CN112953885B - Virtual private network login method and device and computer equipment - Google Patents
Virtual private network login method and device and computer equipment Download PDFInfo
- Publication number
- CN112953885B CN112953885B CN201911265117.1A CN201911265117A CN112953885B CN 112953885 B CN112953885 B CN 112953885B CN 201911265117 A CN201911265117 A CN 201911265117A CN 112953885 B CN112953885 B CN 112953885B
- Authority
- CN
- China
- Prior art keywords
- login
- user
- user terminal
- information
- network address
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0272—Virtual private networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/101—Access control lists [ACL]
Abstract
The embodiment of the invention provides a virtual private network login method, a virtual private network login device and computer equipment. In the technical scheme provided by the embodiment of the invention, first information sent by a user terminal is received, wherein the first information comprises a mobile phone number and network address application data; judging whether a preset white list comprises a mobile phone number and network address application data or not; if the preset white list comprises the mobile phone number and the network address application data, responding to the network address application data to obtain a network address; sending second information to the user terminal, wherein the second information comprises the network address; receiving user login information which is sent by a user terminal and input by a user on a login page of the user terminal; verifying the user login information; if the user login information is successfully verified, login success information is sent to the user terminal, so that the safety of the process of logging in the virtual private network can be greatly improved.
Description
[ technical field ] A method for producing a semiconductor device
The present invention relates to the field of communications technologies, and in particular, to a virtual private network login method, apparatus, and computer device.
[ background of the invention ]
The function of Virtual Private Network (VPN) is mainly to establish a Private Network on a public Network for encrypted communication, and is widely applied in enterprise networks. When using wireless devices, VPNs present security risks; any solution using advanced encryption techniques may be compromised when a user roams between access points. After an enterprise applies for a VPN, a VPN address and an Internet Protocol (IP) address are often public, and for a user, the VPN address and the IP address are fixed, and a login page can be normally opened as long as the user knows the VPN address or the IP address regardless of the permission of the user, so that a relatively high potential safety hazard problem exists.
[ summary of the invention ]
In view of this, embodiments of the present invention provide a method, an apparatus, and a computer device for logging in a virtual private network, which can greatly improve security during logging in the virtual private network.
In one aspect, an embodiment of the present invention provides a virtual private network login method, where the method includes:
receiving first information sent by a user terminal, wherein the first information comprises a mobile phone number and network address application data;
judging whether a preset white list comprises a mobile phone number and network address application data;
if the preset white list comprises the mobile phone number and the network address application data, responding to the network address application data and acquiring a network address;
sending second information to the user terminal, wherein the second information comprises the network address, so that the user terminal can access a login page of the virtual private network according to the network address;
receiving user login information which is sent by a user terminal and input by a user on a login page of the user terminal;
verifying the user login information;
and if the user login information is successfully verified, sending login success information to the user terminal.
Optionally, the acquiring a network address specifically includes:
and acquiring a first network address from the network address pool according to the arrangement sequence of the network addresses in the network address pool.
Optionally, the verifying the user login information specifically includes:
receiving a login verification code which is sent by a user terminal and input by a user on a login page of the user terminal;
judging whether the login verification code is the same as the short message verification code;
if the login verification code is judged to be the same as the short message verification code, the user login information is verified successfully.
Optionally, the user login information includes a user account and a user password;
before receiving a login verification code sent by a user terminal and input by a user on a login page of the user terminal, the method further comprises the following steps: judging whether a preset white list comprises a user account;
if the preset white list comprises the user account, judging whether a user password corresponding to the user account in the preset white list is the same as a user password sent by the user terminal;
and if the user password corresponding to the user account in the preset white list is judged to be the same as the user password sent by the user terminal, sending a short message verification code to the user terminal.
Optionally, after sending the login success information to the user terminal, the method further includes:
recording a login time point for sending login success information to a user terminal;
acquiring a current time point according to a preset time interval;
judging whether the difference value between the current time point and the login time point is greater than or equal to a preset time threshold value or not;
if the difference value between the current time point and the login time point is judged to be larger than or equal to the preset time threshold value, the user terminal is logged out;
and if the difference value between the current time point and the login time point is smaller than the preset threshold value, continuing to execute the step of obtaining the current time point according to the preset time interval.
Optionally, after sending the login success information to the user terminal, the method further includes:
receiving a log-out message sent by a user terminal;
and responding to the log-out message, and logging out the user terminal.
Optionally, after logging out the user terminal, the method further includes:
the status of the network address is modified to be invalid.
In another aspect, an embodiment of the present invention provides a virtual private network login apparatus, including:
the receiving unit is used for receiving first information sent by a user terminal, wherein the first information comprises a mobile phone number and network address application data; receiving user login information which is sent by a user terminal and input by a user on a login page of the user terminal;
the first judging unit is used for judging whether the preset white list comprises the mobile phone number and the network address application data;
the first obtaining unit is used for responding to the network address application data and obtaining the network address if the preset white list is judged to comprise the mobile phone number and the network address application data;
the sending unit is used for sending second information to the user terminal, wherein the second information comprises a network address, so that the user terminal can access a login page of the virtual private network according to the network address; if the user login information is successfully verified, login success information is sent to the user terminal;
and the verification unit is used for verifying the user login information.
On the other hand, an embodiment of the present invention provides a storage medium, where the storage medium includes a stored program, and when the program runs, a device where the storage medium is located is controlled to execute the foregoing virtual private network login method.
In another aspect, an embodiment of the present invention provides a computer device, including a memory and a processor, where the memory is used to store information including program instructions, and the processor is used to control execution of the program instructions, where the program instructions are loaded by the processor and executed to implement the steps of the virtual private network login method described above.
In the scheme of the embodiment of the invention, first information sent by a user terminal is received, wherein the first information comprises a mobile phone number and network address application data; judging whether a preset white list comprises a mobile phone number and network address application data or not; if the preset white list comprises the mobile phone number and the network address application data, responding to the network address application data to obtain a network address; sending second information to the user terminal, wherein the second information comprises the network address, so that the user terminal can access a login page of the virtual private network according to the network address; receiving user login information which is sent by a user terminal and input by a user on a login page of the user terminal; verifying the user login information; if the user login information is successfully verified, login success information is sent to the user terminal, so that the safety of the process of logging in the virtual private network can be greatly improved.
[ description of the drawings ]
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a flowchart of a virtual private network login method according to an embodiment of the present invention;
fig. 2 is a flowchart of another virtual private network login method according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of a virtual private network login apparatus according to an embodiment of the present invention;
fig. 4 is a schematic diagram of a computer device according to an embodiment of the present invention.
[ detailed description ] embodiments
For better understanding of the technical solutions of the present invention, the following detailed descriptions of the embodiments of the present invention are provided with reference to the accompanying drawings.
It should be understood that the described embodiments are only some embodiments of the invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terminology used in the embodiments of the invention is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in the description of the invention and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be understood that the term "and/or" as used herein is merely a relationship that describes an associated object, meaning that three relationships may exist, e.g., a and/or B, may represent: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter related objects are in an "or" relationship.
It should be understood that although the terms first, second, etc. may be used to describe the set thresholds in the embodiments of the present invention, the set thresholds should not be limited to these terms. These terms are used only to distinguish the set thresholds from each other. For example, the first set threshold may also be referred to as the second set threshold, and similarly, the second set threshold may also be referred to as the first set threshold, without departing from the scope of embodiments of the present invention.
Fig. 1 is a flowchart of a virtual private network login method according to an embodiment of the present invention, and as shown in fig. 1, the method includes:
And 104, judging whether the preset white list comprises the mobile phone number and the network address application data.
And step 106, if the preset white list is judged to comprise the mobile phone number and the network address application data, responding to the network address application data to obtain the network address.
And 108, sending second information to the user terminal, wherein the second information comprises the network address, so that the user terminal can access the login page of the virtual private network according to the network address.
And step 110, receiving user login information which is sent by the user terminal and input by the user on a login page of the user terminal.
And step 112, verifying the user login information.
And step 114, if the user login information is successfully verified, sending login success information to the user terminal.
In the technical scheme provided by the embodiment of the invention, first information sent by a user terminal is received, wherein the first information comprises a mobile phone number and network address application data; judging whether a preset white list comprises a mobile phone number and network address application data or not; if the preset white list comprises the mobile phone number and the network address application data, responding to the network address application data to obtain a network address; sending second information to the user terminal, wherein the second information comprises the network address, so that the user terminal can access a login page of the virtual private network according to the network address; receiving user login information which is sent by a user terminal and input by a user on a login page of the user terminal; verifying the user login information; if the user login information is successfully verified, login success information is sent to the user terminal, and therefore the safety of the process of logging in the virtual private network can be greatly improved.
Fig. 2 is a flowchart of another virtual private network login method according to an embodiment of the present invention, and as shown in fig. 2, the method includes:
The steps in this embodiment may be performed by an information center.
In this embodiment, the information form of the first information includes a short message or a multimedia message.
In this embodiment, the mobile phone number includes a mobile phone number of a user terminal that sends the first information.
In this embodiment, the network address application data is information content of the first information, and includes but is not limited to one of a Media Access Control (MAC) address, a number, a special symbol, or any combination thereof. For example, the network application data is 1234.
In this embodiment, if a user wants to log in a Virtual Private Network (VPN), a VPN address or an Internet Protocol (Internet Protocol, IP) address must be obtained, otherwise, a VPN function cannot be used, the VPN address or the IP address is not disclosed, a VPN channel is in a closed state by default, and the user needs to send Network address application data to an information center through a user terminal to apply for the VPN address or the IP address.
In this embodiment, the preset white list includes a plurality of mobile phone numbers, and only the mobile phone numbers existing in the preset white list are qualified to apply for the network address; the preset white list further includes network address application data, and different operations are triggered by different network address application data, for example, the network address application data is 1234, which triggers execution of step 206.
In this embodiment, the maintainer periodically updates the mobile phone number and the network address application data in the preset white list. And when the network address application data is updated, sending the updated network address to all mobile phone numbers in a preset white list in an information form.
And step 206, acquiring the network address.
Specifically, the first network address is obtained from the network address pool according to the arrangement sequence of the network addresses in the network address pool.
In this embodiment, the network address pool includes a plurality of network addresses and a plurality of intranet addresses, the plurality of network addresses are in the network address pool according to a preset arrangement sequence, and when a network address is obtained, a first network address is obtained from the network address pool, and simultaneously, a state of the obtained first network address is modified to be activated. Optionally, the network address pool includes 16 network addresses and 4096 (16 × 256) intranet addresses. And the intranet address is used for the user to carry out intranet connection through the VPN after the user VPN successfully logs in.
In this embodiment, the network address includes a VPN address or an IP address.
In this embodiment, the information format of the second information includes a short message or a multimedia message.
Further, the user acquires a network address through the user terminal and inputs the network address in the user terminal through the Internet (Internet); the user terminal accesses a login page of the VPN according to the network address; the user inputs user login information on a login page of the user terminal and sends the user login information to the information center through the user terminal.
In this embodiment, since the VPN tunnel is in a closed state by default, the network address is obtained only when it is determined that the preset white list includes the mobile phone number and the network address application data, and the first network address is obtained from the network address pool according to the arrangement sequence of the network addresses in the network address pool, so that the network address is not constant, and the security during the process of logging in the virtual private network can be greatly improved.
In this embodiment, the preset white list includes a user account obtained by registration of the user when the user uses the VPN for the first time, and only when the user account input by the user on the login page of the user terminal is the same as the user account in the preset white list, step 214 is executed.
In this embodiment, the preset white list includes the user account and the user password corresponding to the user account, and step 216 is executed only when the user password sent by the user terminal is the same as the user password corresponding to the user account in the preset white list; otherwise, step 232 is performed.
In this embodiment, the information center sends the verification code to the user terminal in an information form.
In this embodiment, the user receives the short message verification code through the user terminal, and inputs the login verification code on the login page of the user terminal.
In this embodiment, if the login verification code is the same as the short message verification code, it indicates that the user login information is successfully verified; if the login verification code is different from the short message verification code, the user login information is verified to be failed.
In this embodiment, the information center notifies the user of the successful VPN login in an information form. Optionally, the login success information is: you are good, you have successfully logged in to the VPN.
In this embodiment, the login success information is sent to the user terminal to indicate that the VPN channel connection is successful. Further, an intranet address is randomly selected from the network address pool, and a user can perform intranet connection according to the intranet address through the VPN and perform office work according to the user requirement.
And step 226, acquiring the current time point according to a preset time interval.
Optionally, the preset time interval is 1 second.
In this embodiment, different time thresholds are set according to different users, and the network address is only valid within a preset time threshold range. For example, if the user is a maintenance person, the time threshold is set to 2 hours; if the user is a system administrator, the time threshold is set to 4 hours; if the user is a regular person, the time threshold is set to 1 hour.
For example, the user is a common person, and the current time point is 15:15, the login time point is 14:00, the difference between the current time point and the login time point is 1 hour and 15 minutes, which is greater than the preset time threshold (1 hour) corresponding to the general staff, and step 230 is executed.
For example, the user personnel is maintenance personnel, and the current time point is 15:15, login time points 14:00, the difference between the current time point and the login time point is 1 hour and 15 minutes, which is smaller than the corresponding preset time threshold (2 hours) of the maintenance personnel, and step 226 is executed.
As an alternative, receiving a log-out message sent by a user terminal; and responding to the log-out message, and logging out the user terminal. Specifically, when the user does not need to use the VPN, the user can click to exit on a VPN page; the user terminal sends log-out information to the information center; the information center responds to the log-out message to log out the user terminal.
As an alternative, recording the operation time point of the last operation instruction input by the user on the user terminal; acquiring a current time point according to a preset time interval; judging whether the difference value between the current time point and the operation time point is greater than or equal to a preset operation time threshold value or not; if the difference value between the current time point and the operation time point is judged to be larger than or equal to the preset operation time threshold value, the user terminal is logged out; if the difference value between the current time point and the operation time point is smaller than the preset operation time threshold value; the step of acquiring the current time point according to the preset time interval is continuously performed. Optionally, the preset time interval is 1 second, and the preset operation time threshold is 10 minutes. For example, if the current time point is 14:15, operating time points 14:00, if the difference value between the current time point and the operation time point is 15 minutes and is greater than the preset operation time threshold, the user terminal is logged out; if the current time point is 14:05, operating time point 14:00, if the difference value between the current time point and the operation time point is 5 minutes and is smaller than the preset operation time threshold, continuing to execute the step of obtaining the current time point according to the preset time interval.
In this embodiment, the user terminal logs out of the login and indicates that the VPN channel is closed.
Further, the state of the network address is modified to be invalid, and an invalid period is set. Optionally, the failure period is 7 days. In the failure period, if the user inputs the network address again, the page displays error information. Optionally, the error information is that the page cannot be opened or the network address has failed.
Further, if the user wants to log in the VPN, the process is executed from step 202.
Optionally, the login failure information is: sorry, you fail in VPN login and retry.
Further, if the user wants to log in the VPN, the process is executed from step 202.
In the technical scheme of the virtual private network login method provided by the embodiment of the invention, first information sent by a user terminal is received, wherein the first information comprises a mobile phone number and network address application data; judging whether a preset white list comprises a mobile phone number and network address application data or not; if the preset white list comprises the mobile phone number and the network address application data, responding to the network address application data to obtain a network address; sending second information to the user terminal, wherein the second information comprises the network address, so that the user terminal can access a login page of the virtual private network according to the network address; receiving user login information which is sent by a user terminal and input by a user on a login page of the user terminal; verifying the user login information; if the user login information is successfully verified, login success information is sent to the user terminal, so that the safety of the process of logging in the virtual private network can be greatly improved.
Fig. 3 is a schematic structural diagram of a virtual private network login apparatus according to an embodiment of the present invention, where the apparatus is configured to execute the virtual private network login method, and as shown in fig. 3, the apparatus includes: a receiving unit 11, a first judging unit 12, a first acquiring unit 13, a transmitting unit 14 and a verifying unit 15.
The receiving unit 11 is configured to receive first information sent by a user terminal, where the first information includes a mobile phone number and network address application data; receiving user login information which is sent by a user terminal and input by a user on a login page of the user terminal;
the first judging unit 12 is configured to judge whether a preset white list includes a mobile phone number and network address application data;
the first obtaining unit 13 is configured to, if the first determining unit 12 determines that the preset white list includes the mobile phone number and the network address application data, obtain the network address in response to the network address application data;
the sending unit 14 is configured to send second information to the user terminal, where the second information includes a network address, so that the user terminal can access a login page of the virtual private network according to the network address; if the user login information is successfully verified, login success information is sent to the user terminal;
the authentication unit 15 is used to authenticate the user login information.
In this embodiment of the present invention, the first obtaining unit 13 is specifically configured to obtain the first network address from the network address pool according to an arrangement order of the network addresses in the network address pool.
In the embodiment of the present invention, the verification unit 15 is specifically configured to receive a login verification code, which is sent by a user terminal and is input by a user on a login page of the user terminal; judging whether the login verification code is the same as the short message verification code; if the login verification code is judged to be the same as the short message verification code, the user login information is verified successfully.
In this embodiment of the present invention, the verifying unit 15 is further specifically configured to determine whether a preset white list includes a user account; if the preset white list comprises the user account, judging whether a user password corresponding to the user account in the preset white list is the same as a user password sent by the user terminal; and if the user password corresponding to the user account in the preset white list is judged to be the same as the user password sent by the user terminal, sending a short message verification code to the user terminal.
In the embodiment of the present invention, the apparatus further includes: a recording unit 16, a second acquiring unit 17, a second judging unit 18, and an exiting unit 19.
The recording unit 16 is configured to record a login time point at which login success information is transmitted to the user terminal.
The second obtaining unit 17 is configured to obtain the current time point according to a preset time interval.
The second determining unit 18 is configured to determine whether a difference between the current time point and the login time point is greater than or equal to a preset time threshold, and if the difference between the current time point and the login time point is smaller than the preset threshold, trigger the second obtaining unit 17 to perform the step of obtaining the current time point according to a preset time interval.
The log-out unit 19 is configured to log out the user terminal if the second determining unit 18 determines that the difference between the current time point and the login time point is greater than or equal to the preset time threshold.
In this embodiment of the present invention, the receiving unit 11 is further configured to receive a log-out message sent by the user terminal.
The log-out unit 19 is further configured to log out the user terminal in response to the log-out message.
In the embodiment of the present invention, the apparatus further includes: the unit 20 is modified.
The modification unit 20 is adapted to modify the status of the network address to invalid.
In the scheme of the embodiment of the invention, first information sent by a user terminal is received, wherein the first information comprises a mobile phone number and network address application data; judging whether a preset white list comprises a mobile phone number and network address application data or not; if the preset white list comprises the mobile phone number and the network address application data, responding to the network address application data and acquiring a network address; sending second information to the user terminal, wherein the second information comprises the network address, so that the user terminal can access a login page of the virtual private network according to the network address; receiving user login information which is sent by a user terminal and input by a user on a login page of the user terminal; verifying the user login information; if the user login information is successfully verified, login success information is sent to the user terminal, and therefore the safety of the process of logging in the virtual private network can be greatly improved.
An embodiment of the present invention provides a storage medium, where the storage medium includes a stored program, where, when the program runs, a device where the storage medium is located is controlled to execute each step of the above embodiment of the virtual private network login method, and specific descriptions may refer to the above embodiment of the virtual private network login method.
An embodiment of the present invention provides a computer device, including a memory and a processor, where the memory is used to store information including program instructions, and the processor is used to control execution of the program instructions, and the program instructions are loaded and executed by the processor to implement the steps of the embodiment of the virtual private network login method, and specific descriptions may refer to the embodiment of the virtual private network login method.
Fig. 4 is a schematic diagram of a computer device according to an embodiment of the present invention. As shown in fig. 4, the computer device 30 of this embodiment includes: a processor 31, a memory 32, and a computer program 33 stored in the memory 32 and capable of running on the processor 31, wherein the computer program 33 is implemented by the processor 31 to implement the data processing method applied in the embodiment, and therefore, for avoiding repetition, detailed descriptions thereof are omitted here. Alternatively, the computer program is executed by the processor 31 to implement the functions of each model/unit applied in the vpn login apparatus in the embodiment, which are not described herein again to avoid redundancy.
The computer device 30 includes, but is not limited to, a processor 31, a memory 32. Those skilled in the art will appreciate that fig. 4 is merely an example of a computer device 30 and is not intended to limit the computer device 30 and that it may include more or fewer components than shown, or some components may be combined, or different components, e.g., the computer device may also include input output devices, network access devices, buses, etc.
The processor 31 may be a Central Processing Unit (CPU), other general purpose processor, a Digital signal processor (DP), an Application specific Integrated Circuit (AIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, discrete hardware component, etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The storage 32 may be an internal storage unit of the computer device 30, such as a hard disk or a memory of the computer device 30. The memory 32 may also be an external storage device of the computer device 30, such as a plug-in hard disk provided on the computer device 30, a smart Memory Card (MC), a secure Digital (D) Card, a flash memory Card (Flah Card), and the like. Further, the memory 32 may also include both internal and external storage units of the computer device 30. The memory 32 is used for storing computer programs and other programs and data required by the computer device. The memory 32 may also be used to temporarily store data that has been output or is to be output.
In the embodiments provided in the present invention, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and there may be other divisions in actual implementation, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and should not be taken as limiting the scope of the present invention, and any modifications, equivalents, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.
Claims (9)
1. A virtual private network login method, the method comprising:
receiving first information sent by a user terminal, wherein the first information comprises a mobile phone number and network address application data;
judging whether a preset white list comprises a mobile phone number and network address application data or not;
if the preset white list comprises the mobile phone number and the network address application data, responding to the network address application data to obtain a network address;
sending second information to the user terminal, wherein the second information comprises the network address, so that the user terminal can access a login page of a virtual private network according to the network address;
receiving user login information which is sent by the user terminal and input by a user on a login page of the user terminal;
verifying the user login information;
if the user login information is successfully verified, login success information is sent to the user terminal;
the verifying the user login information specifically includes:
receiving a login verification code which is sent by the user terminal and is input by a user on a login page of the user terminal;
judging whether the login verification code is the same as the short message verification code;
if the login verification code is judged to be the same as the short message verification code, the user login information is verified successfully.
2. The virtual private network login method according to claim 1, wherein the acquiring a network address specifically comprises:
and acquiring a first network address from the network address pool according to the arrangement sequence of the network addresses in the network address pool.
3. The virtual private network login method of claim 1, wherein the user login information comprises a user account and a user password;
before the receiving of the login verification code sent by the user terminal and input by the user on the login page of the user terminal, the method further includes: judging whether the preset white list comprises the user account;
if the preset white list comprises the user account, judging whether a user password corresponding to the user account in the preset white list is the same as a user password sent by the user terminal;
and if the user password corresponding to the user account in the preset white list is judged to be the same as the user password sent by the user terminal, sending a short message verification code to the user terminal.
4. The virtual private network login method according to claim 1, further comprising, after said sending login success information to said user terminal:
recording a login time point for sending login success information to the user terminal;
acquiring a current time point according to a preset time interval;
judging whether the difference value between the current time point and the login time point is greater than or equal to a preset time threshold value or not;
if the difference value between the current time point and the login time point is judged to be larger than or equal to the preset time threshold value, the user terminal is logged out;
and if the difference value between the current time point and the login time point is smaller than the preset time threshold value, continuing to execute the step of obtaining the current time point according to the preset time interval.
5. The virtual private network login method of claim 1, wherein after said sending login success information to the user terminal, further comprising:
receiving log-out information sent by the user terminal;
and responding to the log-out message, and enabling the user terminal to log out.
6. The virtual private network login method according to claim 4 or 5, further comprising, after said log-out of said user terminal, the steps of:
and modifying the state of the network address to be invalid.
7. A virtual private network entry apparatus, the apparatus comprising:
the mobile terminal comprises a receiving unit, a sending unit and a processing unit, wherein the receiving unit is used for receiving first information sent by a user terminal, and the first information comprises a mobile phone number and network address application data; receiving user login information which is sent by the user terminal and input by a user on a login page of the user terminal;
the first judging unit is used for judging whether the preset white list comprises the mobile phone number and the network address application data;
a first obtaining unit, configured to, if it is determined that the preset white list includes a mobile phone number and network address application data, obtain a network address in response to the network address application data;
a sending unit, configured to send second information to the user terminal, where the second information includes the network address, so that the user terminal accesses a login page of a virtual private network according to the network address; if the user login information is successfully verified, login success information is sent to the user terminal;
the authentication unit is used for authenticating the user login information;
the verification unit is specifically used for receiving a login verification code which is sent by the user terminal and is input by the user on a login page of the user terminal; judging whether the login verification code is the same as the short message verification code; if the login verification code is judged to be the same as the short message verification code, the user login information is verified successfully.
8. A storage medium comprising a stored program, wherein the program, when executed, controls an apparatus in which the storage medium is located to execute the virtual private network login method according to any one of claims 1 to 6.
9. A computer device comprising a memory for storing information including program instructions and a processor for controlling the execution of the program instructions, wherein the program instructions are loaded and executed by the processor to implement the steps of the virtual private network entry method of any one of claims 1 to 6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911265117.1A CN112953885B (en) | 2019-12-11 | 2019-12-11 | Virtual private network login method and device and computer equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911265117.1A CN112953885B (en) | 2019-12-11 | 2019-12-11 | Virtual private network login method and device and computer equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112953885A CN112953885A (en) | 2021-06-11 |
CN112953885B true CN112953885B (en) | 2023-04-18 |
Family
ID=76226461
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911265117.1A Active CN112953885B (en) | 2019-12-11 | 2019-12-11 | Virtual private network login method and device and computer equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112953885B (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103428062A (en) * | 2012-05-25 | 2013-12-04 | 杭州瑞高智能设备有限公司 | VPN server access method and VPN client |
CN107026860A (en) * | 2017-04-01 | 2017-08-08 | 成都虫洞奇迹科技有限公司 | Login authentication method, apparatus and system |
CN108322366A (en) * | 2017-01-17 | 2018-07-24 | 阿里巴巴集团控股有限公司 | Access the methods, devices and systems of network |
CN110298148A (en) * | 2019-05-21 | 2019-10-01 | 视联动力信息技术股份有限公司 | A kind of method and device of login authentication |
CN110519405A (en) * | 2019-08-07 | 2019-11-29 | 彩讯科技股份有限公司 | A kind of short chain address operation access method, device, equipment and storage medium |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7305489B2 (en) * | 2002-01-31 | 2007-12-04 | Utstarcom, Inc. | Method and apparatus for aggregate network address routes |
-
2019
- 2019-12-11 CN CN201911265117.1A patent/CN112953885B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103428062A (en) * | 2012-05-25 | 2013-12-04 | 杭州瑞高智能设备有限公司 | VPN server access method and VPN client |
CN108322366A (en) * | 2017-01-17 | 2018-07-24 | 阿里巴巴集团控股有限公司 | Access the methods, devices and systems of network |
CN107026860A (en) * | 2017-04-01 | 2017-08-08 | 成都虫洞奇迹科技有限公司 | Login authentication method, apparatus and system |
CN110298148A (en) * | 2019-05-21 | 2019-10-01 | 视联动力信息技术股份有限公司 | A kind of method and device of login authentication |
CN110519405A (en) * | 2019-08-07 | 2019-11-29 | 彩讯科技股份有限公司 | A kind of short chain address operation access method, device, equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN112953885A (en) | 2021-06-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11122022B2 (en) | Network connection automation | |
CN100354852C (en) | Automatic re-authentication | |
CN109150907B (en) | Vehicle-mounted industrial personal computer login method, device, system, computer equipment and medium | |
US9059978B2 (en) | System and methods for remote maintenance in an electronic network with multiple clients | |
CN108462710B (en) | Authentication and authorization method, device, authentication server and machine-readable storage medium | |
CN109905312B (en) | Message pushing method, device and system | |
US20100197293A1 (en) | Remote computer access authentication using a mobile device | |
US9544747B2 (en) | Transmitting management commands to a client device | |
EP3641261A1 (en) | Entrusted login method, related device and computer readable storage medium | |
US10187386B2 (en) | Native enrollment of mobile devices | |
CN109413010B (en) | Terminal authentication method, device and system | |
CN111355713B (en) | Proxy access method, device, proxy gateway and readable storage medium | |
CN107820702B (en) | Management and control method, device and electronic equipment | |
CN112738117A (en) | Data transmission method, device and system, storage medium and electronic device | |
CN113225351B (en) | Request processing method and device, storage medium and electronic equipment | |
CN108289074B (en) | User account login method and device | |
CN111247521B (en) | Remote locking of multi-user devices to user sets | |
CN107040501B (en) | Authentication method and device based on platform as a service | |
CN111949958A (en) | Authorization authentication method and device in Oauth protocol | |
CN111949959A (en) | Authorization authentication method and device in Oauth protocol | |
US9954833B2 (en) | Management of access sessions | |
CN104883341A (en) | Application management device, terminal and application management method | |
CN105391673B (en) | Safety access method and device | |
US11902789B2 (en) | Cloud controlled secure Bluetooth pairing for network device management | |
CN112953885B (en) | Virtual private network login method and device and computer equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |