig. 3 (d), the registrant enters the authentication code in the authentication code entry box according to the prompt language in the prompt box. Then, the login button is clicked to transmit an authentication request message to the server.
In the embodiment of fig. 3, the data stream received by the terminal device and used for generating the login interface includes the commodity information, where the commodity information includes the thumbnail and the commodity description information, and the terminal device displays the thumbnail first according to the data stream, and displays the description information after the login user clicks the thumbnail. However, the embodiment of the present invention is not limited, and in other feasible implementation manners, the commodity information may also include only a thumbnail, and after the registrant clicks the thumbnail, the terminal device is triggered to acquire the commodity description information from the server, and then the terminal device displays the description information in the commodity display frame.
In this embodiment, the thumbnail and the description information of the commodity are displayed in sequence on the commodity display frame on the login interface, and the login interface is not jumped. In order to enable a logger to browse detailed description information of commodities, after the logger clicks a thumbnail in a commodity display frame, a page jumps to a description information detail page for the logger to browse detailed description information of the commodities. For example, see fig. 4.
Fig. 4 is a schematic interface diagram of a terminal device in another login authentication method according to an embodiment of the present invention. Referring to fig. 4, in the embodiment, the commodity information includes a thumbnail of the commodity.
As shown in fig. 4 (a), the login interface typically includes interface elements such as an account number input box, a password input box, a verification code generation button, a product display box, a prompt box, a login button, and a cancel button. After the login user inputs the account and the password on the interface, the login user clicks the verification code generation button to obtain the interface shown in (b) of fig. 4. In the process, a login user clicks a verification code generation button, the terminal device is triggered to send a login verification request message to the server, the server determines the commodity according to the account and the password input by the login user, and then commodity information of the commodity is carried in a data stream and sent to the terminal device.
As shown in fig. 4 (b), a thumbnail of one product is displayed in the product display frame. The registrant clicks on the thumbnail image to obtain the interface shown in fig. 4 (c). In the process, the login user clicks the thumbnail of the commodity according to the prompt information in the prompt box, and enters an interface of detailed description information of the commodity. And after the amount is seen, returning to a login interface, and inputting the amount in the verification code input box.
Illustratively, after the loggers click the thumbnails, the terminal equipment is triggered to send a commodity description information request message to the server. Then, the server sends a data stream for generating an interface for displaying the commodity description information to the terminal device. And after receiving the data stream, the terminal equipment displays an interface of detailed description information of the commodity.
As shown in fig. 4 (c), the interface of detailed description information of the product displays the price, color, place of origin, etc. of the product, and may also display all evaluation buttons, shopping cart buttons, etc.
Optionally, since the commodity displayed in the commodity display frame is the best recommended commodity counted by the server, the registrant is interested to a great extent, and in the process of browsing the detailed description information, behaviors such as adding the commodity into a shopping cart, paying attention to the commodity, and the like may occur. At this time, the server caches the correspondence between the registrant and the product corresponding to the product information
As shown in fig. 4 (d), the registrant enters the authentication code in the authentication code entry box according to the prompt language in the prompt box. Then, the login button is clicked to transmit an authentication request message to the server. In this embodiment, the verification code corresponding to the commodity information is a preset attribute in the commodity description information, such as a price, and the server verifies the registrant by determining whether the verification code is consistent with the preset attribute in the commodity description information. In the verification process, if the verification code is consistent with the preset attribute, the login user is determined to be a legal login user, and if the verification code is inconsistent with the preset attribute, the login user is determined to be an illegal login user. For example, the verification code is the amount of the commodity, if the verification code input and submitted by the login user in the verification code input box is the correct amount of the commodity, the login verification of the server is successful, and a login verification response message used for indicating the successful login verification is sent to the terminal equipment; if the verification code input and submitted by the login user in the verification code database is wrong money or other information, the server verifies the login failure and sends a login verification response message for indicating the login verification failure to the terminal equipment.
In the above fig. 3, the user clicks the commodity in the commodity display frame to trigger the commodity display frame to display the commodity description information, and in the above fig. 4, the user clicks the commodity in the commodity display frame to trigger the page jump to display the commodity description information on the new page. However, the embodiment of the present invention is not limited, for example, the server stores a corresponding relationship between the commodity thumbnail and the commodity description information, the commodity description information includes the verification code, the user clicks the commodity in the commodity display frame, and triggers the server to send the short message to the terminal device, the short message carries the commodity description information, and the content of the short message includes commodity description information such as the price and the place of production of the commodity. Or the prompt box prompts the user to input the price of the commodity, and the short message only contains the price of the commodity.
The above-described login authentication method will be described in detail below from the system perspective. For example, see fig. 5, fig. 5 is a system structure diagram of a login authentication method according to an embodiment of the present invention.
Referring to fig. 5, the dashed lines indicate optional operations that the registrar may or may not perform. The system comprises a server, terminal equipment and a recommendation system, wherein the server comprises four modules which are respectively a verification code generation module, a verification code verification module, a commodity recommendation processing module and a commodity conversion delay processing module, the recommendation system can be an existing commodity recommendation system, the existing commodity recommendation system is connected with the commodity recommendation processing module of the server through an interface, and commodities are determined according to identity marks of loggers, such as account numbers and the like. The embodiment comprises the following steps:
201. and the terminal equipment sends a verification code generation request message to the verification code generation module.
202. And the verification code generation module sends a recommendation request message to the commodity recommendation module.
203. And the commodity recommendation processing module sends a recommended commodity acquisition message to the recommendation system.
The recommended commodity acquisition message carries the identity marks such as the account number and the password input by the login person.
204. And the recommendation system sends the commodity information to the commodity recommendation processing module.
205. And the commodity recommendation processing module sends commodity information to the verification code generation module.
206. And the commodity recommendation processing module sends verification information to the verification code verification module.
For example, if the verification code is the amount of money, the amount of money of the commodity is sent to the verification code verification module.
207. And the verification code generation module sends a data stream for generating a login interface to the terminal equipment.
In this step, the verification code generation module carries the commodity information in a data stream for generating a login interface according to the commodity information and sends the commodity information to the terminal device.
208. And the terminal equipment sends an operation request message to the commodity conversion delay processing module.
In this step, the terminal device generates an operation request message according to the operation behavior of the registrant on the commodity information. The operation behaviors comprise a behavior of adding commodities into a shopping cart, a behavior of adding commodities to pay attention and the like.
In this step, although the operation behavior is a behavior of adding a product to the shopping cart, adding attention to the product, or the like, since the registrant does not substantially complete the registration, the product is not actually added to the shopping cart, but is temporarily cached.
209. And the terminal equipment sends a login authentication request message to the authentication code verification module.
In this step, after the login user inputs the verification code in the verification code input box, the terminal device sends a login verification request message carrying the verification code to the verification code verification module.
210. And the verification code checking module sends a verification success message to the commodity conversion delay processing module.
In this step, the verification code checking module judges whether the verification code is the verification code corresponding to the commodity information to verify whether the registrant is legal. If the login user is a legal login user, the verification success message is verified to the commodity conversion delay processing module so as to persist the corresponding relation between the login user and the commodity. For example, the commodity is added to the shopping cart according to the correspondence between the registrants and the commodity in the cache. And if the login verification fails, deleting the corresponding relation between the login user and the commodity.
211. And the verification code verification module sends a login verification response message to the terminal equipment.
In the step, if the login verification of the verification code verification module is successful, a login verification response message for indicating the successful login verification is sent to the terminal equipment, so that the terminal equipment successfully logs in the server; if the login is failed to be verified, a login verification response message for indicating the login verification failure is sent to the terminal equipment, and the terminal equipment is refused to log in the server.
The following are embodiments of the apparatus of the present invention that may be used to perform embodiments of the method of the present invention. For details which are not disclosed in the embodiments of the apparatus of the present invention, reference is made to the embodiments of the method of the present invention.
Fig. 6 is a schematic structural diagram of a login authentication device according to an embodiment of the present invention. The login authentication device according to the present embodiment may be a server or a chip applied to the server. The login authentication means may be adapted to perform the functions of the server in the above embodiments. As shown in fig. 6, the login authentication device 100 may include:
a sending unit 11, configured to send, to a terminal device, a data stream used for generating a login interface, where the data stream includes commodity information, the commodity information is used for login verification, and the login interface includes: a verification code input frame and a commodity display frame;
a receiving unit 12, configured to receive a login authentication request message sent by the terminal device, where the login authentication request message carries an authentication code input by a login user in the authentication code input box;
and the processing unit 13 is configured to determine whether the verification code is a verification code corresponding to the commodity information, so as to verify whether the registrant is legal.
In one possible design, the commodity information includes a thumbnail of a commodity and the commodity description information.
In one possible design, the merchandise information includes a thumbnail of the merchandise; the receiving unit 12 is further configured to receive a commodity description information request message sent by the terminal device after the sending unit 11 sends the data stream for generating a login interface to the terminal device, where the commodity description information request message is generated by the terminal device detecting that the loggers click the thumbnails;
the sending unit 11 is further configured to send, to the terminal device, a data stream for generating an interface for displaying the commodity description information.
In a feasible design, the verification code corresponding to the commodity information is a preset attribute in the commodity description information, and the processing unit 13 is configured to determine whether the verification code is consistent with the preset attribute in the commodity description information; if the verification code is consistent with the preset attribute, determining that the login user is a legal login user, and if the verification code is inconsistent with the preset attribute, determining that the login user is an illegal login user.
In a feasible design, the receiving unit 12 is further configured to receive an operation request message sent by the terminal device after the sending unit 11 sends the data stream for generating a login interface to the terminal device, where the operation request message is generated by the terminal device according to an operation behavior of the registrant on the commodity information;
the processing unit 13 is further configured to cache, according to the operation request message, a correspondence between the registrant and the product corresponding to the product information.
In a possible design, the processing unit 13 is further configured to, after caching the corresponding relationship between the registrant and the commodity corresponding to the commodity information according to the operation request message, persist the corresponding relationship between the registrant and the commodity if login verification is successful; and if the login verification fails, deleting the corresponding relation between the login user and the commodity.
In a feasible design, the sending unit 11 is further configured to send a login verification response message to the terminal device after the processing unit 13 determines whether the verification code is the verification code corresponding to the commodity information to verify whether the login user is legal, where the login verification response message is used to indicate to the terminal device that login verification is successful or login verification is failed.
The login verification device provided by the embodiment of the application can execute the actions of the server in the embodiment, the implementation principle and the technical effect are similar, and details are not repeated herein.
Fig. 7 is a schematic structural diagram of another login authentication device according to an embodiment of the present invention. The login authentication device according to the present embodiment may be a terminal device, or may be a chip applied to a terminal device. The login authentication device may be configured to perform the functions of the terminal device in the above embodiments. As shown in fig. 7, the login authentication device 200 may include:
a receiving unit 21, configured to receive a data stream sent by a server and used to generate a login interface, where the data stream includes commodity information, the commodity information is used for performing login verification, and the login interface includes: a verification code input frame and a commodity display frame;
the display unit 22 is configured to display the login interface according to the data stream, and display a commodity corresponding to the commodity information in the commodity display frame according to the commodity information;
the processing unit 23 is configured to identify a verification code input by a login user in the verification code input box, where the verification code is obtained by the login user operating a commodity displayed in the commodity display box;
a sending unit 24, configured to send a login authentication message to the server, where the login authentication request message carries the authentication code.
In one possible design, the commodity information includes a thumbnail of a commodity and the commodity description information;
the processing unit 23 is configured to determine whether the registrant clicks the thumbnail displayed in the commodity display frame after the display unit 22 displays the login interface according to the data stream and displays the commodity corresponding to the commodity information in the commodity display frame according to the commodity information; and if the fact that the loggers click the thumbnails is detected, triggering the display unit 22 to display the description information in the display frame.
In one possible design, the merchandise information includes a thumbnail of the merchandise; the processing unit 23 is configured to detect that the registrant clicks the thumbnail displayed in the commodity display frame after the display unit 22 displays the login interface according to the data stream and displays the commodity corresponding to the commodity information in the commodity display frame according to the commodity information;
the sending unit 24 is further configured to send a product description information request message to the server;
the receiving unit 21 is further configured to receive a data stream, which is sent by the server and used for generating an interface for displaying the commodity description information;
the display unit 22 is further configured to display an interface of the commodity description information.
In a feasible design, the processing unit 23 is further configured to generate an operation request message according to an operation behavior of the registrant on the commodity information after the display unit 22 displays the login interface according to the data stream and displays the commodity corresponding to the commodity information in the commodity display frame according to the commodity information;
the sending unit 24 is further configured to send the operation request message to the server.
In a possible design, the receiving unit 21 is further configured to receive a login authentication response message sent by the server after the sending unit 24 sends the login authentication message to the server, where the login authentication response message is used to indicate that login authentication succeeds or login authentication fails to the terminal device.
The login verification device provided by the embodiment of the invention can execute the actions of the terminal equipment in the embodiment, the implementation principle and the technical effect are similar, and the details are not repeated.
It should be noted that the above receiving unit may be actually implemented as a receiver, and the transmitting unit may be actually implemented as a transmitter. The processing unit can be realized in the form of software called by the processing element; or may be implemented in hardware. For example, the processing unit may be a processing element separately set up, or may be implemented by being integrated into a chip of the apparatus, or may be stored in a memory of the apparatus in the form of program code, and a function of the processing unit may be called and executed by a processing element of the apparatus. In addition, all or part of the units can be integrated together or can be independently realized. The processing element described herein may be an integrated circuit having signal processing capabilities. In implementation, the steps of the method or the units above may be implemented by hardware integrated logic circuits in a processor element or instructions in software.
For example, the above units may be one or more integrated circuits configured to implement the above methods, such as: one or more Application Specific Integrated Circuits (ASICs), or one or more microprocessors (DSPs), or one or more Field Programmable Gate Arrays (FPGAs), etc. For another example, when some of the above units are implemented in the form of a processing element scheduler code, the processing element may be a general-purpose processor, such as a Central Processing Unit (CPU) or other processor that can call the program code. As another example, these units may be integrated together and implemented in the form of a system-on-a-chip (SOC).
Fig. 8 is a schematic structural diagram of another login authentication device according to an embodiment of the present invention. As shown in fig. 8, the login authentication device 300 includes:
at least one processor 31 and memory 32;
the memory 32 stores computer-executable instructions;
the at least one processor 31 executes computer-executable instructions stored by the memory 32, causing the at least one processor 31 to perform the login authentication method as performed by the terminal device or the login authentication method as performed by the server as described above.
For a specific implementation process of the processor 31, reference may be made to the above method embodiments, which implement the principle and the technical effect similarly, and details of this embodiment are not described herein again.
Optionally, the login authentication device 300 further comprises a communication component 33. The processor 31, the memory 32, and the communication unit 33 may be connected by a bus 34.
The embodiment of the present invention further provides a storage medium, where the storage medium stores computer execution instructions, and the computer execution instructions are executed by a processor to implement the login authentication method described above.
Embodiments of the present invention further provide a computer program product, which, when running on a computer, enables the computer to execute the above login authentication method.
In the above embodiments, it should be understood that the described apparatus and method may be implemented in other ways. For example, the above-described device embodiments are merely illustrative, and for example, the division of the modules is only one logical division, and other divisions may be realized in practice, for example, a plurality of modules may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or modules, and may be in an electrical, mechanical or other form.
The modules described as separate parts may or may not be physically separate, and parts displayed as modules may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
In addition, functional modules in the embodiments of the present invention may be integrated into one processing unit, or each module may exist alone physically, or two or more modules are integrated into one unit. The unit formed by the modules can be realized in a hardware form, and can also be realized in a form of hardware and a software functional unit.
The integrated module implemented in the form of a software functional module may be stored in a computer-readable storage medium. The software functional module is stored in a storage medium and includes several instructions to enable an electronic device (which may be a personal computer, a server, or a network device) or a processor (processor) to execute some steps of the method according to various embodiments of the present invention.
It should be understood that the processor may be a Central Processing Unit (CPU), other general purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of a method disclosed in connection with the present invention may be embodied directly in a hardware processor, or in a combination of the hardware and software modules within the processor.
The memory may comprise a high-speed RAM memory, and may further comprise a non-volatile storage NVM, such as at least one disk memory, and may also be a usb disk, a removable hard disk, a read-only memory, a magnetic or optical disk, etc.
The bus may be an Industry Standard Architecture (ISA) bus, a Peripheral Component Interconnect (PCI) bus, an Extended ISA (EISA) bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, the buses in the figures of the present invention are not limited to only one bus or one type of bus.
The storage medium may be implemented by any type or combination of volatile or non-volatile memory devices, such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks. A storage media may be any available media that can be accessed by a general purpose or special purpose computer.
An exemplary storage medium is coupled to the processor such the processor can read information from, and write information to, the storage medium. Of course, the storage medium may also be integral to the processor. The processor and the storage medium may reside in an Application Specific Integrated Circuits (ASIC). Of course, the processor and the storage medium may reside as discrete components in a terminal or server.
Those of ordinary skill in the art will understand that: all or a portion of the steps of implementing the above-described method embodiments may be performed by hardware associated with program instructions. The program may be stored in a computer-readable storage medium. When executed, the program performs steps comprising the method embodiments described above; and the aforementioned storage medium includes: various media that can store program codes, such as ROM, RAM, magnetic or optical disks.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (24)

1. A login authentication method, comprising:
sending a data stream for generating a login interface to a terminal device, wherein the data stream comprises commodity information, the commodity information is used for login verification, and the login interface comprises: a verification code input frame and a commodity display frame;
receiving a login authentication request message sent by the terminal equipment, wherein the login authentication request message carries an authentication code input by a login user in the authentication code input box;
and judging whether the verification code is the verification code corresponding to the commodity information or not so as to verify whether the login user is legal or not.
2. The method according to claim 1, wherein the article information includes a thumbnail of an article and the article description information.
3. The method according to claim 1, wherein the article information includes a thumbnail of the article; after sending the data stream for generating the login interface to the terminal device, the method further includes:
receiving a commodity description information request message sent by the terminal equipment, wherein the commodity description information request message is generated by the terminal equipment detecting that the loggers click the thumbnails;
and sending a data stream for generating an interface for displaying the commodity description information to the terminal equipment.
4. The method according to any one of claims 1 to 3, wherein the identifying code corresponding to the commodity information is a preset attribute in the commodity description information, and the determining whether the identifying code is the identifying code corresponding to the commodity information to identify whether the registrant is legal comprises:
judging whether the verification code is consistent with a preset attribute in the commodity description information;
if the verification code is consistent with the preset attribute, determining that the login user is a legal login user, and if the verification code is inconsistent with the preset attribute, determining that the login user is an illegal login user.
5. The method according to any one of claims 1 to 3, wherein after sending the data stream for generating the login interface to the terminal device, the method further comprises:
receiving an operation request message sent by the terminal equipment, wherein the operation request message is generated by the terminal equipment according to the operation behavior of the login user on the commodity information;
and caching the corresponding relation between the loggers and the commodities corresponding to the commodity information according to the operation request message.
6. The method according to claim 5, wherein after caching the correspondence between the registrant and the product corresponding to the product information according to the operation request message, the method further comprises:
if the login verification is successful, the corresponding relation between the login person and the commodity is persisted;
and if the login verification fails, deleting the corresponding relation between the login user and the commodity.
7. The method according to any one of claims 1 to 3, wherein the determining whether the verification code is a verification code corresponding to the commodity information to verify whether the registrant is legitimate further comprises:
and sending a login verification response message to the terminal equipment, wherein the login verification response message is used for indicating login verification success or login verification failure to the terminal equipment.
8. A login authentication method, comprising:
receiving a data stream sent by a server and used for generating a login interface, wherein the data stream comprises commodity information, the commodity information is used for login verification, and the login interface comprises: a verification code input frame and a commodity display frame;
displaying the login interface according to the data stream, and displaying the commodity corresponding to the commodity information in the commodity display frame according to the commodity information;
identifying a verification code input by a login user in the verification code input box, wherein the verification code is obtained by the login user operating the commodity displayed in the commodity display box;
and sending a login verification message to the server, wherein the login verification request message carries the verification code.
9. The method according to claim 8, wherein the article information includes a thumbnail of an article and the article description information; the displaying the login interface according to the data stream, and displaying the commodity corresponding to the commodity information in the commodity display frame according to the commodity information further includes:
judging whether the loggers click the thumbnails displayed in the commodity display frames or not;
and if the fact that the loggers click the thumbnails is detected, displaying the description information in the display frame.
10. The method according to claim 8, wherein the article information includes a thumbnail of the article; the displaying the login interface according to the data stream, and displaying the commodity corresponding to the commodity information in the commodity display frame according to the commodity information further includes:
detecting that the loggers click the thumbnails displayed in the commodity display frames;
sending a commodity description information request message to the server;
receiving a data stream which is sent by the server and generates an interface for displaying the commodity description information;
and displaying the interface of the commodity description information.
11. The method according to any one of claims 8 to 10, wherein the displaying the login interface according to the data stream and displaying the commodity corresponding to the commodity information in the commodity display frame according to the commodity information further comprises:
generating an operation request message according to the operation behavior of the login user on the commodity information;
and sending the operation request message to the server.
12. The method according to any one of claims 8 to 10, wherein after sending the login authentication message to the server, the method further comprises:
and receiving a login authentication response message sent by the server, wherein the login authentication response message is used for indicating login authentication success or login authentication failure to the terminal equipment.
13. A login authentication apparatus, comprising:
a sending unit, configured to send a data stream used for generating a login interface to a terminal device, where the data stream includes commodity information, the commodity information is used for login verification, and the login interface includes: a verification code input frame and a commodity display frame;
a receiving unit, configured to receive a login authentication request message sent by the terminal device, where the login authentication request message carries an authentication code input by a login user in the authentication code input box;
and the processing unit is used for judging whether the verification code is the verification code corresponding to the commodity information so as to verify whether the login user is legal.
14. The apparatus according to claim 13, wherein the article information includes a thumbnail of an article and the article description information.
15. The apparatus according to claim 13, wherein the article information includes a thumbnail of the article; the receiving unit is further configured to receive a commodity description information request message sent by the terminal device after the sending unit sends the data stream for generating a login interface to the terminal device, where the commodity description information request message is generated by the terminal device detecting that the loggers click the thumbnails;
the sending unit is further configured to send a data stream for generating an interface for displaying the commodity description information to the terminal device.
16. The device according to any one of claims 13 to 15, wherein the verification code corresponding to the commodity information is a preset attribute in the commodity description information, and the processing unit is configured to determine whether the verification code is consistent with the preset attribute in the commodity description information; if the verification code is consistent with the preset attribute, determining that the login user is a legal login user, and if the verification code is inconsistent with the preset attribute, determining that the login user is an illegal login user.
17. The apparatus according to any one of claims 13 to 15,
the receiving unit is used for receiving an operation request message sent by the terminal equipment after the sending unit sends the data stream for generating a login interface to the terminal equipment, wherein the operation request message is generated by the terminal equipment according to the operation behavior of the login user on the commodity information;
the processing unit is further configured to cache a corresponding relationship between the registrant and the commodity corresponding to the commodity information according to the operation request message.
18. The apparatus of claim 17,
the processing unit is used for caching the corresponding relation between the loggers and the commodities corresponding to the commodity information according to the operation request message, and then is used for persisting the corresponding relation between the loggers and the commodities if login verification is successful; and if the login verification fails, deleting the corresponding relation between the login user and the commodity.
19. The apparatus according to any one of claims 13 to 15,
the sending unit is further configured to send a login verification response message to the terminal device after the processing unit determines whether the verification code is the verification code corresponding to the commodity information to verify whether the login user is legal, where the login verification response message is used to indicate to the terminal device that login verification is successful or login verification is failed.
20. A login authentication apparatus, comprising:
a receiving unit, configured to receive a data stream sent by a server and used to generate a login interface, where the data stream includes commodity information, the commodity information is used for login verification, and the login interface includes: a verification code input frame and a commodity display frame;
the display unit is used for displaying the login interface according to the data stream and displaying the commodity corresponding to the commodity information in the commodity display frame according to the commodity information;
the processing unit is used for identifying the verification code input by the login user in the verification code input box, wherein the verification code is obtained by the login user operating the commodity displayed in the commodity display box;
and the sending unit is used for sending a login verification message to the server, wherein the login verification request message carries the verification code.
21. The apparatus according to claim 20, wherein the article information includes a thumbnail of an article and the article description information;
the processing unit is used for judging whether the loggers click the thumbnails displayed in the commodity display frame or not after the display unit displays the login interface according to the data stream and displays the commodities corresponding to the commodity information in the commodity display frame according to the commodity information; and if the fact that the loggers click the thumbnails is detected, triggering the display unit to display the description information in the display frame.
22. The apparatus according to claim 20, wherein the article information includes a thumbnail of the article; the processing unit is used for detecting that the loggers click the thumbnails displayed in the commodity display frame after the display unit displays the login interface according to the data stream and displays the commodities corresponding to the commodity information in the commodity display frame according to the commodity information;
the sending unit is also used for sending a commodity description information request message to the server;
the receiving unit is further configured to receive a data stream, which is sent by the server and used for generating an interface for displaying the commodity description information;
the display unit is also used for displaying an interface of the commodity description information.
23. The apparatus according to any one of claims 20 to 22,
the processing unit is used for generating an operation request message according to the operation behavior of the loggers on the commodity information after the display unit displays the login interface according to the data stream and displays the commodity corresponding to the commodity information in the commodity display frame according to the commodity information;
the sending unit is further configured to send the operation request message to the server.
24. The apparatus according to any one of claims 20 to 22,
the receiving unit is further configured to receive a login authentication response message sent by the server after the sending unit sends the login authentication message to the server, where the login authentication response message is used to indicate login authentication success or login authentication failure to the terminal device.
CN201910217532.3A 2019-03-21 2019-03-21 Login verification method and device Pending CN111723357A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910217532.3A CN111723357A (en) 2019-03-21 2019-03-21 Login verification method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910217532.3A CN111723357A (en) 2019-03-21 2019-03-21 Login verification method and device

Publications (1)

Publication Number Publication Date
CN111723357A true CN111723357A (en) 2020-09-29

Family

ID=72562189

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910217532.3A Pending CN111723357A (en) 2019-03-21 2019-03-21 Login verification method and device

Country Status (1)

Country Link
CN (1) CN111723357A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112671738A (en) * 2020-12-16 2021-04-16 平安普惠企业管理有限公司 Login method, device, terminal and storage medium of enterprise internal system

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102194070A (en) * 2010-03-18 2011-09-21 F2威尔股份有限公司 Data processing method and system as well as computer program product thereof
CN102957682A (en) * 2011-08-30 2013-03-06 北京百度网讯科技有限公司 Method and equipment for providing picture verification code based on verification security level
CN103353970A (en) * 2013-06-25 2013-10-16 王泳江 Download control method based on advertising verification code
CN103426101A (en) * 2013-07-31 2013-12-04 广州市动景计算机科技有限公司 Generating method and device for verification code
CN106850550A (en) * 2016-12-19 2017-06-13 北京五八信息技术有限公司 Verification method, server and terminal
US20180091305A1 (en) * 2016-09-23 2018-03-29 Beijing Xiaomi Mobile Software Co., Ltd. Method and device for processing verification code
CN108881126A (en) * 2017-05-15 2018-11-23 阿里巴巴集团控股有限公司 The methods, devices and systems of authentication code

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102194070A (en) * 2010-03-18 2011-09-21 F2威尔股份有限公司 Data processing method and system as well as computer program product thereof
CN102957682A (en) * 2011-08-30 2013-03-06 北京百度网讯科技有限公司 Method and equipment for providing picture verification code based on verification security level
CN103353970A (en) * 2013-06-25 2013-10-16 王泳江 Download control method based on advertising verification code
CN103426101A (en) * 2013-07-31 2013-12-04 广州市动景计算机科技有限公司 Generating method and device for verification code
US20180091305A1 (en) * 2016-09-23 2018-03-29 Beijing Xiaomi Mobile Software Co., Ltd. Method and device for processing verification code
CN106850550A (en) * 2016-12-19 2017-06-13 北京五八信息技术有限公司 Verification method, server and terminal
CN108881126A (en) * 2017-05-15 2018-11-23 阿里巴巴集团控股有限公司 The methods, devices and systems of authentication code

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112671738A (en) * 2020-12-16 2021-04-16 平安普惠企业管理有限公司 Login method, device, terminal and storage medium of enterprise internal system

Similar Documents

Publication Publication Date Title
CN108683666B (en) Webpage identification method and device
US10645071B2 (en) Systems and method for determining use of non-human users in a distributed computer network environment
US9871795B2 (en) Inactive non-blocking automated agent detection
CN109376078B (en) Mobile application testing method, terminal equipment and medium
US9985943B1 (en) Automated agent detection using multiple factors
US20120204257A1 (en) Detecting fraud using touchscreen interaction behavior
US20120323700A1 (en) Image-based captcha system
CN105591743B (en) Method and device for identity authentication through equipment operation characteristics of user terminal
JP5868529B2 (en) Form related validation
CN103685307A (en) Method, system, client and server for detecting phishing fraud webpage based on feature library
CN107451819B (en) Identity verification method and device based on user operation behavior characteristics
CN109327439B (en) Risk identification method and device for service request data, storage medium and equipment
US10097583B1 (en) Non-blocking automated agent detection
US10438225B1 (en) Game-based automated agent detection
CN111083165B (en) Login interception method and system based on combined anti-collision library platform
US8677116B1 (en) Systems and methods for authentication and verification
US10893061B2 (en) Automated detection of phishing campaigns via social media
CN105913245A (en) Internet payment method, device and server
CN109547426B (en) Service response method and server
CN108574721B (en) Login method, device, server, user terminal and readable storage medium
EP3822895A1 (en) Prevention of malicious activity through friction point implementation
CN113949560B (en) Network security identification method, device, server and storage medium
CN111723357A (en) Login verification method and device
CN107679865B (en) Identity verification method and device based on touch area
US11503058B2 (en) Security server for dynamic verification of web content, end users remote device, system comprising said end users remote device and server, and method implemented by said system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination