WO2021012552A1 - Login processing method and related device - Google Patents

Login processing method and related device Download PDF

Info

Publication number
WO2021012552A1
WO2021012552A1 PCT/CN2019/120959 CN2019120959W WO2021012552A1 WO 2021012552 A1 WO2021012552 A1 WO 2021012552A1 CN 2019120959 W CN2019120959 W CN 2019120959W WO 2021012552 A1 WO2021012552 A1 WO 2021012552A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
digest
password
user
sample
Prior art date
Application number
PCT/CN2019/120959
Other languages
French (fr)
Chinese (zh)
Inventor
张松松
冯承勇
Original Assignee
深圳壹账通智能科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳壹账通智能科技有限公司 filed Critical 深圳壹账通智能科技有限公司
Publication of WO2021012552A1 publication Critical patent/WO2021012552A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/004Arrangements for detecting or preventing errors in the information received by using forward error control
    • H04L1/0056Systems characterized by the type of code used
    • H04L1/0061Error detection codes

Definitions

  • This application relates to the field of computer technology, in particular to a login processing method and related equipment.
  • the embodiments of the present application provide a login processing method and related equipment, which help ensure the security of user information during the transmission process.
  • an embodiment of the present application provides a login processing method, the method is applied to a client, and the method includes:
  • the embodiments of the present application provide another login processing method, which is applied to a server, and the method includes:
  • the first verification request carries a random number, a hash value corresponding to the encrypted digest information, and encrypted account information, the digest information is based on the client
  • the specified information digest algorithm is obtained by data processing the password information entered by the user;
  • Target digest sample information corresponding to target password sample information stored in association with the target account sample information, where the target digest sample information is obtained by data processing on the password sample information based on the specified information digest algorithm;
  • the first indication information that has passed the verification is returned to the client, so that the client can log in the user based on the indication information, and the indication information is used to indicate the user’s password information and the Account information is verified.
  • an embodiment of the present application provides a login processing device, which includes a module for executing the method of the first aspect.
  • an embodiment of the present application provides another login processing device, and the login processing device includes a module for executing the method of the second aspect.
  • an embodiment of the present application provides a client.
  • the client includes an input device, an output device, a processor, and a memory, and the input device, output device, processor, and memory are connected to each other.
  • the memory is used to store a computer program that supports the server to execute the above method
  • the computer program includes program instructions
  • the processor is configured to invoke the program instructions to execute the method of the above first aspect.
  • an embodiment of the present application provides a server.
  • the server includes a processor, a network interface, and a memory.
  • the processor, the network interface, and the memory are connected to each other, wherein the network interface is controlled by the processor.
  • the memory is used to store a computer program that supports the server to execute the above method
  • the computer program includes program instructions
  • the processor is configured to call the program instructions to execute the method of the second aspect described above.
  • embodiments of the present application provide a computer non-volatile readable storage medium, the computer non-volatile readable storage medium stores a computer program, the computer program includes program instructions, and the program instructions When executed by a processor, the processor is caused to execute the method of the first aspect.
  • a random number is used to hash the digest information corresponding to the password information, which ensures the randomness of the cipher text corresponding to the password information, which is beneficial to improve the security of the password information; Encryption of information and user information at the same time helps to further improve the security of user information during transmission.
  • FIG. 1 is a schematic structural diagram of a login processing system provided by an embodiment of the present application
  • FIG. 2 is a schematic flowchart of a login processing method provided by an embodiment of the present application.
  • FIG. 3 is a schematic flowchart of another login processing method provided by an embodiment of the present application.
  • FIG. 4 is a schematic flowchart of another login processing method provided by an embodiment of the present application.
  • FIG. 5 is a schematic diagram of the interaction process of a login processing method provided by an embodiment of the present application.
  • FIG. 6 is a schematic block diagram of a login processing apparatus provided by an embodiment of the present application.
  • FIG. 7 is a schematic block diagram of a client provided by an embodiment of the present application.
  • FIG. 8 is a schematic block diagram of another login processing apparatus provided by an embodiment of the present application.
  • Fig. 9 is a schematic block diagram of a server provided by an embodiment of the present application.
  • the login processing method described in the embodiment of the present application involves a client that can provide login access for users and a server that provides login services.
  • Fig. 1 is a schematic structural diagram of a login processing system applicable to the embodiment of the present application.
  • the login processing system may include a client 101 and a server 102.
  • the server may refer to a server in a server group composed of multiple servers for providing login-related services such as login processing.
  • the client may be a smart terminal in which an application requiring login processing or a website that can open the application is pre-installed in the smart terminal.
  • the client may also be the application itself, which is not specifically limited in this application.
  • the application may be an application corresponding to the log platform.
  • the client 101 in the login processing system may receive a login request carrying user information, and the user information includes password information and account information input by the user. Further, the client 101 may generate digest information for the password information based on a specified information digest algorithm, generate a random number according to a preset rule, and hash the digest information through the random number to obtain the hash value corresponding to the digest information . Further, the client 101 may encrypt the hash value and account information, generate a first verification request including the random number, the encrypted hash value, and the encrypted account information, and perform the first verification The request is sent to the server 102.
  • the server 102 may decrypt the encrypted hash value and account information based on the pre-configured key to obtain the plaintext information corresponding to the account information and decrypt it. After the hash value. Further, if the server 102 detects that there is target account sample information matching the plaintext information in the database, it determines that the verification of the account information is passed, and obtains the target summary sample information corresponding to the target password sample information stored in association with the target account sample information .
  • the server 102 may perform a hash calculation on the target digest sample information based on the aforementioned random number to obtain the sample hash value corresponding to the target digest sample information, and if it is detected that the hash value matches the sample hash value, it is determined to match the password information After the verification is passed, the first indication information that the verification passed is returned to the client, and the first indication information is used to indicate that the password information and account information of the user are both verified.
  • the client 101 may perform login processing based on the user.
  • a random number is used to hash the digest information corresponding to the password information, which ensures the randomness of the password information corresponding to the cipher text, which is beneficial to improve the security of the password information; Encrypting user information at the same time helps to further improve the security of user information during transmission.
  • Figure 2 is a schematic flowchart of a login processing method provided by an embodiment of the present application. The method is applied to the client and can be executed by the client. As shown in the figure, the login processing method may include:
  • 201 Receive a login request carrying user information, where the user information includes password information and account information entered by the user.
  • the designated information digest algorithm may include a message digest algorithm (Message-Digest Algorithm 5, MD5) or a cyclic redundancy check algorithm (Cyclic Redundancy Check, CRC), etc., and may also include other information digest algorithms. There is no specific limitation.
  • MD5 has been widely used to determine the reliability of file transmission.
  • the sending terminal provides an MD5 checksum in advance.
  • the receiving terminal uses the MD5 algorithm to calculate the MD5 checksum of the received file, and then by checking whether the two checksums are consistent, the received file can be judged Whether there is an error. Even if you make a small change in the original text (such as replacing d with c), its MD5 checksum will change dramatically.
  • the cyclic redundancy check CRC is a hash function that generates a short fixed-digit check code based on data such as network data packets or computer files. It can be used to detect or verify data transmission or storage. error. The generated numbers are calculated and appended to the data before transmission or storage, and then the receiver checks to determine whether the data has changed. That is, if the contents of two files are exactly the same, the CRCs of the two files must be the same. Therefore, it is possible to determine whether the specific contents of the two files are the same by comparing whether the CRCs of the two files are the same.
  • the above-mentioned designated information digest algorithm may be selected from the information digest algorithm MD5 and cyclic redundancy check algorithm (CRC) preset by the user according to his own needs, or may be a system default setting.
  • the specified information digest algorithm when the specified information digest algorithm has been predetermined, the user can adjust the specified information digest algorithm according to his own needs.
  • the predetermined specified information digest algorithm is MD5, and the subsequent user can follow his own It is required to change the specified information digest algorithm to CRC.
  • the server may generate digest information for the password information based on the cyclic redundancy check algorithm CRC; or, when the designated message digest algorithm is the message digest algorithm MD5 , The server can generate digest information for the password information based on MD5. It can be seen that the above-mentioned summary information includes the summary information generated for the password information based on the cyclic redundancy check algorithm CRC or the summary information generated for the password information based on the information digest algorithm MD5.
  • the preset rule indicates the value corresponding to the random number generated.
  • the client may hash the digest information by using random numbers to obtain the hash value corresponding to the digest information. Using random numbers for hashing calculations, the same digest information will not appear after the hashing results are the same, ensuring the randomness of the obtained hash values.
  • the hash processing of the digest information can be regarded as the encryption process of the password information, and the hash value after the hash processing can be regarded as the cipher text corresponding to the password information. Therefore, the random number is used for the hash calculation.
  • the result is the same, which ensures the randomness of the ciphertext, and accordingly, improves the security of the password information.
  • the summary information obtained in step 202 is an array, from a to z, 0 to 9, A to Z, a total of 62 characters, that is, index 0 in the array represents a, 1 Represents b, and so on.
  • the server hashes the digest information through random numbers, and the specific process of obtaining the hash value corresponding to the digest information is as follows: The server divides the digest information into groups of 8 bits, and takes 4 groups in total (that is, only 32 characters). Further, the server processes each group, first converts the 8 bits of each group to hexadecimal, and performs bit-AND operation with 0x3FFFFFFF after the conversion to obtain the value A.
  • the server can use A to do N (random number) processing times, and each time use A and 0x0000003D to perform bitwise AND operation to obtain a number (less than 62), use this number as an index to fetch the characters in the array to obtain character B, and at the same time Shift A to the right by 5 bits to generate a new A, and the new A(A) is used as a new round of processing to prevent the same A from being processed N times with the same result. Then finally N (random number) different Bs will be generated, and N B combinations are defined as C.
  • the advantage of using random numbers to process digest information is: the digest value generated by the same password is the same, so brute force cracking (collision method) can be used, which can be collided in a certain time, and the success of collision is only time And the question of probability. Therefore, the digest must be hashed again.
  • the purpose is that even if the same password is hashed with a random number after generating the same digest information, the result must be different. Can improve the security of the password.
  • the server may use a preset encryption algorithm to encrypt the hash value and account information, and generate a first verification request including the encrypted hash value, encrypted account information, and the aforementioned random number .
  • the preset encryption algorithm may include a symmetric encryption algorithm or an asymmetric encryption algorithm, which is not specifically limited in this application.
  • the server may send the first verification request generated in step 204 to the server.
  • the server may decrypt the encrypted hash value and account information based on the pre-configured key. Obtain the plaintext information corresponding to the account information and the decrypted hash value.
  • the server detects that there is target account sample information matching the plaintext information in the database, it determines that the verification of the account information is passed, and obtains the target summary sample information corresponding to the target password sample information stored in association with the target account sample information. Further, the server may perform a hash calculation on the target digest sample information based on the above random number to obtain the sample hash value corresponding to the target digest sample information. If the hash value matches the sample hash value, it determines the password information After the verification is passed, the first instruction information indicating that the verification passed is returned to the client, and the first instruction information is used to indicate that the password information and account information of the user are both verified.
  • the client After the client receives the instruction information, it can perform login processing based on the account information and password information input by the user, so as to realize the login of the account corresponding to the account information.
  • the client uses random numbers to hash the digest information corresponding to the password information, which ensures the randomness of the cipher text corresponding to the password information, which is beneficial to improve the security of the password information;
  • the password information and user information can be encrypted at the same time, which is beneficial to further improve the security of user information during transmission.
  • FIG 3 is a schematic flowchart of another login processing method provided by an embodiment of the present application. The method is applied to the client and can be executed by the client. As shown in the figure, the login processing method may include:
  • step 301 Receive a login request carrying user information, where the user information includes password information and account information entered by the user.
  • the user information includes password information and account information entered by the user.
  • step 301 For the specific implementation of step 301, reference may be made to the related description of step 201 in the foregoing embodiment, which is not repeated here.
  • the cyclic redundancy check algorithm CRC is determined from the preset information digest algorithm MD5 and the cyclic redundancy check algorithm CRC to determine the specified information digest algorithm, and the first cipher information is generated based on the cyclic redundancy check algorithm CRC. Summary information.
  • the reliability of the information digest algorithm MD5 is greater than that of the cyclic redundancy check algorithm CRC, that is, if the CRCs of the two files are different, it can be proved that the contents of the two files are definitely different.
  • CRC cyclic redundancy check algorithm
  • the cyclic redundancy check algorithm CRC may be selected as the designated information digest algorithm first, and the first digest information for the cryptographic information is generated based on the cyclic redundancy check algorithm CRC, thereby improving data Processing efficiency.
  • the algorithm MD5 After receiving the first indication information that has passed the verification, if it is detected that the first indication information indicates that the first summary information matches the target summary sample information corresponding to the password sample information pre-stored in the database by the user, based on the information summary The algorithm MD5 generates the second digest information for the password information, and hashes the second digest information according to the random number to obtain the hash value corresponding to the second digest information.
  • the first summary information corresponding to the password information may be generated first based on the CRC, and the subsequent steps are performed based on the first summary information 303 ⁇ 305.
  • the server receives the first verification request, it can
  • the encrypted hash value and account information are decrypted based on the pre-configured key. If the server detects that there is target account sample information in the database that matches the plaintext information, it will determine that the account information is verified and obtain Target summary sample information corresponding to the target password sample information stored in association with the target account sample information. Further, the server 102 may perform a hash calculation on the target digest sample information based on the above random number to obtain the sample hash value corresponding to the target digest sample information. If it is detected that the hash value and the sample hash value do not match, it determines that the password is not matched. If the verification of the information fails, the second indication information indicating that the verification failed may be returned to the client. The second indication information is used to indicate that the password information input by the user does not match the password sample information pre-stored by the user in the database.
  • prompt information is output, and the prompt information is used to prompt the user that the password is entered incorrectly.
  • the reliability of the information digest algorithm MD5 is greater than that of the cyclic redundancy check algorithm CRC, that is, if the CRC of the two files are different, it can be proved that the content of the two files must be different, but the CRC only accounts for two Bytes, while MD5 takes 16 bytes.
  • the cyclic redundancy check algorithm CRC is firstly determined from the preset message digest algorithm MD5 and the cyclic redundancy check algorithm CRC to determine the specified message digest algorithm, and based on the cyclic redundancy check algorithm CRC, the password
  • the first summary information of the information, and the subsequent steps 303 to 305 are executed based on the first summary information.
  • the server verifies the password information, it is also based on the hash value corresponding to the first digest information. Therefore, if the hash value corresponding to the first digest information matches the sample corresponding to the pre-stored target digest sample information in the database, If the desired value does not match, it can be directly determined that the password information entered by the user does not match the password sample information pre-stored by the user in the database. In this way, since the CRC occupies fewer bytes, the data processing efficiency can be improved while ensuring the security of the password information.
  • the server determines that the user’s account information is passed, if the server verifies based on the hash value corresponding to the first digest information, it determines that the hash value corresponding to the first digest information is the same as the one in the database.
  • the sample hash value corresponding to the stored target digest sample information matches, and the first indication information that has passed the verification can be sent to the client.
  • the first indication information is used to indicate that the first digest information and the user's pre-stored password sample information in the database The corresponding target summary sample information matches.
  • the client may generate second digest information for the password information based on the message digest algorithm MD5, and hash the second digest information according to the random number to obtain the second digest information corresponding
  • Step 307 is executed to send a second verification request including the hash value corresponding to the encrypted second digest information to the server.
  • the server may compare the hash value corresponding to the second summary information with the previously determined sample hash value corresponding to the target summary sample information, and if the comparison obtains the hash value corresponding to the second summary information If the sample hash value corresponding to the above-mentioned target summary sample information matches, the verified third indication information can be returned to the client.
  • the third indication information is used to indicate the second summary information and the user's pre-stored password sample in the database The target summary sample information corresponding to the information matches.
  • the client may perform login processing on the user when receiving the third instruction information.
  • it is equivalent to first filtering out different password information through CRC, and then using MD5 for further verification only for password information with the same hash value corresponding to CRC, which is equivalent to a comprehensive use of two information digest algorithms.
  • the advantage is that it can not only improve the verification efficiency of password information, but also ensure the reliability of verification.
  • the client can comprehensively utilize the advantages of the two information digest algorithms, CRC and MD5, which can not only improve the verification efficiency of password information, but also ensure the reliability of verification.
  • Figure 4 is a schematic flowchart of another login processing method provided by an embodiment of the present application.
  • the method may be executed by a server.
  • the login processing method may include:
  • the first verification request carries a random number, a hash value corresponding to the encrypted digest information, and encrypted account information.
  • the digest information is based on the client's specified information
  • the digest algorithm is obtained by data processing the password information entered by the user.
  • the keys required for server decryption are all set uniformly and stored in the designated area after the setting is completed. Any encrypted hash value and account information sent by the client can be decrypted using the unified key.
  • the server after the server receives the first verification request, it can obtain a preset key from the designated area, and use the key to encrypt the hash value corresponding to the encrypted digest information and the encrypted The account information is decrypted.
  • each user account may correspond to a storage area
  • the storage area is associated with the account sample information of each user account and the summary sample information corresponding to the password sample information, and each storage area is A unique account ID is added.
  • the server may find the storage area uniquely corresponding to the account identification from at least one preset storage area based on the account identification in the account information, and obtain the pre-stored target of the user in the storage area Account sample information, and then determine whether the pre-stored target account sample information and the plaintext information corresponding to the account information match, if they match, continue to obtain the pre-stored target summary corresponding to the user’s target password sample information from the storage area Sample information.
  • one storage area corresponds to one user, which can improve the efficiency of querying user account information and password information.
  • the above-mentioned target summary sample information is obtained by performing data processing on the password sample information based on a specified information digest algorithm.
  • the above-mentioned designated information digest algorithm may include the information digest algorithm MD5 or the cyclic redundancy check algorithm CRC, and the first digest generated based on the cyclic redundancy check algorithm CRC for the target password sample information is pre-stored in the database.
  • the server detects that there is target account sample information that matches the plaintext information in the database, it determines that the verification of the account information is passed, and obtains the target password sample information stored in association with the target account sample information from the first The one summary sample sub-information and the second summary sample sub-information select the target summary sample information matching the specified information summary algorithm.
  • the server determines the second digest sample sub-information as the target digest sample information corresponding to the target password sample information; if the specified information digest algorithm is the cyclic redundancy check algorithm CRC, then the server determines the first digest sample sub-information as the target digest sample information corresponding to the target password sample information.
  • step 404 Perform a hash calculation on the target digest sample information based on the random number to obtain a sample hash value corresponding to the target digest sample information. If a match between the hash value and the sample hash value is detected, it is determined that the verification of the password information is passed.
  • how to use random numbers to hash the target summary sample information can refer to the related description of step 203 in the foregoing embodiment, which will not be repeated here.
  • the sample hash value can be compared with the hash value for similarity, if the comparison shows that the similarity between the two is greater than or equal to the preset similarity
  • the degree threshold is determined to pass the verification of the password information.
  • the random number is used to hash the target digest sample information, so that the obtained sample hash value has randomness, is not easy to be tampered with, and can improve the accuracy of password information verification.
  • the server may return to the client the first indication that the authentication is passed, and when the client receives the first indication, it may follow the user’s input Account information and password information for login processing.
  • the server after the server obtains the sample hash value corresponding to the target digest sample information, if it detects that the hash value does not match the sample hash value, it can determine that the password information is not verified, and send the first sample to the client.
  • Two indication information the second indication information is used to indicate that the password information input by the user does not match the password sample information pre-stored by the user in the database.
  • the digest information (hereinafter referred to as the first digest information) corresponding to the encrypted hash value carried in the first verification request is obtained based on the cyclic redundancy check algorithm CRC.
  • the server receives the first verification request and determines that the user’s account information is passed based on the first verification request, if it detects that the hash value matches the sample hash value, it determines the verification of the password information Pass, and send first instruction information to the server.
  • the first instruction information also indicates that the first summary information matches the target summary sample information corresponding to the password sample information pre-stored by the user in the database.
  • the verification of the password information input by the user can be further verified in combination with the information digest algorithm.
  • the client after the client receives the first indication information for indicating that the first digest information matches the target digest sample information corresponding to the password sample information stored in the database in advance by the user, the client can generate the corresponding password based on the information digest algorithm MD5 The second digest information of the information, and hash the second digest information according to the random number to obtain the hash value corresponding to the second digest information.
  • the client may perform encryption processing on the hash value corresponding to the second digest information, generate a second verification request including the hash value corresponding to the encrypted second digest information, and send the second verification request to the server. Further, after receiving the second verification request, the server can decrypt the hash value corresponding to the encrypted second digest information to obtain the hash value corresponding to the second digest information, and obtain the MD5 based on the information digest algorithm in advance.
  • the target summary sample information obtained by performing data processing on the target password sample information is to obtain the aforementioned second summary sample sub-information.
  • the server performs a hash calculation on the second digest sample sub-information based on the random number to obtain the sample hash value corresponding to the second digest sample sub-information, if it is detected that the hash value corresponds to the second digest sample sub-information If the hash value of the sample matches, it is determined that the verification of the password information is passed, and the third instruction information is sent to the client.
  • the client receives the third instruction information, the user is logged in.
  • the server uses random numbers to hash the target summary sample information, so that the obtained sample hash value is random, not easy to be tampered with, and can improve the accuracy of password information verification.
  • FIG. 5 is an interactive schematic diagram of a login processing method proposed in an embodiment of the present application. The method includes the following steps:
  • the client receives a login request carrying user information, where the user information includes password information and account information entered by the user.
  • the client generates digest information for the password information based on the specified information digest algorithm, generates a random number according to a preset rule, and hashes the digest information through the random number to obtain a hash value corresponding to the digest information.
  • step 501 to step 502 The client encrypts the hash value and account information, generates a first verification request including the random number, the encrypted hash value, and the encrypted account information, and sends the first verification request to the server.
  • step 501 to step 502 reference may be made to the related description of step 201 to step 205 in the foregoing embodiment, which will not be repeated here.
  • the server decrypts the encrypted hash value and account information based on the pre-configured key, and obtains the plaintext information corresponding to the account information and the decrypted hash value. If it detects that there is a matching plaintext information in the database The target account sample information confirms that the verification of the account information is passed.
  • the server obtains the target digest sample information corresponding to the target password sample information stored in association with the target account sample information, and performs a hash calculation on the target digest sample information based on the above random number to obtain the sample hash value corresponding to the target digest sample information , If it is detected that the hash value matches the sample hash value, it is determined that the verification of the password information is passed.
  • step 506 The server returns the first indication information that the verification is passed to the client.
  • step 504 to step 505 reference may be made to the related description of step 401 to step 405 in the foregoing embodiment, which will not be repeated here.
  • the client performs login processing on the user.
  • the client may perform login processing based on the user's account information and password information.
  • the embodiment of the present application also provides a login processing device.
  • the device includes a module for executing the method described in FIG. 2 or FIG. 3, and is configured on the client.
  • FIG. 6, which is a schematic block diagram of a login processing apparatus provided by an embodiment of the present application.
  • the login processing device of this embodiment includes:
  • the input module 10 is configured to receive a login request carrying user information, the user information including password information and account information entered by the user;
  • the processing module 11 is configured to generate digest information for the password information based on a specified information digest algorithm, generate a random number according to a preset rule, and hash the digest information by the random number to obtain the digest information Corresponding to the hash value, encrypting the hash value and the account information, and generating a first verification request including the random number, the encrypted hash value, and the encrypted account information;
  • the output module 12 is configured to send the first verification request to the server, so that the server verifies the user based on the first verification request, and returns the verified first to the client after the verification is passed.
  • the processing module 11 is further configured to perform login processing on the user when the input module 10 receives the first indication information that the authentication is passed, and the first indication information is used to indicate the password information of the user and the Account information is verified.
  • the specified information digest algorithm includes an information digest algorithm MD5 or a cyclic redundancy check algorithm CRC
  • the digest information includes digest information generated for the cryptographic information based on the cyclic redundancy check algorithm CRC Or based on the digest information generated by the information digest algorithm MD5 for the password information.
  • the processing module 11 is specifically configured to determine the cyclic redundancy check algorithm CRC as the designated information digest algorithm from the preset information digest algorithm MD5 and the cyclic redundancy check algorithm CRC;
  • the cyclic redundancy check algorithm CRC generates first summary information for the cryptographic information.
  • the summary information is the first summary information
  • the processing module 11 is further configured to receive second indication information returned by the server after failing to verify the user; if the second information is detected If the instruction information indicates that the password information input by the user does not match the password sample information pre-stored in the database by the user, prompt information is output through the output module 12, and the prompt information is used to prompt the user to input the password error.
  • the summary information is the first summary information
  • the processing module 11 is further configured to: after the input module 10 receives the first indication information that the verification is passed, if the first indication information is detected An indication information indicates that the first summary information matches the target summary sample information corresponding to the password sample information pre-stored in the database by the user, and the second summary information for the password information is generated based on the information digest algorithm MD5 , And hash the second digest information according to the random number to obtain the hash value corresponding to the second digest information; perform encryption processing on the hash value corresponding to the second digest information to generate
  • the encrypted second digest information corresponds to the second verification request of the hash value, and the second verification request is sent to the server through the output module 12, so that the server can base on the encrypted second verification request.
  • the second digest information corresponds to the hash value verification, and after the password information entered by the user matches the password sample information pre-stored in the database by the user, return the third indication information that the verification passed to the client;
  • the client in this embodiment may include: one or more processors 20; one or more input devices 21, one or more output devices 22, and a memory 23.
  • the aforementioned processor 20, input device 21, output device 22, and memory 23 are connected by a bus.
  • the memory 23 is configured to store a computer program including program instructions, and the processor 20 is configured to execute the program instructions stored in the memory 23.
  • the processor 20 is configured to call the program instructions to execute: receive a login request carrying user information, the user information includes password information and account information entered by the user; and generate information based on a specified information digest algorithm for the password information
  • the summary information ; generate random numbers according to preset rules, and hash the summary information through the random numbers to obtain the hash value corresponding to the summary information; compare the hash value and the account information Perform encryption processing to generate a first verification request including the random number, the encrypted hash value, and the encrypted account information; send the first verification request to the server so that the server can base on the first verification request
  • the verification request verifies the user, and after the verification is passed, returns to the client the first indication information that the verification is passed; when the first indication information that the verification passes is received, the user is logged in,
  • the first indication information is used to indicate that the password information of the user and the account information are both verified.
  • the so-called processor 20 may be a central processing unit (Central Processing Unit, CPU), and the processor may also be other general-purpose processors or digital signal processors (Digital Signal Processors, DSP). , Application Specific Integrated Circuit (ASIC), Field-Programmable Gate Array (FPGA) or other programmable logic devices, discrete gates or transistor logic devices, discrete hardware components, etc.
  • the general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like.
  • the input device 21 may include a touch panel, a microphone, etc.
  • the output device 22 may include a display (LCD, etc.), a speaker, and the like.
  • the memory 23 may include a read-only memory and a random access memory, and provides instructions and data to the processor 20. A part of the memory 23 may also include a non-volatile random access memory. For example, the memory 23 may also store device type information.
  • the processor 20, input device 21, and output device 22 described in the embodiment of this application can execute the implementation described in the method embodiment in FIG. 2 or FIG. 3 provided in the embodiment of this application, and may also execute The implementation of the device described in FIG. 6 in the embodiment of the present application will not be repeated here.
  • the embodiment of the present application also provides a login processing device.
  • the device includes a module for executing the method described in FIG. 4, and is configured on a server.
  • FIG. 8 is a schematic block diagram of a login processing apparatus provided by an embodiment of the present application.
  • the login processing device of this embodiment includes:
  • the communication module 30 is configured to receive a first verification request from the client, the first verification request carrying a random number, a hash value corresponding to the encrypted digest information, and encrypted account information, the digest information Is obtained by the client terminal performing data processing on the password information input by the user based on a specified information digest algorithm;
  • the processing module 31 is configured to decrypt the encrypted hash value and the account information based on the pre-configured key to obtain the plain text information corresponding to the account information and the decrypted hash value. If there is target account sample information matching the plaintext information in the database, it is determined that the verification of the account information is passed;
  • the processing module 31 is further configured to obtain target digest sample information corresponding to the target password sample information stored in association with the target account sample information, and perform a hash calculation on the target digest sample information based on the random number to obtain If the hash value of the sample corresponding to the target digest sample information is detected to match the hash value of the sample, it is determined that the verification of the password information is passed;
  • the communication module 30 is further configured to return to the client the first indication information that has passed the verification, so that the client can log in the user based on the indication information, and the indication information is used to indicate Both the password information of the user and the account information are verified.
  • the specified information digest algorithm includes an information digest algorithm MD5 or a cyclic redundancy check algorithm CRC
  • the database pre-stores information based on the cyclic redundancy check algorithm CRC for the target password sample
  • the generated first summary sample sub-information and the second summary sample sub-information generated for the target password information based on the information digest algorithm MD5 the processing module 31 is specifically configured to: communicate with the target account sample information in advance From the first summary sample sub-information and the second summary sample sub-information corresponding to the target password sample information stored in association, target summary sample information that matches the specified information digest algorithm is selected.
  • FIG. 9 is a schematic block diagram of a server provided by an embodiment of the present application.
  • the server includes a processor 40, a memory 41 and a network interface 42.
  • the above-mentioned processor 40, memory 41, and network interface 42 may be connected by a bus or in other ways.
  • connection by a bus is taken as an example.
  • the network interface 42 is controlled by the processor to send and receive messages, the memory 41 is used to store a computer program, and the computer program includes program instructions, and the processor 40 is used to execute the program instructions stored in the memory 41.
  • the processor 40 is configured to call the program instructions to execute: receive processing result information for processing the target document through the network interface 42, where the processing result information includes the processing request identifier corresponding to the processing of the target document and the processing station The document processing information corresponding to the target document; from the pre-established correspondence between the processing application identifier and the processing item, the target processing item corresponding to the processing application identifier of the target document is determined, and the target option to which the target processing item belongs is detected Type, and based on the correspondence between the preset option type and the preset storage mode, determine the target storage mode matching the target option type, and then store the bill processing information according to the target storage mode.
  • the so-called processor 40 may be a central processing unit (Central Processing Unit, CPU), and the processor 40 may also be other general-purpose processors, digital signal processors (Digital Signal Processors, DSPs). ), Application Specific Integrated Circuit (ASIC), Field-Programmable Gate Array (FPGA) or other programmable logic devices, discrete gates or transistor logic devices, discrete hardware components, etc.
  • the general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like.
  • the memory 41 may include a read-only memory and a random access memory, and provides instructions and data to the processor 40. A part of the memory 41 may also include a non-volatile random access memory. For example, the memory 41 may also store device type information.
  • the processor 40, the memory 41, and the network interface 42 described in the embodiment of the present application can perform the implementation described in the method embodiment described in FIG. 4 provided by the embodiment of the present application, and can also perform the implementation of the present application For example, the implementation of the login processing device described in FIG. 8 will not be repeated here.
  • a computer-readable storage medium stores a computer program
  • the computer program includes program instructions
  • the program instructions are executed by a processor to realize: receiving A login request carrying user information, the user information including the password information and account information entered by the user; generating summary information for the password information based on a specified information digest algorithm; generating random numbers according to preset rules, and passing the random numbers Perform a hash process on the digest information to obtain a hash value corresponding to the digest information; perform an encryption process on the hash value and the account information to generate a hash including the random number and the encrypted process Value and the encrypted first verification request of the account information; sending the first verification request to the server, so that the server verifies the user based on the first verification request, and sends the first verification request to the
  • the client returns the first indication information that the authentication is passed; when receiving the first indication information that the authentication is passed, the user is logged in, and the first indication information is used to indicate the user's password information and the password.
  • a computer-readable storage medium stores a computer program, the computer program includes program instructions, and the program instructions are executed by a processor to realize: receiving A first verification request from the client, the first verification request carries a random number, a hash value corresponding to the encrypted digest information, and encrypted account information, the digest information is based on the client's specified
  • the information digest algorithm is obtained by data processing on the password information input by the user; the encrypted hash value and the account information are decrypted based on the pre-configured key to obtain the plaintext information corresponding to the account information and The decrypted hash value; if it is detected that there is target account sample information matching the plaintext information in the database, it is determined that the verification of the account information is passed; and the target password sample stored in association with the target account sample information is obtained
  • the target digest sample information corresponding to the information, the target digest sample information is obtained by data processing the password sample information based on the specified information digest algorithm; the target digest sample information is hashe
  • the computer-readable storage medium may be the internal storage unit of the server or the client described in any of the foregoing embodiments, such as the hard disk or memory of the server or the client.
  • the computer-readable storage medium may also be an external storage device of the server or the client, such as a plug-in hard disk equipped on the server or the client, a smart memory card (Smart Media Card, SMC), and a secure digital (Secure Digital) Digital, SD) card, flash card (Flash Card), etc.
  • the computer-readable storage medium may also include both an internal storage unit of the server and an external storage device.
  • the computer-readable storage medium is used to store the computer program and other programs and data required by the server or client.
  • the computer-readable storage medium can also be used to temporarily store data that has been output or will be output.
  • the program can be stored in a computer readable storage medium. During execution, it may include the procedures of the above-mentioned method embodiments.
  • the storage medium may be a magnetic disk, an optical disc, a read-only memory (Read-Only Memory, ROM), or a random access memory (Random Access Memory, RAM), etc.

Abstract

Disclosed are a login processing method and a related device. The method is applied to the technical field of passwords, and comprises: generating, on the basis of a specified information digest algorithm, digest information for password information; carrying out the hash processing of the digest information by means of a random number to obtain a hash value corresponding to the digest information; and performing encryption processing on the hash value and account information, sending a first verification request, which comprises the above-mentioned random number, the encrypted hash value and the encrypted account information, to a server, and performing login processing on a user when first indication information indicating that the verification is passed is received. By means of the present application, on the one hand, hash calculation is performed on the digest information corresponding to password information by means of a random number, such that the randomness of the ciphertext corresponding to password information is ensured, and the security of the password information is improved; on the other hand, password information and user information can be encrypted at the same time, and the security of the user information during a transmission process is further improved.

Description

一种登录处理方法及相关设备Login processing method and related equipment
本申请要求于2019年7月25日提交中国专利局、申请号为201910679227.6、申请名称为“一种登录处理方法及相关设备”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。This application claims the priority of a Chinese patent application filed with the Chinese Patent Office on July 25, 2019, the application number is 201910679227.6, and the application name is "a login processing method and related equipment", the entire content of which is incorporated into this application by reference in.
技术领域Technical field
本申请涉及计算机技术领域,尤其涉及一种登录处理方法及相关设备。This application relates to the field of computer technology, in particular to a login processing method and related equipment.
背景技术Background technique
目前,用户信息越来越受到重视,在用户登录业务平台时,需要通过前端将用户输入的用户信息传入到后端进行校验,当后端校验通过时,对该用户进行登录处理。其中,在用户信息的传输过程中,如果对用户信息保护不够很容易导致该用户信息被非法获取或者被非法篡改,严重影响用户信息的安全性以及后端校验结果的准确性。At present, more and more attention is paid to user information. When a user logs in to a service platform, the user information input by the user needs to be transmitted to the back end through the front end for verification. When the back end verification passes, the user is logged in. Among them, in the transmission process of user information, if the user information is not protected enough, it is easy to cause the user information to be illegally obtained or illegally tampered with, which seriously affects the security of user information and the accuracy of back-end verification results.
因此,如何在用户登录过程中,对用户输入的用户信息进行保护,成为一个亟待解决的问题。Therefore, how to protect the user information input by the user during the user login process has become an urgent problem to be solved.
发明内容Summary of the invention
本申请实施例提供了一种登录处理方法及相关设备,有利于保证用户信息在传输过程中的安全性。The embodiments of the present application provide a login processing method and related equipment, which help ensure the security of user information during the transmission process.
第一方面,本申请实施例提供了一种登录处理方法,所述方法应用于客户端,该方法包括:In the first aspect, an embodiment of the present application provides a login processing method, the method is applied to a client, and the method includes:
接收携带有用户信息的登录请求,所述用户信息包括用户输入的密码信息和账号信息;Receiving a login request carrying user information, where the user information includes password information and account information entered by the user;
基于指定信息摘要算法生成针对所述密码信息的摘要信息;Generating digest information for the password information based on a designated information digest algorithm;
根据预设规则生成随机数,并通过所述随机数对所述摘要信息进行哈希处理,得到所述摘要信息对应的哈希值;Generating a random number according to a preset rule, and hashing the digest information by using the random number to obtain a hash value corresponding to the digest information;
对所述哈希值和所述账号信息进行加密处理,生成包括所述随机数、加密处理后的哈希值以及加密处理后的账号信息的第一验证请求;Performing encryption processing on the hash value and the account information, and generating a first verification request including the random number, the encrypted hash value, and the encrypted account information;
将所述第一验证请求发送至服务器,以便于服务器基于所述第一验证请求对所述用户进行验证,并在验证通过后向所述客户端返回验证通过的第一指示信息;Sending the first verification request to the server, so that the server verifies the user based on the first verification request, and returns the first indication information that the verification passed to the client after the verification is passed;
当接收到所述验证通过的第一指示信息时,对所述用户进行登录处理,所述第一指示信息用于指示所述用户的密码信息和所述账号信息均验证通过。When receiving the first indication information that the authentication is passed, log in to the user, where the first indication information is used to indicate that both the password information and the account information of the user pass the authentication.
第二方面,本申请实施例提供了另一种登录处理方法,所述方法应用于服务器,该方法包括:In the second aspect, the embodiments of the present application provide another login processing method, which is applied to a server, and the method includes:
接收来自客户端的第一验证请求,所述第一验证请求中携带有随机数、加密处理后的摘要信息对应的哈希值以及加密处理后的账号信息,所述摘要信息是所述客户端基于指定信息摘要算法对用户输入的密码信息进行数据处理得到的;Receive a first verification request from a client, the first verification request carries a random number, a hash value corresponding to the encrypted digest information, and encrypted account information, the digest information is based on the client The specified information digest algorithm is obtained by data processing the password information entered by the user;
基于预先配置的密钥对所述加密处理后的哈希值和所述账号信息进行解密处理,得到所述账号信息对应的明文信息以及解密后的哈希值;Performing decryption processing on the encrypted hash value and the account information based on the pre-configured key to obtain the plaintext information corresponding to the account information and the decrypted hash value;
若检测到数据库中存在与所述明文信息匹配的目标账号样本信息,则确定对所述账号信息的验证通过;If it is detected that there is target account sample information matching the plaintext information in the database, it is determined that the verification of the account information is passed;
获取与所述目标账号样本信息关联存储的目标密码样本信息对应的目标摘要样本信息, 所述目标摘要样本信息是基于所述指定信息摘要算法对所述密码样本信息进行数据处理得到的;Acquiring target digest sample information corresponding to target password sample information stored in association with the target account sample information, where the target digest sample information is obtained by data processing on the password sample information based on the specified information digest algorithm;
基于所述随机数对所述目标摘要样本信息进行哈希计算,得到所述目标摘要样本信息对应的样本哈希值,若检测到所述哈希值和所述样本哈希值匹配,则确定对所述密码信息的验证通过;Perform a hash calculation on the target digest sample information based on the random number to obtain the sample hash value corresponding to the target digest sample information. If it is detected that the hash value matches the sample hash value, it is determined The verification of the password information is passed;
向所述客户端返回验证通过的第一指示信息,以便于所述客户端基于所述指示信息,对所述用户进行登录处理,所述指示信息用于指示所述用户的密码信息和所述账号信息均验证通过。The first indication information that has passed the verification is returned to the client, so that the client can log in the user based on the indication information, and the indication information is used to indicate the user’s password information and the Account information is verified.
第三方面,本申请实施例提供了一种登录处理装置,该登录处理装置包括用于执行上述第一方面的方法的模块。In a third aspect, an embodiment of the present application provides a login processing device, which includes a module for executing the method of the first aspect.
第四方面,本申请实施例提供了另一种登录处理装置,该登录处理装置包括用于执行上述第二方面的方法的模块。In a fourth aspect, an embodiment of the present application provides another login processing device, and the login processing device includes a module for executing the method of the second aspect.
第五方面,本申请实施例提供了一种客户端,该客户端包括输入设备、输出设备、处理器和存储器,所述输入设备、输出设备、处理器和存储器相互连接。其中,所述存储器用于存储支持服务器执行上述方法的计算机程序,所述计算机程序包括程序指令,所述处理器被配置用于调用所述程序指令,执行上述第一方面的方法。In a fifth aspect, an embodiment of the present application provides a client. The client includes an input device, an output device, a processor, and a memory, and the input device, output device, processor, and memory are connected to each other. Wherein, the memory is used to store a computer program that supports the server to execute the above method, the computer program includes program instructions, and the processor is configured to invoke the program instructions to execute the method of the above first aspect.
第六方面,本申请实施例提供了一种服务器,该服务器包括处理器、网络接口和存储器,所述处理器、网络接口和存储器相互连接,其中,所述网络接口受所述处理器的控制用于收发消息,所述存储器用于存储支持服务器执行上述方法的计算机程序,所述计算机程序包括程序指令,所述处理器被配置用于调用所述程序指令,执行上述第二方面的方法。In a sixth aspect, an embodiment of the present application provides a server. The server includes a processor, a network interface, and a memory. The processor, the network interface, and the memory are connected to each other, wherein the network interface is controlled by the processor. For sending and receiving messages, the memory is used to store a computer program that supports the server to execute the above method, the computer program includes program instructions, and the processor is configured to call the program instructions to execute the method of the second aspect described above.
第七方面,本申请实施例提供了一种计算机非易失性可读存储介质,所述计算机非易失性可读存储介质存储有计算机程序,所述计算机程序包括程序指令,所述程序指令当被处理器执行时使所述处理器执行上述第一方面的方法。In a seventh aspect, embodiments of the present application provide a computer non-volatile readable storage medium, the computer non-volatile readable storage medium stores a computer program, the computer program includes program instructions, and the program instructions When executed by a processor, the processor is caused to execute the method of the first aspect.
本申请实施例中,一方面,利用随机数对密码信息对应的摘要信息进行哈希计算,保证了密码信息对应密文的随机性,有利于提高密码信息的安全性;另一方面可以对密码信息和用户信息进行同时加密,有利于进一步提高传输过程中用户信息的安全性。In the embodiments of this application, on the one hand, a random number is used to hash the digest information corresponding to the password information, which ensures the randomness of the cipher text corresponding to the password information, which is beneficial to improve the security of the password information; Encryption of information and user information at the same time helps to further improve the security of user information during transmission.
附图说明Description of the drawings
图1是本申请实施例提供的一种登录处理系统的结构示意图;FIG. 1 is a schematic structural diagram of a login processing system provided by an embodiment of the present application;
图2是本申请实施例提供的一种登录处理方法的流程示意图;2 is a schematic flowchart of a login processing method provided by an embodiment of the present application;
图3是本申请实施例提供的另一种登录处理方法的流程示意图;FIG. 3 is a schematic flowchart of another login processing method provided by an embodiment of the present application;
图4是本申请实施例提供的又一种登录处理方法的流程示意图;4 is a schematic flowchart of another login processing method provided by an embodiment of the present application;
图5是本申请实施例提供的一种登录处理方法的交互程示意图;FIG. 5 is a schematic diagram of the interaction process of a login processing method provided by an embodiment of the present application;
图6是本申请实施例提供的一种登录处理装置的示意性框图;FIG. 6 is a schematic block diagram of a login processing apparatus provided by an embodiment of the present application;
图7是本申请实施例提供的一种客户端的示意性框图;FIG. 7 is a schematic block diagram of a client provided by an embodiment of the present application;
图8是本申请实施例提供的另一种登录处理装置的示意性框图;FIG. 8 is a schematic block diagram of another login processing apparatus provided by an embodiment of the present application;
图9是本申请实施例提供的一种服务器的示意性框图。Fig. 9 is a schematic block diagram of a server provided by an embodiment of the present application.
具体实施方式Detailed ways
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。The technical solutions in the embodiments of the present application will be described clearly and completely in conjunction with the accompanying drawings in the embodiments of the present application. Obviously, the described embodiments are part of the embodiments of the present application, rather than all of them. Based on the embodiments in this application, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of this application.
本申请实施例所描述的关于登录处理的方法,涉及到能够为用户提供登录接入的客户端、和提供登录服务的服务器。请参见图1,是本申请实施例可应用的一种登录处理系统的结构示意图。如图1所示,该登录处理系统可包括客户端101和服务器102。其中,该服务器可以是指用于提供登录处理等登录相关服务的多个服务器构成的服务器组中的某个服务器。该客户端可以为一种智能终端,该智能终端中预先安装有需要登录处理的应用或者可以开启该应用的网站,该客户端还可以为该应用本身,本申请对此不作具体限定。示例性地,该应用可以为日志平台对应的应用。The login processing method described in the embodiment of the present application involves a client that can provide login access for users and a server that provides login services. Please refer to Fig. 1, which is a schematic structural diagram of a login processing system applicable to the embodiment of the present application. As shown in FIG. 1, the login processing system may include a client 101 and a server 102. Wherein, the server may refer to a server in a server group composed of multiple servers for providing login-related services such as login processing. The client may be a smart terminal in which an application requiring login processing or a website that can open the application is pre-installed in the smart terminal. The client may also be the application itself, which is not specifically limited in this application. Exemplarily, the application may be an application corresponding to the log platform.
在一个实施例中,本登录处理系统中的客户端101可以接收携带有用户信息的登录请求,该用户信息包括用户输入的密码信息和账号信息。进一步地,客户端101可以基于指定信息摘要算法生成针对密码信息的摘要信息,并根据预设规则生成随机数,并通过该随机数对摘要信息进行哈希处理,得到摘要信息对应的哈希值。进一步地,客户端101可以对该哈希值和账号信息进行加密处理,生成包括随机数、加密处理后的哈希值以及加密处理后的账号信息的第一验证请求,并将该第一验证请求发送至服务器102。In one embodiment, the client 101 in the login processing system may receive a login request carrying user information, and the user information includes password information and account information input by the user. Further, the client 101 may generate digest information for the password information based on a specified information digest algorithm, generate a random number according to a preset rule, and hash the digest information through the random number to obtain the hash value corresponding to the digest information . Further, the client 101 may encrypt the hash value and account information, generate a first verification request including the random number, the encrypted hash value, and the encrypted account information, and perform the first verification The request is sent to the server 102.
进一步地,服务器102接收到来自客户端101的上述第一验证请求后,可以基于预先配置的密钥对加密处理后的哈希值和账号信息进行解密处理,得到账号信息对应的明文信息以及解密后的哈希值。进一步地,若服务器102检测到数据库中存在与明文信息匹配的目标账号样本信息,则确定对账号信息的验证通过,并获取与目标账号样本信息关联存储的目标密码样本信息对应的目标摘要样本信息。进一步地,服务器102可以基于上述随机数对目标摘要样本信息进行哈希计算,得到目标摘要样本信息对应的样本哈希值,若检测到哈希值和样本哈希值匹配,则确定对密码信息的验证通过,进而向客户端返回验证通过的第一指示信息,该第一指示信息用于指示用户的密码信息和账号信息均验证通过。Further, after the server 102 receives the above-mentioned first verification request from the client 101, it may decrypt the encrypted hash value and account information based on the pre-configured key to obtain the plaintext information corresponding to the account information and decrypt it. After the hash value. Further, if the server 102 detects that there is target account sample information matching the plaintext information in the database, it determines that the verification of the account information is passed, and obtains the target summary sample information corresponding to the target password sample information stored in association with the target account sample information . Further, the server 102 may perform a hash calculation on the target digest sample information based on the aforementioned random number to obtain the sample hash value corresponding to the target digest sample information, and if it is detected that the hash value matches the sample hash value, it is determined to match the password information After the verification is passed, the first indication information that the verification passed is returned to the client, and the first indication information is used to indicate that the password information and account information of the user are both verified.
进一步地,客户端101接收到该指示信息后,可以基于对该用户进行登录处理。采用这样的方式,一方面,利用随机数对密码信息对应的摘要信息进行哈希计算,保证了密码信息对应密文的随机性,有利于提高密码信息的安全性;另一方面可以对密码信息和用户信息进行同时加密,有利于进一步提高传输过程中用户信息的安全性。Further, after the client 101 receives the instruction information, it may perform login processing based on the user. In this way, on the one hand, a random number is used to hash the digest information corresponding to the password information, which ensures the randomness of the password information corresponding to the cipher text, which is beneficial to improve the security of the password information; Encrypting user information at the same time helps to further improve the security of user information during transmission.
参见图2,图2是本申请实施例提供的一种登录处理方法的流程示意图,该方法应用于客户端,可由客户端执行,如图所示,该登录处理方法可包括:Referring to Figure 2, Figure 2 is a schematic flowchart of a login processing method provided by an embodiment of the present application. The method is applied to the client and can be executed by the client. As shown in the figure, the login processing method may include:
201:接收携带有用户信息的登录请求,该用户信息包括用户输入的密码信息和账号信息。201: Receive a login request carrying user information, where the user information includes password information and account information entered by the user.
202:基于指定信息摘要算法生成针对密码信息的摘要信息。其中,该指定信息摘要算法可以包括信息摘要算法(Message-Digest Algorithm 5,MD5)或者循环冗余校验算法(Cyclic Redundancy Check,CRC)等等,也可以包括其他信息摘要算法,本申请对此不作具体限定。202: Generate digest information for the password information based on the specified information digest algorithm. Among them, the designated information digest algorithm may include a message digest algorithm (Message-Digest Algorithm 5, MD5) or a cyclic redundancy check algorithm (Cyclic Redundancy Check, CRC), etc., and may also include other information digest algorithms. There is no specific limitation.
其中,MD5的典型应用是对一段信息(Message)产生信息摘要(Message-Digest),以防止被篡改。具体地,MD5已经广泛使用于文件传输可靠性的判断。例如,发送终端预先提供一个MD5校验和,接收终端接收到文件以后,用MD5算法计算接收文件的MD5校验和,然后通过检查这两个校验和是否一致,就能判断该接收的文件是否出错。即使在原文中作一个小变化(比如用c取代d),其MD5校验和也会发生巨大的变化。Among them, a typical application of MD5 is to generate a message digest (Message-Digest) for a piece of information (Message) to prevent tampering. Specifically, MD5 has been widely used to determine the reliability of file transmission. For example, the sending terminal provides an MD5 checksum in advance. After the receiving terminal receives the file, it uses the MD5 algorithm to calculate the MD5 checksum of the received file, and then by checking whether the two checksums are consistent, the received file can be judged Whether there is an error. Even if you make a small change in the original text (such as replacing d with c), its MD5 checksum will change dramatically.
其中,循环冗余校验CRC是一种根据网络数据封包或电脑档案等数据产生简短固定位数校验码的一种散列函数,可以用于检测或校验数据传输或者保存后可能出现的错误。生成的数字在传输或者储存之前计算出来并且附加到数据后面,然后接收方进行检验确定数据是否发生变化。也即,如果两个文件的内容是完全相同的,则两个文件的CRC一定是相同的,因此,可以通过比较两个文件的CRC是否相同,来确定两个文件的具体内容是否相同。Among them, the cyclic redundancy check CRC is a hash function that generates a short fixed-digit check code based on data such as network data packets or computer files. It can be used to detect or verify data transmission or storage. error. The generated numbers are calculated and appended to the data before transmission or storage, and then the receiver checks to determine whether the data has changed. That is, if the contents of two files are exactly the same, the CRCs of the two files must be the same. Therefore, it is possible to determine whether the specific contents of the two files are the same by comparing whether the CRCs of the two files are the same.
在一个实施例中,上述指定信息摘要算法可以是用户根据自身需求中预设的信息摘要算法MD5和循环冗余校验算法(CRC)中选取出的,也可以是系统默认设置。在一个实施例中,当指定信息摘要算法已经被预先确定的情况下,用户可以根据自身需求对该指定信息摘要算法进行调整,例如,预先确定的指定信息摘要算法为MD5,后续用户可以根据自身需求将指定信息摘要算法更改为CRC。In one embodiment, the above-mentioned designated information digest algorithm may be selected from the information digest algorithm MD5 and cyclic redundancy check algorithm (CRC) preset by the user according to his own needs, or may be a system default setting. In one embodiment, when the specified information digest algorithm has been predetermined, the user can adjust the specified information digest algorithm according to his own needs. For example, the predetermined specified information digest algorithm is MD5, and the subsequent user can follow his own It is required to change the specified information digest algorithm to CRC.
在一个实施例中,当指定信息摘要算法为循环冗余校验算法CRC时,服务器可以基于循环冗余校验算法CRC针对密码信息生成摘要信息;或者,当指定信息摘要算法为信息摘要算法MD5,服务器可以基于MD5针对密码信息生成摘要信息。可以看出,上述摘要信息包括基于循环冗余校验算法CRC针对密码信息生成的摘要信息或者基于信息摘要算法MD5针对密码信息生成的摘要信息。In one embodiment, when the designated message digest algorithm is the cyclic redundancy check algorithm CRC, the server may generate digest information for the password information based on the cyclic redundancy check algorithm CRC; or, when the designated message digest algorithm is the message digest algorithm MD5 , The server can generate digest information for the password information based on MD5. It can be seen that the above-mentioned summary information includes the summary information generated for the password information based on the cyclic redundancy check algorithm CRC or the summary information generated for the password information based on the information digest algorithm MD5.
203:根据预设规则生成随机数,并通过随机数对摘要信息进行哈希处理,得到摘要信息对应的哈希值。203: Generate a random number according to a preset rule, and hash the digest information through the random number to obtain a hash value corresponding to the digest information.
其中,该预设规则指示了生成随机数对应的数值。在一个实施例中,客户端可以通过随机数对摘要信息进行哈希计算,得到该摘要信息对应的哈希值。利用随机数进行哈希计算,不会出现同一摘要信息哈希处理后的结果是一样的,保证了所得哈希值的随机性。其中,对摘要信息的哈希处理,可以视为对密码信息的加密过程,该哈希处理后的哈希值可以视为密码信息对应的密文,因此采用随机数进行哈希计算,不会出现同一密码加密后结果是一样的,保证了密文的随机性,相应地,也提高了密码信息的安全性。Wherein, the preset rule indicates the value corresponding to the random number generated. In one embodiment, the client may hash the digest information by using random numbers to obtain the hash value corresponding to the digest information. Using random numbers for hashing calculations, the same digest information will not appear after the hashing results are the same, ensuring the randomness of the obtained hash values. Among them, the hash processing of the digest information can be regarded as the encryption process of the password information, and the hash value after the hash processing can be regarded as the cipher text corresponding to the password information. Therefore, the random number is used for the hash calculation. When the same password is encrypted, the result is the same, which ensures the randomness of the ciphertext, and accordingly, improves the security of the password information.
在一个实施例中,假设随机数为N,步骤202得到的摘要信息为一个数组,从a~z,0~9,A~Z,共62个字符,即在数组中索引0代表a,1代表b,以此类推。服务器通过随机数对摘要信息进行哈希处理,得到摘要信息对应的哈希值的具体过程如下:服务器将摘要信息按照8位一组分开,共取4组(也就是说只要32位字符)。进一步地,服务器对每一组进行处理,先将每一组的8位进行16进制转换,转换后与0x3FFFFFFF进行位与运算,得到值A。In one embodiment, assuming that the random number is N, the summary information obtained in step 202 is an array, from a to z, 0 to 9, A to Z, a total of 62 characters, that is, index 0 in the array represents a, 1 Represents b, and so on. The server hashes the digest information through random numbers, and the specific process of obtaining the hash value corresponding to the digest information is as follows: The server divides the digest information into groups of 8 bits, and takes 4 groups in total (that is, only 32 characters). Further, the server processes each group, first converts the 8 bits of each group to hexadecimal, and performs bit-AND operation with 0x3FFFFFFF after the conversion to obtain the value A.
进一步地,服务器可以用A做N(随机数)次处理,每次用A和0x0000003D进行位与运算,得到一个数字(小于62),用这个数字作为索引取数组中字符,得到字符B,同时将A进行按位右移5位,生成新A,新A(A)作为新一轮的处理,以便防止相同的A做N次处理结果一样。那么最后会生成N(随机数)个不同的B,将N个B组合定义为C。Further, the server can use A to do N (random number) processing times, and each time use A and 0x0000003D to perform bitwise AND operation to obtain a number (less than 62), use this number as an index to fetch the characters in the array to obtain character B, and at the same time Shift A to the right by 5 bits to generate a new A, and the new A(A) is used as a new round of processing to prevent the same A from being processed N times with the same result. Then finally N (random number) different Bs will be generated, and N B combinations are defined as C.
进一步地,最后会生成4组C,服务器将4组C组合成D作为最后的哈希值。Furthermore, 4 groups of C will be generated in the end, and the server will combine 4 groups of C into D as the final hash value.
可以看出,采用随机数对摘要信息进行处理的好处为:相同密码生成的摘要值是相同的,所以可以采用暴力破解(碰撞的方式),在一定的时间里可以碰撞出来,碰撞成功只是时间和概率的问题。所以要对摘要再次进行哈希处理,目的是为了即使相同的密码在生成相同摘要信息后用随机数进行哈希后,结果一定是不一样的。可以提高密码的安全性。It can be seen that the advantage of using random numbers to process digest information is: the digest value generated by the same password is the same, so brute force cracking (collision method) can be used, which can be collided in a certain time, and the success of collision is only time And the question of probability. Therefore, the digest must be hashed again. The purpose is that even if the same password is hashed with a random number after generating the same digest information, the result must be different. Can improve the security of the password.
204:对哈希值和账号信息进行加密处理,生成包括上述随机数、加密处理后的哈希值以及加密处理后的账号信息的第一验证请求。204: Perform encryption processing on the hash value and account information, and generate a first verification request including the random number, the encrypted hash value, and the encrypted account information.
在一个实施例中,服务器可以采用预设加密算法对哈希值和账号信息加密处理,并生成包括该加密处理后的哈希值、加密处理后的账号信息以及上述随机数的第一验证请求。其中,预设加密算法可以包括对称加密算法,也可以包括非对称加密算法,本申请对此不作具体限定。In one embodiment, the server may use a preset encryption algorithm to encrypt the hash value and account information, and generate a first verification request including the encrypted hash value, encrypted account information, and the aforementioned random number . The preset encryption algorithm may include a symmetric encryption algorithm or an asymmetric encryption algorithm, which is not specifically limited in this application.
205:将第一验证请求发送至服务器,以便于服务器基于第一验证请求对用户进行验证,并在验证通过后向客户端返回验证通过的第一指示信息。205: Send the first verification request to the server, so that the server verifies the user based on the first verification request, and returns the first indication information that the verification is passed to the client after the verification is passed.
206:当接收到验证通过的第一指示信息时,对用户进行登录处理,该第一指示信息用于指示用户的密码信息和账号信息均验证通过。206: When receiving the first indication information that the verification is passed, perform a login process on the user, where the first indication information is used to indicate that the password information and account information of the user are both verified.
服务器可以将步骤204生成的第一验证请求发送至服务器,服务器接收到来自客户端 的上述第一验证请求后,可以基于预先配置的密钥对加密处理后的哈希值和账号信息进行解密处理,得到账号信息对应的明文信息以及解密后的哈希值。进一步地,若服务器检测到数据库中存在与明文信息匹配的目标账号样本信息,则确定对账号信息的验证通过,并获取与目标账号样本信息关联存储的目标密码样本信息对应的目标摘要样本信息。进一步地,服务器可以基于上述随机数对目标摘要样本信息进行哈希计算,得到目标摘要样本信息对应的样本哈希值,若检测到哈希值和样本哈希值匹配,则确定对密码信息的验证通过,进而向客户端返回验证通过的第一指示信息,该第一指示信息用于指示用户的密码信息和账号信息均验证通过。The server may send the first verification request generated in step 204 to the server. After receiving the first verification request from the client, the server may decrypt the encrypted hash value and account information based on the pre-configured key. Obtain the plaintext information corresponding to the account information and the decrypted hash value. Further, if the server detects that there is target account sample information matching the plaintext information in the database, it determines that the verification of the account information is passed, and obtains the target summary sample information corresponding to the target password sample information stored in association with the target account sample information. Further, the server may perform a hash calculation on the target digest sample information based on the above random number to obtain the sample hash value corresponding to the target digest sample information. If the hash value matches the sample hash value, it determines the password information After the verification is passed, the first instruction information indicating that the verification passed is returned to the client, and the first instruction information is used to indicate that the password information and account information of the user are both verified.
进一步地,客户端接收到该指示信息后,可以基于对用户输入的账号信息和密码信息进行登录处理,实现对账号信息对应账号的登录。Further, after the client receives the instruction information, it can perform login processing based on the account information and password information input by the user, so as to realize the login of the account corresponding to the account information.
在本申请实施例中,客户端一方面,利用随机数对密码信息对应的摘要信息进行哈希计算,保证了密码信息对应密文的随机性,有利于提高密码信息的安全性;另一方面可以对密码信息和用户信息进行同时加密,有利于进一步提高传输过程中用户信息的安全性。In the embodiment of this application, on the one hand, the client uses random numbers to hash the digest information corresponding to the password information, which ensures the randomness of the cipher text corresponding to the password information, which is beneficial to improve the security of the password information; The password information and user information can be encrypted at the same time, which is beneficial to further improve the security of user information during transmission.
参见图3,图3是本申请实施例提供的另一种登录处理方法的流程示意图,该方法应用于客户端,可由客户端执行,如图所示,该登录处理方法可包括:Referring to Figure 3, Figure 3 is a schematic flowchart of another login processing method provided by an embodiment of the present application. The method is applied to the client and can be executed by the client. As shown in the figure, the login processing method may include:
301:接收携带有用户信息的登录请求,该用户信息包括用户输入的密码信息和账号信息。其中,步骤301的具体实施方式可以参见上述实施例中步骤201的相关描述,此处不在赘述。301: Receive a login request carrying user information, where the user information includes password information and account information entered by the user. For the specific implementation of step 301, reference may be made to the related description of step 201 in the foregoing embodiment, which is not repeated here.
302:从预设的信息摘要算法MD5和循环冗余校验算法CRC中将循环冗余校验算法CRC确定指定信息摘要算法,并基于该循环冗余校验算法CRC生成针对密码信息的第一摘要信息。302: The cyclic redundancy check algorithm CRC is determined from the preset information digest algorithm MD5 and the cyclic redundancy check algorithm CRC to determine the specified information digest algorithm, and the first cipher information is generated based on the cyclic redundancy check algorithm CRC. Summary information.
其中,信息摘要算法MD5的可靠性要大于循环冗余校验算法CRC,也即,如果两个文件的CRC不同,则可以证明两个文件的内容肯定不同,然而,如果两个文件的CRC相同,则两个文件的内容却不一定是相同的。但是CRC只占2个字节,而MD5却要占16个字节,因此,用CRC生成摘要信息时,效率会比较高。综上,本申请在执行步骤302时,可以优先选择循环冗余校验算法CRC作为指定信息摘要算法,并基于该循环冗余校验算法CRC生成针对密码信息的第一摘要信息,从而提高数据处理效率。Among them, the reliability of the information digest algorithm MD5 is greater than that of the cyclic redundancy check algorithm CRC, that is, if the CRCs of the two files are different, it can be proved that the contents of the two files are definitely different. However, if the CRCs of the two files are the same , The contents of the two files are not necessarily the same. But CRC only occupies 2 bytes, while MD5 occupies 16 bytes. Therefore, the efficiency will be higher when CRC is used to generate summary information. In summary, when the application performs step 302, the cyclic redundancy check algorithm CRC may be selected as the designated information digest algorithm first, and the first digest information for the cryptographic information is generated based on the cyclic redundancy check algorithm CRC, thereby improving data Processing efficiency.
303:根据预设规则生成随机数,并通过随机数对第一摘要信息进行哈希处理,得到第一摘要信息对应的哈希值。303: Generate a random number according to a preset rule, and hash the first digest information through the random number to obtain a hash value corresponding to the first digest information.
304:对上述哈希值和账号信息进行加密处理,生成包括上述随机数、加密处理后的哈希值以及加密处理后的账号信息的第一验证请求。304: Perform encryption processing on the hash value and account information, and generate a first verification request that includes the random number, the hash value after encryption, and the account information after encryption.
305:将第一验证请求发送至服务器,以便于服务器基于第一验证请求对用户进行验证,并在验证通过后向客户端返回验证通过的第一指示信息。305: Send the first verification request to the server, so that the server verifies the user based on the first verification request, and returns the first indication information that the verification is passed to the client after the verification is passed.
306:接收到验证通过的第一指示信息后,若检测到该第一指示信息指示了第一摘要信息与用户预先存储在数据库中的密码样本信息对应的目标摘要样本信息匹配,则基于信息摘要算法MD5生成针对密码信息的第二摘要信息,并根据随机数对第二摘要信息进行哈希处理,得到第二摘要信息对应的哈希值。306: After receiving the first indication information that has passed the verification, if it is detected that the first indication information indicates that the first summary information matches the target summary sample information corresponding to the password sample information pre-stored in the database by the user, based on the information summary The algorithm MD5 generates the second digest information for the password information, and hashes the second digest information according to the random number to obtain the hash value corresponding to the second digest information.
307:对第二摘要信息对应的哈希值进行加密处理,生成包括加密处理后的第二摘要信息对应哈希值的第二验证请求,并将第二验证请求发送至服务器,以便于服务器基于加密处理后的第二摘要信息对应哈希值验证得到用户输入的密码信息与用户预先存储在数据库中的密码样本信息匹配后,向客户端返回验证通过的第三指示信息。307: Perform encryption processing on the hash value corresponding to the second digest information, generate a second verification request including the hash value corresponding to the encrypted second digest information, and send the second verification request to the server so that the server can base After the encrypted second digest information corresponds to the hash value verification, after the password information input by the user matches the password sample information stored in the database by the user in advance, the third indication information that the verification passed is returned to the client.
308:当接收到该第三指示信息时,对用户进行登录处理。308: When the third instruction information is received, perform login processing on the user.
在一个实施例中,当采用循环冗余校验算法CRC生成密码信息对应的第一摘要信息后,可以首先基于CRC生成密码信息对应的第一摘要信息,并基于第一摘要信息执行后续的步 骤303~305。当服务器接收到该第一验证请求后,可以In one embodiment, after the cyclic redundancy check algorithm CRC is used to generate the first summary information corresponding to the password information, the first summary information corresponding to the password information may be generated first based on the CRC, and the subsequent steps are performed based on the first summary information 303~305. When the server receives the first verification request, it can
基于预先配置的密钥对加密处理后的哈希值和账号信息进行解密处理,,若服务器检测到数据库中存在与明文信息匹配的目标账号样本信息,则确定对账号信息的验证通过,并获取与目标账号样本信息关联存储的目标密码样本信息对应的目标摘要样本信息。进一步地,服务器102可以基于上述随机数对目标摘要样本信息进行哈希计算,得到目标摘要样本信息对应的样本哈希值,若检测到哈希值和样本哈希值不匹配,则确定对密码信息的验证不通过,可以向客户端返回验证失败的第二指示信息,该第二指示信息用于指示用户输入的密码信息与所述用户预先存储在数据库中的密码样本信息不匹配。The encrypted hash value and account information are decrypted based on the pre-configured key. If the server detects that there is target account sample information in the database that matches the plaintext information, it will determine that the account information is verified and obtain Target summary sample information corresponding to the target password sample information stored in association with the target account sample information. Further, the server 102 may perform a hash calculation on the target digest sample information based on the above random number to obtain the sample hash value corresponding to the target digest sample information. If it is detected that the hash value and the sample hash value do not match, it determines that the password is not matched. If the verification of the information fails, the second indication information indicating that the verification failed may be returned to the client. The second indication information is used to indicate that the password information input by the user does not match the password sample information pre-stored by the user in the database.
进一步地,客户端接收到服务器对用户验证失败后返回的第二指示信息后,Further, after the client receives the second indication information returned by the server after the user authentication fails,
若检测到第二指示信息指示了用户输入的密码信息与用户预先存储在数据库中的密码样本信息不匹配,则输出提示信息,该提示信息用于提示用户密码输入错误。If it is detected that the second indication information indicates that the password information input by the user does not match the password sample information pre-stored by the user in the database, prompt information is output, and the prompt information is used to prompt the user that the password is entered incorrectly.
可以理解的是,信息摘要算法MD5的可靠性要大于循环冗余校验算法CRC,也即,如果两个文件的CRC不同,则可以证明两个文件的内容肯定不同,但是CRC只占2个字节,而MD5却要占16个字节。相应地,步骤302优先从预设的信息摘要算法MD5和循环冗余校验算法CRC中将循环冗余校验算法CRC确定指定信息摘要算法,并基于该循环冗余校验算法CRC生成针对密码信息的第一摘要信息,并基于该第一摘要信息执行后续的步骤303~305。服务器对密码信息进行验证时,也是基于该第一摘要信息对应的哈希值进行验证,因此,若该第一摘要信息对应的哈希值与数据库中预先存储的目标摘要样本信息对应的样本哈希值不匹配,则可以直接确定用户输入的密码信息与用户预先存储在数据库中的密码样本信息不匹配。采用这样的方式,由于CRC占的字节更少,在保证密码信息安全性的同时,可以提高数据的处理效率。It is understandable that the reliability of the information digest algorithm MD5 is greater than that of the cyclic redundancy check algorithm CRC, that is, if the CRC of the two files are different, it can be proved that the content of the two files must be different, but the CRC only accounts for two Bytes, while MD5 takes 16 bytes. Correspondingly, in step 302, the cyclic redundancy check algorithm CRC is firstly determined from the preset message digest algorithm MD5 and the cyclic redundancy check algorithm CRC to determine the specified message digest algorithm, and based on the cyclic redundancy check algorithm CRC, the password The first summary information of the information, and the subsequent steps 303 to 305 are executed based on the first summary information. When the server verifies the password information, it is also based on the hash value corresponding to the first digest information. Therefore, if the hash value corresponding to the first digest information matches the sample corresponding to the pre-stored target digest sample information in the database, If the desired value does not match, it can be directly determined that the password information entered by the user does not match the password sample information pre-stored by the user in the database. In this way, since the CRC occupies fewer bytes, the data processing efficiency can be improved while ensuring the security of the password information.
在一个实施例中,在服务器确定对用户的账号信息通过的情况下,若服务器基于第一摘要信息对应的哈希值进行验证后,确定出第一摘要信息对应的哈希值与数据库中预先存储的目标摘要样本信息对应的样本哈希值匹配,可以向客户端发送验证通过的第一指示信息,该第一指示信息用于指示第一摘要信息与用户预先存储在数据库中的密码样本信息对应的目标摘要样本信息匹配。In one embodiment, when the server determines that the user’s account information is passed, if the server verifies based on the hash value corresponding to the first digest information, it determines that the hash value corresponding to the first digest information is the same as the one in the database. The sample hash value corresponding to the stored target digest sample information matches, and the first indication information that has passed the verification can be sent to the client. The first indication information is used to indicate that the first digest information and the user's pre-stored password sample information in the database The corresponding target summary sample information matches.
进一步地,客户端接收到该第一指示信息后,可以基于信息摘要算法MD5生成针对密码信息的第二摘要信息,并根据随机数对第二摘要信息进行哈希处理,得到第二摘要信息对应的哈希值,执行步骤307,将包括加密处理后的第二摘要信息对应哈希值的第二验证请求发送至服务器。服务器可以基于该第二验证请求,将第二摘要信息对应的哈希值与之前确定出的上述目标摘要样本信息对应的样本哈希值进行对比,若对比得到第二摘要信息对应的哈希值与上述目标摘要样本信息对应的样本哈希值匹配,则可以向客户端返回验证通过的第三指示信息,该第三指示信息用于指示第二摘要信息与用户预先存储在数据库中的密码样本信息对应的目标摘要样本信息匹配。Further, after receiving the first indication information, the client may generate second digest information for the password information based on the message digest algorithm MD5, and hash the second digest information according to the random number to obtain the second digest information corresponding Step 307 is executed to send a second verification request including the hash value corresponding to the encrypted second digest information to the server. Based on the second verification request, the server may compare the hash value corresponding to the second summary information with the previously determined sample hash value corresponding to the target summary sample information, and if the comparison obtains the hash value corresponding to the second summary information If the sample hash value corresponding to the above-mentioned target summary sample information matches, the verified third indication information can be returned to the client. The third indication information is used to indicate the second summary information and the user's pre-stored password sample in the database The target summary sample information corresponding to the information matches.
进一步地,客户端可以在接收到该第三指示信息时,对用户进行登录处理。采用这样的方式,相当于首先通过CRC将肯定不同的密码信息过滤掉,然后仅针对CRC对应哈希值相同的密码信息,采用MD5进行进一步地验证,相当于综合利用了两种信息摘要算法的优点,既可以提高对密码信息的验证效率,又可以保证验证的可靠性。Further, the client may perform login processing on the user when receiving the third instruction information. In this way, it is equivalent to first filtering out different password information through CRC, and then using MD5 for further verification only for password information with the same hash value corresponding to CRC, which is equivalent to a comprehensive use of two information digest algorithms. The advantage is that it can not only improve the verification efficiency of password information, but also ensure the reliability of verification.
本申请实施例中,客户端可以综合利用了CRC和MD5这两种信息摘要算法的优点,既可以提高对密码信息的验证效率,又可以保证验证的可靠性。In the embodiments of the present application, the client can comprehensively utilize the advantages of the two information digest algorithms, CRC and MD5, which can not only improve the verification efficiency of password information, but also ensure the reliability of verification.
参见图4,图4是本申请实施例提供的另一种登录处理方法的流程示意图,该方法可由服务器执行,如图所示,该登录处理方法可包括:Referring to Figure 4, Figure 4 is a schematic flowchart of another login processing method provided by an embodiment of the present application. The method may be executed by a server. As shown in the figure, the login processing method may include:
401:接收来自客户端的第一验证请求,该第一验证请求中携带有随机数、加密处理后的摘要信息对应的哈希值以及加密处理后的账号信息,该摘要信息是客户端基于指定信息 摘要算法对用户输入的密码信息进行数据处理得到的。401: Receive a first verification request from the client. The first verification request carries a random number, a hash value corresponding to the encrypted digest information, and encrypted account information. The digest information is based on the client's specified information The digest algorithm is obtained by data processing the password information entered by the user.
402:基于预先配置的密钥对加密处理后的哈希值和账号信息进行解密处理,得到账号信息对应的明文信息以及解密后的哈希值。402: Decrypt the encrypted hash value and account information based on the pre-configured key to obtain the plaintext information corresponding to the account information and the decrypted hash value.
在一个实施例中,服务器解密所需的密钥都是统一设置的,并在设置完成后存储至指定区域。客户端发来的任一个加密处理后的哈希值和账号信息均可以使用该统一设定的密钥进行解密。在一个实施例中,当服务器接收到第一验证请求后,可以从该指定区域获取预先设置的密钥,并使用该密钥对加密处理后的摘要信息对应的哈希值以及加密处理后的账号信息进行解密。In one embodiment, the keys required for server decryption are all set uniformly and stored in the designated area after the setting is completed. Any encrypted hash value and account information sent by the client can be decrypted using the unified key. In one embodiment, after the server receives the first verification request, it can obtain a preset key from the designated area, and use the key to encrypt the hash value corresponding to the encrypted digest information and the encrypted The account information is decrypted.
403:若检测到数据库中存在与明文信息匹配的目标账号样本信息,则确定对账号信息的验证通过,并获取与目标账号样本信息关联存储的目标密码样本信息对应的目标摘要样本信息,该目标摘要样本信息是基于指定信息摘要算法对密码样本信息进行数据处理得到的。403: If it is detected that there is target account sample information matching the plaintext information in the database, it is determined that the verification of the account information is passed, and the target summary sample information corresponding to the target password sample information stored in association with the target account sample information is obtained. The digest sample information is obtained by data processing of the password sample information based on the specified information digest algorithm.
在一个实施例中,在服务器端,每个用户账号可以对应一个存储区域,该存储区域关联存储有每一个用户账号的账号样本信息和密码样本信息对应的摘要样本信息,且每一个存储区域均添加有唯一的账号标识。In one embodiment, on the server side, each user account may correspond to a storage area, and the storage area is associated with the account sample information of each user account and the summary sample information corresponding to the password sample information, and each storage area is A unique account ID is added.
在一个实施例中,服务器可以基于账号信息中的账号标识,从预先设置的至少一个存储区域中查找到该账号标识唯一对应的存储区域,并在该存储区域中获取到该用户预先存储的目标账号样本信息,进而判断该预先存储的目标账号样本信息和该账号信息对应的明文信息是否匹配,若匹配,则继续从该存储区域中获取预先存储的该用户的目标密码样本信息对应的目标摘要样本信息。这样的方式,一个存储区域对应一个用户,可以提高用户的账号信息和密码信息的查询效率。In an embodiment, the server may find the storage area uniquely corresponding to the account identification from at least one preset storage area based on the account identification in the account information, and obtain the pre-stored target of the user in the storage area Account sample information, and then determine whether the pre-stored target account sample information and the plaintext information corresponding to the account information match, if they match, continue to obtain the pre-stored target summary corresponding to the user’s target password sample information from the storage area Sample information. In this way, one storage area corresponds to one user, which can improve the efficiency of querying user account information and password information.
其中,上述目标摘要样本信息是基于指定信息摘要算法对密码样本信息进行数据处理得到的。在一个实施例中,上述指定信息摘要算法可以包括信息摘要算法MD5或者循环冗余校验算法CRC,该数据库中预先存储有基于循环冗余校验算法CRC针对目标密码样本信息生成的第一摘要样本子信息和基于信息摘要算法MD5针对目标密码信息生成的第二摘要样本子信息。Among them, the above-mentioned target summary sample information is obtained by performing data processing on the password sample information based on a specified information digest algorithm. In one embodiment, the above-mentioned designated information digest algorithm may include the information digest algorithm MD5 or the cyclic redundancy check algorithm CRC, and the first digest generated based on the cyclic redundancy check algorithm CRC for the target password sample information is pre-stored in the database. The sample sub-information and the second digest sample sub-information generated based on the information digest algorithm MD5 for the target password information.
在一个实施例中,若服务器检测到数据库中存在与明文信息匹配的目标账号样本信息,则确定对账号信息的验证通过,并从预先与目标账号样本信息关联存储的目标密码样本信息对应的第一摘要样本子信息和第二摘要样本子信息中选取出与指定信息摘要算法匹配的目标摘要样本信息。In one embodiment, if the server detects that there is target account sample information that matches the plaintext information in the database, it determines that the verification of the account information is passed, and obtains the target password sample information stored in association with the target account sample information from the first The one summary sample sub-information and the second summary sample sub-information select the target summary sample information matching the specified information summary algorithm.
示例性地,若指定信息摘要算法为信息摘要算法MD5,那么服务器则将第二摘要样本子信息确定为目标密码样本信息对应的目标摘要样本信息;若指定信息摘要算法为循环冗余校验算法CRC,那么服务器则将第一摘要样本子信息确定为目标密码样本信息对应的目标摘要样本信息。Exemplarily, if the specified information digest algorithm is the information digest algorithm MD5, then the server determines the second digest sample sub-information as the target digest sample information corresponding to the target password sample information; if the specified information digest algorithm is the cyclic redundancy check algorithm CRC, then the server determines the first digest sample sub-information as the target digest sample information corresponding to the target password sample information.
404:基于该随机数对目标摘要样本信息进行哈希计算,得到目标摘要样本信息对应的样本哈希值,若检测到哈希值和样本哈希值匹配,则确定对密码信息的验证通过。其中,如何使用随机数对目标摘要样本信息进行哈希计算,可以参照上述实施例步骤203的相关描述,此处不再赘述。404: Perform a hash calculation on the target digest sample information based on the random number to obtain a sample hash value corresponding to the target digest sample information. If a match between the hash value and the sample hash value is detected, it is determined that the verification of the password information is passed. Wherein, how to use random numbers to hash the target summary sample information can refer to the related description of step 203 in the foregoing embodiment, which will not be repeated here.
在一个实施例中,服务器得到目标摘要样本信息对应的样本哈希值之后,可以将该样本哈希值与哈希值进行相似度对比,若对比得到两者的相似度大于或者等于预设相似度阈值,则确定对密码信息的验证通过。采用随机数对目标摘要样本信息进行哈希计算,使获得的样本哈希值具有随机性,不易被篡改,可以提高对密码信息进行验证的准确性。In one embodiment, after the server obtains the sample hash value corresponding to the target summary sample information, the sample hash value can be compared with the hash value for similarity, if the comparison shows that the similarity between the two is greater than or equal to the preset similarity The degree threshold is determined to pass the verification of the password information. The random number is used to hash the target digest sample information, so that the obtained sample hash value has randomness, is not easy to be tampered with, and can improve the accuracy of password information verification.
405:向客户端返回验证通过的第一指示信息,以便于客户端基于指示信息对该用户进行登录处理,该第一指示信息用于指示用户的密码信息和账号信息均验证通过。405: Return the first indication information that the authentication is passed to the client, so that the client can log in to the user based on the indication information, where the first indication information is used to indicate that the password information and account information of the user have passed the authentication.
在一个实施例中,当服务器确定对用户的密码信息和账号信息验证通过后,可以向客户端返回验证通过的第一指示信息,当客户端接收到该第一指示信息时,可以根据用户输入的账号信息和密码信息进行登录处理。In one embodiment, after the server determines that the user’s password information and account information have been verified, it may return to the client the first indication that the authentication is passed, and when the client receives the first indication, it may follow the user’s input Account information and password information for login processing.
在一个实施例中,服务器得到目标摘要样本信息对应的样本哈希值之后,若检测到哈希值和样本哈希值不匹配,可以确定对密码信息的验证不通过,并向客户端发送第二指示信息,该第二指示信息用于指示该用户输入的密码信息与用户预先存储在数据库中的密码样本信息不匹配。In one embodiment, after the server obtains the sample hash value corresponding to the target digest sample information, if it detects that the hash value does not match the sample hash value, it can determine that the password information is not verified, and send the first sample to the client. Two indication information, the second indication information is used to indicate that the password information input by the user does not match the password sample information pre-stored by the user in the database.
在一个实施例中,第一验证请求中携带的加密处理后的哈希值对应的摘要信息(以下称为第一摘要信息)是基于循环冗余校验算法CRC得到的。这种情况下,服务器接收到该第一验证请求,并基于该第一验证请求确定对用户的账号信息通过后,若检测到哈希值和样本哈希值匹配,则确定对密码信息的验证通过,并向服务器发送第一指示信息,该第一指示信息还指示了第一摘要信息与用户预先存储在数据库中的密码样本信息对应的目标摘要样本信息匹配。In one embodiment, the digest information (hereinafter referred to as the first digest information) corresponding to the encrypted hash value carried in the first verification request is obtained based on the cyclic redundancy check algorithm CRC. In this case, after the server receives the first verification request and determines that the user’s account information is passed based on the first verification request, if it detects that the hash value matches the sample hash value, it determines the verification of the password information Pass, and send first instruction information to the server. The first instruction information also indicates that the first summary information matches the target summary sample information corresponding to the password sample information pre-stored by the user in the database.
进一步地,由于循环冗余校验算法CRC生成的第一摘要信息的可靠性较低,对于用户输入的密码信息的验证,还可以进一步结合信息摘要算法进行再次验证。这种情况下,客户端接收到用于指示第一摘要信息与用户预先存储在数据库中的密码样本信息对应的目标摘要样本信息匹配的第一指示信息后,可以基于信息摘要算法MD5生成针对密码信息的第二摘要信息,并根据随机数对第二摘要信息进行哈希处理,得到第二摘要信息对应的哈希值。进一步地,客户端可以对第二摘要信息对应的哈希值进行加密处理,生成包括加密处理后的第二摘要信息对应哈希值的第二验证请求,并将第二验证请求发送至服务器。进一步地,服务器收到该第二验证请求后,可以对该加密处理后的第二摘要信息对应哈希值进行解密,得到该第二摘要信息对应哈希值,并获取预先基于信息摘要算法MD5对目标密码样本信息进行数据处理得到的目标摘要样本信息,即获取上述第二摘要样本子信息。Further, since the reliability of the first digest information generated by the cyclic redundancy check algorithm CRC is low, the verification of the password information input by the user can be further verified in combination with the information digest algorithm. In this case, after the client receives the first indication information for indicating that the first digest information matches the target digest sample information corresponding to the password sample information stored in the database in advance by the user, the client can generate the corresponding password based on the information digest algorithm MD5 The second digest information of the information, and hash the second digest information according to the random number to obtain the hash value corresponding to the second digest information. Further, the client may perform encryption processing on the hash value corresponding to the second digest information, generate a second verification request including the hash value corresponding to the encrypted second digest information, and send the second verification request to the server. Further, after receiving the second verification request, the server can decrypt the hash value corresponding to the encrypted second digest information to obtain the hash value corresponding to the second digest information, and obtain the MD5 based on the information digest algorithm in advance. The target summary sample information obtained by performing data processing on the target password sample information is to obtain the aforementioned second summary sample sub-information.
进一步地,服务器基于上述随机数对上述第二摘要样本子信息进行哈希计算,得到第二摘要样本子信息对应的样本哈希值,若检测到上述哈希值和第二摘要样本子信息对应的样本哈希值匹配,则确定对密码信息的验证通过,并向客户端发送第三指示信息,当客户端接收到该第三指示信息后,对该用户进行登录处理。Further, the server performs a hash calculation on the second digest sample sub-information based on the random number to obtain the sample hash value corresponding to the second digest sample sub-information, if it is detected that the hash value corresponds to the second digest sample sub-information If the hash value of the sample matches, it is determined that the verification of the password information is passed, and the third instruction information is sent to the client. When the client receives the third instruction information, the user is logged in.
本申请实施例中,服务器采用随机数对目标摘要样本信息进行哈希计算,使获得的样本哈希值具有随机性,不易被篡改,可以提高对密码信息进行验证的准确性。In this embodiment of the application, the server uses random numbers to hash the target summary sample information, so that the obtained sample hash value is random, not easy to be tampered with, and can improve the accuracy of password information verification.
在一个实施例中,请参见图5,是本申请实施例提出的一种登录处理方法的交互示意图,所述方法包括如下步骤:In an embodiment, please refer to FIG. 5, which is an interactive schematic diagram of a login processing method proposed in an embodiment of the present application. The method includes the following steps:
501:客户端接收携带有用户信息的登录请求,该用户信息包括用户输入的密码信息和账号信息。501: The client receives a login request carrying user information, where the user information includes password information and account information entered by the user.
502:客户端基于指定信息摘要算法生成针对密码信息的摘要信息,并根据预设规则生成随机数,通过随机数对摘要信息进行哈希处理,得到摘要信息对应的哈希值。502: The client generates digest information for the password information based on the specified information digest algorithm, generates a random number according to a preset rule, and hashes the digest information through the random number to obtain a hash value corresponding to the digest information.
503:客户端对哈希值和账号信息进行加密处理,生成包括随机数、加密处理后的哈希值以及加密处理后的账号信息的第一验证请求,并将第一验证请求发送至服务器。其中,步骤501~步骤502的具体实施方式可以参见上述实施例中步骤201~步骤205的相关描述,此处不再赘述。503: The client encrypts the hash value and account information, generates a first verification request including the random number, the encrypted hash value, and the encrypted account information, and sends the first verification request to the server. For the specific implementation manners of step 501 to step 502, reference may be made to the related description of step 201 to step 205 in the foregoing embodiment, which will not be repeated here.
504:服务器基于预先配置的密钥对加密处理后的哈希值和账号信息进行解密处理,得到账号信息对应的明文信息以及解密后的哈希值,若检测到数据库中存在与明文信息匹配的目标账号样本信息,则确定对账号信息的验证通过。504: The server decrypts the encrypted hash value and account information based on the pre-configured key, and obtains the plaintext information corresponding to the account information and the decrypted hash value. If it detects that there is a matching plaintext information in the database The target account sample information confirms that the verification of the account information is passed.
505:服务器获取与目标账号样本信息关联存储的目标密码样本信息对应的目标摘要样本信息,并基于上述随机数对该目标摘要样本信息进行哈希计算,得到目标摘要样本信息 对应的样本哈希值,若检测到哈希值和样本哈希值匹配,则确定对密码信息的验证通过。505: The server obtains the target digest sample information corresponding to the target password sample information stored in association with the target account sample information, and performs a hash calculation on the target digest sample information based on the above random number to obtain the sample hash value corresponding to the target digest sample information , If it is detected that the hash value matches the sample hash value, it is determined that the verification of the password information is passed.
506:服务器向客户端返回验证通过的第一指示信息。其中,步骤504~步骤505的具体实施方式可以参见上述实施例中步骤401~步骤405的相关描述,此处不再赘述。506: The server returns the first indication information that the verification is passed to the client. For the specific implementation manners of step 504 to step 505, reference may be made to the related description of step 401 to step 405 in the foregoing embodiment, which will not be repeated here.
507:客户端对用户进行登录处理。在一个实施例中,当客户端接收到来自服务器的第一指示信息后,可以基于用户的账号信息和密码信息进行登录处理。507: The client performs login processing on the user. In an embodiment, after the client receives the first instruction information from the server, it may perform login processing based on the user's account information and password information.
本申请实施例还提供了一种登录处理装置。该装置包括用于执行前述图2、或者图3所述的方法的模块,配置于客户端。具体地,参见图6,是本申请实施例提供的登录处理装置的示意框图。本实施例的登录处理装置包括:The embodiment of the present application also provides a login processing device. The device includes a module for executing the method described in FIG. 2 or FIG. 3, and is configured on the client. Specifically, refer to FIG. 6, which is a schematic block diagram of a login processing apparatus provided by an embodiment of the present application. The login processing device of this embodiment includes:
输入模块10,用于接收携带有用户信息的登录请求,该用户信息包括用户输入的密码信息和账号信息;The input module 10 is configured to receive a login request carrying user information, the user information including password information and account information entered by the user;
处理模块11,用于基于指定信息摘要算法生成针对所述密码信息的摘要信息,根据预设规则生成随机数,并通过所述随机数对所述摘要信息进行哈希处理,得到所述摘要信息对应的哈希值,对所述哈希值和所述账号信息进行加密处理,生成包括所述随机数、加密处理后的哈希值以及加密处理后的账号信息的第一验证请求;The processing module 11 is configured to generate digest information for the password information based on a specified information digest algorithm, generate a random number according to a preset rule, and hash the digest information by the random number to obtain the digest information Corresponding to the hash value, encrypting the hash value and the account information, and generating a first verification request including the random number, the encrypted hash value, and the encrypted account information;
输出模块12,用于将所述第一验证请求发送至服务器,以便于服务器基于所述第一验证请求对所述用户进行验证,并在验证通过后向所述客户端返回验证通过的第一指示信息;The output module 12 is configured to send the first verification request to the server, so that the server verifies the user based on the first verification request, and returns the verified first to the client after the verification is passed. Instruction information
处理模块11,还用于当输入模块10接收到所述验证通过的第一指示信息时,对所述用户进行登录处理,所述第一指示信息用于指示所述用户的密码信息和所述账号信息均验证通过。The processing module 11 is further configured to perform login processing on the user when the input module 10 receives the first indication information that the authentication is passed, and the first indication information is used to indicate the password information of the user and the Account information is verified.
在一个实施例中,所述指定信息摘要算法包括信息摘要算法MD5或者循环冗余校验算法CRC,所述摘要信息包括基于所述循环冗余校验算法CRC针对所述密码信息生成的摘要信息或者基于所述信息摘要算法MD5针对所述密码信息生成的摘要信息。In an embodiment, the specified information digest algorithm includes an information digest algorithm MD5 or a cyclic redundancy check algorithm CRC, and the digest information includes digest information generated for the cryptographic information based on the cyclic redundancy check algorithm CRC Or based on the digest information generated by the information digest algorithm MD5 for the password information.
在一个实施例中,处理模块11,具体用于从预设的信息摘要算法MD5和循环冗余校验算法CRC中将所述循环冗余校验算法CRC确定为指定信息摘要算法;基于所述循环冗余校验算法CRC生成针对所述密码信息的第一摘要信息。In one embodiment, the processing module 11 is specifically configured to determine the cyclic redundancy check algorithm CRC as the designated information digest algorithm from the preset information digest algorithm MD5 and the cyclic redundancy check algorithm CRC; The cyclic redundancy check algorithm CRC generates first summary information for the cryptographic information.
在一个实施例中,所述摘要信息为所述第一摘要信息,处理模块11,还用于接收所述服务器对所述用户验证失败后返回的第二指示信息;若检测到所述第二指示信息指示了所述用户输入的所述密码信息与所述用户预先存储在数据库中的密码样本信息不匹配,则通过输出模块12输出提示信息,所述提示信息用于提示所述用户密码输入错误。In one embodiment, the summary information is the first summary information, and the processing module 11 is further configured to receive second indication information returned by the server after failing to verify the user; if the second information is detected If the instruction information indicates that the password information input by the user does not match the password sample information pre-stored in the database by the user, prompt information is output through the output module 12, and the prompt information is used to prompt the user to input the password error.
在一个实施例中,所述摘要信息为所述第一摘要信息,处理模块11,还用于当输入模块10接收到所述验证通过的所述第一指示信息后,若检测到所述第一指示信息指示了所述第一摘要信息与所述用户预先存储在数据库中的密码样本信息对应的目标摘要样本信息匹配,基于所述信息摘要算法MD5生成针对所述密码信息的第二摘要信息,并根据所述随机数对所述第二摘要信息进行哈希处理,得到所述第二摘要信息对应的哈希值;对所述第二摘要信息对应的哈希值进行加密处理,生成包括加密处理后的所述第二摘要信息对应哈希值的第二验证请求,并通过输出模块12将所述第二验证请求发送至所述服务器,以便于服务器基于所述加密处理后的所述第二摘要信息对应哈希值验证得到所述用户输入的密码信息与所述用户预先存储在数据库中的密码样本信息匹配后,向所述客户端返回验证通过的第三指示信息;In one embodiment, the summary information is the first summary information, and the processing module 11 is further configured to: after the input module 10 receives the first indication information that the verification is passed, if the first indication information is detected An indication information indicates that the first summary information matches the target summary sample information corresponding to the password sample information pre-stored in the database by the user, and the second summary information for the password information is generated based on the information digest algorithm MD5 , And hash the second digest information according to the random number to obtain the hash value corresponding to the second digest information; perform encryption processing on the hash value corresponding to the second digest information to generate The encrypted second digest information corresponds to the second verification request of the hash value, and the second verification request is sent to the server through the output module 12, so that the server can base on the encrypted second verification request. The second digest information corresponds to the hash value verification, and after the password information entered by the user matches the password sample information pre-stored in the database by the user, return the third indication information that the verification passed to the client;
当通过输入模块10接收到所述第三指示信息时,对所述用户进行登录处理的步骤。When the third instruction information is received through the input module 10, a step of login processing is performed on the user.
需要说明的是,本申请实施例所描述的登录处理装置的各功能模块的功能可根据图2或者图3所述的方法实施例中的方法具体实现,其具体实现过程可以参照图2或者图3的方法实施例的相关描述,此处不再赘述。It should be noted that the functions of the functional modules of the login processing apparatus described in the embodiment of the present application can be specifically implemented according to the method in the method embodiment described in FIG. 2 or FIG. 3, and the specific implementation process may refer to FIG. 2 or FIG. The relevant description of the method embodiment of 3 will not be repeated here.
参见图7,是本申请实施例提供的一种客户端的示意性框图。如图所示的本实施例中的客户端可以包括:一个或多个处理器20;一个或多个输入设备21,一个或多个输出设备22和存储器23。上述处理器20、输入设备21、输出设备22和存储器23通过总线连接。存储器23用于存储计算机程序,所述计算机程序包括程序指令,处理器20用于执行存储器23存储的程序指令。其中,处理器20被配置用于调用所述程序指令执行:接收携带有用户信息的登录请求,所述用户信息包括用户输入的密码信息和账号信息;基于指定信息摘要算法生成针对所述密码信息的摘要信息;根据预设规则生成随机数,并通过所述随机数对所述摘要信息进行哈希处理,得到所述摘要信息对应的哈希值;对所述哈希值和所述账号信息进行加密处理,生成包括所述随机数、加密处理后的哈希值以及加密处理后的账号信息的第一验证请求;将所述第一验证请求发送至服务器,以便于服务器基于所述第一验证请求对所述用户进行验证,并在验证通过后向所述客户端返回验证通过的第一指示信息;当接收到所述验证通过的第一指示信息时,对所述用户进行登录处理,所述第一指示信息用于指示所述用户的密码信息和所述账号信息均验证通过。Refer to FIG. 7, which is a schematic block diagram of a client provided in an embodiment of the present application. As shown in the figure, the client in this embodiment may include: one or more processors 20; one or more input devices 21, one or more output devices 22, and a memory 23. The aforementioned processor 20, input device 21, output device 22, and memory 23 are connected by a bus. The memory 23 is configured to store a computer program including program instructions, and the processor 20 is configured to execute the program instructions stored in the memory 23. The processor 20 is configured to call the program instructions to execute: receive a login request carrying user information, the user information includes password information and account information entered by the user; and generate information based on a specified information digest algorithm for the password information The summary information; generate random numbers according to preset rules, and hash the summary information through the random numbers to obtain the hash value corresponding to the summary information; compare the hash value and the account information Perform encryption processing to generate a first verification request including the random number, the encrypted hash value, and the encrypted account information; send the first verification request to the server so that the server can base on the first verification request The verification request verifies the user, and after the verification is passed, returns to the client the first indication information that the verification is passed; when the first indication information that the verification passes is received, the user is logged in, The first indication information is used to indicate that the password information of the user and the account information are both verified.
应当理解,在本申请实施例中,所称处理器20可以是中央处理单元(Central Processing Unit,CPU),该处理器还可以是其他通用处理器、数字信号处理器(Digital Signal Processor,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现成可编程门阵列(Field-Programmable Gate Array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。It should be understood that, in the embodiment of the present application, the so-called processor 20 may be a central processing unit (Central Processing Unit, CPU), and the processor may also be other general-purpose processors or digital signal processors (Digital Signal Processors, DSP). , Application Specific Integrated Circuit (ASIC), Field-Programmable Gate Array (FPGA) or other programmable logic devices, discrete gates or transistor logic devices, discrete hardware components, etc. The general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like.
输入设备21可以包括触控板、麦克风等,输出设备22可以包括显示器(LCD等)、扬声器等。The input device 21 may include a touch panel, a microphone, etc., and the output device 22 may include a display (LCD, etc.), a speaker, and the like.
该存储器23可以包括只读存储器和随机存取存储器,并向处理器20提供指令和数据。存储器23的一部分还可以包括非易失性随机存取存储器。例如,存储器23还可以存储设备类型的信息。The memory 23 may include a read-only memory and a random access memory, and provides instructions and data to the processor 20. A part of the memory 23 may also include a non-volatile random access memory. For example, the memory 23 may also store device type information.
具体实现中,本申请实施例中所描述的处理器20、输入设备21、输出设备22可执行本申请实施例提供的图2或者图3所述方法实施例所描述的实现方式,也可执行本申请实施例图6所描述的装置的实现方式,在此不再赘述。In specific implementation, the processor 20, input device 21, and output device 22 described in the embodiment of this application can execute the implementation described in the method embodiment in FIG. 2 or FIG. 3 provided in the embodiment of this application, and may also execute The implementation of the device described in FIG. 6 in the embodiment of the present application will not be repeated here.
本申请实施例还提供了一种登录处理装置。该装置包括用于执行前述图4所述的方法的模块,配置于服务器。具体地,参见图8,是本申请实施例提供的登录处理装置的示意框图。本实施例的登录处理装置包括:The embodiment of the present application also provides a login processing device. The device includes a module for executing the method described in FIG. 4, and is configured on a server. Specifically, refer to FIG. 8, which is a schematic block diagram of a login processing apparatus provided by an embodiment of the present application. The login processing device of this embodiment includes:
通信模块30,用于接收来自客户端的第一验证请求,所述第一验证请求中携带有随机数、加密处理后的摘要信息对应的哈希值以及加密处理后的账号信息,所述摘要信息是所述客户端基于指定信息摘要算法对用户输入的密码信息进行数据处理得到的;The communication module 30 is configured to receive a first verification request from the client, the first verification request carrying a random number, a hash value corresponding to the encrypted digest information, and encrypted account information, the digest information Is obtained by the client terminal performing data processing on the password information input by the user based on a specified information digest algorithm;
处理模块31,用于基于预先配置的密钥对所述加密处理后的哈希值和所述账号信息进行解密处理,得到所述账号信息对应的明文信息以及解密后的哈希值,若检测到数据库中存在与所述明文信息匹配的目标账号样本信息,则确定对所述账号信息的验证通过;The processing module 31 is configured to decrypt the encrypted hash value and the account information based on the pre-configured key to obtain the plain text information corresponding to the account information and the decrypted hash value. If there is target account sample information matching the plaintext information in the database, it is determined that the verification of the account information is passed;
所述处理模块31,还用于获取与所述目标账号样本信息关联存储的目标密码样本信息对应的目标摘要样本信息,并基于所述随机数对所述目标摘要样本信息进行哈希计算,得到所述目标摘要样本信息对应的样本哈希值,若检测到所述哈希值和所述样本哈希值匹配,则确定对所述密码信息的验证通过;The processing module 31 is further configured to obtain target digest sample information corresponding to the target password sample information stored in association with the target account sample information, and perform a hash calculation on the target digest sample information based on the random number to obtain If the hash value of the sample corresponding to the target digest sample information is detected to match the hash value of the sample, it is determined that the verification of the password information is passed;
所述通信模块30,还用于向所述客户端返回验证通过的第一指示信息,以便于所述客户端基于所述指示信息,对所述用户进行登录处理,所述指示信息用于指示所述用户的密码信息和所述账号信息均验证通过。The communication module 30 is further configured to return to the client the first indication information that has passed the verification, so that the client can log in the user based on the indication information, and the indication information is used to indicate Both the password information of the user and the account information are verified.
在一个实施例中,所述指定信息摘要算法包括信息摘要算法MD5或者循环冗余校验算法CRC,所述数据库中预先存储有基于所述循环冗余校验算法CRC针对所述目标密码样本信息生成的第一摘要样本子信息和基于所述信息摘要算法MD5针对所述目标密码信息生成的第二摘要样本子信息,所述处理模块31,具体用于:从预先与所述目标账号样本信息关联存储的目标密码样本信息对应的所述第一摘要样本子信息和所述第二摘要样本子信息中选取出与所述指定信息摘要算法匹配的目标摘要样本信息。In one embodiment, the specified information digest algorithm includes an information digest algorithm MD5 or a cyclic redundancy check algorithm CRC, and the database pre-stores information based on the cyclic redundancy check algorithm CRC for the target password sample The generated first summary sample sub-information and the second summary sample sub-information generated for the target password information based on the information digest algorithm MD5, the processing module 31 is specifically configured to: communicate with the target account sample information in advance From the first summary sample sub-information and the second summary sample sub-information corresponding to the target password sample information stored in association, target summary sample information that matches the specified information digest algorithm is selected.
需要说明的是,本申请实施例所描述的登录处理装置的各功能模块的功能可根据图4所述的方法实施例中的方法具体实现,其具体实现过程可以参照图4的方法实施例的相关描述,此处不再赘述。It should be noted that the functions of the functional modules of the login processing apparatus described in the embodiment of the present application can be specifically implemented according to the method in the method embodiment described in FIG. 4, and the specific implementation process can refer to the method in the method embodiment in FIG. Related descriptions are not repeated here.
请参见图9,图9是本申请实施例提供的一种服务器的示意性框图,如图9所示,该服务器包括,处理器40、存储器41和网络接口42。上述处理器40、存储器41和网络接口42可通过总线或其他方式连接,在本申请实施例所示图9中以通过总线连接为例。其中,网络接口42受所述处理器的控制用于收发消息,存储器41用于存储计算机程序,所述计算机程序包括程序指令,处理器40用于执行存储器41存储的程序指令。其中,处理器40被配置用于调用所述程序指令执行:通过网络接口42接收针对目标单据进行处理的处理结果信息,所述处理结果信息包括处理所述目标单据对应的处理申请标识以及处理所述目标单据对应的单据处理信息;从预先建立的处理申请标识与处理项的对应关系中,确定出所述目标单据的处理申请标识对应的目标处理项,检测所述目标处理项所属的目标选项类型,并基于预设选项类型与预设存储方式的对应关系,确定出与所述目标选项类型匹配的目标存储方式,进而依照所述目标存储方式存储所述单据处理信息。Please refer to FIG. 9. FIG. 9 is a schematic block diagram of a server provided by an embodiment of the present application. As shown in FIG. 9, the server includes a processor 40, a memory 41 and a network interface 42. The above-mentioned processor 40, memory 41, and network interface 42 may be connected by a bus or in other ways. In FIG. 9 shown in the embodiment of the present application, connection by a bus is taken as an example. The network interface 42 is controlled by the processor to send and receive messages, the memory 41 is used to store a computer program, and the computer program includes program instructions, and the processor 40 is used to execute the program instructions stored in the memory 41. The processor 40 is configured to call the program instructions to execute: receive processing result information for processing the target document through the network interface 42, where the processing result information includes the processing request identifier corresponding to the processing of the target document and the processing station The document processing information corresponding to the target document; from the pre-established correspondence between the processing application identifier and the processing item, the target processing item corresponding to the processing application identifier of the target document is determined, and the target option to which the target processing item belongs is detected Type, and based on the correspondence between the preset option type and the preset storage mode, determine the target storage mode matching the target option type, and then store the bill processing information according to the target storage mode.
应当理解,在本申请实施例中,所称处理器40可以是中央处理单元(Central Processing Unit,CPU),该处理器40还可以是其他通用处理器、数字信号处理器(Digital Signal Processor,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现成可编程门阵列(Field-Programmable Gate Array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。It should be understood that, in the embodiment of the present application, the so-called processor 40 may be a central processing unit (Central Processing Unit, CPU), and the processor 40 may also be other general-purpose processors, digital signal processors (Digital Signal Processors, DSPs). ), Application Specific Integrated Circuit (ASIC), Field-Programmable Gate Array (FPGA) or other programmable logic devices, discrete gates or transistor logic devices, discrete hardware components, etc. The general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like.
该存储器41可以包括只读存储器和随机存取存储器,并向处理器40提供指令和数据。存储器41的一部分还可以包括非易失性随机存取存储器。例如,存储器41还可以存储设备类型的信息。The memory 41 may include a read-only memory and a random access memory, and provides instructions and data to the processor 40. A part of the memory 41 may also include a non-volatile random access memory. For example, the memory 41 may also store device type information.
具体实现中,本申请实施例中所描述的处理器40、存储器41和网络接口42可执行本申请实施例提供的图4所述的方法实施例所描述的实现方式,也可执行本申请实施例图8所描述的登录处理装置的实现方式,在此不再赘述。In specific implementation, the processor 40, the memory 41, and the network interface 42 described in the embodiment of the present application can perform the implementation described in the method embodiment described in FIG. 4 provided by the embodiment of the present application, and can also perform the implementation of the present application For example, the implementation of the login processing device described in FIG. 8 will not be repeated here.
在本申请的另一实施例中提供一种计算机可读存储介质,所述计算机可读存储介质存储有计算机程序,所述计算机程序包括程序指令,所述程序指令被处理器执行时实现:接收携带有用户信息的登录请求,所述用户信息包括用户输入的密码信息和账号信息;基于指定信息摘要算法生成针对所述密码信息的摘要信息;根据预设规则生成随机数,并通过所述随机数对所述摘要信息进行哈希处理,得到所述摘要信息对应的哈希值;对所述哈希值和所述账号信息进行加密处理,生成包括所述随机数、加密处理后的哈希值以及加密处理后的账号信息的第一验证请求;将所述第一验证请求发送至服务器,以便于服务器基于所述第一验证请求对所述用户进行验证,并在验证通过后向所述客户端返回验证通过的第一指示信息;当接收到所述验证通过的第一指示信息时,对所述用户进行登录处理,所述第一指示信息用于指示所述用户的密码信息和所述账号信息均验证通过。In another embodiment of the present application, a computer-readable storage medium is provided, the computer-readable storage medium stores a computer program, the computer program includes program instructions, and the program instructions are executed by a processor to realize: receiving A login request carrying user information, the user information including the password information and account information entered by the user; generating summary information for the password information based on a specified information digest algorithm; generating random numbers according to preset rules, and passing the random numbers Perform a hash process on the digest information to obtain a hash value corresponding to the digest information; perform an encryption process on the hash value and the account information to generate a hash including the random number and the encrypted process Value and the encrypted first verification request of the account information; sending the first verification request to the server, so that the server verifies the user based on the first verification request, and sends the first verification request to the The client returns the first indication information that the authentication is passed; when receiving the first indication information that the authentication is passed, the user is logged in, and the first indication information is used to indicate the user's password information and the password. The account information has been verified.
在本申请的另一实施例中提供一种计算机可读存储介质,所述计算机可读存储介质存储有计算机程序,所述计算机程序包括程序指令,所述程序指令被处理器执行时实现:接 收来自客户端的第一验证请求,所述第一验证请求中携带有随机数、加密处理后的摘要信息对应的哈希值以及加密处理后的账号信息,所述摘要信息是所述客户端基于指定信息摘要算法对用户输入的密码信息进行数据处理得到的;基于预先配置的密钥对所述加密处理后的哈希值和所述账号信息进行解密处理,得到所述账号信息对应的明文信息以及解密后的哈希值;若检测到数据库中存在与所述明文信息匹配的目标账号样本信息,则确定对所述账号信息的验证通过;获取与所述目标账号样本信息关联存储的目标密码样本信息对应的目标摘要样本信息,所述目标摘要样本信息是基于所述指定信息摘要算法对所述密码样本信息进行数据处理得到的;基于所述随机数对所述目标摘要样本信息进行哈希计算,得到所述目标摘要样本信息对应的样本哈希值,若检测到所述哈希值和所述样本哈希值匹配,则确定对所述密码信息的验证通过;向所述客户端返回验证通过的第一指示信息,以便于所述客户端基于所述指示信息,对所述用户进行登录处理,所述指示信息用于指示所述用户的密码信息和所述账号信息均验证通过。In another embodiment of the present application, a computer-readable storage medium is provided, the computer-readable storage medium stores a computer program, the computer program includes program instructions, and the program instructions are executed by a processor to realize: receiving A first verification request from the client, the first verification request carries a random number, a hash value corresponding to the encrypted digest information, and encrypted account information, the digest information is based on the client's specified The information digest algorithm is obtained by data processing on the password information input by the user; the encrypted hash value and the account information are decrypted based on the pre-configured key to obtain the plaintext information corresponding to the account information and The decrypted hash value; if it is detected that there is target account sample information matching the plaintext information in the database, it is determined that the verification of the account information is passed; and the target password sample stored in association with the target account sample information is obtained The target digest sample information corresponding to the information, the target digest sample information is obtained by data processing the password sample information based on the specified information digest algorithm; the target digest sample information is hashed based on the random number , Obtain the sample hash value corresponding to the target digest sample information, if it is detected that the hash value matches the sample hash value, it is determined that the verification of the password information is passed; and the verification is returned to the client The passed first indication information is used to facilitate the client to perform login processing on the user based on the indication information, and the indication information is used to indicate that the password information of the user and the account information are both verified.
所述计算机可读存储介质可以是前述任一实施例所述的服务器或者客户端的内部存储单元,例如服务器或者客户端的硬盘或内存。所述计算机可读存储介质也可以是所述服务器或者客户端的外部存储设备,例如所述服务器或者客户端上配备的插接式硬盘,智能存储卡(Smart Media Card,SMC),安全数字(Secure Digital,SD)卡,闪存卡(Flash Card)等。进一步地,所述计算机可读存储介质还可以既包括所述服务器的内部存储单元也包括外部存储设备。所述计算机可读存储介质用于存储所述计算机程序以及所述服务器或者客户端所需的其他程序和数据。所述计算机可读存储介质还可以用于暂时地存储已经输出或者将要输出的数据。The computer-readable storage medium may be the internal storage unit of the server or the client described in any of the foregoing embodiments, such as the hard disk or memory of the server or the client. The computer-readable storage medium may also be an external storage device of the server or the client, such as a plug-in hard disk equipped on the server or the client, a smart memory card (Smart Media Card, SMC), and a secure digital (Secure Digital) Digital, SD) card, flash card (Flash Card), etc. Further, the computer-readable storage medium may also include both an internal storage unit of the server and an external storage device. The computer-readable storage medium is used to store the computer program and other programs and data required by the server or client. The computer-readable storage medium can also be used to temporarily store data that has been output or will be output.
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,是可以通过计算机程序来指令相关的硬件来完成,所述的程序可存储于一计算机可读取存储介质中,该程序在执行时,可包括如上述各方法的实施例的流程。其中,所述的存储介质可为磁碟、光盘、只读存储记忆体(Read-Only Memory,ROM)或随机存储记忆体(Random Access Memory,RAM)等。A person of ordinary skill in the art can understand that all or part of the processes in the above-mentioned embodiment methods can be implemented by instructing relevant hardware through a computer program. The program can be stored in a computer readable storage medium. During execution, it may include the procedures of the above-mentioned method embodiments. Wherein, the storage medium may be a magnetic disk, an optical disc, a read-only memory (Read-Only Memory, ROM), or a random access memory (Random Access Memory, RAM), etc.
以上所揭露的仅为本申请的部分实施例而已,当然不能以此来限定本申请之权利范围,本领域普通技术人员可以理解实现上述实施例的全部或部分流程,并依本申请权利要求所作的等同变化,仍属于发明所涵盖的范围。The above-disclosed are only part of the embodiments of this application. Of course, it cannot be used to limit the scope of rights of this application. Those of ordinary skill in the art can understand all or part of the process for implementing the above-mentioned embodiments and make them in accordance with the claims of this application. The equivalent changes still fall within the scope of the invention.

Claims (20)

  1. 一种登录处理方法,所述方法应用于客户端,其特征在于,所述方法包括:A login processing method, which is applied to a client terminal, characterized in that the method includes:
    接收携带有用户信息的登录请求,所述用户信息包括用户输入的密码信息和账号信息;Receiving a login request carrying user information, where the user information includes password information and account information entered by the user;
    基于指定信息摘要算法生成针对所述密码信息的摘要信息;Generating digest information for the password information based on a designated information digest algorithm;
    根据预设规则生成随机数,并通过所述随机数对所述摘要信息进行哈希处理,得到所述摘要信息对应的哈希值;Generating a random number according to a preset rule, and hashing the digest information by using the random number to obtain a hash value corresponding to the digest information;
    对所述哈希值和所述账号信息进行加密处理,生成包括所述随机数、加密处理后的哈希值以及加密处理后的账号信息的第一验证请求;Performing encryption processing on the hash value and the account information, and generating a first verification request including the random number, the encrypted hash value, and the encrypted account information;
    将所述第一验证请求发送至服务器,以便于服务器基于所述第一验证请求对所述用户进行验证,并在验证通过后向所述客户端返回验证通过的第一指示信息;Sending the first verification request to the server, so that the server verifies the user based on the first verification request, and returns the first indication information that the verification passed to the client after the verification is passed;
    当接收到所述验证通过的第一指示信息时,对所述用户进行登录处理,所述第一指示信息用于指示所述用户的密码信息和所述账号信息均验证通过。When receiving the first indication information that the authentication is passed, log in to the user, where the first indication information is used to indicate that both the password information and the account information of the user pass the authentication.
  2. 根据权利要求1所述的方法,其特征在于,所述指定信息摘要算法包括信息摘要算法MD5或者循环冗余校验算法CRC,所述摘要信息包括基于所述循环冗余校验算法CRC针对所述密码信息生成的摘要信息或者基于所述信息摘要算法MD5针对所述密码信息生成的摘要信息。The method according to claim 1, wherein the specified information digest algorithm includes an information digest algorithm MD5 or a cyclic redundancy check algorithm CRC, and the digest information includes a CRC based on the cyclic redundancy check algorithm for all The digest information generated by the password information or the digest information generated for the password information based on the information digest algorithm MD5.
  3. 根据权利要求2所述的方法,其特征在于,所述基于指定信息摘要算法生成针对所述密码信息的摘要信息,包括:The method according to claim 2, wherein the generating the digest information for the password information based on a specified information digest algorithm comprises:
    从预设的信息摘要算法MD5和循环冗余校验算法CRC中将所述循环冗余校验算法CRC确定为指定信息摘要算法;Determining the cyclic redundancy check algorithm CRC as the designated information digest algorithm from the preset information digest algorithm MD5 and the cyclic redundancy check algorithm CRC;
    基于所述循环冗余校验算法CRC生成针对所述密码信息的第一摘要信息。The first summary information for the cryptographic information is generated based on the cyclic redundancy check algorithm CRC.
  4. 根据权利要求3所述的方法,其特征在于,所述摘要信息为所述第一摘要信息,所述将所述验证请求发送至服务器之后,所述方法还包括:The method according to claim 3, wherein the summary information is the first summary information, and after the verification request is sent to the server, the method further comprises:
    接收所述服务器对所述用户验证失败后返回的第二指示信息;Receiving the second indication information returned by the server after failing to verify the user;
    若检测到所述第二指示信息指示了所述用户输入的所述密码信息与所述用户预先存储在数据库中的密码样本信息不匹配,则输出提示信息,所述提示信息用于提示所述用户密码输入错误。If it is detected that the second indication information indicates that the password information input by the user does not match the password sample information pre-stored by the user in the database, then output prompt information, the prompt information being used to prompt the The user password is entered incorrectly.
  5. 根据权利要求3所述的方法,其特征在于,所述摘要信息为所述第一摘要信息,所述方法还包括:The method according to claim 3, wherein the summary information is the first summary information, and the method further comprises:
    接收到所述验证通过的所述第一指示信息后,若检测到所述第一指示信息指示了所述第一摘要信息与所述用户预先存储在数据库中的密码样本信息对应的目标摘要样本信息匹配;After receiving the first indication information that passed the verification, if it is detected that the first indication information indicates that the first summary information corresponds to the target summary sample of the password sample information pre-stored in the database by the user Information matching
    基于所述信息摘要算法MD5生成针对所述密码信息的第二摘要信息,并根据所述随机数对所述第二摘要信息进行哈希处理,得到所述第二摘要信息对应的哈希值;Generating second digest information for the password information based on the information digest algorithm MD5, and hashing the second digest information according to the random number to obtain a hash value corresponding to the second digest information;
    对所述第二摘要信息对应的哈希值进行加密处理,生成包括加密处理后的所述第二摘要信息对应哈希值的第二验证请求,并将所述第二验证请求发送至所述服务器,以便于服务器基于所述加密处理后的所述第二摘要信息对应哈希值验证得到所述用户输入的密码信息与所述用户预先存储在数据库中的密码样本信息匹配后,向所述客户端返回验证通过的第三指示信息;Perform encryption processing on the hash value corresponding to the second digest information, generate a second verification request including the encrypted hash value corresponding to the second digest information, and send the second verification request to the Server, so that the server verifies that the password information entered by the user matches the password sample information pre-stored in the database by the user based on the hash value corresponding to the second digest information after the encryption process, and then sends the The client returns the third indication information that the verification is passed;
    当接收到所述第三指示信息时,触发执行所述对所述用户进行登录处理的步骤。When the third instruction information is received, trigger execution of the step of logging in to the user.
  6. 一种登录处理方法,所述方法应用于服务器,所述方法包括:A login processing method, the method is applied to a server, and the method includes:
    接收来自客户端的第一验证请求,所述第一验证请求中携带有随机数、加密处理后的 摘要信息对应的哈希值以及加密处理后的账号信息,所述摘要信息是所述客户端基于指定信息摘要算法对用户输入的密码信息进行数据处理得到的;Receive a first verification request from a client, the first verification request carries a random number, a hash value corresponding to the encrypted digest information, and encrypted account information, the digest information is based on the client The specified information digest algorithm is obtained by data processing the password information entered by the user;
    基于预先配置的密钥对所述加密处理后的哈希值和所述账号信息进行解密处理,得到所述账号信息对应的明文信息以及解密后的哈希值;Performing decryption processing on the encrypted hash value and the account information based on the pre-configured key to obtain the plaintext information corresponding to the account information and the decrypted hash value;
    若检测到数据库中存在与所述明文信息匹配的目标账号样本信息,则确定对所述账号信息的验证通过;If it is detected that there is target account sample information matching the plaintext information in the database, it is determined that the verification of the account information is passed;
    获取与所述目标账号样本信息关联存储的目标密码样本信息对应的目标摘要样本信息,所述目标摘要样本信息是基于所述指定信息摘要算法对所述密码样本信息进行数据处理得到的;Obtaining target summary sample information corresponding to target password sample information stored in association with the target account sample information, where the target summary sample information is obtained by data processing the password sample information based on the specified information digest algorithm;
    基于所述随机数对所述目标摘要样本信息进行哈希计算,得到所述目标摘要样本信息对应的样本哈希值,若检测到所述哈希值和所述样本哈希值匹配,则确定对所述密码信息的验证通过;Perform a hash calculation on the target digest sample information based on the random number to obtain the sample hash value corresponding to the target digest sample information. If it is detected that the hash value matches the sample hash value, it is determined The verification of the password information is passed;
    向所述客户端返回验证通过的第一指示信息,以便于所述客户端基于所述指示信息,对所述用户进行登录处理,所述指示信息用于指示所述用户的密码信息和所述账号信息均验证通过。The first indication information that has passed the verification is returned to the client, so that the client can log in the user based on the indication information, and the indication information is used to indicate the user’s password information and the Account information is verified.
  7. 根据权利要求6所述的方法,其特征在于,所述若检测到数据库中存在与所述明文信息匹配的目标账号样本信息,则确定对所述账号信息的验证通过之前,所述方法还包括:The method according to claim 6, characterized in that if it is detected that there is target account sample information matching the plaintext information in the database, before determining that the verification of the account information is passed, the method further comprises :
    从所述明文信息中获取账号标识;Obtain an account identifier from the plaintext information;
    从预先设置的至少一个存储区域中查找所述账号标识对应的存储区域,并在所述账号标识对应的存储区域中检测是否存在与所述明文信息匹配的目标账号样本信息。Search for a storage area corresponding to the account identifier from at least one preset storage area, and detect whether there is target account sample information matching the plaintext information in the storage area corresponding to the account identifier.
  8. 一种登录处理装置,所述装置配置于客户端,其特征在于,所述装置包括:A login processing device, the device is configured on a client, and is characterized in that the device includes:
    输入模块,用于接收携带有用户信息的登录请求,该用户信息包括用户输入的密码信息和账号信息;The input module is used to receive a login request carrying user information, the user information including password information and account information entered by the user;
    处理模块,用于基于指定信息摘要算法生成针对所述密码信息的摘要信息,根据预设规则生成随机数,并通过所述随机数对所述摘要信息进行哈希处理,得到所述摘要信息对应的哈希值,对所述哈希值和所述账号信息进行加密处理,生成包括所述随机数、加密处理后的哈希值以及加密处理后的账号信息的第一验证请求;The processing module is configured to generate digest information for the password information based on a specified information digest algorithm, generate random numbers according to preset rules, and hash the digest information through the random numbers to obtain the corresponding digest information Performing encryption processing on the hash value and the account information to generate a first verification request including the random number, the encrypted hash value, and the encrypted account information;
    输出模块,用于将所述第一验证请求发送至服务器,以便于服务器基于所述第一验证请求对所述用户进行验证,并在验证通过后向所述客户端返回验证通过的第一指示信息;The output module is configured to send the first verification request to the server, so that the server verifies the user based on the first verification request, and returns a first indication that the verification is passed to the client after the verification is passed information;
    处理模块,还用于当所述输入模块接收到所述验证通过的第一指示信息时,对所述用户进行登录处理,所述第一指示信息用于指示所述用户的密码信息和所述账号信息均验证通过。The processing module is further configured to perform login processing on the user when the input module receives the first indication information that the verification is passed, and the first indication information is used to indicate the password information of the user and the Account information is verified.
  9. 根据权利要求8所述的装置,其特征在于,所述指定信息摘要算法包括信息摘要算法MD5或者循环冗余校验算法CRC,所述摘要信息包括基于所述循环冗余校验算法CRC针对所述密码信息生成的摘要信息或者基于所述信息摘要算法MD5针对所述密码信息生成的摘要信息。The device according to claim 8, wherein the specified information digest algorithm includes an information digest algorithm MD5 or a cyclic redundancy check algorithm CRC, and the digest information includes a CRC based on the cyclic redundancy check algorithm for all The digest information generated by the password information or the digest information generated for the password information based on the information digest algorithm MD5.
  10. 根据权利要求9所述的装置,其特征在于,所述处理模块,具体用于从预设的信息摘要算法MD5和循环冗余校验算法CRC中将所述循环冗余校验算法CRC确定为指定信息摘要算法;基于所述循环冗余校验算法CRC生成针对所述密码信息的第一摘要信息。The device according to claim 9, wherein the processing module is specifically configured to determine the cyclic redundancy check algorithm CRC as a preset message digest algorithm MD5 and a cyclic redundancy check algorithm CRC as Specify an information digest algorithm; generate first digest information for the password information based on the cyclic redundancy check algorithm CRC.
  11. 根据权利要求10所述的装置,其特征在于,所述装置还包括输出模块,其中:The device according to claim 10, wherein the device further comprises an output module, wherein:
    所述输入模块,还用于接收所述服务器对所述用户验证失败后返回的第二指示信息;所述输出模块,用于若所述处理模块检测到所述第二指示信息指示了所述用户输入的所述密码信息与所述用户预先存储在数据库中的密码样本信息不匹配,则输出提示信息,所述提示信息用于提示所述用户密码输入错误。The input module is further configured to receive second indication information returned by the server after failing to verify the user; the output module is configured to, if the processing module detects that the second indication information indicates the If the password information input by the user does not match the password sample information pre-stored by the user in the database, prompt information is output, and the prompt information is used to prompt the user that the password is entered incorrectly.
  12. 根据权利要求10所述的装置,其特征在于,所述摘要信息为所述第一摘要信息,所述处理模块,还用于通过所述输入模块接收到所述验证通过的所述第一指示信息后,若检测到所述第一指示信息指示了所述第一摘要信息与所述用户预先存储在数据库中的密码样本信息对应的目标摘要样本信息匹配,基于所述信息摘要算法MD5生成针对所述密码信息的第二摘要信息,并根据所述随机数对所述第二摘要信息进行哈希处理,得到所述第二摘要信息对应的哈希值;对所述第二摘要信息对应的哈希值进行加密处理,生成包括加密处理后的所述第二摘要信息对应哈希值的第二验证请求;The apparatus according to claim 10, wherein the summary information is the first summary information, and the processing module is further configured to receive the first indication that the verification is passed through the input module After information, if it is detected that the first indication information indicates that the first summary information matches the target summary sample information corresponding to the password sample information pre-stored in the database by the user, based on the information digest algorithm MD5, the target summary The second digest information of the password information, and hash the second digest information according to the random number to obtain the hash value corresponding to the second digest information; The hash value is encrypted, and a second verification request including the hash value corresponding to the encrypted second digest information is generated;
    所述输出模块,还用于将所述第二验证请求发送至所述服务器,以便于服务器基于所述加密处理后的所述第二摘要信息对应哈希值验证得到所述用户输入的密码信息与所述用户预先存储在数据库中的密码样本信息匹配后,向所述客户端返回验证通过的第三指示信息;The output module is further configured to send the second verification request to the server, so that the server verifies the password information entered by the user based on the hash value corresponding to the encrypted second digest information After matching with the password sample information pre-stored in the database by the user, return to the client the third indication information that the verification is passed;
    所述处理模块,还用于当通过所述输入模块接收到所述第三指示信息时,触发执行所述对所述用户进行登录处理的步骤。The processing module is further configured to trigger the execution of the step of logging in the user when the third instruction information is received through the input module.
  13. 一种登录处理装置,所述装置配置于服务器,其特征在于,所述装置包括:A login processing device, the device is configured on a server, and is characterized in that the device includes:
    通信模块,用于接收来自客户端的第一验证请求,所述第一验证请求中携带有随机数、加密处理后的摘要信息对应的哈希值以及加密处理后的账号信息,所述摘要信息是所述客户端基于指定信息摘要算法对用户输入的密码信息进行数据处理得到的;The communication module is configured to receive a first verification request from the client, the first verification request carrying a random number, a hash value corresponding to the encrypted digest information, and encrypted account information, the digest information being The client terminal performs data processing on the password information input by the user based on a specified information digest algorithm;
    处理模块,用于基于预先配置的密钥对所述加密处理后的哈希值和所述账号信息进行解密处理,得到所述账号信息对应的明文信息以及解密后的哈希值,若检测到数据库中存在与所述明文信息匹配的目标账号样本信息,则确定对所述账号信息的验证通过;The processing module is used to decrypt the encrypted hash value and the account information based on the pre-configured key to obtain the plain text information corresponding to the account information and the decrypted hash value, if detected If there is target account sample information matching the plaintext information in the database, it is determined that the verification of the account information is passed;
    所述处理模块,还用于获取与所述目标账号样本信息关联存储的目标密码样本信息对应的目标摘要样本信息,并基于所述随机数对所述目标摘要样本信息进行哈希计算,得到所述目标摘要样本信息对应的样本哈希值,若检测到所述哈希值和所述样本哈希值匹配,则确定对所述密码信息的验证通过;The processing module is further configured to obtain target summary sample information corresponding to the target password sample information stored in association with the target account sample information, and perform hash calculation on the target summary sample information based on the random number to obtain The sample hash value corresponding to the target summary sample information, if it is detected that the hash value matches the sample hash value, it is determined that the verification of the password information is passed;
    所述通信模块,还用于向所述客户端返回验证通过的第一指示信息,以便于所述客户端基于所述指示信息,对所述用户进行登录处理,所述指示信息用于指示所述用户的密码信息和所述账号信息均验证通过。The communication module is further configured to return first indication information that has passed the verification to the client, so that the client can log in to the user based on the indication information, and the indication information is used to indicate The password information of the user and the account information are both verified.
  14. 根据权利要求13所述的装置,其特征在于,所述处理模块,还用于从所述明文信息中获取账号标识,从预先设置的至少一个存储区域中查找所述账号标识对应的存储区域,并在所述账号标识对应的存储区域中检测是否存在与所述明文信息匹配的目标账号样本信息。The device according to claim 13, wherein the processing module is further configured to obtain an account identifier from the plaintext information, and search for a storage area corresponding to the account identifier from at least one preset storage area, And detect in the storage area corresponding to the account identifier whether there is target account sample information that matches the plaintext information.
  15. 一种客户端,其特征在于,包括处理器、存储器、输入设备和输出设备,所述处理器和所述存储器相互连接,其中,所述存储器用于存储计算机程序,所述计算机程序包括程序指令,所述处理器被配置用于调用所述程序指令执行:通过所述输入设备接收携带有用户信息的登录请求,所述用户信息包括用户输入的密码信息和账号信息;基于指定信息摘要算法生成针对所述密码信息的摘要信息;根据预设规则生成随机数,并通过所述随机数对所述摘要信息进行哈希处理,得到所述摘要信息对应的哈希值;对所述哈希值和所述账号信息进行加密处理,生成包括所述随机数、加密处理后的哈希值以及加密处理后的账号信息的第一验证请求;通过所述输出设备将所述第一验证请求发送至服务器,以便于服务器基于所述第一验证请求对所述用户进行验证,并在验证通过后向所述客户端返回验证通过的第一指示信息;当通过所述输入设备接收到所述验证通过的第一指示信息时,对所述用户进行登录处理,所述第一指示信息用于指示所述用户的密码信息和所述账号信息均验证通过。A client, characterized by comprising a processor, a memory, an input device, and an output device, the processor and the memory are connected to each other, wherein the memory is used to store a computer program, and the computer program includes program instructions The processor is configured to invoke the program instructions to execute: receive a login request carrying user information through the input device, the user information including password information and account information entered by the user; generate based on a specified information digest algorithm For the digest information of the password information; generate a random number according to a preset rule, and hash the digest information through the random number to obtain the hash value corresponding to the digest information; compare the hash value Perform encryption processing with the account information to generate a first verification request including the random number, the encrypted hash value, and the encrypted account information; and send the first verification request to the output device through the output device Server, so that the server verifies the user based on the first verification request, and returns to the client the first indication information that the verification passed after the verification is passed; when the verification passed is received through the input device The first instruction information is to perform login processing on the user, and the first instruction information is used to indicate that the password information of the user and the account information are both verified.
  16. 根据权利要求15所述的客户端,其特征在于,所述指定信息摘要算法包括信息摘 要算法MD5或者循环冗余校验算法CRC,所述摘要信息包括基于所述循环冗余校验算法CRC针对所述密码信息生成的摘要信息或者基于所述信息摘要算法MD5针对所述密码信息生成的摘要信息。The client according to claim 15, wherein the specified information digest algorithm includes an information digest algorithm MD5 or a cyclic redundancy check algorithm CRC, and the digest information includes a CRC based on the cyclic redundancy check algorithm. The digest information generated by the password information or the digest information generated for the password information based on the information digest algorithm MD5.
  17. 根据权利要求16所述的客户端,其特征在于,所述处理器,具体用于从预设的信息摘要算法MD5和循环冗余校验算法CRC中将所述循环冗余校验算法CRC确定为指定信息摘要算法;The client according to claim 16, wherein the processor is specifically configured to determine the cyclic redundancy check algorithm CRC from a preset message digest algorithm MD5 and a cyclic redundancy check algorithm CRC Specify the information digest algorithm;
    基于所述循环冗余校验算法CRC生成针对所述密码信息的第一摘要信息。The first summary information for the cryptographic information is generated based on the cyclic redundancy check algorithm CRC.
  18. 一种服务器,其特征在于,包括处理器、存储器和网络接口,所述处理器、所述存储器和所述网络接口相互连接,其中,所述存储器用于存储计算机程序,所述计算机程序包括程序指令,所述处理器被配置用于调用所述程序指令执行:通过所述网络接口接收来自客户端的第一验证请求,所述第一验证请求中携带有随机数、加密处理后的摘要信息对应的哈希值以及加密处理后的账号信息,所述摘要信息是所述客户端基于指定信息摘要算法对用户输入的密码信息进行数据处理得到的;基于预先配置的密钥对所述加密处理后的哈希值和所述账号信息进行解密处理,得到所述账号信息对应的明文信息以及解密后的哈希值;若检测到数据库中存在与所述明文信息匹配的目标账号样本信息,则确定对所述账号信息的验证通过;获取与所述目标账号样本信息关联存储的目标密码样本信息对应的目标摘要样本信息,所述目标摘要样本信息是基于所述指定信息摘要算法对所述密码样本信息进行数据处理得到的;基于所述随机数对所述目标摘要样本信息进行哈希计算,得到所述目标摘要样本信息对应的样本哈希值,若检测到所述哈希值和所述样本哈希值匹配,则确定对所述密码信息的验证通过;通过所述网络接口向所述客户端返回验证通过的第一指示信息,以便于所述客户端基于所述指示信息,对所述用户进行登录处理,所述指示信息用于指示所述用户的密码信息和所述账号信息均验证通过。A server, characterized by comprising a processor, a memory, and a network interface, the processor, the memory, and the network interface are connected to each other, wherein the memory is used to store a computer program, and the computer program includes a program Instructions, the processor is configured to call the program instructions to execute: receive a first verification request from a client through the network interface, the first verification request carries a random number and the encrypted digest information corresponding to The hash value and encrypted account information, the summary information is obtained by the client based on a specified information digest algorithm on the password information input by the user; after the encryption processing based on the pre-configured key Decrypt the hash value of the account information and the account information to obtain the plaintext information corresponding to the account information and the decrypted hash value; if it is detected that there is a target account sample information that matches the plaintext information in the database, it is determined The verification of the account information is passed; the target digest sample information corresponding to the target password sample information stored in association with the target account sample information is obtained, and the target digest sample information is based on the specified information digest algorithm for the password sample Information is obtained by data processing; based on the random number, the target digest sample information is hashed to obtain the sample hash value corresponding to the target digest sample information, if the hash value and the sample are detected If the hash value matches, it is determined that the verification of the password information is passed; the first indication information that the verification passed is returned to the client through the network interface, so that the client can check the password based on the indication information. The user performs login processing, and the instruction information is used to indicate that the password information of the user and the account information are both verified.
  19. 根据权利要求18所述的服务器,其特征在于,所述处理器,还用于The server according to claim 18, wherein the processor is further configured to
    从所述明文信息中获取账号标识,从预先设置的至少一个存储区域中查找所述账号标识对应的存储区域,并在所述账号标识对应的存储区域中检测是否存在与所述明文信息匹配的目标账号样本信息。Obtain the account identifier from the plaintext information, search for the storage area corresponding to the account identifier from at least one preset storage area, and detect in the storage area corresponding to the account identifier whether there is a match with the plaintext information Target account sample information.
  20. 一种计算机非易失性可读存储介质,其特征在于,所述计算机非易失性可读存储介质存储有计算机程序,所述计算机程序包括程序指令,所述程序指令当被处理器执行时使所述处理器执行如权利要求1-5任意一项或者6-7任意一项所述的方法。A computer nonvolatile readable storage medium, wherein the computer nonvolatile readable storage medium stores a computer program, the computer program includes program instructions, and the program instructions when executed by a processor The processor is caused to execute the method according to any one of claims 1-5 or any one of claims 6-7.
PCT/CN2019/120959 2019-07-25 2019-11-26 Login processing method and related device WO2021012552A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910679227.6A CN110493197B (en) 2019-07-25 2019-07-25 Login processing method and related equipment
CN201910679227.6 2019-07-25

Publications (1)

Publication Number Publication Date
WO2021012552A1 true WO2021012552A1 (en) 2021-01-28

Family

ID=68548280

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/120959 WO2021012552A1 (en) 2019-07-25 2019-11-26 Login processing method and related device

Country Status (2)

Country Link
CN (1) CN110493197B (en)
WO (1) WO2021012552A1 (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112860702A (en) * 2021-03-02 2021-05-28 岭东核电有限公司 Test execution work order verification method and device, computer equipment and storage medium
CN113378146A (en) * 2021-05-27 2021-09-10 广州朗国电子科技有限公司 Method for quickly logging in user by using NFC
CN113536367A (en) * 2021-06-11 2021-10-22 深圳市优克联新技术有限公司 Registration method, privacy server, service information server and registration system
CN113746833A (en) * 2021-09-02 2021-12-03 上海商汤智能科技有限公司 Communication method and apparatus, electronic device, and storage medium
CN114020346A (en) * 2021-09-29 2022-02-08 苏州浪潮智能科技有限公司 Configuration file processing method and device, electronic equipment and storage medium
CN114338158A (en) * 2021-12-28 2022-04-12 中国电信股份有限公司 Authentication verification method, system and device
CN114430346A (en) * 2022-01-27 2022-05-03 亿咖通(湖北)技术有限公司 Login method and device and electronic equipment
CN114584310A (en) * 2021-12-31 2022-06-03 中钞信用卡产业发展有限公司杭州区块链技术研究院 Identity verification method, device, equipment, medium and product
CN114759972A (en) * 2022-04-01 2022-07-15 权浩 Information checking method and system based on Beidou satellite
CN115604012A (en) * 2022-10-20 2023-01-13 浪潮云信息技术股份公司(Cn) Method and system for realizing complete storage of important data in government affair cloud scene
CN115622794A (en) * 2022-11-15 2023-01-17 北京密码云芯科技有限公司 Encryption and decryption method, device, equipment and storage medium

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110493197B (en) * 2019-07-25 2022-02-01 深圳壹账通智能科技有限公司 Login processing method and related equipment
CN111026798B (en) * 2019-12-05 2023-07-14 江苏中车城市发展有限公司 Electromechanical equipment database system and control method thereof
CN112333133A (en) * 2020-07-08 2021-02-05 深圳Tcl新技术有限公司 Data security transmission method, device, equipment and computer readable storage medium
CN112804030A (en) * 2021-01-17 2021-05-14 国网辽宁省电力有限公司电力科学研究院 Data checking method based on CRC + MD5 hash function bidirectional communication
CN113259136B (en) * 2021-07-07 2021-11-16 浙江宇视科技有限公司 Multi-client cooperative authentication method, device, equipment and medium for feature recognition
CN114154126B (en) * 2021-10-31 2024-04-19 苏州浪潮智能科技有限公司 BMC login authentication method, device and medium
CN114499859A (en) * 2022-03-22 2022-05-13 深圳壹账通智能科技有限公司 Password verification method, device, equipment and storage medium
CN115378694A (en) * 2022-08-19 2022-11-22 山东大学 Login verification method and system
CN117668936A (en) * 2024-01-31 2024-03-08 荣耀终端有限公司 Data processing method and related device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107295011A (en) * 2017-08-04 2017-10-24 杭州安恒信息技术有限公司 The safety certifying method and device of webpage
US20190028273A1 (en) * 2016-01-18 2019-01-24 Roland Harras Method for saving data with multi-layer protection, in particular log-on data and passwords
CN110493197A (en) * 2019-07-25 2019-11-22 深圳壹账通智能科技有限公司 A kind of login process method and relevant device

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107733656A (en) * 2017-10-23 2018-02-23 北京深思数盾科技股份有限公司 A kind of cipher authentication method and device
CN107911343B (en) * 2017-10-27 2020-09-15 深圳英飞拓科技股份有限公司 Secure password storage verification method and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190028273A1 (en) * 2016-01-18 2019-01-24 Roland Harras Method for saving data with multi-layer protection, in particular log-on data and passwords
CN107295011A (en) * 2017-08-04 2017-10-24 杭州安恒信息技术有限公司 The safety certifying method and device of webpage
CN110493197A (en) * 2019-07-25 2019-11-22 深圳壹账通智能科技有限公司 A kind of login process method and relevant device

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112860702A (en) * 2021-03-02 2021-05-28 岭东核电有限公司 Test execution work order verification method and device, computer equipment and storage medium
CN113378146A (en) * 2021-05-27 2021-09-10 广州朗国电子科技有限公司 Method for quickly logging in user by using NFC
CN113536367A (en) * 2021-06-11 2021-10-22 深圳市优克联新技术有限公司 Registration method, privacy server, service information server and registration system
CN113536367B (en) * 2021-06-11 2023-10-10 深圳市优克联新技术有限公司 Registration method, privacy server, business information server and registration system
CN113746833B (en) * 2021-09-02 2023-06-16 上海商汤智能科技有限公司 Communication method and device, electronic equipment and storage medium
CN113746833A (en) * 2021-09-02 2021-12-03 上海商汤智能科技有限公司 Communication method and apparatus, electronic device, and storage medium
CN114020346A (en) * 2021-09-29 2022-02-08 苏州浪潮智能科技有限公司 Configuration file processing method and device, electronic equipment and storage medium
CN114020346B (en) * 2021-09-29 2023-07-18 苏州浪潮智能科技有限公司 Configuration file processing method and device, electronic equipment and storage medium
CN114338158A (en) * 2021-12-28 2022-04-12 中国电信股份有限公司 Authentication verification method, system and device
CN114584310A (en) * 2021-12-31 2022-06-03 中钞信用卡产业发展有限公司杭州区块链技术研究院 Identity verification method, device, equipment, medium and product
CN114430346A (en) * 2022-01-27 2022-05-03 亿咖通(湖北)技术有限公司 Login method and device and electronic equipment
CN114430346B (en) * 2022-01-27 2023-09-05 亿咖通(湖北)技术有限公司 Login method and device and electronic equipment
CN114759972A (en) * 2022-04-01 2022-07-15 权浩 Information checking method and system based on Beidou satellite
CN114759972B (en) * 2022-04-01 2023-06-23 权浩 Beidou satellite-based information checking method and system
CN115604012A (en) * 2022-10-20 2023-01-13 浪潮云信息技术股份公司(Cn) Method and system for realizing complete storage of important data in government affair cloud scene
CN115622794A (en) * 2022-11-15 2023-01-17 北京密码云芯科技有限公司 Encryption and decryption method, device, equipment and storage medium
CN115622794B (en) * 2022-11-15 2023-04-07 北京密码云芯科技有限公司 Encryption and decryption method, device, equipment and storage medium

Also Published As

Publication number Publication date
CN110493197B (en) 2022-02-01
CN110493197A (en) 2019-11-22

Similar Documents

Publication Publication Date Title
WO2021012552A1 (en) Login processing method and related device
US9847880B2 (en) Techniques for ensuring authentication and integrity of communications
US8001383B2 (en) Secure serial number
US20110202992A1 (en) method for authenticating a trusted platform based on the tri-element peer authentication(tepa)
CN110719173B (en) Information processing method and device
KR100702499B1 (en) System and method for guaranteeing software integrity
JP2016515235A5 (en)
US8566952B1 (en) System and method for encrypting data and providing controlled access to encrypted data with limited additional access
KR102137122B1 (en) Security check method, device, terminal and server
CN108805571B (en) Data protection method, platform, block chain node, system and storage medium
CN110071937B (en) Login method, system and storage medium based on block chain
WO2018112482A1 (en) Method and system for distributing attestation key and certificate in trusted computing
CN111639325A (en) Merchant authentication method, device, equipment and storage medium based on open platform
KR101253683B1 (en) Digital Signing System and Method Using Chained Hash
CN113610526A (en) Data trust method and device, electronic equipment and storage medium
CN113688399A (en) Firmware digital signature protection method and device, computer equipment and storage medium
WO2018047120A1 (en) A system and method for data block modification detection and authentication codes
US9027096B2 (en) Method and device for enhancing security of user security model
CN116881936A (en) Trusted computing method and related equipment
CN114726606B (en) User authentication method, client, gateway and authentication server
CN108242997B (en) Method and apparatus for secure communication
CN113221074B (en) Offline authorization method
CN115604034A (en) Encryption and decryption method and system for communication connection and electronic equipment
CN115550060A (en) Block chain based trusted certificate verification method, apparatus, device and medium
CN113849801A (en) Single sign-on method and device, computer equipment and storage medium

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19938575

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19938575

Country of ref document: EP

Kind code of ref document: A1

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205 DATED 09/08/2022)

122 Ep: pct application non-entry in european phase

Ref document number: 19938575

Country of ref document: EP

Kind code of ref document: A1