CN102346823B - The method and system that in a kind of internet, user logs in - Google Patents

The method and system that in a kind of internet, user logs in Download PDF

Info

Publication number
CN102346823B
CN102346823B CN201010250363.2A CN201010250363A CN102346823B CN 102346823 B CN102346823 B CN 102346823B CN 201010250363 A CN201010250363 A CN 201010250363A CN 102346823 B CN102346823 B CN 102346823B
Authority
CN
China
Prior art keywords
log file
internal memory
user
kept
local device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201010250363.2A
Other languages
Chinese (zh)
Other versions
CN102346823A (en
Inventor
刘方敏
黄奎
严峻
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201010250363.2A priority Critical patent/CN102346823B/en
Publication of CN102346823A publication Critical patent/CN102346823A/en
Application granted granted Critical
Publication of CN102346823B publication Critical patent/CN102346823B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The present invention is applicable to internet arena, and the invention provides the method and system that in a kind of internet, user logs in, the method comprises: after user logins successfully, and generates the log file carrying log-on message; Described log file is kept in the internal memory of local device.Technical scheme of the present invention has the advantage improving security.

Description

The method and system that in a kind of internet, user logs in
Technical field
The invention belongs to internet arena, particularly relate to the method and system that in a kind of internet, user logs in.
Background technology
Along with the development of internet, user is exchanged by internet, the login method of internet of the prior art, is specially, after user opens this webpage or application program (such as instant messaging), display login interface, when after the account receiving user's input and password, server is sent to verify, after being proved to be successful the account and password, display logins successfully, and the account and password is generated Cookie file and is kept in local cache.
Conventionally provided technical scheme, finds to there is following technical matters in prior art:
The Cookie file of the technical scheme that prior art provides is kept at local cache, so the preservation position of Cookie file is changeless, so other people (such as hacker) is easy to obtain this Cookie file from local cache, obtain username and password information, the account security of user is low.
Summary of the invention
The object of the embodiment of the present invention is to provide a kind of method that in internet, user logs in, and is intended to solve user in prior art after log-on webpage or application program, occurs the problem that the account security of user is low.
The embodiment of the present invention is achieved in that a kind of method that in internet, user logs in, and described method comprises the steps:
After user logins successfully, generate the log file carrying log-on message;
Described log file is kept in the internal memory of local device.
The present invention also provides the system that in a kind of internet, user logs in, and described system comprises:
Generation unit, for after user logins successfully, generates the log file carrying log-on message;
Storage unit, for being kept at described log file in the internal memory of local device.
The embodiment of the present invention compared with prior art, beneficial effect is: this log file is stored in internal memory by technical scheme of the present invention, because internal memory is Random assignment, so the position that this log file stores is not fixed, so other people cannot obtain this log file, so it has the high advantage of security.
Accompanying drawing explanation
Fig. 1 is the process flow diagram of the method that in a kind of internet provided by the invention, user logs in;
Fig. 2 is the process flow diagram that the embodiment of the present invention one provides a kind of method that user logs in internet;
Fig. 3 is the logical diagram that the embodiment of the present invention three provides a kind of method that user logs in internet;
Fig. 4 is the logical diagram that the embodiment of the present invention four provides a kind of method that user logs in internet;
Fig. 5 is the structural drawing that the invention provides the system that user logs in a kind of internet.
Embodiment
In order to make object of the present invention, technical scheme and advantage clearly understand, below in conjunction with drawings and Examples, the present invention is further elaborated.Should be appreciated that specific embodiment described herein only in order to explain the present invention, be not intended to limit the present invention.
The invention provides a kind of method that in internet, user logs in, the method is completed by local device, and this local device specifically can as computing machine, can certainly be other equipment, such as mobile terminal, PDA etc., only needs this local device can logging in network or run application.
S11, after user logins successfully, generate and carry the log file of this log-on message;
It should be noted that, above-mentioned log-on message is specifically as follows, the account used when user logs in and password, the log file of current account and password can be all Cookie file, certainly in a practical situation, also can other filename of called after, such as KEY file etc., the present invention does not limit to the concrete form of this log file, only needs this log file to include account and encrypted message.
S12, this log file to be kept in the internal memory of local device.
Optionally, the method realizing S22 is specifically as follows:
In internal memory, Random assignment one memory headroom, is kept at this log file in memory headroom.
Optionally, after S22, can also comprise the steps:
Steps A, when determining under attack, again in internal memory, distribute another shelf space;
It should be noted that, above-mentionedly determine that determination methods under attack is specifically as follows:
After the preservation request receiving this log file, judge under attack, it can certainly be other method, such as when receiving the request of access of this log file of acquisition that third party sends, or when detecting that local device is attacked by trojan horse etc., the present invention does not limit to this determination methods under attack.
Step B, this log file to be kept in another shelf space.
Optionally, said method, after S11, can also comprise the steps:
Step C, by user browse record be kept in the internal memory of local device, the browsing content of user is kept at local cache;
Step D, by user browse record and the browsing content of user is kept in internal memory;
It should be noted that, the execution sequence of above-mentioned steps C, D before S12, also after S12, can certainly can perform with S12 simultaneously.
Method provided by the invention is when carrying out user and logging in, its place of preserving log file is internal memory, due to computing machine save the data in internal memory time, all Random assignment memory headrooms, according to the work characteristics of internal memory, when user releases login, operating system can discharge all memory headrooms shared by this process automatically, the memory headroom of certain this log file of preservation also can be discharged by operating system automatically, namely this log file is automatically deleted, so it has protection account safety, there is the advantage that security is high, and the address due to internal memory is Random assignment, all go to a fixing place to find internal memory required for you so have no idea at every turn, so this log file cannot be obtained from fixing place, further improve security.And the method is when determining under attack, change the memory headroom preserving this log file, there is user in this way when operating this webpage or application program, immediately attacked, this log file is owing to having changed memory headroom, also can not be obtained this log file by other people, institute further improves security in this way.
embodiment one:
The present embodiment provides a kind of method that in internet, user logs in, the technology scene that the present embodiment realizes is: the present embodiment supplying method entrusts browser to carry out in local device by server, namely the method is completed by local computer, the log file of the present embodiment is for Cookie file, the method as shown in Figure 2, specifically comprises the steps:
S21, after user logins successfully, generate and carry the Cookie file of the account and password;
S22, in internal memory Random assignment one memory headroom;
S23, this Cookie file to be kept in the memory headroom of distribution.
It should be noted that, when S22 Random assignment memory headroom, the size of its memory headroom distributed is wanted to preserve this Cookie file; Namely the size in its storage allocation space is greater than or equals the size of this Cookie file, illustrates with an example, if it is 1K that this Cookie file obtains size; The size of the memory headroom then distributed is greater than or equals 1K; Certainly in order to save internal memory, the size in prioritizing selection storage allocation space is 1K.
The method that the present embodiment provides is when carrying out user and logging in, its place of preserving Cookie file is internal memory, due to computing machine save the data in internal memory time, all Random assignment memory headrooms, according to the work characteristics of internal memory, when user releases login, operating system can discharge all memory headrooms shared by this process automatically, the memory headroom of this Cookie file of certain preservation also can be discharged by operating system automatically, namely this Cookie file is automatically deleted, so it has protection account safety, there is the advantage that security is high, and the address due to internal memory is Random assignment, all go to a fixing place to find internal memory required for you so have no idea at every turn, so this Cookie file cannot be obtained from fixing place, further improve security.
embodiment two:
The present embodiment provides a kind of method that in internet, user logs in, and the technology scene that the present embodiment realizes is identical with the technology scene that embodiment one realizes, and is not repeating here.The method embodiment one institute in steps outside, it can also comprise the steps: after S23
S24, after the request of access receiving third-party Cookie file, again in internal memory, distribute another shelf space;
S25, this Cookie file to be kept in another shelf space of distribution.
The method that the present embodiment provides is after receiving the request of access of third-party Cookie file (being equivalent to receive attack), change the memory headroom preserving this Cookie file, there is user in this way when operating this webpage or application program, immediately by success attack, this Cookie file, owing to having changed memory headroom, also can not be obtained this Cookie file by other people; Institute further improves security in this way.
embodiment three:
The present embodiment provides user in a kind of internet the method logged in, and the present embodiment place different from embodiment one is, browsing of user, when performing S23, can also to be recorded or the browsing content of user be kept in the memory headroom of distribution by the present embodiment.The record of browsing of above-mentioned user is specifically as follows: webpage browse record, it can certainly be the operation note of application program, can also be the state of current web page and the status information of user etc., the browsing content of above-mentioned user specifically can comprise: the web page contents browsed, the content of the application program browsed.The logical diagram of concrete accessed web page as shown in Figure 3.
The present embodiment not only preserves Cookie file; also preserve the browsing content browsing record and user of user; not only protect account and the password of user in this way, also protect the browsing content browsing record and user of user, further increase security.
embodiment four:
The present embodiment provides a kind of method that in internet, user logs in, the present embodiment place different from embodiment one is, the present embodiment is when performing S23, can also the record of browsing of user be kept in the memory headroom of distribution, it should be noted that, the above-mentioned browsing content due to user does not belong to privacy information, so the browsing content of user can certainly be kept at local cache, the logical diagram of the present embodiment accessed web page as shown in Figure 4.
The present invention also provides the system that in a kind of internet, user logs in, and this system as shown in Figure 5, specifically can comprise:
Generation unit 51, after user logins successfully, generates the log file carrying log-on message;
This log file is kept in the internal memory of local device by storage unit 52.
Optionally, above-mentioned storage unit 52 specifically can comprise:
Distribution module 521 is Random assignment one memory headroom in the internal memory of local device;
Preserve module 522 this log file is kept in described memory headroom.
Optionally, said system can also comprise:
Allocation units 53, when determining under attack, distribute another shelf space again in the internal memory of local device;
Described log file is also kept in another shelf space described by storage unit 52.
Optionally, the record of browsing that above-mentioned storage unit 52 goes back user is kept in the internal memory of local device, and the browsing content of user is kept at local cache; Or the browsing content browsing record and user of user is kept in the internal memory of local device.
It should be noted that, above-mentioned login letter can comprise: the account that user logs in and password, this log file can be Cookie file.
It should be noted that, the system that in this internet, user logs in can be the system of individualism, can certainly be arranged in mobile terminal, computing machine, PDA, and the present invention does not limit to the technology scene of this system realization and the concrete equipment at this system place.
System provided by the invention is when carrying out user and logging in, its place of preserving log file is internal memory, due to computing machine save the data in internal memory time, all Random assignment memory headrooms, according to the work characteristics of internal memory, when user releases login, operating system can discharge all memory headrooms shared by this process automatically, the memory headroom of certain this log file of preservation also can be discharged by operating system automatically, namely this log file is automatically deleted, so it has protection account safety, there is the advantage that security is high, and the address due to internal memory is Random assignment, all go to a fixing place to find internal memory required for you so have no idea at every turn, so this log file cannot be obtained from fixing place, further improve security.And this system is when determining under attack, change the memory headroom preserving this log file, so this system has user when operating this webpage or application program, immediately attacked, this log file is owing to having changed memory headroom, also this log file can not be obtained by other people, so this system further improves security.
It should be noted that in said system embodiment, included unit is carry out dividing according to function logic, but is not limited to above-mentioned division, as long as can realize corresponding function; In addition, the concrete title of each functional unit, also just for the ease of mutual differentiation, is not limited to protection scope of the present invention.
In addition, one of ordinary skill in the art will appreciate that all or part of step realized in above-described embodiment method is that the hardware that can carry out instruction relevant by program completes, corresponding program can be stored in a kind of computer-readable recording medium, the above-mentioned storage medium mentioned can be ROM (read-only memory), disk or CD etc.
In sum, technical scheme provided by the invention has the high advantage of security.
The foregoing is only preferred embodiment of the present invention, not in order to limit the present invention, all any amendments done within the spirit and principles in the present invention, equivalent replacement and improvement etc., all should be included within protection scope of the present invention.

Claims (8)

1. the method that in internet, user logs in, it is characterized in that, described method comprises the steps:
After user logins successfully, generate the log file carrying log-on message;
Described log file is kept in the internal memory of local device;
After the request of access receiving third-party log file, again in internal memory, distribute another shelf space;
Described log file is kept in another shelf space described;
After described generation carries the log file of log-on message, described method also comprises:
The browsing content browsing record and user of user is kept in the internal memory of local device.
2. method according to claim 1, is characterized in that, describedly the step that described log file is kept in the internal memory of local device is specifically comprised:
In the internal memory of local device, Random assignment one memory headroom, is kept at this log file in described memory headroom.
3. method according to claim 1, is characterized in that, after the described request of access receiving third-party log file, in internal memory, again distributing another shelf space be specially:
When determining under attack, again in the internal memory of local device, distribute another shelf space.
4. method according to claim 1, is characterized in that, described log-on message comprises: the account that user logs in and password, described log file is Cookie file.
5. the system that in internet, user logs in, it is characterized in that, described system comprises:
Generation unit, for after user logins successfully, generates the log file carrying log-on message;
Storage unit, for being kept in the internal memory of local device by described log file, also for being kept in the internal memory of local device by the browsing content browsing record and user of user;
Allocation units, for after the request of access receiving third-party log file, distribute another shelf space again in internal memory;
Described storage unit is also for being kept at described log file in another shelf space described.
6. system according to claim 5, is characterized in that, described storage unit specifically comprises:
Distribution module, for Random assignment one memory headroom in the internal memory of local device;
Preserve module, for being kept in described memory headroom by this log file.
7. system according to claim 5, is characterized in that, described allocation units, specifically for when determining under attack, distribute another shelf space again in the internal memory of local device.
8. system according to claim 5, is characterized in that, described log-on message comprises: the account that user logs in and password, described log file is Cookie file.
CN201010250363.2A 2010-08-03 2010-08-03 The method and system that in a kind of internet, user logs in Active CN102346823B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201010250363.2A CN102346823B (en) 2010-08-03 2010-08-03 The method and system that in a kind of internet, user logs in

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201010250363.2A CN102346823B (en) 2010-08-03 2010-08-03 The method and system that in a kind of internet, user logs in

Publications (2)

Publication Number Publication Date
CN102346823A CN102346823A (en) 2012-02-08
CN102346823B true CN102346823B (en) 2016-02-03

Family

ID=45545495

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201010250363.2A Active CN102346823B (en) 2010-08-03 2010-08-03 The method and system that in a kind of internet, user logs in

Country Status (1)

Country Link
CN (1) CN102346823B (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103905497B (en) 2012-12-27 2018-04-27 腾讯科技(深圳)有限公司 Realize the method, apparatus and application platform of third-party application business website log
CN104348612A (en) * 2013-07-23 2015-02-11 腾讯科技(深圳)有限公司 Third-party website login method based on mobile terminal and mobile terminal
CN106961420B (en) * 2013-11-08 2021-04-02 北京奇虎科技有限公司 Cookie information processing method and device
CN103685494B (en) * 2013-12-05 2017-09-19 北京奇虎科技有限公司 Cookies recognition methods and device and Cookies method for cleaning and device
CN104683334A (en) * 2015-02-11 2015-06-03 百度在线网络技术(北京)有限公司 Method and device for processing logging data
CN106856470A (en) * 2015-12-09 2017-06-16 中国电信股份有限公司 For the method and device of guarding network attack
CN105743700A (en) * 2016-01-28 2016-07-06 北京量科邦信息技术有限公司 Simulation login method based on APP (Application) native page
CN110084024A (en) * 2019-04-29 2019-08-02 四川长虹教育科技有限公司 Terminal device, the system and method for software login are carried out based on movable storage device

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101621498A (en) * 2008-06-30 2010-01-06 成都市华为赛门铁克科技有限公司 Method, device and equipment for defending against network attacks
CN101764841A (en) * 2009-12-16 2010-06-30 中兴通讯股份有限公司 Method and device for synchronizing user data

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101621498A (en) * 2008-06-30 2010-01-06 成都市华为赛门铁克科技有限公司 Method, device and equipment for defending against network attacks
CN101764841A (en) * 2009-12-16 2010-06-30 中兴通讯股份有限公司 Method and device for synchronizing user data

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
郑志勇.攻防课堂之挖掘小甜饼.《电脑迷》.2006, *

Also Published As

Publication number Publication date
CN102346823A (en) 2012-02-08

Similar Documents

Publication Publication Date Title
CN102346823B (en) The method and system that in a kind of internet, user logs in
US20200351174A1 (en) Providing Mobile Device Management Functionalities
US20200145510A1 (en) Optimizing Web Applications Using a Rendering Engine
US10270758B2 (en) Login method, server, and login system
US20190097807A1 (en) Network access control based on distributed ledger
CN107852585B (en) Method and computer-readable medium for improving performance of wrapped applications
CN109756337B (en) Secure access method and device for service interface
JP2016519818A (en) Provision of mobile device management functions
US8813179B1 (en) Providing mobile device management functionalities
CN106339309A (en) Application program test method, client side and system
CN111066307B (en) Wrapping continuation tokens to support paging across multiple servers in different geographic locations
US11743101B2 (en) Techniques for accessing logical networks via a virtualized gateway
KR101459261B1 (en) Apparatus and Method for Switching Browser Automatically in a Logical Network Separation
CN110941412A (en) Method, system and terminal for realizing multi-terminal animation co-browsing based on imaging
KR101531833B1 (en) Multi-channel method and device for smartwork security framework based on mobile virtualization environment
CN103346880B (en) A kind of handset token automatic recovery system and method
CN103067365A (en) Set top box, client-side, system and method for virtual desktop access
CN109302446B (en) Cross-platform access method and device, electronic equipment and storage medium
CN103051607B (en) Access method, equipment and system
US10915646B2 (en) Method and apparatus for network secure storage
US11095683B1 (en) Systems and methods for delegating endpoint security operations to a nearby computing device
CN105871928A (en) Safety control method and safety control system of distributed network
AU2012319193B2 (en) Techniques for accessing logical networks via a programmatic service call
CN103279308A (en) Cache method and device for remote application interface
Qian et al. A cloud-based system for enhancing security of Android devices

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant