CN108462687A - Method, apparatus, terminal device and the storage medium that anti-brush logs in - Google Patents

Method, apparatus, terminal device and the storage medium that anti-brush logs in Download PDF

Info

Publication number
CN108462687A
CN108462687A CN201810014424.1A CN201810014424A CN108462687A CN 108462687 A CN108462687 A CN 108462687A CN 201810014424 A CN201810014424 A CN 201810014424A CN 108462687 A CN108462687 A CN 108462687A
Authority
CN
China
Prior art keywords
sequence number
verification
termination
client
brush
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810014424.1A
Other languages
Chinese (zh)
Other versions
CN108462687B (en
Inventor
辜坤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN201810014424.1A priority Critical patent/CN108462687B/en
Priority to PCT/CN2018/077313 priority patent/WO2019134234A1/en
Publication of CN108462687A publication Critical patent/CN108462687A/en
Application granted granted Critical
Publication of CN108462687B publication Critical patent/CN108462687B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords

Abstract

The invention discloses a kind of method, apparatus, terminal device and storage mediums that anti-brush logs in, and are related to technical field of network security.This it is anti-brush log in method include:The login authentication request that client is sent is obtained, login authentication request includes Termination ID;Database is inquired based on Termination ID, judges to whether there is verification sequence number corresponding with Termination ID in database;If there is verification sequence number, judge whether verification sequence number is effective based on the sequence number information in verification sequence number;If verifying, sequence number is effective, updates the sequence number information of verification sequence number, generates graphical verification code corresponding with verification sequence number, and graphical verification code is sent to client corresponding with Termination ID.Server only makes a response the verification effective client of sequence number in this method, greatly reduces the danger trespassed by crack servers after multiple brush machine.

Description

Method, apparatus, terminal device and the storage medium that anti-brush logs in
Technical field
The present invention relates to network safety filed more particularly to a kind of method, apparatus, terminal device and storages that anti-brush logs in Medium.
Background technology
C/S (Client/Server, client and server) structure is common Internet architecture, by making full use of Task is reasonably allocated to client and server to realize by the advantage of both ends hardware environment.For the safety of safeguard service device, It needs to carry out authentication to client before server execution task in C/S structures, is common certification by graphical verification code Mode.Graphical verification code authentication mode does not have anti-brush mechanism mostly at present, and safety is not high.
Invention content
The embodiment of the present invention provides a kind of method, apparatus, terminal device and storage medium that anti-brush logs in, current to solve Graphical verification code authentication mode does not have anti-brush mechanism, the not high problem of safety mostly.
In a first aspect, the embodiment of the present invention provides a kind of method that anti-brush logs in, including:
The login authentication request that client is sent is obtained, login authentication request includes Termination ID;
Database is inquired based on Termination ID, judges to whether there is verification sequence number corresponding with Termination ID in database;
If there is verification sequence number, judge to verify whether sequence number has based on the sequence number information in verification sequence number Effect;
If verifying, sequence number is effective, updates the sequence number information of verification sequence number, generates corresponding with verification sequence number Graphical verification code, and graphical verification code is sent to client corresponding with Termination ID.
Second aspect, the embodiment of the present invention provide a kind of device that anti-brush logs in, including:
Login authentication request module is obtained, the login authentication request for obtaining client transmission, login authentication request bag Include Termination ID;
Judgement verification sequence number module judges to whether there is and end in database for inquiring database based on Termination ID Hold the corresponding verification sequence numbers of ID;
The effective module of sequence number is judged, if for there is verification sequence number, based on the sequence number letter in verification sequence number Breath judges whether verification sequence number is effective;
Graphical verification code module is sent, if effective for verifying sequence number, updates the sequence number information of verification sequence number, Graphical verification code corresponding with verification sequence number is generated, and graphical verification code is sent to client corresponding with Termination ID End.
Third aspect present invention provides a kind of terminal device, including memory, processor and is stored in the memory In and the computer program that can run on the processor, the processor realize such as this hair when executing the computer program The step of method that the bright anti-brush logs in.
Fourth aspect present invention provides a kind of computer readable storage medium, and the computer-readable recording medium storage has Computer program realizes anti-the step of brushing the method logged in as described herein when the computer program is executed by processor.
It is provided in an embodiment of the present invention it is anti-brush log in method, apparatus, terminal device and storage medium, be by judge with Whether the Termination ID of client corresponding verification sequence number is effectively realized.If there is verification sequence number in database, and When verify sequence number it is effective when, generate with the corresponding graphical verification code of verification sequence number, and graphical verification code is sent to and The corresponding client of Termination ID.Server only makes a response the verification effective client of sequence number, on the one hand greatly reduces The danger trespassed by crack servers after multiple brush machine.
Description of the drawings
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below by institute in the description to the embodiment of the present invention Attached drawing to be used is needed to be briefly described, it should be apparent that, the accompanying drawings in the following description is only some implementations of the present invention Example, for those of ordinary skill in the art, without having to pay creative labor, can also be according to these attached drawings Obtain other attached drawings.
Fig. 1 is a flow chart of the method that anti-brush logs in the embodiment of the present invention 1.
Fig. 2 is another particular flow sheet for the method that anti-brush logs in the embodiment of the present invention 1.
Fig. 3 is another particular flow sheet for the method that anti-brush logs in the embodiment of the present invention 1.
Fig. 4 is a functional block diagram of the device that anti-brush logs in the embodiment of the present invention 2.
Fig. 5 is a schematic diagram of terminal device in the embodiment of the present invention 4.
Specific implementation mode
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation describes, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair Embodiment in bright, the every other implementation that those of ordinary skill in the art are obtained without creative efforts Example, shall fall within the protection scope of the present invention.
Embodiment 1
Fig. 1 shows the flow chart for the method that anti-brush logs in the present embodiment.The present embodiment is applied in C/S (Client/ Server, client and server) structure Internet architecture in, wherein the executive agent of this programme is equipped with database Server.As shown in Figure 1, the method that the anti-brush logs in includes the following steps:
S10. the login authentication request that client is sent is obtained, login authentication request includes Termination ID.
Specifically, the client in the present embodiment includes but not limited to smart mobile phone, computer, PAD etc. for user's typing The terminal that information is interacted with server.
Login authentication request is that (verification information can be User ID to the entrance typing verification information that is provided from client of user With user password etc.) after, the request for establishing secure connection is sent to server.
Termination ID is the mark for the client for sending login authentication request for identification.Server can be according to the Termination ID Determine that it is the IP address of client for identification or log in MAC Address etc..
The present embodiment asks Connection Service device by the login authentication that client is sent, and can be established in server and client The safety of client is confirmed before secure connection.
S20. it is based on Termination ID and inquires database, judge to whether there is verification sequence corresponding with Termination ID in database Number.
It is that first log into checking request of the server based on any client gives client corresponding terminal to verify sequence number The one number of ID distribution.Server subsequently can client-based Termination ID, it is corresponding that the client is searched from database Verify sequence number.
Client-based Termination ID in the present embodiment, in the database storage with the associated verification sequence number of Termination ID, The verification sequence number that the Termination ID can be matched rapidly in the server of storage mass data, obtains the corresponding visitor of the Termination ID The sequence number information at family end carries out safety verification to be based on the sequence number information.
If S30. there is verification sequence number, judge whether verify sequence number based on the sequence number information in verification sequence number Effectively.
Specifically, sequence number information is the login situation of record and the verification associated Termination ID of sequence number, for example verifies sequence Login times, verification period and the effective degree of row number.The verification period be server be set according to actual conditions limiting The time of client login times;Effective degree is most logins within the verification period that server is set according to actual conditions Number;Login times are the numbers for the login authentication request that client is sent.
Further, if the current time in system is within the verification period, and the corresponding login times of Termination ID are obtained effective In number, then it is effective to verify sequence number, on the contrary then invalid.Judging whether verification sequence number is effective based on sequence number information When, the current time in system need to be judged whether within the verification period of sequence number information, and judges the corresponding login times of Termination ID Whether in the effective degree of sequence number information, if the current time in system within the verification period, and obtains that Termination ID is corresponding steps on Number is recorded in effective degree, then it is effective to verify sequence number;If the current time in system not verification the period in or login times not In effective degree, then invalid sequence number is verified.
In the present embodiment, the sequence number information of client can be known rapidly by sequence number information, to be based on the sequence Row information judges the validity of verification sequence number, provides corresponding feedback action.
When server often gets a login authentication information, a pair sequence for verification sequence number corresponding with its Termination ID is needed Number information is updated, so that its sequence number information changes in real time, volatile data base (such as REDIS) may be used in the present embodiment Store sequence number information.REDIS is that a use ANSI C language increased income is write, supports network, can also be held based on memory Log type, the Key-Value databases changed long.Quick search can be realized using REDIS storages sequence number information.
For example, can be 2 minutes by verification slot setup, effective degree be set as 20 times.That is, if client is at 2 points Login times in clock are less than 20 times, then the verification sequence number of the client is also effective.It is to be appreciated that if client is 2 Login times in minute reach 20 times, then the verification invalid sequence number of the client.
In the present embodiment, effective degree is less than by the login times being limited in the limited verification period, it may be determined that It is effective to verify sequence number, improves the whether effective authenticity of confirmation verification sequence number and accuracy.
If S40. verification sequence number is effective, the sequence number information of verification sequence number is updated, is generated and verification sequence number phase Corresponding graphical verification code, and graphical verification code is sent to client corresponding with Termination ID.
Specifically, verification sequence number effectively meets preset requirement including the verification associated sequence number information of sequence number, including But it is not limited to:The login times of verification sequence number are in effective degree etc. within the verification period of verification sequence number.
Server receives the request of this login authentication, based on getting sequence number information associated with Termination ID When progress Effective judgement determines that its verification sequence number is effective, then the dynamic content in renewal sequence information is needed, for example, testing Demonstrate,prove the login times of sequence number.Specifically, it is asked when server receives new login authentication, and effective in verification sequence number When, so that the login times of verification sequence number is added 1, and so on.
In the present embodiment, the login authentication request of client is defined, only to the verification effective client of sequence number Graphical verification code is sent, effectively ensures the malice brush machine that server is initiated from client.
The method that anti-brush provided in this embodiment logs in, is by judging verification sequence corresponding with the Termination ID of client Whether row number is effectively realized.If there is verification sequence number in database, and when verification sequence number is effective, generate and verification The corresponding graphical verification code of sequence number, and graphical verification code is sent to client corresponding with Termination ID.Server is only The verification effective client of sequence number is made a response, is on the one hand greatly reduced illegal by crack servers after multiple brush machine The danger of intrusion;On the other hand, it because being accessed by the associated verification sequence number limitation of Termination ID, is no longer limited and is accessed by IP Server, the user experience is improved.
In a specific embodiment, as shown in Figure 1, after step S30, i.e., based on the sequence in verification sequence number Number information judges after verifying the whether effective step of sequence number that method that the anti-brush logs in further includes:
If S50. verifying invalid sequence number, Termination ID is arranged in the verification sequence number in the library that clears data in the database Login status be lock-out state, and to client send login failure information.
Specifically, if verification invalid sequence number, the i.e. associated sequence number information of current authentication sequence number do not meet default want The case where asking.It is to be appreciated that the login times of verification sequence number are more than effective degree within the verification period of verification sequence number, It can assert the verification invalid sequence number.
The login times of verification sequence number are more than effective degree within the verification period of verification sequence number, illustrate that client exists Verify multiple login service device in the period, it is understood that there may be the unsafe factor of client.At this point, Termination ID is arranged in the database Login status be lock-out state, preset time, such as 2 hours or 1 day are set as during the locking that state can be locked, The client is locked, the login authentication request of client initiation is refused.While locking, by the corresponding verification sequence of the client Row number is also deleted in the database, mitigates the redundant data of database, and conducive to client after unlock login service again Device.In the present embodiment, the client of invalid sequence number being verified by locking, can be effectively protected server, malice is avoided to brush Machine.
Login failure information is the notification information that server is sent to client, to notify client login failure, and By client during locking the fixed information of internal lock.The login failure information is sent to client by server, for reminding visitor Family end can just access server again later during locking.
In a specific embodiment, as shown in Figure 1, before step S20, namely whether there is in judging database Before the step of verification sequence number corresponding with Termination ID, the method that anti-brush logs in further includes:
S60. judge whether the corresponding login status of Termination ID is lock-out state.
Specifically, there are a variety of situations for the client of login service device:It logs in, stepped on when verification sequence number is effective for the first time Record, login etc. after login, locked period login, unlock when verifying invalid sequence number, client is locked in these situations When period logs in, the corresponding login status of Termination ID is lock-out state.Server needs receiving stepping on for client transmission After recording checking request, the login situation of the client is distinguished rapidly, so as to the feedback made a response.
In the present embodiment, judge whether client is in the lock state first by the Termination ID of client, it can be quick Ground responds to the login authentication request that client is sent.
If S70. login status is lock-out state, login failure information is sent to client.
Specifically, login failure information is the notification information that server is sent to client, to notify client to log in Failure, and by client during locking the fixed information of internal lock.The login failure information is sent to client by server, is used for Remind client during locking after just can login service device again.
In the present embodiment, by sending login failure information to client, is reminded accordingly to client, improve user Experience.
If S80. login status is not lock-out state, executes and judge in database with the presence or absence of corresponding with Termination ID The step of verifying sequence number.
Specifically, can be with the preliminary judgement client temporarily for security client if login status is not lock-out state, it can To carry out the judgement of the subsequently verification sequence number for the client.Here not be lock-out state include but not limited to for the first time Log in, verify sequence number it is effective when log in, when verify invalid sequence number log in and unlock after login etc. situations.
In the present embodiment, judge that client is not locked out first, i.e., be not lock-out state, it is peace that can confirm client temporarily Full client can execute rapidly subsequent verification step (i.e. the step of after step S20), improve verification efficiency.
In a specific embodiment, as shown in Figure 1, after step S20, namely whether there is in judging database After the step of verification sequence number corresponding with Termination ID, the method which logs in further includes:
If verification sequence number is S90. not present, the corresponding verification sequence number of terminal ID assignment, initialization verification sequence are given Number sequence number information, generate and verify the associated graphical verification code of sequence number, graphical verification code is sent to and Termination ID Corresponding client.
Specifically, corresponding verification sequence number is not present in the Termination ID of client, and the terminal is not present in database of descriptions The sequence number information of ID, server need to establish new record to the Termination ID, subsequently to identify the client.Further Corresponding verification sequence number is established on ground based on the Termination ID, is based on the verification sequence number, establishes corresponding sequence number letter Breath, to establish complete record information in the server to the client.In the present embodiment, the sequence of initialization verification sequence number Row information refers to that the login times in its sequence number information are set as 1, subsequently often to receive same client hair When the login authentication request sent, 1 can be added on the basis of the login times of last registration, in order to be based on the verification of its login times Whether effective verify sequence number.
It is to be appreciated that when to there is no when the client distribution verification sequence number of verification sequence number, illustrate the client It is first login server, can temporarily regards as safe client and send graphical verification code.
In the present embodiment, by the client distribution verification sequence number to first login server, and relevant sequence is established Row information, when being conducive to the follow-up client application login service device, server is made according to the sequence number information of the client Response.
In a specific embodiment, as shown in Fig. 2, the method that the anti-brush that the present embodiment proposes logs in further includes:Sequence Number information includes verification period and effective degree.
S110. timing more new command is obtained, timing more new command includes program ID.
Specifically, timing more new command is the instruction for initiating effective degree in renewal sequence information.Program ID is For identifying the unique number each instructed, server can call different program instructions by program ID.
S120. at the end of the current time in system is each verification period, more new procedures corresponding with program ID are triggered, The effective degree of renewal sequence information is zero.
Further, at the end of each verification period, the verification period corresponding verification sequence number there is also, it was demonstrated that should Verify that sequence number is also effective namely login times of client are in effective degree.The Yin Ben verification periods, the client was corresponding Sequence number is effective, can tentatively confirm that client is security client, can distribute next verification period to client.It is appreciated that Ground, at this time by the corresponding effective degree zero setting of the verification sequence number, when exactly continuing to continue a verification to the verification sequence number Section.
For example, can be 2 minutes by verification slot setup, effective degree be set as 20 times.That is, if client is at 2 points Login times in clock are less than 20 times, then the client can preliminary judgement be safety client, which can protect It stays and corresponds to and open next verification period.It is to be appreciated that the corresponding verification sequence number of the client is at first in 2 minutes Login times are in effective degree, then at second in 2 minutes, the maximum login times of the verification sequence number can also be 19 It is secondary.At this time, it is necessary at the end of first 2 minutes verification period, the corresponding effective degree of the verification sequence number is reset, It is counted to re-start.
In the present embodiment, server is automatically continued to the verification effective client of sequence number continues next verification period, While ensureing Server Security, also it is conducive to promote customer experience.
In a specific embodiment, as shown in figure 3, graphical verification code is sent to client corresponding with Termination ID After the step of end, the method which logs in further includes:
S130. the access checking request that client is sent is obtained, it includes Termination ID and current verification code to access checking request.
Specifically, it is the graphical verification code that client is sent based on server to access checking request, is worked as to server transmission Preceding identifying code, the request that current verification code is verified to server.
In the present embodiment, server is by verifying the current verification code that client is sent, for further determining The safety of client can avoid the malice brush machine that server is initiated by client.
S140. it is based on Termination ID and obtains corresponding graphical verification code.
Specifically, when the corresponding client of each Termination ID sends access checking request to server, server can be based on Termination ID inquiry obtains storage graphical verification code in the database, current to be inputted with client based on the graphical verification code Identifying code carries out matching verification.It is to be appreciated that graphical verification code is being sent to the corresponding client of Termination ID by server Later, which need to be stored in the database, safety verification is carried out in order to subsequently be based on the graphical verification code.
It, can be to client by obtaining the corresponding graphical verification code of Termination ID of server storage in the present embodiment Safe condition is decision making, simple and effective.
If S150. current verification code matches with graphical verification code, by accessing checking request.
It, can be fast by the matched client of graphical verification code in the current verification code and server of transmission in the present embodiment Speed is by accessing checking request, while simplifying proving program, it is also ensured that the safety of server.
If S160. current verification code is mismatched with graphical verification code, execute based on the sequence number letter in verification sequence number Breath judges to verify the whether effective step of sequence number.
Specifically, if current verification code is mismatched with graphical verification code, server is needed to be confirmed whether to send figure again Identifying code is verified to client, that is, needs to inquire database, acquisition and terminal based on the Termination ID accessed in checking request The corresponding verification sequence numbers of ID, then execute and judge whether verification sequence number effective based on the sequence number information in verification sequence number The step of (i.e. step S30).
Further, by the corresponding verification sequence number of Termination ID, the sequence number information based on verification sequence number record (such as the login times of verification sequence number, verification period and effective degree etc.), whether decision verification sequence number is effective, if having Effect then needs update sequence number information corresponding with Termination ID, and sends graphical verification code to client, to remind client weight New input accesses checking request.
The sequence number information that can know client rapidly by sequence number information is judged to verify the effective of sequence number Property, provide corresponding feedback action.
In the present embodiment, the access checking request with current verification code sent by obtaining client can be first Match the safety of client surely by graphical verification code and current authentication, it is simple and effective;When graphical verification code is not verified When, then the corresponding sequence number information of the Termination ID is judged, to make feedback action.
It should be understood that the size of the serial number of each step is not meant that the order of the execution order in above-described embodiment, each process Execution sequence should be determined by its function and internal logic, the implementation process without coping with the embodiment of the present invention constitutes any limit It is fixed.
Embodiment 2
The functional block diagram for the device that the one-to-one anti-brush of method that Fig. 5 is shown with anti-brush logs in embodiment 1 logs in.Such as Shown in Fig. 5, the device which logs in includes obtaining login authentication request module 10, judging verification sequence number module 20, judge The effective module 30 of sequence number and transmission graphical verification code module 40.Wherein, it obtains login authentication request module 10, judge verification sequence Row number module 20 judges the effective module 30 of sequence number and sends anti-brush in the realization function and embodiment of graphical verification code module 40 The corresponding step of method of login corresponds, and to avoid repeating, the present embodiment is not described in detail one by one.
Login authentication request module 10 is obtained, the login authentication request for obtaining client transmission, login authentication request Including Termination ID.
Judge verification sequence number module 20, for inquiring database based on Termination ID, judge in database with the presence or absence of with The corresponding verification sequence number of Termination ID.
The effective module 30 of sequence number is judged, if for there is verification sequence number, based on the sequence number in verification sequence number Information judges whether verification sequence number is effective.
Graphical verification code module 40 is sent, if effective for verifying sequence number, updates the sequence number letter of verification sequence number Breath generates graphical verification code corresponding with verification sequence number, and graphical verification code is sent to visitor corresponding with Termination ID Family end.
Preferably, as shown in figure 5, the device that the anti-brush logs in further includes removing verification sequence number module 50.Wherein, it removes The realization function step corresponding with the method that anti-brush logs in embodiment for verifying sequence number module 50 corresponds, to avoid going to live in the household of one's in-laws on getting married It states, the present embodiment is not described in detail one by one.Verification sequence number module 50 is removed, if for verifying invalid sequence number, clear data library In verification sequence number, in the database be arranged Termination ID login status be lock-out state, and to client send log in lose Lose information.
Preferably, as shown in figure 5, the device that the anti-brush logs in further includes judging lock-out state module 60, sending to log in and lose It loses information module 70 and executes verification sequence number module 80.Wherein, judge lock-out state module 60, send login failure information mould Block 70 and the realization function of executing verification sequence number module 80 step 1 corresponding with the method that anti-brush logs in embodiment are a pair of It answers, to avoid repeating, the present embodiment is not described in detail one by one.
Lock-out state module 60 is judged, for judging whether the corresponding login status of Termination ID is lock-out state.
Login failure information module 70 is sent, if being lock-out state for login status, sends to log in client and lose Lose information.
Execute verification sequence number module 80, if being not lock-out state for login status, execute judge be in database It is no to there is the step of verification sequence number corresponding with Termination ID.
Preferably, as shown in figure 5, the device that the anti-brush logs in further includes distribution verification sequence number module 90.Wherein, it distributes The realization function step corresponding with the method that anti-brush logs in embodiment for verifying sequence number module 90 corresponds, to avoid going to live in the household of one's in-laws on getting married It states, the present embodiment is not described in detail one by one.
Distribution verification sequence number module 90, if for there is no verification sequence number, gives the corresponding verification of terminal ID assignment Sequence number, the sequence number information of initialization verification sequence number, generates graphical verification code associated with verification sequence number, by figure Identifying code is sent to client corresponding with Termination ID.
Preferably, judge the effective module 30 of sequence number, if for the current time in system within the verification period, and obtain terminal For the number of ID corresponding login authentication requests in effective degree, then it is effective to verify sequence number, on the contrary it is then in vain.
Preferably, as shown in figure 5, the device that the anti-brush logs in further includes obtaining update instruction module 110 and update of setting out Program module 120.Wherein, the realization function and embodiment 1 of update instruction module 110 and the more new program module 120 that sets out are obtained In step S110 and S120 corresponding to the method that logs in of anti-brush correspond, to avoid repeating, the present embodiment is not described in detail one by one.
Update instruction module 110 is obtained, for obtaining timing more new command, timing more new command includes program ID and triggering Time.
Set out more new program module 120, for when the current time in system is the triggered time, triggering to be corresponding with program ID More new procedures, remove the current time in system not verification the period verification sequence number.
Preferably, as shown in figure 5, device that the anti-brush logs in further includes obtaining access request module 130, obtaining figure and test Demonstrate,prove code module 140, by accessing checking request module 150, denied access checking request module 160.Wherein, access request is obtained Module 130 obtains graphical verification code module 140, by accessing checking request module 150, denied access checking request module 160 Realization function corresponded with the corresponding step of method that anti-brush logs in embodiment, to avoid repeating, the present embodiment differs One is described in detail.
Access request module 130 is obtained, the access checking request for obtaining client transmission, accessing checking request includes Termination ID and current verification code.
Graphical verification code module 140 is obtained, for obtaining corresponding graphical verification code based on Termination ID.
Pass through access if matching for current verification code and graphical verification code by accessing checking request module 150 Checking request.
Denied access checking request module 160, if being mismatched for current verification code and graphical verification code, execution is based on Sequence number information in verification sequence number judges to verify the whether effective step of sequence number.
Embodiment 3
The present embodiment provides a computer readable storage medium, computer journey is stored on the computer readable storage medium Sequence realizes the method that anti-brush logs in embodiment 1, to avoid repeating, here no longer when the computer program is executed by processor It repeats.Alternatively, realizing each module/unit in the device that anti-brush logs in embodiment 2 when the computer program is executed by processor Function, to avoid repeating, which is not described herein again.
Embodiment 4
Fig. 5 is the schematic diagram for device/terminal device that the anti-brush that one embodiment of the invention provides logs in.As shown in figure 5, should Device/terminal device 500 that the anti-brush of embodiment logs in includes:Processor 510, memory 520 and it is stored in memory 520 In and the computer program 530 that can be run on processor 510, such as program that anti-brush logs in.Processor 510 executes computer The step in the embodiment of the method that above-mentioned each anti-brush logs in, such as step S10 to S40 shown in FIG. 1 are realized when program 530. Alternatively, processor 510 realizes the function of each module/unit in above-mentioned each device embodiment when executing computer program 530, such as The function of module 10 to 40 shown in Fig. 5.
Illustratively, computer program 530 can be divided into one or more module/units, one or more mould Block/unit is stored in memory 520, and is executed by processor 510, to complete the present invention.One or more module/units Can be the series of computation machine program instruction section that can complete specific function, the instruction segment is for describing computer program 530 Implementation procedure in device/terminal device 500 that anti-brush logs in.It is stepped on for example, computer program 530 can be divided into acquisition Record checking request module 10 judges verification sequence number module 20, judges the effective module 30 of sequence number and sends graphical verification code mould Block 40 (module in virtual bench), each module concrete function are corresponded with the step of method that anti-brush logs in embodiment 1, To avoid repeating, do not repeat one by one herein.
Device/terminal device 500 that anti-brush logs in can be desktop PC, notebook, palm PC and high in the clouds clothes The computing devices such as business device.Device/terminal device that anti-brush logs in may include, but be not limited only to, processor 510, memory 520. It will be understood by those skilled in the art that Fig. 5 is only the example for device/terminal device 500 that anti-brush logs in, do not constitute to anti- The restriction for brushing the device/terminal device 500 logged in may include than illustrating more or fewer components, or the certain portions of combination Part or different components, such as device/terminal device that anti-brush logs in can also include input-output equipment, network insertion Equipment, bus etc..
Alleged processor 510 can be central processing unit (Central Processing Unit, CPU), can also be Other general processors, digital signal processor (Digital Signal Processor, DSP), application-specific integrated circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field- Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic, Discrete hardware components etc..General processor can be microprocessor or the processor can also be any conventional processor Deng.
Memory 520 can be the internal storage unit for device/terminal device 500 that anti-brush logs in, such as the login of anti-brush Device/terminal device 500 hard disk or memory.Memory 520 can also be device/terminal device 500 that anti-brush logs in The plug-in type hard disk being equipped on External memory equipment, such as device/terminal device 500 of anti-brush login, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card, flash card (Flash Card) etc..Into One step, memory 520 can also be both including the anti-internal storage unit for brushing the device/terminal device 500 logged in or including outer Portion's storage device.Memory 520 is used to store other journeys needed for device/terminal device that computer program and anti-brush log in Sequence and data.Memory 520 can be also used for temporarily storing the data that has exported or will export.
It is apparent to those skilled in the art that for convenience of description and succinctly, only with above-mentioned each work( Can unit, module division progress for example, in practical application, can be as needed and by above-mentioned function distribution by different Functional unit, module are completed, i.e., the internal structure of device are divided into different functional units or module, to complete above description All or part of function.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, it can also It is that each unit physically exists alone, it can also be during two or more units be integrated in one unit.Above-mentioned integrated list The form that hardware had both may be used in member is realized, can also be realized in the form of SFU software functional unit.
If the integrated module/unit be realized in the form of SFU software functional unit and as independent product sale or In use, can be stored in a computer read/write memory medium.Based on this understanding, the present invention realizes above-mentioned implementation All or part of flow in example method, can also instruct relevant hardware to complete, computer journey by computer program Sequence can be stored in a computer readable storage medium, and the computer program is when being executed by processor, it can be achieved that above-mentioned each The step of embodiment of the method.Wherein, computer program includes computer program code, and computer program code can be source code Form, object identification code form, executable file or certain intermediate forms etc..The computer-readable medium may include:It can Carry any entity or device, recording medium, USB flash disk, mobile hard disk, magnetic disc, CD, computer of the computer program code Memory, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), electric carrier signal, telecommunication signal and software distribution medium etc..It should be noted that the computer-readable medium Including content can carry out increase and decrease appropriate according to legislation in jurisdiction and the requirement of patent practice, such as in certain departments Method administrative area, according to legislation and patent practice, computer-readable medium is including being not electric carrier signal and telecommunication signal.
Embodiment described above is merely illustrative of the technical solution of the present invention, rather than its limitations;Although with reference to aforementioned reality Applying example, invention is explained in detail, it will be understood by those of ordinary skill in the art that:It still can be to aforementioned each Technical solution recorded in embodiment is modified or equivalent replacement of some of the technical features;And these are changed Or replace, the spirit and scope for various embodiments of the present invention technical solution that it does not separate the essence of the corresponding technical solution should all It is included within protection scope of the present invention.

Claims (10)

1. a kind of method that anti-brush logs in, which is characterized in that including:
The login authentication request that client is sent is obtained, the login authentication request includes Termination ID;
Database is inquired based on the Termination ID, judges to whether there is verification corresponding with the Termination ID in the database Sequence number;
If there are the verification sequence number, the verification sequence number is judged based on the sequence number information in the verification sequence number Whether effectively;
If the verification sequence number is effective, the sequence number information of the verification sequence number is updated, is generated and verification sequence number phase Corresponding graphical verification code, and the graphical verification code is sent to client corresponding with the Termination ID.
2. the method that anti-brush as described in claim 1 logs in, which is characterized in that the method that the anti-brush logs in further includes:
If the verification invalid sequence number, the verification sequence number in the database is removed, is set in the database The login status for setting the Termination ID is lock-out state, and sends login failure information to the client.
3. the method that anti-brush as described in claim 1 logs in, which is characterized in that judge whether deposited in the database described Before the verification sequence number corresponding with the Termination ID the step of, the method that the anti-brush logs in further includes:
Judge whether the corresponding login status of the Termination ID is lock-out state;
If the login status is lock-out state, login failure information is sent to the client;
If the login status is not lock-out state, executes and judge in the database with the presence or absence of opposite with the Termination ID The step of verification sequence number answered.
4. the method that anti-brush as described in claim 1 logs in, which is characterized in that the method that the anti-brush logs in further includes:
If the verification sequence number is not present, the corresponding verification sequence number of the terminal ID assignment is given, the verification is initialized The sequence number information of sequence number generates graphical verification code associated with the verification sequence number, the graphical verification code is sent out Give client corresponding with the Termination ID.
5. the method that anti-brush as described in claim 1 logs in, which is characterized in that the sequence number information include the verification period, Login times and effective degree;
The sequence number information based in the verification sequence number judges whether the verification sequence number is effective, including:
If the current time in system obtains the corresponding login times of the Termination ID described effectively secondary within the verification period In number, then the verification sequence number is effective, on the contrary then invalid.
6. the method that anti-brush as described in claim 1 logs in, which is characterized in that the sequence number information include the verification period and Effective degree;
It is described it is anti-brush log in method further include:
Timing more new command is obtained, the timing more new command includes program ID;
At the end of the current time in system is each verification period, more new procedures corresponding with described program ID are triggered, The effective degree for updating the sequence number information is zero.
7. the method that anti-brush as described in claim 1 or 4 logs in, which is characterized in that send out the graphical verification code described After the step of giving client corresponding with the Termination ID, the method further includes:
The access checking request that client is sent is obtained, the access checking request includes Termination ID and current verification code;
Corresponding graphical verification code is obtained based on the Termination ID;
If the current verification code matches with the graphical verification code, pass through the access checking request;
If the current verification code is mismatched with the graphical verification code, execute based on the sequence number information in verification sequence number Judge to verify the whether effective step of sequence number.
8. a kind of device that anti-brush logs in, which is characterized in that including:
Login authentication request module is obtained, the login authentication request for obtaining client transmission, the login authentication request bag Include Termination ID;
Judge verification sequence number module, for inquiring database based on the Termination ID, judges to whether there is in the database Verification sequence number corresponding with the Termination ID;
The effective module of sequence number is judged, if for there are the verification sequence numbers, based on the sequence in the verification sequence number Number information judges whether the verification sequence number is effective;
Graphical verification code module is sent, if effective for the verification sequence number, updates the sequence number of the verification sequence number Information generates graphical verification code corresponding with verification sequence number, and the graphical verification code is sent to and the Termination ID Corresponding client.
9. a kind of terminal device, including memory, processor and it is stored in the memory and can be on the processor The computer program of operation, which is characterized in that the processor realizes such as claim 1 to 7 when executing the computer program The step of method that any one anti-brush logs in.
10. a kind of computer readable storage medium, the computer-readable recording medium storage has computer program, feature to exist In the step for the method that realization anti-brush as described in any one of claim 1 to 7 logs in when the computer program is executed by processor Suddenly.
CN201810014424.1A 2018-01-08 2018-01-08 Anti-swipe login method and device, terminal device and storage medium Active CN108462687B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201810014424.1A CN108462687B (en) 2018-01-08 2018-01-08 Anti-swipe login method and device, terminal device and storage medium
PCT/CN2018/077313 WO2019134234A1 (en) 2018-01-08 2018-02-27 Rooting-prevention log-in method, device, terminal apparatus, and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810014424.1A CN108462687B (en) 2018-01-08 2018-01-08 Anti-swipe login method and device, terminal device and storage medium

Publications (2)

Publication Number Publication Date
CN108462687A true CN108462687A (en) 2018-08-28
CN108462687B CN108462687B (en) 2020-02-14

Family

ID=63221218

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810014424.1A Active CN108462687B (en) 2018-01-08 2018-01-08 Anti-swipe login method and device, terminal device and storage medium

Country Status (2)

Country Link
CN (1) CN108462687B (en)
WO (1) WO2019134234A1 (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109508531A (en) * 2018-10-17 2019-03-22 航天信息股份有限公司 Sign and issue the method, apparatus and storage medium of soft certificate
CN110161873A (en) * 2019-06-12 2019-08-23 南京东屋电气有限公司 A kind of method and system of smart home sensor low power consumption data safe transmission
CN110768995A (en) * 2019-10-30 2020-02-07 北京达佳互联信息技术有限公司 Security verification method, device and system
CN111181722A (en) * 2020-03-06 2020-05-19 联想(北京)有限公司 Authentication method and system
CN111585956A (en) * 2020-03-31 2020-08-25 完美世界(北京)软件科技发展有限公司 Website anti-brushing verification method and device
CN112866179A (en) * 2019-11-27 2021-05-28 北京沃东天骏信息技术有限公司 Current limiting method and current limiting device
CN112950236A (en) * 2021-03-31 2021-06-11 四川虹美智能科技有限公司 Serial number writing method and device and computer readable medium
CN113486344A (en) * 2021-07-14 2021-10-08 北京奇艺世纪科技有限公司 Interface anti-brushing method and device, server and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102300182A (en) * 2011-09-07 2011-12-28 飞天诚信科技股份有限公司 Short-message-based authentication method, system and device
CN105897670A (en) * 2015-11-13 2016-08-24 乐视云计算有限公司 Website user login authentication method and system
CN106789855A (en) * 2015-11-25 2017-05-31 北京奇虎科技有限公司 The method and device of user login validation
US9767040B2 (en) * 2015-08-31 2017-09-19 Salesforce.Com, Inc. System and method for generating and storing real-time analytics metric data using an in memory buffer service consumer framework

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1832401A (en) * 2006-04-06 2006-09-13 陈珂 Method for protecting safety of account number cipher
CN102546914A (en) * 2010-12-27 2012-07-04 梁志龙 Automatic login system based on smart phone and control method
US20170017890A1 (en) * 2015-07-14 2017-01-19 Jewel Dohan Method and System For Identifying Potentially Successful Dating Relationship

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102300182A (en) * 2011-09-07 2011-12-28 飞天诚信科技股份有限公司 Short-message-based authentication method, system and device
US9767040B2 (en) * 2015-08-31 2017-09-19 Salesforce.Com, Inc. System and method for generating and storing real-time analytics metric data using an in memory buffer service consumer framework
CN105897670A (en) * 2015-11-13 2016-08-24 乐视云计算有限公司 Website user login authentication method and system
CN106789855A (en) * 2015-11-25 2017-05-31 北京奇虎科技有限公司 The method and device of user login validation

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109508531A (en) * 2018-10-17 2019-03-22 航天信息股份有限公司 Sign and issue the method, apparatus and storage medium of soft certificate
CN110161873A (en) * 2019-06-12 2019-08-23 南京东屋电气有限公司 A kind of method and system of smart home sensor low power consumption data safe transmission
CN110768995A (en) * 2019-10-30 2020-02-07 北京达佳互联信息技术有限公司 Security verification method, device and system
CN110768995B (en) * 2019-10-30 2022-04-01 北京达佳互联信息技术有限公司 Security verification method, device, system and storage medium
CN112866179A (en) * 2019-11-27 2021-05-28 北京沃东天骏信息技术有限公司 Current limiting method and current limiting device
CN111181722A (en) * 2020-03-06 2020-05-19 联想(北京)有限公司 Authentication method and system
CN111585956A (en) * 2020-03-31 2020-08-25 完美世界(北京)软件科技发展有限公司 Website anti-brushing verification method and device
CN111585956B (en) * 2020-03-31 2022-09-09 完美世界(北京)软件科技发展有限公司 Website anti-brushing verification method and device
CN112950236A (en) * 2021-03-31 2021-06-11 四川虹美智能科技有限公司 Serial number writing method and device and computer readable medium
CN112950236B (en) * 2021-03-31 2023-05-23 四川虹美智能科技有限公司 Sequence number writing method, device and computer readable medium
CN113486344A (en) * 2021-07-14 2021-10-08 北京奇艺世纪科技有限公司 Interface anti-brushing method and device, server and storage medium
CN113486344B (en) * 2021-07-14 2023-09-05 北京奇艺世纪科技有限公司 Interface anti-brushing method and device, server side and storage medium

Also Published As

Publication number Publication date
CN108462687B (en) 2020-02-14
WO2019134234A1 (en) 2019-07-11

Similar Documents

Publication Publication Date Title
CN108462687A (en) Method, apparatus, terminal device and the storage medium that anti-brush logs in
CN112637214B (en) Resource access method and device and electronic equipment
US8856892B2 (en) Interactive authentication
US7010600B1 (en) Method and apparatus for managing network resources for externally authenticated users
CN108462704A (en) Login validation method, device, computer equipment and storage medium
CN109802941A (en) A kind of login validation method, device, storage medium and server
JP6574168B2 (en) Terminal identification method, and method, system, and apparatus for registering machine identification code
US20190306148A1 (en) Method for oauth service through blockchain network, and terminal and server using the same
CN112651011B (en) Login verification method, device and equipment for operation and maintenance system and computer storage medium
CN109522726A (en) Method for authenticating, server and the computer readable storage medium of small routine
US20060265598A1 (en) Access to a computing environment by computing devices
CN109587126B (en) User authentication method and system
KR102192370B1 (en) Method for oauth service through blockchain, and terminal and server using the same
KR102252086B1 (en) Method for oauth service through blockchain, and terminal and server using the same
CN110049048B (en) Data access method, equipment and readable medium for government affair public service
US9882914B1 (en) Security group authentication
EP2366164A1 (en) Method and system for impersonating a user
CN106878250B (en) Cross-application single-state login method and device
CN108881309A (en) Access method, device, electronic equipment and the readable storage medium storing program for executing of big data platform
CN114021103A (en) Single sign-on method, device, terminal and storage medium based on identity authentication
EP3062254B1 (en) License management for device management system
WO2015156788A1 (en) Identifying suspicious activity in a load test
CN114510701A (en) Single sign-on method, device, equipment and storage medium
US10255558B1 (en) Managing knowledge-based authentication systems
CN109861982A (en) A kind of implementation method and device of authentication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant