CN112953885B - Virtual private network login method and device and computer equipment - Google Patents

Virtual private network login method and device and computer equipment Download PDF

Info

Publication number
CN112953885B
CN112953885B CN201911265117.1A CN201911265117A CN112953885B CN 112953885 B CN112953885 B CN 112953885B CN 201911265117 A CN201911265117 A CN 201911265117A CN 112953885 B CN112953885 B CN 112953885B
Authority
CN
China
Prior art keywords
login
user
user terminal
information
network address
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911265117.1A
Other languages
Chinese (zh)
Other versions
CN112953885A (en
Inventor
李涛
朱祥磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
China Mobile Group Shandong Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
China Mobile Group Shandong Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd, China Mobile Group Shandong Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN201911265117.1A priority Critical patent/CN112953885B/en
Publication of CN112953885A publication Critical patent/CN112953885A/en
Application granted granted Critical
Publication of CN112953885B publication Critical patent/CN112953885B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0272Virtual private networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]

Abstract

The embodiment of the invention provides a virtual private network login method, a virtual private network login device and computer equipment. In the technical scheme provided by the embodiment of the invention, first information sent by a user terminal is received, wherein the first information comprises a mobile phone number and network address application data; judging whether a preset white list comprises a mobile phone number and network address application data or not; if the preset white list comprises the mobile phone number and the network address application data, responding to the network address application data to obtain a network address; sending second information to the user terminal, wherein the second information comprises the network address; receiving user login information which is sent by a user terminal and input by a user on a login page of the user terminal; verifying the user login information; if the user login information is successfully verified, login success information is sent to the user terminal, so that the safety of the process of logging in the virtual private network can be greatly improved.

Description

Virtual private network login method and device and computer equipment
[ technical field ] A method for producing a semiconductor device
The present invention relates to the field of communications technologies, and in particular, to a virtual private network login method, apparatus, and computer device.
[ background of the invention ]
The function of Virtual Private Network (VPN) is mainly to establish a Private Network on a public Network for encrypted communication, and is widely applied in enterprise networks. When using wireless devices, VPNs present security risks; any solution using advanced encryption techniques may be compromised when a user roams between access points. After an enterprise applies for a VPN, a VPN address and an Internet Protocol (IP) address are often public, and for a user, the VPN address and the IP address are fixed, and a login page can be normally opened as long as the user knows the VPN address or the IP address regardless of the permission of the user, so that a relatively high potential safety hazard problem exists.
[ summary of the invention ]
In view of this, embodiments of the present invention provide a method, an apparatus, and a computer device for logging in a virtual private network, which can greatly improve security during logging in the virtual private network.
In one aspect, an embodiment of the present invention provides a virtual private network login method, where the method includes:
receiving first information sent by a user terminal, wherein the first information comprises a mobile phone number and network address application data;
judging whether a preset white list comprises a mobile phone number and network address application data;
if the preset white list comprises the mobile phone number and the network address application data, responding to the network address application data and acquiring a network address;
sending second information to the user terminal, wherein the second information comprises the network address, so that the user terminal can access a login page of the virtual private network according to the network address;
receiving user login information which is sent by a user terminal and input by a user on a login page of the user terminal;
verifying the user login information;
and if the user login information is successfully verified, sending login success information to the user terminal.
Optionally, the acquiring a network address specifically includes:
and acquiring a first network address from the network address pool according to the arrangement sequence of the network addresses in the network address pool.
Optionally, the verifying the user login information specifically includes:
receiving a login verification code which is sent by a user terminal and input by a user on a login page of the user terminal;
judging whether the login verification code is the same as the short message verification code;
if the login verification code is judged to be the same as the short message verification code, the user login information is verified successfully.
Optionally, the user login information includes a user account and a user password;
before receiving a login verification code sent by a user terminal and input by a user on a login page of the user terminal, the method further comprises the following steps: judging whether a preset white list comprises a user account;
if the preset white list comprises the user account, judging whether a user password corresponding to the user account in the preset white list is the same as a user password sent by the user terminal;
and if the user password corresponding to the user account in the preset white list is judged to be the same as the user password sent by the user terminal, sending a short message verification code to the user terminal.
Optionally, after sending the login success information to the user terminal, the method further includes:
recording a login time point for sending login success information to a user terminal;
acquiring a current time point according to a preset time interval;
judging whether the difference value between the current time point and the login time point is greater than or equal to a preset time threshold value or not;
if the difference value between the current time point and the login time point is judged to be larger than or equal to the preset time threshold value, the user terminal is logged out;
and if the difference value between the current time point and the login time point is smaller than the preset threshold value, continuing to execute the step of obtaining the current time point according to the preset time interval.
Optionally, after sending the login success information to the user terminal, the method further includes:
receiving a log-out message sent by a user terminal;
and responding to the log-out message, and logging out the user terminal.
Optionally, after logging out the user terminal, the method further includes:
the status of the network address is modified to be invalid.
In another aspect, an embodiment of the present invention provides a virtual private network login apparatus, including:
the receiving unit is used for receiving first information sent by a user terminal, wherein the first information comprises a mobile phone number and network address application data; receiving user login information which is sent by a user terminal and input by a user on a login page of the user terminal;
the first judging unit is used for judging whether the preset white list comprises the mobile phone number and the network address application data;
the first obtaining unit is used for responding to the network address application data and obtaining the network address if the preset white list is judged to comprise the mobile phone number and the network address application data;
the sending unit is used for sending second information to the user terminal, wherein the second information comprises a network address, so that the user terminal can access a login page of the virtual private network according to the network address; if the user login information is successfully verified, login success information is sent to the user terminal;
and the verification unit is used for verifying the user login information.
On the other hand, an embodiment of the present invention provides a storage medium, where the storage medium includes a stored program, and when the program runs, a device where the storage medium is located is controlled to execute the foregoing virtual private network login method.
In another aspect, an embodiment of the present invention provides a computer device, including a memory and a processor, where the memory is used to store information including program instructions, and the processor is used to control execution of the program instructions, where the program instructions are loaded by the processor and executed to implement the steps of the virtual private network login method described above.
In the scheme of the embodiment of the invention, first information sent by a user terminal is received, wherein the first information comprises a mobile phone number and network address application data; judging whether a preset white list comprises a mobile phone number and network address application data or not; if the preset white list comprises the mobile phone number and the network address application data, responding to the network address application data to obtain a network address; sending second information to the user terminal, wherein the second information comprises the network address, so that the user terminal can access a login page of the virtual private network according to the network address; receiving user login information which is sent by a user terminal and input by a user on a login page of the user terminal; verifying the user login information; if the user login information is successfully verified, login success information is sent to the user terminal, so that the safety of the process of logging in the virtual private network can be greatly improved.
[ description of the drawings ]
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a flowchart of a virtual private network login method according to an embodiment of the present invention;
fig. 2 is a flowchart of another virtual private network login method according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of a virtual private network login apparatus according to an embodiment of the present invention;
fig. 4 is a schematic diagram of a computer device according to an embodiment of the present invention.
[ detailed description ] embodiments
For better understanding of the technical solutions of the present invention, the following detailed descriptions of the embodiments of the present invention are provided with reference to the accompanying drawings.
It should be understood that the described embodiments are only some embodiments of the invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terminology used in the embodiments of the invention is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in the description of the invention and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be understood that the term "and/or" as used herein is merely a relationship that describes an associated object, meaning that three relationships may exist, e.g., a and/or B, may represent: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter related objects are in an "or" relationship.
It should be understood that although the terms first, second, etc. may be used to describe the set thresholds in the embodiments of the present invention, the set thresholds should not be limited to these terms. These terms are used only to distinguish the set thresholds from each other. For example, the first set threshold may also be referred to as the second set threshold, and similarly, the second set threshold may also be referred to as the first set threshold, without departing from the scope of embodiments of the present invention.
Fig. 1 is a flowchart of a virtual private network login method according to an embodiment of the present invention, and as shown in fig. 1, the method includes:
step 102, receiving first information sent by a user terminal, wherein the first information comprises a mobile phone number and network address application data.
And 104, judging whether the preset white list comprises the mobile phone number and the network address application data.
And step 106, if the preset white list is judged to comprise the mobile phone number and the network address application data, responding to the network address application data to obtain the network address.
And 108, sending second information to the user terminal, wherein the second information comprises the network address, so that the user terminal can access the login page of the virtual private network according to the network address.
And step 110, receiving user login information which is sent by the user terminal and input by the user on a login page of the user terminal.
And step 112, verifying the user login information.
And step 114, if the user login information is successfully verified, sending login success information to the user terminal.
In the technical scheme provided by the embodiment of the invention, first information sent by a user terminal is received, wherein the first information comprises a mobile phone number and network address application data; judging whether a preset white list comprises a mobile phone number and network address application data or not; if the preset white list comprises the mobile phone number and the network address application data, responding to the network address application data to obtain a network address; sending second information to the user terminal, wherein the second information comprises the network address, so that the user terminal can access a login page of the virtual private network according to the network address; receiving user login information which is sent by a user terminal and input by a user on a login page of the user terminal; verifying the user login information; if the user login information is successfully verified, login success information is sent to the user terminal, and therefore the safety of the process of logging in the virtual private network can be greatly improved.
Fig. 2 is a flowchart of another virtual private network login method according to an embodiment of the present invention, and as shown in fig. 2, the method includes:
step 202, receiving first information sent by a user terminal, wherein the first information comprises a mobile phone number and network address application data.
The steps in this embodiment may be performed by an information center.
In this embodiment, the information form of the first information includes a short message or a multimedia message.
In this embodiment, the mobile phone number includes a mobile phone number of a user terminal that sends the first information.
In this embodiment, the network address application data is information content of the first information, and includes but is not limited to one of a Media Access Control (MAC) address, a number, a special symbol, or any combination thereof. For example, the network application data is 1234.
In this embodiment, if a user wants to log in a Virtual Private Network (VPN), a VPN address or an Internet Protocol (Internet Protocol, IP) address must be obtained, otherwise, a VPN function cannot be used, the VPN address or the IP address is not disclosed, a VPN channel is in a closed state by default, and the user needs to send Network address application data to an information center through a user terminal to apply for the VPN address or the IP address.
Step 204, judging whether the preset white list comprises the mobile phone number and the network address application data, if so, continuing to execute step 206; if not, the process ends.
In this embodiment, the preset white list includes a plurality of mobile phone numbers, and only the mobile phone numbers existing in the preset white list are qualified to apply for the network address; the preset white list further includes network address application data, and different operations are triggered by different network address application data, for example, the network address application data is 1234, which triggers execution of step 206.
In this embodiment, the maintainer periodically updates the mobile phone number and the network address application data in the preset white list. And when the network address application data is updated, sending the updated network address to all mobile phone numbers in a preset white list in an information form.
And step 206, acquiring the network address.
Specifically, the first network address is obtained from the network address pool according to the arrangement sequence of the network addresses in the network address pool.
In this embodiment, the network address pool includes a plurality of network addresses and a plurality of intranet addresses, the plurality of network addresses are in the network address pool according to a preset arrangement sequence, and when a network address is obtained, a first network address is obtained from the network address pool, and simultaneously, a state of the obtained first network address is modified to be activated. Optionally, the network address pool includes 16 network addresses and 4096 (16 × 256) intranet addresses. And the intranet address is used for the user to carry out intranet connection through the VPN after the user VPN successfully logs in.
In this embodiment, the network address includes a VPN address or an IP address.
Step 208, sending second information to the user terminal, wherein the second information comprises a network address.
In this embodiment, the information format of the second information includes a short message or a multimedia message.
Further, the user acquires a network address through the user terminal and inputs the network address in the user terminal through the Internet (Internet); the user terminal accesses a login page of the VPN according to the network address; the user inputs user login information on a login page of the user terminal and sends the user login information to the information center through the user terminal.
In this embodiment, since the VPN tunnel is in a closed state by default, the network address is obtained only when it is determined that the preset white list includes the mobile phone number and the network address application data, and the first network address is obtained from the network address pool according to the arrangement sequence of the network addresses in the network address pool, so that the network address is not constant, and the security during the process of logging in the virtual private network can be greatly improved.
Step 210, receiving user login information, which is sent by the user terminal and input by the user on a login page of the user terminal, wherein the user login information includes a user account and a user password.
Step 212, judging whether a preset white list includes a user account, if so, continuing to execute step 214; if not, go to step 232.
In this embodiment, the preset white list includes a user account obtained by registration of the user when the user uses the VPN for the first time, and only when the user account input by the user on the login page of the user terminal is the same as the user account in the preset white list, step 214 is executed.
Step 214, judging whether a user password corresponding to the user account in the preset white list is the same as the user password sent by the user terminal, if so, continuing to execute step 216; if not, go to step 232.
In this embodiment, the preset white list includes the user account and the user password corresponding to the user account, and step 216 is executed only when the user password sent by the user terminal is the same as the user password corresponding to the user account in the preset white list; otherwise, step 232 is performed.
Step 216, sending the short message verification code to the user terminal.
In this embodiment, the information center sends the verification code to the user terminal in an information form.
Step 218, receiving a login verification code sent by the user terminal and input by the user on the login page of the user terminal.
In this embodiment, the user receives the short message verification code through the user terminal, and inputs the login verification code on the login page of the user terminal.
Step 220, judging whether the login verification code is the same as the short message verification code, if so, continuing to execute step 222; if not, go to step 232.
In this embodiment, if the login verification code is the same as the short message verification code, it indicates that the user login information is successfully verified; if the login verification code is different from the short message verification code, the user login information is verified to be failed.
Step 222, sending login success information to the user terminal.
In this embodiment, the information center notifies the user of the successful VPN login in an information form. Optionally, the login success information is: you are good, you have successfully logged in to the VPN.
In this embodiment, the login success information is sent to the user terminal to indicate that the VPN channel connection is successful. Further, an intranet address is randomly selected from the network address pool, and a user can perform intranet connection according to the intranet address through the VPN and perform office work according to the user requirement.
Step 224, recording the login time point of the login success information sent to the user terminal.
And step 226, acquiring the current time point according to a preset time interval.
Optionally, the preset time interval is 1 second.
Step 228, determining whether the difference between the current time point and the login time point is greater than or equal to a preset time threshold, if so, continuing to execute step 230; if not, proceed to step 226.
In this embodiment, different time thresholds are set according to different users, and the network address is only valid within a preset time threshold range. For example, if the user is a maintenance person, the time threshold is set to 2 hours; if the user is a system administrator, the time threshold is set to 4 hours; if the user is a regular person, the time threshold is set to 1 hour.
For example, the user is a common person, and the current time point is 15:15, the login time point is 14:00, the difference between the current time point and the login time point is 1 hour and 15 minutes, which is greater than the preset time threshold (1 hour) corresponding to the general staff, and step 230 is executed.
For example, the user personnel is maintenance personnel, and the current time point is 15:15, login time points 14:00, the difference between the current time point and the login time point is 1 hour and 15 minutes, which is smaller than the corresponding preset time threshold (2 hours) of the maintenance personnel, and step 226 is executed.
As an alternative, receiving a log-out message sent by a user terminal; and responding to the log-out message, and logging out the user terminal. Specifically, when the user does not need to use the VPN, the user can click to exit on a VPN page; the user terminal sends log-out information to the information center; the information center responds to the log-out message to log out the user terminal.
As an alternative, recording the operation time point of the last operation instruction input by the user on the user terminal; acquiring a current time point according to a preset time interval; judging whether the difference value between the current time point and the operation time point is greater than or equal to a preset operation time threshold value or not; if the difference value between the current time point and the operation time point is judged to be larger than or equal to the preset operation time threshold value, the user terminal is logged out; if the difference value between the current time point and the operation time point is smaller than the preset operation time threshold value; the step of acquiring the current time point according to the preset time interval is continuously performed. Optionally, the preset time interval is 1 second, and the preset operation time threshold is 10 minutes. For example, if the current time point is 14:15, operating time points 14:00, if the difference value between the current time point and the operation time point is 15 minutes and is greater than the preset operation time threshold, the user terminal is logged out; if the current time point is 14:05, operating time point 14:00, if the difference value between the current time point and the operation time point is 5 minutes and is smaller than the preset operation time threshold, continuing to execute the step of obtaining the current time point according to the preset time interval.
Step 230, log out the user terminal, and the process is ended.
In this embodiment, the user terminal logs out of the login and indicates that the VPN channel is closed.
Further, the state of the network address is modified to be invalid, and an invalid period is set. Optionally, the failure period is 7 days. In the failure period, if the user inputs the network address again, the page displays error information. Optionally, the error information is that the page cannot be opened or the network address has failed.
Further, if the user wants to log in the VPN, the process is executed from step 202.
Step 232, sending login failure information to the user terminal.
Optionally, the login failure information is: sorry, you fail in VPN login and retry.
Further, if the user wants to log in the VPN, the process is executed from step 202.
In the technical scheme of the virtual private network login method provided by the embodiment of the invention, first information sent by a user terminal is received, wherein the first information comprises a mobile phone number and network address application data; judging whether a preset white list comprises a mobile phone number and network address application data or not; if the preset white list comprises the mobile phone number and the network address application data, responding to the network address application data to obtain a network address; sending second information to the user terminal, wherein the second information comprises the network address, so that the user terminal can access a login page of the virtual private network according to the network address; receiving user login information which is sent by a user terminal and input by a user on a login page of the user terminal; verifying the user login information; if the user login information is successfully verified, login success information is sent to the user terminal, so that the safety of the process of logging in the virtual private network can be greatly improved.
Fig. 3 is a schematic structural diagram of a virtual private network login apparatus according to an embodiment of the present invention, where the apparatus is configured to execute the virtual private network login method, and as shown in fig. 3, the apparatus includes: a receiving unit 11, a first judging unit 12, a first acquiring unit 13, a transmitting unit 14 and a verifying unit 15.
The receiving unit 11 is configured to receive first information sent by a user terminal, where the first information includes a mobile phone number and network address application data; receiving user login information which is sent by a user terminal and input by a user on a login page of the user terminal;
the first judging unit 12 is configured to judge whether a preset white list includes a mobile phone number and network address application data;
the first obtaining unit 13 is configured to, if the first determining unit 12 determines that the preset white list includes the mobile phone number and the network address application data, obtain the network address in response to the network address application data;
the sending unit 14 is configured to send second information to the user terminal, where the second information includes a network address, so that the user terminal can access a login page of the virtual private network according to the network address; if the user login information is successfully verified, login success information is sent to the user terminal;
the authentication unit 15 is used to authenticate the user login information.
In this embodiment of the present invention, the first obtaining unit 13 is specifically configured to obtain the first network address from the network address pool according to an arrangement order of the network addresses in the network address pool.
In the embodiment of the present invention, the verification unit 15 is specifically configured to receive a login verification code, which is sent by a user terminal and is input by a user on a login page of the user terminal; judging whether the login verification code is the same as the short message verification code; if the login verification code is judged to be the same as the short message verification code, the user login information is verified successfully.
In this embodiment of the present invention, the verifying unit 15 is further specifically configured to determine whether a preset white list includes a user account; if the preset white list comprises the user account, judging whether a user password corresponding to the user account in the preset white list is the same as a user password sent by the user terminal; and if the user password corresponding to the user account in the preset white list is judged to be the same as the user password sent by the user terminal, sending a short message verification code to the user terminal.
In the embodiment of the present invention, the apparatus further includes: a recording unit 16, a second acquiring unit 17, a second judging unit 18, and an exiting unit 19.
The recording unit 16 is configured to record a login time point at which login success information is transmitted to the user terminal.
The second obtaining unit 17 is configured to obtain the current time point according to a preset time interval.
The second determining unit 18 is configured to determine whether a difference between the current time point and the login time point is greater than or equal to a preset time threshold, and if the difference between the current time point and the login time point is smaller than the preset threshold, trigger the second obtaining unit 17 to perform the step of obtaining the current time point according to a preset time interval.
The log-out unit 19 is configured to log out the user terminal if the second determining unit 18 determines that the difference between the current time point and the login time point is greater than or equal to the preset time threshold.
In this embodiment of the present invention, the receiving unit 11 is further configured to receive a log-out message sent by the user terminal.
The log-out unit 19 is further configured to log out the user terminal in response to the log-out message.
In the embodiment of the present invention, the apparatus further includes: the unit 20 is modified.
The modification unit 20 is adapted to modify the status of the network address to invalid.
In the scheme of the embodiment of the invention, first information sent by a user terminal is received, wherein the first information comprises a mobile phone number and network address application data; judging whether a preset white list comprises a mobile phone number and network address application data or not; if the preset white list comprises the mobile phone number and the network address application data, responding to the network address application data and acquiring a network address; sending second information to the user terminal, wherein the second information comprises the network address, so that the user terminal can access a login page of the virtual private network according to the network address; receiving user login information which is sent by a user terminal and input by a user on a login page of the user terminal; verifying the user login information; if the user login information is successfully verified, login success information is sent to the user terminal, and therefore the safety of the process of logging in the virtual private network can be greatly improved.
An embodiment of the present invention provides a storage medium, where the storage medium includes a stored program, where, when the program runs, a device where the storage medium is located is controlled to execute each step of the above embodiment of the virtual private network login method, and specific descriptions may refer to the above embodiment of the virtual private network login method.
An embodiment of the present invention provides a computer device, including a memory and a processor, where the memory is used to store information including program instructions, and the processor is used to control execution of the program instructions, and the program instructions are loaded and executed by the processor to implement the steps of the embodiment of the virtual private network login method, and specific descriptions may refer to the embodiment of the virtual private network login method.
Fig. 4 is a schematic diagram of a computer device according to an embodiment of the present invention. As shown in fig. 4, the computer device 30 of this embodiment includes: a processor 31, a memory 32, and a computer program 33 stored in the memory 32 and capable of running on the processor 31, wherein the computer program 33 is implemented by the processor 31 to implement the data processing method applied in the embodiment, and therefore, for avoiding repetition, detailed descriptions thereof are omitted here. Alternatively, the computer program is executed by the processor 31 to implement the functions of each model/unit applied in the vpn login apparatus in the embodiment, which are not described herein again to avoid redundancy.
The computer device 30 includes, but is not limited to, a processor 31, a memory 32. Those skilled in the art will appreciate that fig. 4 is merely an example of a computer device 30 and is not intended to limit the computer device 30 and that it may include more or fewer components than shown, or some components may be combined, or different components, e.g., the computer device may also include input output devices, network access devices, buses, etc.
The processor 31 may be a Central Processing Unit (CPU), other general purpose processor, a Digital signal processor (DP), an Application specific Integrated Circuit (AIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, discrete hardware component, etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The storage 32 may be an internal storage unit of the computer device 30, such as a hard disk or a memory of the computer device 30. The memory 32 may also be an external storage device of the computer device 30, such as a plug-in hard disk provided on the computer device 30, a smart Memory Card (MC), a secure Digital (D) Card, a flash memory Card (Flah Card), and the like. Further, the memory 32 may also include both internal and external storage units of the computer device 30. The memory 32 is used for storing computer programs and other programs and data required by the computer device. The memory 32 may also be used to temporarily store data that has been output or is to be output.
In the embodiments provided in the present invention, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and there may be other divisions in actual implementation, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and should not be taken as limiting the scope of the present invention, and any modifications, equivalents, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (9)

1. A virtual private network login method, the method comprising:
receiving first information sent by a user terminal, wherein the first information comprises a mobile phone number and network address application data;
judging whether a preset white list comprises a mobile phone number and network address application data or not;
if the preset white list comprises the mobile phone number and the network address application data, responding to the network address application data to obtain a network address;
sending second information to the user terminal, wherein the second information comprises the network address, so that the user terminal can access a login page of a virtual private network according to the network address;
receiving user login information which is sent by the user terminal and input by a user on a login page of the user terminal;
verifying the user login information;
if the user login information is successfully verified, login success information is sent to the user terminal;
the verifying the user login information specifically includes:
receiving a login verification code which is sent by the user terminal and is input by a user on a login page of the user terminal;
judging whether the login verification code is the same as the short message verification code;
if the login verification code is judged to be the same as the short message verification code, the user login information is verified successfully.
2. The virtual private network login method according to claim 1, wherein the acquiring a network address specifically comprises:
and acquiring a first network address from the network address pool according to the arrangement sequence of the network addresses in the network address pool.
3. The virtual private network login method of claim 1, wherein the user login information comprises a user account and a user password;
before the receiving of the login verification code sent by the user terminal and input by the user on the login page of the user terminal, the method further includes: judging whether the preset white list comprises the user account;
if the preset white list comprises the user account, judging whether a user password corresponding to the user account in the preset white list is the same as a user password sent by the user terminal;
and if the user password corresponding to the user account in the preset white list is judged to be the same as the user password sent by the user terminal, sending a short message verification code to the user terminal.
4. The virtual private network login method according to claim 1, further comprising, after said sending login success information to said user terminal:
recording a login time point for sending login success information to the user terminal;
acquiring a current time point according to a preset time interval;
judging whether the difference value between the current time point and the login time point is greater than or equal to a preset time threshold value or not;
if the difference value between the current time point and the login time point is judged to be larger than or equal to the preset time threshold value, the user terminal is logged out;
and if the difference value between the current time point and the login time point is smaller than the preset time threshold value, continuing to execute the step of obtaining the current time point according to the preset time interval.
5. The virtual private network login method of claim 1, wherein after said sending login success information to the user terminal, further comprising:
receiving log-out information sent by the user terminal;
and responding to the log-out message, and enabling the user terminal to log out.
6. The virtual private network login method according to claim 4 or 5, further comprising, after said log-out of said user terminal, the steps of:
and modifying the state of the network address to be invalid.
7. A virtual private network entry apparatus, the apparatus comprising:
the mobile terminal comprises a receiving unit, a sending unit and a processing unit, wherein the receiving unit is used for receiving first information sent by a user terminal, and the first information comprises a mobile phone number and network address application data; receiving user login information which is sent by the user terminal and input by a user on a login page of the user terminal;
the first judging unit is used for judging whether the preset white list comprises the mobile phone number and the network address application data;
a first obtaining unit, configured to, if it is determined that the preset white list includes a mobile phone number and network address application data, obtain a network address in response to the network address application data;
a sending unit, configured to send second information to the user terminal, where the second information includes the network address, so that the user terminal accesses a login page of a virtual private network according to the network address; if the user login information is successfully verified, login success information is sent to the user terminal;
the authentication unit is used for authenticating the user login information;
the verification unit is specifically used for receiving a login verification code which is sent by the user terminal and is input by the user on a login page of the user terminal; judging whether the login verification code is the same as the short message verification code; if the login verification code is judged to be the same as the short message verification code, the user login information is verified successfully.
8. A storage medium comprising a stored program, wherein the program, when executed, controls an apparatus in which the storage medium is located to execute the virtual private network login method according to any one of claims 1 to 6.
9. A computer device comprising a memory for storing information including program instructions and a processor for controlling the execution of the program instructions, wherein the program instructions are loaded and executed by the processor to implement the steps of the virtual private network entry method of any one of claims 1 to 6.
CN201911265117.1A 2019-12-11 2019-12-11 Virtual private network login method and device and computer equipment Active CN112953885B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911265117.1A CN112953885B (en) 2019-12-11 2019-12-11 Virtual private network login method and device and computer equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911265117.1A CN112953885B (en) 2019-12-11 2019-12-11 Virtual private network login method and device and computer equipment

Publications (2)

Publication Number Publication Date
CN112953885A CN112953885A (en) 2021-06-11
CN112953885B true CN112953885B (en) 2023-04-18

Family

ID=76226461

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911265117.1A Active CN112953885B (en) 2019-12-11 2019-12-11 Virtual private network login method and device and computer equipment

Country Status (1)

Country Link
CN (1) CN112953885B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103428062A (en) * 2012-05-25 2013-12-04 杭州瑞高智能设备有限公司 VPN server access method and VPN client
CN107026860A (en) * 2017-04-01 2017-08-08 成都虫洞奇迹科技有限公司 Login authentication method, apparatus and system
CN108322366A (en) * 2017-01-17 2018-07-24 阿里巴巴集团控股有限公司 Access the methods, devices and systems of network
CN110298148A (en) * 2019-05-21 2019-10-01 视联动力信息技术股份有限公司 A kind of method and device of login authentication
CN110519405A (en) * 2019-08-07 2019-11-29 彩讯科技股份有限公司 A kind of short chain address operation access method, device, equipment and storage medium

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7305489B2 (en) * 2002-01-31 2007-12-04 Utstarcom, Inc. Method and apparatus for aggregate network address routes

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103428062A (en) * 2012-05-25 2013-12-04 杭州瑞高智能设备有限公司 VPN server access method and VPN client
CN108322366A (en) * 2017-01-17 2018-07-24 阿里巴巴集团控股有限公司 Access the methods, devices and systems of network
CN107026860A (en) * 2017-04-01 2017-08-08 成都虫洞奇迹科技有限公司 Login authentication method, apparatus and system
CN110298148A (en) * 2019-05-21 2019-10-01 视联动力信息技术股份有限公司 A kind of method and device of login authentication
CN110519405A (en) * 2019-08-07 2019-11-29 彩讯科技股份有限公司 A kind of short chain address operation access method, device, equipment and storage medium

Also Published As

Publication number Publication date
CN112953885A (en) 2021-06-11

Similar Documents

Publication Publication Date Title
US11122022B2 (en) Network connection automation
CN100354852C (en) Automatic re-authentication
CN109150907B (en) Vehicle-mounted industrial personal computer login method, device, system, computer equipment and medium
US9059978B2 (en) System and methods for remote maintenance in an electronic network with multiple clients
CN108462710B (en) Authentication and authorization method, device, authentication server and machine-readable storage medium
CN109905312B (en) Message pushing method, device and system
US20100197293A1 (en) Remote computer access authentication using a mobile device
US9544747B2 (en) Transmitting management commands to a client device
EP3641261A1 (en) Entrusted login method, related device and computer readable storage medium
US10187386B2 (en) Native enrollment of mobile devices
CN109413010B (en) Terminal authentication method, device and system
CN111355713B (en) Proxy access method, device, proxy gateway and readable storage medium
CN107820702B (en) Management and control method, device and electronic equipment
CN112738117A (en) Data transmission method, device and system, storage medium and electronic device
CN113225351B (en) Request processing method and device, storage medium and electronic equipment
CN108289074B (en) User account login method and device
CN111247521B (en) Remote locking of multi-user devices to user sets
CN107040501B (en) Authentication method and device based on platform as a service
CN111949958A (en) Authorization authentication method and device in Oauth protocol
CN111949959A (en) Authorization authentication method and device in Oauth protocol
US9954833B2 (en) Management of access sessions
CN104883341A (en) Application management device, terminal and application management method
CN105391673B (en) Safety access method and device
US11902789B2 (en) Cloud controlled secure Bluetooth pairing for network device management
CN112953885B (en) Virtual private network login method and device and computer equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant