CN102346823A - User logging method and system in internet - Google Patents

User logging method and system in internet Download PDF

Info

Publication number
CN102346823A
CN102346823A CN2010102503632A CN201010250363A CN102346823A CN 102346823 A CN102346823 A CN 102346823A CN 2010102503632 A CN2010102503632 A CN 2010102503632A CN 201010250363 A CN201010250363 A CN 201010250363A CN 102346823 A CN102346823 A CN 102346823A
Authority
CN
China
Prior art keywords
user
internal memory
log file
kept
local device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2010102503632A
Other languages
Chinese (zh)
Other versions
CN102346823B (en
Inventor
刘方敏
黄奎
严峻
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201010250363.2A priority Critical patent/CN102346823B/en
Publication of CN102346823A publication Critical patent/CN102346823A/en
Application granted granted Critical
Publication of CN102346823B publication Critical patent/CN102346823B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention is suitable for the internet field, and provides a user logging method and system in the internet. The method comprises: generating a logging file with logging information after the user successfully logs in; and storing the logging file in a memory of a local device. The technical scheme of the invention has the advantage of improving the safety.

Description

The method and system of user's login in a kind of internet
Technical field
The invention belongs to internet arena, relate in particular to the method and system of user's login in a kind of internet.
Background technology
Along with Internet development, the user exchanges through the internet, the login method of internet of the prior art; Be specially, after the user opens this webpage or application program (for example instant messaging), show login interface; Behind account that receives user input and password, the account and password are sent to server verify, after verifying successfully; Show and login successfully, the account and password generation Cookie file are kept in the local cache.
According to the technical scheme that prior art provided, find to exist in the prior art following technical matters:
The Cookie file of the technical scheme that prior art provides is to be kept at local cache; So the preservation position of Cookie file is changeless; So other people (for example hacker) is easy to from local cache, obtain this Cookie file; Obtain username and password information, user's account security is low.
Summary of the invention
The purpose of the embodiment of the invention is to provide user in a kind of internet the method for login, is intended to solve the user appears in user in the prior art after log-on webpage or application program the low problem of account security.
The embodiment of the invention is achieved in that the method for user's login in a kind of internet, and said method comprises the steps:
After the user logins success, generate the log file that carries log-on message;
Said log file is kept in the internal memory of local device.
The present invention also provides the system of user's login in a kind of internet, and said system comprises:
Generation unit is used for after the user logins success, generates the log file that carries log-on message;
Preserve the unit, be used for said log file is kept in the internal memory of local device.
The embodiment of the invention compared with prior art; Beneficial effect is: technical scheme of the present invention is stored in this log file in the internal memory; Because internal memory is Random assignment; So the position of this log file storage is unfixing, so other people can't obtain this log file, so it has safe advantage.
Description of drawings
Fig. 1 is the process flow diagram of the method for user's login in a kind of internet provided by the invention;
Fig. 2 is the process flow diagram that the embodiment of the invention one provides the method for user's login in a kind of internet;
Fig. 3 is the logical diagram that the embodiment of the invention three provides the method for user's login in a kind of internet;
Fig. 4 is the logical diagram that the embodiment of the invention four provides the method for user's login in a kind of internet;
Fig. 5 is the structural drawing that the present invention provides the system of user's login in a kind of internet.
Embodiment
In order to make the object of the invention, technical scheme and advantage clearer,, the present invention is further elaborated below in conjunction with accompanying drawing and embodiment.Should be appreciated that specific embodiment described herein only in order to explanation the present invention, and be not used in qualification the present invention.
The present invention provides the method for user's login in a kind of internet, and this method is accomplished by local device, and this local device specifically can be like computing machine; Can certainly be other equipment; Portable terminal for example, PDA or the like only needs this local device can logging in network or run application and get final product.
S11, after the user logins success, generate the log file carry this log-on message;
Need to prove, above-mentioned log-on message specifically can for, the account and the password that use when the user logins; The log file of account and password all can be the Cookie file at present; Certainly in actual conditions, also can other filename of called after, for example KEY file etc.; The present invention does not limit to the concrete form of this log file, only needs this log file to include account and encrypted message gets final product.
S12, this log file is kept in the internal memory of local device.
Optional, the method that realizes S22 specifically can for:
Random assignment one memory headroom is kept at this log file in the memory headroom in internal memory.
Optional, after S22, can also comprise the steps:
Steps A, confirm when under attack, in internal memory, distribute another shelf space again;
Need to prove, above-mentioned confirm determination methods under attack specifically can for:
After the preservation request that receives this log file; Judge under attack; Can certainly be other method; For example when receive that the third party sends obtain the access request of this log file the time, perhaps when detecting local device and attacked by trojan horse or the like, the present invention does not limit to this determination methods under attack.
Step B, this log file is kept in another shelf space.
Optional, said method can also comprise the steps: after S11
Step C, with the user browse recorded and stored in the internal memory of local device, user's browsing content is kept at local cache;
Step D, with the user browse record and user's browsing content is kept in the internal memory;
Need to prove that the execution sequence of above-mentioned steps C, D can also can certainly be carried out with S12 simultaneously after S12 before S12.
Method provided by the invention is being carried out the user when logining, and its place of preserving log file is an internal memory, because computing machine is when saving the data in internal memory; All are Random assignment memory headrooms, according to the work characteristics of internal memory, when the user releases login; Operating system can discharge all shared memory headrooms of this process automatically, and the memory headroom of preserving this log file certainly also can be discharged by operating system automatically, promptly deletes this log file automatically; So it has the protection account safety; Have safe advantage, and because the address of internal memory is Random assignment, so have no idea all to go to a fixing place to find your needed internal memory at every turn; So can't obtain this log file from fixing place, further improve security.And this method is being confirmed when under attack; Change the memory headroom of preserving this log file; So this method has the user when this webpage of operation or application program, is attacked immediately, this log file is owing to changed memory headroom; Can do not obtained this log file, so this method has further improved security by other people yet.
Embodiment one:
Present embodiment provides the method for user's login in a kind of internet; The technological scene that present embodiment is realized is: present embodiment provides method to entrust browser in local device, to carry out by server; Promptly this method is accomplished by local computer; The log file of present embodiment is an example with the Cookie file, and this method is as shown in Figure 2, specifically comprises the steps:
S21, after the user logins success, generate the Cookie file carry the account and password;
S22, in internal memory Random assignment one memory headroom;
S23, this Cookie file is kept in the memory headroom of distribution.
Need to prove that when S22 Random assignment memory headroom, the size of the memory headroom of its distribution is wanted to preserve this Cookie file; Be the size that the size in its storage allocation space was greater than or equaled this Cookie file, explain, if this Cookie file gets the big or small 1K that is with an instance; The size of the memory headroom that then distributes is greater than or equals 1K; Certainly in order to save internal memory, the size of preferentially selecting the storage allocation space is 1K.
The method that present embodiment provides is being carried out the user when logining, and its place of preserving the Cookie file is an internal memory, because computing machine is when saving the data in internal memory; All are Random assignment memory headrooms, according to the work characteristics of internal memory, when the user releases login; Operating system can discharge all shared memory headrooms of this process automatically, and the memory headroom of preserving this Cookie file certainly also can be discharged by operating system automatically, promptly deletes this Cookie file automatically; So it has the protection account safety; Have safe advantage, and because the address of internal memory is Random assignment, so have no idea all to go to a fixing place to find your needed internal memory at every turn; So can't obtain this Cookie file from fixing place, further improve security.
Embodiment two:
Present embodiment provides the method for user's login in a kind of internet, and the technological scene that present embodiment is realized is identical with the technological scene that embodiment one realizes, is not giving unnecessary details here.This method embodiment one the institute in steps outside, it can also comprise the steps: after S23
S24, after the access request that receives third-party Cookie file, in internal memory, distribute another shelf space again;
S25, this Cookie file is kept in another shelf space of distribution.
The method that present embodiment provides is after the access request that receives third-party Cookie file (being equivalent to receive attack); Change the memory headroom of preserving this Cookie file; So this method has the user when this webpage of operation or application program; Immediately by success attack, this Cookie file can not obtained this Cookie file by other people owing to changed memory headroom yet; So this method has further improved security.
Embodiment three:
Present embodiment provides the method for user's login in a kind of internet, and present embodiment is that with embodiment one different place present embodiment can also be kept at user's the browsing content of browsing record or user in the memory headroom of distribution when carrying out S23.Above-mentioned user browses record and specifically can be the record of browsing of: webpage; Can certainly be the operation note of application program; Can also be the state of current web page and state of user information or the like; Above-mentioned user's browsing content specifically can comprise: the web page contents of browsing, the content of the application program of browsing.The logical diagram of concrete accessed web page is as shown in Figure 3.
Present embodiment is not only preserved the Cookie file; Also preserve user's the browsing content of browsing record and user; So this method has not only been protected user's account and password, also protected user's the browsing content of browsing record and user, further improved security.
Embodiment four:
Present embodiment provides the method for user's login in a kind of internet; Present embodiment is with embodiment one different place, present embodiment when carrying out S23, can also be with the user browse recorded and stored in the memory headroom that distributes; Need to prove; Above-mentioned because user's browsing content does not belong to privacy information, so can certainly user's browsing content be kept at local cache, the logical diagram of present embodiment accessed web page is as shown in Figure 4.
The present invention also provides the system of user's login in a kind of internet, and this system is as shown in Figure 5, specifically can comprise:
Generation unit 51 generates the log file that carries log-on message after the user logins success;
Preserving unit 52 is kept at this log file in the internal memory of local device.
Optional, above-mentioned preservation unit 52 specifically can comprise:
Distribution module 521 is Random assignment one memory headroom in the internal memory of local device;
Preserving module 522 is kept at this log file in the said memory headroom.
Optional, said system can also comprise:
Allocation units 53 are confirming in the internal memory of local device, to distribute another shelf space again when under attack;
Preserving unit 52 also is kept at said log file in said another shelf space.
Optional, above-mentioned preservation unit 52 also the user browse recorded and stored in the internal memory of local device, user's browsing content is kept at local cache; Or with the user browse record and user's browsing content is kept in the internal memory of local device.
Need to prove that above-mentioned login letter can comprise: the account and the password of user's login, this log file can be the Cookie file.
Need to prove that the system of user's login can be the system of individualism in this internet, can certainly be arranged in portable terminal, computing machine, the PDA that the present invention does not limit to the technological scene of this system's realization and the concrete equipment at this system place.
System provided by the invention is carrying out the user when logining, and its place of preserving log file is an internal memory, because computing machine is when saving the data in internal memory; All are Random assignment memory headrooms, according to the work characteristics of internal memory, when the user releases login; Operating system can discharge all shared memory headrooms of this process automatically, and the memory headroom of preserving this log file certainly also can be discharged by operating system automatically, promptly deletes this log file automatically; So it has the protection account safety; Have safe advantage, and because the address of internal memory is Random assignment, so have no idea all to go to a fixing place to find your needed internal memory at every turn; So can't obtain this log file from fixing place, further improve security.And this system is confirming when under attack; Change the memory headroom of preserving this log file; So this system has the user when this webpage of operation or application program, is attacked immediately, this log file is owing to changed memory headroom; Can do not obtained this log file, so this system has further improved security by other people yet.
It should be noted that among the said system embodiment that each included unit is just divided according to function logic, but is not limited to above-mentioned division, as long as can realize function corresponding; In addition, the concrete title of each functional unit also just for the ease of mutual differentiation, is not limited to protection scope of the present invention.
In addition; One of ordinary skill in the art will appreciate that all or part of step that realizes in the foregoing description method is to instruct relevant hardware to accomplish through program; Corresponding program can be stored in a kind of computer-readable recording medium; The above-mentioned storage medium of mentioning can be a ROM (read-only memory), disk or CD etc.
In sum, technical scheme provided by the invention has safe advantage.
The above is merely preferred embodiment of the present invention, not in order to restriction the present invention, all any modifications of within spirit of the present invention and principle, being done, is equal to and replaces and improvement etc., all should be included within protection scope of the present invention.

Claims (10)

1. the method for user's login in the internet is characterized in that said method comprises the steps:
After the user logins success, generate the log file that carries log-on message;
Said log file is kept in the internal memory of local device.
2. method according to claim 1 is characterized in that, the step in the said internal memory that said log file is kept at local device specifically comprises:
Random assignment one memory headroom is kept at this log file in the said memory headroom in the internal memory of local device.
3. method according to claim 1 is characterized in that, also comprises after the step of said method in the internal memory that said log file is kept at local device:
Confirm when under attack, in the internal memory of local device, distribute another shelf space again;
Said log file is kept in said another shelf space.
4. method according to claim 1 is characterized in that, said method also comprises after generation carries the step of log file of log-on message:
With the user browse recorded and stored in the internal memory of local device, user's browsing content is kept at local cache; Or
User's the browsing content of browsing record and user is kept in the internal memory of local device.
5. method according to claim 1 is characterized in that, said log-on message comprises: the account and the password of user's login, said log file is the Cookie file.
6. the system of user's login in the internet is characterized in that said system comprises:
Generation unit is used for after the user logins success, generates the log file that carries log-on message;
Preserve the unit, be used for said log file is kept in the internal memory of local device.
7. system according to claim 6 is characterized in that, said preservation unit specifically comprises:
Distribution module is used for internal memory Random assignment one memory headroom at local device;
Preserve module, be used for this log file is kept in the said memory headroom.
8. system according to claim 6 is characterized in that, said system also comprises:
Allocation units are used for confirming in the internal memory of local device, to distribute another shelf space again when under attack;
Said preservation unit also is used for said log file is kept in said another shelf space.
9. system according to claim 6 is characterized in that, said preservation unit also be used for the user browse recorded and stored in the internal memory of local device, user's browsing content is kept at local cache; Or with the user browse record and user's browsing content is kept in the internal memory of local device.
10. system according to claim 6 is characterized in that, said log-on message comprises: the account and the password of user's login, said log file is the Cookie file.
CN201010250363.2A 2010-08-03 2010-08-03 The method and system that in a kind of internet, user logs in Active CN102346823B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201010250363.2A CN102346823B (en) 2010-08-03 2010-08-03 The method and system that in a kind of internet, user logs in

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201010250363.2A CN102346823B (en) 2010-08-03 2010-08-03 The method and system that in a kind of internet, user logs in

Publications (2)

Publication Number Publication Date
CN102346823A true CN102346823A (en) 2012-02-08
CN102346823B CN102346823B (en) 2016-02-03

Family

ID=45545495

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201010250363.2A Active CN102346823B (en) 2010-08-03 2010-08-03 The method and system that in a kind of internet, user logs in

Country Status (1)

Country Link
CN (1) CN102346823B (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103685494A (en) * 2013-12-05 2014-03-26 北京奇虎科技有限公司 Method and device for recognizing Cookies and method and device clearing Cookies
CN103905497A (en) * 2012-12-27 2014-07-02 腾讯科技(深圳)有限公司 Method, device and application platform for realizing login of third-party application service website
CN104348612A (en) * 2013-07-23 2015-02-11 腾讯科技(深圳)有限公司 Third-party website login method based on mobile terminal and mobile terminal
CN104683334A (en) * 2015-02-11 2015-06-03 百度在线网络技术(北京)有限公司 Method and device for processing logging data
CN105743700A (en) * 2016-01-28 2016-07-06 北京量科邦信息技术有限公司 Simulation login method based on APP (Application) native page
CN106856470A (en) * 2015-12-09 2017-06-16 中国电信股份有限公司 For the method and device of guarding network attack
CN106961420A (en) * 2013-11-08 2017-07-18 北京奇虎科技有限公司 The processing method and processing device of cookie information
CN110084024A (en) * 2019-04-29 2019-08-02 四川长虹教育科技有限公司 Terminal device, the system and method for software login are carried out based on movable storage device

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101621498A (en) * 2008-06-30 2010-01-06 成都市华为赛门铁克科技有限公司 Method, device and equipment for defending against network attacks
CN101764841A (en) * 2009-12-16 2010-06-30 中兴通讯股份有限公司 Method and device for synchronizing user data

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101621498A (en) * 2008-06-30 2010-01-06 成都市华为赛门铁克科技有限公司 Method, device and equipment for defending against network attacks
CN101764841A (en) * 2009-12-16 2010-06-30 中兴通讯股份有限公司 Method and device for synchronizing user data

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
郑志勇: "攻防课堂之挖掘小甜饼", 《电脑迷》 *

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103905497A (en) * 2012-12-27 2014-07-02 腾讯科技(深圳)有限公司 Method, device and application platform for realizing login of third-party application service website
US9794242B2 (en) 2012-12-27 2017-10-17 Tencent Technology (Shenzhen) Company Limited Method, apparatus and application platform for realizing logon to an application service website
CN103905497B (en) * 2012-12-27 2018-04-27 腾讯科技(深圳)有限公司 Realize the method, apparatus and application platform of third-party application business website log
CN104348612A (en) * 2013-07-23 2015-02-11 腾讯科技(深圳)有限公司 Third-party website login method based on mobile terminal and mobile terminal
CN106961420A (en) * 2013-11-08 2017-07-18 北京奇虎科技有限公司 The processing method and processing device of cookie information
CN103685494A (en) * 2013-12-05 2014-03-26 北京奇虎科技有限公司 Method and device for recognizing Cookies and method and device clearing Cookies
CN104683334A (en) * 2015-02-11 2015-06-03 百度在线网络技术(北京)有限公司 Method and device for processing logging data
CN106856470A (en) * 2015-12-09 2017-06-16 中国电信股份有限公司 For the method and device of guarding network attack
CN105743700A (en) * 2016-01-28 2016-07-06 北京量科邦信息技术有限公司 Simulation login method based on APP (Application) native page
CN110084024A (en) * 2019-04-29 2019-08-02 四川长虹教育科技有限公司 Terminal device, the system and method for software login are carried out based on movable storage device

Also Published As

Publication number Publication date
CN102346823B (en) 2016-02-03

Similar Documents

Publication Publication Date Title
CN102346823A (en) User logging method and system in internet
US10270758B2 (en) Login method, server, and login system
TWI687113B (en) Method and server for determining whether the terminal logging in to the website is a mobile terminal
CN104283843B (en) A kind of method, apparatus and system that user logs in
CN113347206B (en) Network access method and device
CN102857484B (en) A kind of method, system and device realizing single-sign-on
US10607016B2 (en) Decrypting files for data leakage protection in an enterprise network
TWI671642B (en) Method for sharing data across applications and web browser
Tsai et al. Information security issue of enterprises adopting the application of cloud computing
CN102413151B (en) Network resource sharing method and system
US9203815B1 (en) Systems and methods for secure third-party data storage
CN109756337B (en) Secure access method and device for service interface
CN102420836A (en) Sign-on method and sign-on management system for service information system
Singh et al. Overview of security issues in cloud computing
US20180198675A1 (en) Techniques for accessing logical networks via a virtualized gateway
US9021578B1 (en) Systems and methods for securing internet access on restricted mobile platforms
Kumar Cloud computing: threats, attacks and solutions
CN106919348A (en) Distributed memory system and storage method that anti-violence is cracked
CN104426834A (en) Webpage requesting method, client, server and system
CN106685906B (en) authentication processing method, node and system
US10356112B2 (en) Method of mitigating cookie-injection and cookie-replaying attacks
KR101459261B1 (en) Apparatus and Method for Switching Browser Automatically in a Logical Network Separation
Suthar et al. Encryscation: An secure approach for data security using encryption and obfuscation techniques for iaas and daas services in cloud environment
CN103957252A (en) Method and system for obtaining log of cloud storage system
CN105893862A (en) Browser cache data protection method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant