CN109040146A - Account logs in authorization method, server, computer equipment and storage medium - Google Patents
Account logs in authorization method, server, computer equipment and storage medium Download PDFInfo
- Publication number
- CN109040146A CN109040146A CN201811246788.9A CN201811246788A CN109040146A CN 109040146 A CN109040146 A CN 109040146A CN 201811246788 A CN201811246788 A CN 201811246788A CN 109040146 A CN109040146 A CN 109040146A
- Authority
- CN
- China
- Prior art keywords
- account
- mac address
- terminal
- logs
- log
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Small-Scale Networks (AREA)
- Telephonic Communication Services (AREA)
Abstract
The invention discloses a kind of accounts to log in authorization method, server, computer equipment and storage medium, passes through the first mac address information of the account of the electric pin system of acquisition user's login, password and first terminal;Judge whether account is to first log into;When account is to first log into, the prompt information of account and the binding of the first MAC Address is sent to first terminal;When receiving the account and the information of the first MAC Address binding of first terminal transmission, account and the first MAC Address are bound, so that first terminal, which has permission, logs in electric pin system by account, and account is fixed to the login interface for being shown in electric pin system.Account provided by the invention, which logs in authorization method, server, computer equipment and storage medium, effectively account to be avoided to abuse, and largely eliminates the security risk of electric pin system.
Description
Technical field
Authorization method, server, computer equipment are logged in the present invention relates to security monitoring field more particularly to account and are deposited
Storage media.
Background technique
Currently, since sales force and administrative staff sell platform in electricity and uniformly commence business, selling people in electric pin system
When the case where Misuse account is examined, inquires and is sold between member's Misuse administrator account and sales force
There is generation.The behavior of the Misuse account abuse that does not only result in account in this way, while great safety is brought for electric pin system
Hidden danger.
Summary of the invention
In view of this, the present invention proposes that a kind of account logs in authorization method, server, computer equipment and storage medium,
Effectively account can be avoided to abuse, and largely eliminate the security risk of electric pin system.
Firstly, to achieve the above object, the present invention proposes that a kind of account logs in authorization method, is applied in server, it should
Method comprising steps of
User, which is obtained, from first terminal logs in the electric log-on message of pin system and the first MAC Address of the first terminal
Information, the log-on message include at least account and password;
Judge whether the account is to first log into;
When the account be first log into when, send the account and first MAC Address binding prompt information extremely
The first terminal;
When receiving the information of the account and first MAC Address binding that the first terminal is sent, by institute
Account and first MAC Address binding are stated, so that the first terminal, which has permission, logs in electricity pin system by the account
System, and the account is fixed to the login interface for being shown in the electric pin system.
Optionally, described to judge whether the account is to further comprise the steps of: for the first time after login step
When the account is not to first log into, the second MAC Address with the second terminal of account binding is obtained;
Judge whether second MAC Address is first MAC Address;
When second MAC Address is not first MAC Address, send whether change the account and described first
The prompt information of MAC Address binding is to the first terminal;And
When receiving the information for the change binding that the first terminal is sent, transmission verification information to third terminal, with
The binding information of the account Yu second MAC Address is released, and the account and first MAC Address are bound and incited somebody to action
The display interface of the fixed electric pin system for being shown in the first terminal installation of the account.
Optionally, this method further comprises the steps of:
When second MAC Address is first MAC Address, then verify the account and the password whether be
Effective account and proper password;And
When the account and password authentification success, the electric pin system is logged in.
Optionally, this method further comprises the steps of:
Record first MAC Address and second MAC Address that the account logs in;
According to first MAC Address and second MAC Address of record, day monitoring information is generated;And
Whether it is abused according to account described in the day monitoring information early warning.
Optionally, the day monitoring information includes the account and first MAC Address and second MAC Address
Login record.
It is optionally, described to judge whether the account is the step of first logging into, further includes:
Record the login times of the account;
Judge whether the login times are 1;And
When the login times are 1, then the account is judged to first log into.
Optionally, the third terminal is the terminal with verifying authorization, computer or manager including system manager
Computer.
In addition, to achieve the above object, the present invention also provides a kind of servers comprising:
Obtain module, suitable for from first terminal obtain user log in electric pin system log-on message and the first terminal
The first mac address information, the log-on message include at least account and password;
Judgment module, suitable for judging whether the account is to first log into;
First sending module, suitable for sending the account and first MAC Address when the account is to first log into
The prompt information of binding is to the first terminal;And
Binding module, suitable for being bound when the account and first MAC Address that receive the first terminal transmission
Information when, the account and first MAC Address are bound, stepped on so that the first terminal has permission by the account
The electric pin system is recorded, and the account is fixed to the login interface for being shown in the electric pin system.
Optionally, the acquisition module is further adapted for when the account is not to first log into, and obtains and binds with the account
Second terminal the second MAC Address;The server further includes the second judgment module and the second sending module, and described second
Judgment module is suitable for judging whether second MAC Address is first MAC Address;First sending module is further adapted for working as
When second MAC Address is not first MAC Address, sends and change the account and first MAC Address binding
Prompt information is to the first terminal;And second sending module is suitable for tying up when the change for receiving the first terminal transmission
When fixed information, verification information is sent to third terminal, to release the binding information of the account Yu second MAC Address,
And the account and first MAC Address are bound.
Optionally, the server further includes authentication module and login module, and the authentication module is suitable for when described the
Whether when two MAC Address are first MAC Address, then it is effective account and correct for verifying the account and the password
Password;And the login module is suitable for when the account and password authentification success, logs in the electric pin system.
Optionally, the server further includes logging modle, generation module and warning module, wherein the record mould
Block is suitable for recording first MAC Address and second MAC Address that the account logs in;The generation module is suitable for root
According to first MAC Address and second MAC Address of record, day monitoring information is generated;And the warning module is suitable for
Whether it is abused according to account described in the day monitoring information early warning.
Optionally, the day monitoring information includes the account and first MAC Address and second MAC Address
Login record.
Optionally, when whether judge the account is to first log into, the logging modle is further adapted for recording the account
Login times;The first judgment module is further adapted for judging whether the login times are 1;And second judgment module is also
Suitable for when the login times are 1, then judging the account to first log into.
Optionally, the third terminal is the terminal with verifying authorization, computer or manager including system manager
Computer.
To achieve the above object, it the present invention also provides a kind of computer equipment, including memory, processor and is stored in
On memory and the computer program that can run on the processor, the processor are realized when executing the computer program
The step of above method.
To achieve the above object, the present invention also provides computer readable storage mediums, are stored thereon with computer program, institute
State the step of above method is realized when computer program is executed by processor.
Compared to the prior art, account proposed by the invention logs in authorization method, server, computer equipment and storage
Medium is bound the MAC Address of account and terminal by that will detect the login record of account, when the terminal that account replacement logs in
When, send verification information to another terminal with by the terminal MAC address of the account and binding unbind, and by the account with step at this time
The MAC Address of record is bound, and effectively account can be avoided to abuse, and largely eliminates the security risk of electric pin system, and
It can prevent the generation of account abuse condition to a certain extent.
Detailed description of the invention
Fig. 1 is the schematic diagram of the optional hardware structure of server one of the embodiment of the present invention;
Fig. 2 is the program module schematic diagram for the first embodiment that account of the present invention logs in authoring system;
Fig. 3 is the program module schematic diagram for the second embodiment that account of the present invention logs in authoring system;
Fig. 4 is the program module schematic diagram for the 3rd embodiment that account of the present invention logs in authoring system;
Fig. 5 is the program module schematic diagram for the fourth embodiment that account of the present invention logs in authoring system;
Fig. 6 is the flow diagram for the first embodiment that account of the present invention logs in authorization method;
Fig. 7 is the flow diagram for the second embodiment that account of the present invention logs in authorization method;
Fig. 8 is the flow diagram for the 3rd embodiment that account of the present invention logs in authorization method.
Appended drawing reference:
Server | 1 |
Memory | 11 |
Processor | 12 |
Network interface | 13 |
Account logs in authoring system | 200 |
Obtain module | 201 |
First judgment module | 202 |
First sending module | 203 |
Binding module | 204 |
Second judgment module | 205 |
Second sending module | 206 |
Authentication module | 207 |
Login module | 208 |
Logging modle | 209 |
Generation module | 210 |
Warning module | 211 |
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawings and embodiments, right
The present invention is further elaborated.It should be appreciated that described herein, specific examples are only used to explain the present invention, not
For limiting the present invention.Based on the embodiments of the present invention, those of ordinary skill in the art are not before making creative work
Every other embodiment obtained is put, shall fall within the protection scope of the present invention.
It should be noted that the description for being related to " first ", " second " etc. in the present invention is used for description purposes only, and cannot
It is interpreted as its relative importance of indication or suggestion or implicitly indicates the quantity of indicated technical characteristic.Define as a result, " the
One ", the feature of " second " can explicitly or implicitly include at least one of the features.In addition, the skill between each embodiment
Art scheme can be combined with each other, but must be based on can be realized by those of ordinary skill in the art, when technical solution
Will be understood that the combination of this technical solution is not present in conjunction with there is conflicting or cannot achieve when, also not the present invention claims
Protection scope within.
As shown in fig.1, being the schematic diagram of the optional hardware structure of server 1 one of the present invention.
In the present embodiment, the server 1 may include, but be not limited only to, and can be in communication with each other connection by system bus and deposit
Reservoir 11, processor 12, network interface 13.It should be pointed out that Fig. 2 illustrates only the server 1 with component 11-13, but
Be it should be understood that, it is not required that implement all components shown, the implementation that can be substituted is more or less component.
Wherein, the server 1 can be rack-mount server, blade server, tower server or cabinet-type clothes
Business device etc. calculates equipment, which can be independent server, be also possible to server set composed by multiple servers
Group.
The memory 11 include at least a type of readable storage medium storing program for executing, the readable storage medium storing program for executing include flash memory,
Hard disk, multimedia card, card-type memory (for example, SD or DX memory etc.), random access storage device (RAM), static random are visited
It asks memory (SRAM), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), may be programmed read-only deposit
Reservoir (PROM), magnetic storage, disk, CD etc..In some embodiments, the memory 11 can be the server
2 internal storage unit, such as the hard disk or memory of the server 1.In further embodiments, the memory 11 can also be with
It is the plug-in type hard disk being equipped on the External memory equipment of the server 1, such as the server 1, intelligent memory card
(SmartMediaCard, SMC), secure digital (SecureDigital, SD) card, flash card (FlashCard) etc..Certainly, institute
State memory 11 can also both including the server 1 internal storage unit and also including its External memory equipment.The present embodiment
In, the memory 11 is installed on the operating system and types of applications software of the server 1, such as account commonly used in storage
Log in the program code etc. of authoring system 200.In addition, the memory 11 can be also used for temporarily storing exported or
The Various types of data that will be exported.
The processor 12 can be in some embodiments central processing unit (CentralProcessing Unit,
CPU), controller, microcontroller, microprocessor or other data processing chips.The processor 12 is commonly used in the control clothes
The overall operation of business device 1.In the present embodiment, the processor 12 for run the program code stored in the memory 11 or
Person handles data, such as runs the account and log in authoring system 200 etc..
The network interface 13 may include radio network interface or wired network interface, which is commonly used in
Communication connection is established between the server 1 and other electronic equipments.
So far, oneself is through describing the hardware configuration and function of relevant device of the present invention in detail.In the following, above-mentioned introduction will be based on
It is proposed each embodiment of the invention.
Firstly, the present invention proposes that a kind of account logs in authoring system 200.
As shown in fig.2, being the program module schematic diagram for the first embodiment that account of the present invention logs in authoring system 200.
In the present embodiment, it includes a series of calculating being stored on memory 11 that the account, which logs in authoring system 200,
Machine program instruction, when the computer program instructions are executed by processor 12, the account that various embodiments of the present invention may be implemented is stepped on
Record Authorized operation.In some embodiments, the specific operation realized based on the computer program instructions each section, account are stepped on
Record authoring system 200 can be divided into one or more modules.For example, the account logs in authoring system 200 in Fig. 2
It can be divided into and obtain module 201, first judgment module 202, the first sending module 203 and binding module 204.Wherein:
The acquisition module 201 logs in the log-on message of electric pin system and described suitable for obtaining user from first terminal
First mac address information of first terminal, the log-on message include at least account and password.
In a preferred embodiment, when user is in electric pin system that first terminal is installed input login account and password,
First mac address information for obtaining module 201 and obtaining the account, the password and the first terminal.
The first judgment module 202, suitable for judging whether the account is to first log into.
In a preferred embodiment, the first judgment module 202 is according to the account for logging in the electric pin system got
Number judge whether user is to log in electric pin system for the first time.Specifically, the server 1 preserves the login times of the account
Information, user log in once, and the number that the login times information is shown adds 1.When user is to first log into, the login time
Number information shows that number is 1.
First sending module 203, suitable for sending the account and described first when the account is to first log into
The prompt information of MAC Address binding is to the first terminal.
The binding module 204, suitable for when the account and described first for receiving the first terminal transmission
When the information of MAC Address binding, the account and first MAC Address are bound so that the first terminal have permission it is logical
It crosses the account and logs in the electric pin system, and the account is fixed to the login interface for being shown in the electric pin system.
In a preferred embodiment, described when the first judgment module 202 judges that the user is to first log into
The prompt that first sending module 203 binds the first MAC Address of the account for logging in the electric pin system and the first terminal
Information is sent to the first terminal, so that the account is tied to the first terminal and logs in, while working as and using the account
When logging in the electric pin system, the fixed login interface for being shown in the electric pin system of the account.When the binding module 204
When receiving the information that the first MAC Address of account and the first terminal that the first terminal is sent is bound, by described the
First MAC Address of one account and the first terminal is bound.It is described in the case where not changing binding after the completion of binding
Account can only log in the electricity pin system in the first terminal, effectively avoid to a certain extent other users abuse the account and
Password is the occurrence of other terminals log in electric pin system.
As shown in fig.3, being the program module schematic diagram for the second embodiment that account of the present invention logs in authoring system 200.
In the present embodiment, the account logs in authoring system 200 in addition to including the acquisition module in first embodiment
It 201, further include the second judgment module 205 except first judgment module 202, the first sending module 203 and binding module 204
And second sending module 206.Module 201 and first sending module 203 of obtaining is except execution first embodiment
Except operation further include:
The acquisition module 201 is further adapted for when the account is not to first log into, and obtains the with account binding
Second MAC Address of two terminals.
Second judgment module 205, suitable for judging whether second MAC Address is first MAC Address.
In a preferred embodiment, the with the second terminal of account binding is got in the acquisition module 201
After two MAC Address, second judgment module 205 judges whether first MAC Address is the second terminal first logged into
Second MAC Address.
First sending module 203 is further adapted for when second MAC Address is not first MAC Address, sends
The prompt information of the account and first MAC Address binding is changed to the first terminal.
Second sending module 206, suitable for sending out when receiving the information for the change binding that the first terminal is sent
Send verification information to third terminal, to release the binding information of the account Yu second MAC Address, and by the account with
The first MAC Address binding.Wherein, the third terminal is the terminal with verifying authorization, the electricity including system manager
Brain or the computer of manager.
In a preferred embodiment, if the login times information saved in server shows that number is greater than 1, the account
Not to first log into electric pin system, the MAC Address for logging in the terminal of the electric pin system at this time is obtained.Getting terminal at this time
MAC Address after, judge the MAC Address whether be last login terminal MAC Address.If logon account is described at this time
The MAC Address of terminal is not the MAC Address of the terminal of last login, then represents the owning user replacement terminal of the account either
Other people abuse the electric pin system of account login, send the prompt of the MAC Address binding of change account and last login terminal at this time
Information prompts user to change account binding to present terminal.
When user is when present terminal (terminal has been replaced) input account logs in electric pin system, and clicks and determine change account
The button of binding, server receives the information that the change account that present terminal is sent is bound, and sends verification information and test to having
The terminal (such as: the computer of system manager or the computer of manager) for demonstrate,proving permission, in the terminal authentication with verifying authorization
After the success of the MAC Address of the account and present terminal, the binding for releasing the MAC Address of the account and last time terminal is believed
Breath, and the MAC Address of the account and present terminal is bound, so that the account is obtained in present terminal logs in the electricity pin
The permission of system, and the account is fixed to the login interface for being shown in present terminal electricity pin system.It, can by this embodiment
Greatly to avoid other users from logging in electric pin system by the account of the user in other terminals, and then greatly push one
The implementation of one account of people (account) system.Specifically, when user is when new terminal A logs in electric pin system, and according to the display of terminal A
" whether binding the MAC Address of account and terminal A " prompt information of screen display, clicks ACK button, server receives eventually
The information for binding the MAC Address of account and terminal A that A is sent is held, and " whether is agreed to account and end with lettergram mode transmission
The mailbox of the prompt information extremely manager of the MAC Address binding of end A ".After the completion of manager's confirmation, server receives the confirmation message
And the binding relationship of the MAC Address of account and last time terminal is released, account and the MAC Address of terminal A are bound again, this
When user obtain the permission that the account logs in electric pin system in terminal A, successful log electricity pin system, while account fixation is shown in
The login interface of the electric pin system of terminal A.
As shown in fig.4, being the program module schematic diagram for the 3rd embodiment that account of the present invention logs in authoring system 200.
In the present embodiment, the account logs in authoring system 200 in addition to including the acquisition module in second embodiment
201, first judgment module 202, the first sending module 203, binding module 204, the second judgment module 205 and second send mould
It further include authentication module 207 and login module 208 except block 206.
The authentication module 207, suitable for when second MAC Address is first MAC Address, then verifying the account
Number and the password whether be effective account and proper password.
The login module 208 is suitable for when the account and password authentification success, logs in the electric pin system.
In a preferred embodiment, when user is not to first log into electric pin system, and server 1 judges present terminal
MAC Address when being the MAC Address of last time terminal, state of the MAC Address of account and last time terminal still in binding at this time, clothes
Whether the device verifying account of being engaged in and the password are effective account and proper password.If the account and password authentification at
Function, representing the account has the permission for logging in electric pin system, then logs in electric pin system.
As shown in fig.5, being the program module schematic diagram for the fourth embodiment that account of the present invention logs in authoring system 200.
In the present embodiment, the account logs in authoring system 200 in addition to including the acquisition module in 3rd embodiment
201, first judgment module 202, the first sending module 203, binding module 204, the second judgment module 205, the second sending module
It 206, further include logging modle 209, generation module 210 and warning module except authentication module 207 and login module 208
211。
The logging modle 209, suitable for recording the account logs within one day first MAC Address and described
Second MAC Address.
In a preferred embodiment, when user logs in every time daily, the logging modle 207 records the account and is stepped on
The MAC Address of the terminal of record, the first MAC of the first terminal including the second MAC Address and subsequent login that first log into
Location.
The generation module 210 is generated suitable for first MAC Address and second MAC Address according to record
Day monitoring information.Wherein, the day monitoring information includes the account and first MAC Address and the 2nd MAC
The login record of location.Specifically, all MAC Address (packets that the generation module 208 is recorded according to the logging modle 207
Include the first MAC Address of the first terminal of the second MAC Address and subsequent login that first log into) day monitoring information is generated, with
The account is monitored in the historical log situation of different terminals.
Whether the warning module 211 is abused suitable for the account according to the day monitoring information early warning.For example, root
According to day monitoring information, if terminal A, terminal B and terminal C login account are fixed in user one month daily, and day monitoring letter
User's today is shown in breath in the day monitoring information of terminal D login account, then user described in early warning may be abused.
Through this embodiment, other users can further be avoided to log in electricity by the account of the user in other terminals
Pin system improves the security level of electric pin system.
In addition, the present invention also proposes that a kind of account logs in authorization method.
As shown in fig.6, being the flow diagram for the first embodiment that account of the present invention logs in authorization method.The account
Authorization method is logged in be applied in server 1.In the present embodiment, the step in flow chart shown in fig. 6 according to different requirements,
Rapid execution sequence can change, and certain steps can be omitted.
Step S600, from first terminal obtain user log in electric pin system log-on message and the first terminal the
One mac address information, the log-on message include at least account and password.
Step S602 judges whether the account is to first log into, if the account is to first log into, is thened follow the steps
S604, it is no to then follow the steps S608.
Step S604 sends the prompt information of the account and first MAC Address binding to the first terminal.
Step S606 is bound when receiving the account that the first terminal is sent with first MAC Address
Information when, the account and first MAC Address are bound, stepped on so that the first terminal has permission by the account
The electric pin system is recorded, and the account is fixed to the login interface for being shown in the electric pin system.
Step S608 obtains the second MAC Address with the second terminal of account binding.
Step S610 judges whether second MAC Address is first MAC Address, if second MAC Address is not
It is first MAC Address, thens follow the steps S612, it is no to then follow the steps S616.
Step S612, the prompt information that the transmission change account is bound with first MAC Address to described first is eventually
End.
Step S614 sends verification information to the when receiving the information for the change binding that the first terminal is sent
Three terminals, to release the binding information of the account Yu second MAC Address, and by the account and the first MAC
Bind and fix the account display interface for being shown in the electric pin system of the first terminal installation in location, wherein institute
Stating third terminal is the terminal with verifying authorization, the computer of computer or manager including system manager.
Step S616, verifies whether the account and the password are effective account and proper password.
Step S618 logs in the electric pin system when the account and password authentification success.In a preferred embodiment
In, if the account and password authentification success, representing the account has the permission for logging in electric pin system, then logs in the electricity pin
System.
The generation of account abuse condition can effectively be avoided by logging in authorization method by the above account, while greatly be mentioned
The high security level of electric pin system.
As shown in fig.7, being the flow diagram for the second embodiment that account of the present invention logs in authorization method.The account
Authorization method is logged in be applied in server 1.In the present embodiment, the account logs in the step of authorization method in addition to including the
Except step S600~S618 of one embodiment, the server 1 is every time in the MAC Address for obtaining the terminal that the account logs in
When, it further include step S700~S704.
Step S700, first MAC Address and the 2nd MAC that the account logs within record one day
Location.
Step S702 generates day monitoring information according to first MAC Address and second MAC Address of record.
Wherein, the day monitoring information includes the login note of the account and first MAC Address and second MAC Address
Record.All MAC Address that specifically, the generation module 208 is recorded according to the logging modle 207 (including first log into
The second MAC Address and subsequent login first terminal the first MAC Address) generate day monitoring information, to monitor the account
Number different terminals historical log situation.
Whether step S704 is abused according to account described in the day monitoring information early warning.Believe for example, being monitored according to day
Breath if being fixed on terminal A, terminal B and terminal C login account in user one month daily, and shows the present in day monitoring information
Its user is in the day monitoring information of terminal D login account, then server 1 shows the terminal D in the day monitoring information
It for red, and is flashed, by the way that terminal D is carried out highlight indication to remind the user account that may be abused.
As shown in fig.8, being the flow diagram for the 3rd embodiment that account of the present invention logs in authorization method.The account
Authorization method is logged in be applied in server 1.In the present embodiment, the account logs in the step of authorization method in addition to including the
It is described to judge whether the account is the step first logged into except the step S600~S618 and S700~S704 of two embodiments
It suddenly further include step S800~S806.
Step S800 records the login times of the account.
Step S802 judges whether the login times are 1, if judging, the login times for 1, are thened follow the steps
S804, it is no to then follow the steps S806.
Step S804 judges that the account is to first log into.
Step S806 judges that the account does not first log into.
Through this embodiment, effectively account can be avoided to abuse, largely eliminates the security risk of electric pin system, simultaneously
It can prevent the generation of account abuse condition.
The embodiment of the present invention also provides a kind of computer equipment, can such as execute the smart phone, tablet computer, pen of program
Remember that this computer, desktop computer, rack-mount server, blade server, tower server or Cabinet-type server are (including only
Server cluster composed by vertical server or multiple servers) etc..The computer equipment of the present embodiment include at least but
It is not limited to: memory, processor of connection etc. can be in communication with each other by system bus.
The present embodiment also provides a kind of computer readable storage medium, such as flash memory, hard disk, multimedia card, card-type memory
(for example, SD or DX memory etc.), random access storage device (RAM), static random-access memory (SRAM), read-only memory
(ROM), electrically erasable programmable read-only memory (EEPROM), programmable read only memory (PROM), magnetic storage, magnetic
Disk, CD, server, App are stored thereon with computer program, phase are realized when program is executed by processor using store etc.
Answer function.The computer readable storage medium of the present embodiment logs in authoring system 200 for storing account, when being executed by processor
Realize that account of the invention logs in authorization method.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art
The part contributed out can be embodied in the form of software products, which is stored in a storage medium
In (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal device (can be mobile phone, computer, clothes
Business device, air conditioner or the network equipment etc.) execute method described in each embodiment of the present invention.
The above is only a preferred embodiment of the present invention, is not intended to limit the scope of the invention, all to utilize this hair
Equivalent structure or equivalent flow shift made by bright specification and accompanying drawing content is applied directly or indirectly in other relevant skills
Art field, is included within the scope of the present invention.
Claims (10)
1. a kind of account logs in authorization method, it is applied in server, which is characterized in that the method includes the steps:
User, which is obtained, from first terminal logs in the log-on message of electric pin system and the first MAC Address letter of the first terminal
Breath, the log-on message include at least account and password;
Judge whether the account is to first log into;
When the account is to first log into, prompt information that the account and first MAC Address are bound is sent to described
First terminal;And
When receiving the information of the account and first MAC Address binding that the first terminal is sent, by the account
Number and first MAC Address binding so that the first terminal, which has permission, logs in the electric pin system by the account, and
By the fixed login interface for being shown in the electric pin system of the account.
2. account as described in claim 1 logs in authorization method, which is characterized in that described to judge whether the account is for the first time
After login step, further includes:
When the account is not to first log into, the second MAC Address with the second terminal of account binding is obtained;
Judge whether second MAC Address is first MAC Address;
When second MAC Address is not first MAC Address, sends and change the account and first MAC Address
The prompt information of binding is to the first terminal;And
When receiving the information for the change binding that the first terminal is sent, verification information is sent to third terminal, to release
The binding information of the account and second MAC Address, and the account and first MAC Address are bound and will be described
The display interface of the fixed electric pin system for being shown in the first terminal installation of account.
3. account as claimed in claim 2 logs in authorization method, which is characterized in that the method also includes steps:
When second MAC Address is first MAC Address, then verify whether the account and the password are effective
Account and proper password;And
When the account and password authentification success, the electric pin system is logged in.
4. account as claimed in claim 2 logs in authorization method, which is characterized in that the method also includes steps:
First MAC Address and second MAC Address that the account logs within record one day;
According to first MAC Address and second MAC Address of record, day monitoring information is generated;And
Whether it is abused according to account described in the day monitoring information early warning.
5. account as claimed in claim 4 logs in authorization method, which is characterized in that the day monitoring information includes the account
With the login record of first MAC Address and second MAC Address.
6. account as described in claim 1 logs in authorization method, which is characterized in that described to judge whether the account is for the first time
The step of login, further includes:
Record the login times of the account;
Judge whether the login times are 1;And
When the login times are 1, then the account is judged to first log into.
7. account as claimed in claim 2 logs in authorization method, which is characterized in that the third terminal is with verifying authorization
Terminal, the computer of computer or manager including system manager.
8. a kind of server, characterized in that it comprises:
Obtain module, suitable for from first terminal obtain user log in electric pin system log-on message and the first terminal the
One mac address information, the log-on message include at least account and password;
Judgment module, suitable for judging whether the account is to first log into;
First sending module, suitable for sending the account and first MAC Address being bound when the account is to first log into
Prompt information to the first terminal;And
Binding module, suitable for when the letter for receiving the account and the first MAC address binding that the first terminal is sent
When breath, the account and first MAC Address are bound, so that the first terminal, which has permission, logs in institute by the account
Electric pin system is stated, and the account is fixed to the login interface for being shown in the electric pin system.
9. a kind of computer equipment, can run on a memory and on a processor including memory, processor and storage
Computer program, which is characterized in that the processor realizes any one of claim 1 to 7 institute when executing the computer program
The account stated logs in the step of authorization method.
10. a kind of computer readable storage medium, is stored thereon with computer program, it is characterised in that: the computer program
The step of account of any of claims 1-7 logs in authorization method is realized when being executed by processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811246788.9A CN109040146B (en) | 2018-10-25 | 2018-10-25 | Account login authorization method, server, computer equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811246788.9A CN109040146B (en) | 2018-10-25 | 2018-10-25 | Account login authorization method, server, computer equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109040146A true CN109040146A (en) | 2018-12-18 |
CN109040146B CN109040146B (en) | 2022-07-22 |
Family
ID=64614162
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811246788.9A Active CN109040146B (en) | 2018-10-25 | 2018-10-25 | Account login authorization method, server, computer equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109040146B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110012109A (en) * | 2019-04-15 | 2019-07-12 | 珠海格力电器股份有限公司 | The method for building up of the engineering information of high accuracy can be achieved |
CN112398695A (en) * | 2020-11-19 | 2021-02-23 | 上海浦东发展银行股份有限公司 | Large-scale terminal equipment management and control method, system, equipment and storage medium |
CN112737825A (en) * | 2020-12-23 | 2021-04-30 | 携程旅游信息技术(上海)有限公司 | Log-based network device association method, system, device and storage medium |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103491092A (en) * | 2013-09-24 | 2014-01-01 | 长沙裕邦软件开发有限公司 | Method and system for separating and binding of application platform and databank |
CN104125062A (en) * | 2013-04-26 | 2014-10-29 | 腾讯科技(深圳)有限公司 | Login method, device, login authentication device, server, terminals and system |
CN104657851A (en) * | 2013-11-19 | 2015-05-27 | 腾讯科技(深圳)有限公司 | Payment binding management method, payment server, client side and system |
CN104767713A (en) * | 2014-01-02 | 2015-07-08 | 腾讯科技(深圳)有限公司 | Account binding method, server and account binding system |
CN104780042A (en) * | 2014-01-13 | 2015-07-15 | 深圳中兴网信科技有限公司 | Two-layer authentication method, device and system for instant messaging |
CN105100190A (en) * | 2015-05-21 | 2015-11-25 | 小米科技有限责任公司 | Methods, devices and system for managing control relation of account and device |
CN105656948A (en) * | 2016-03-30 | 2016-06-08 | 北京小米移动软件有限公司 | Account login method and device |
CN106022013A (en) * | 2016-05-03 | 2016-10-12 | 北京小米移动软件有限公司 | Method and device for relieving application program authorization |
CN106354540A (en) * | 2016-10-31 | 2017-01-25 | 广州云移信息科技有限公司 | Terminal-spanning application program loading method and terminal-spanning application program loading system |
CN106656978A (en) * | 2016-10-19 | 2017-05-10 | 广东欧珀移动通信有限公司 | Account login method and server |
US20170163628A1 (en) * | 2013-07-02 | 2017-06-08 | Tencent Technology (Shenzhen) Company Limited | User login methods, devices, and systems |
-
2018
- 2018-10-25 CN CN201811246788.9A patent/CN109040146B/en active Active
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104125062A (en) * | 2013-04-26 | 2014-10-29 | 腾讯科技(深圳)有限公司 | Login method, device, login authentication device, server, terminals and system |
US20170163628A1 (en) * | 2013-07-02 | 2017-06-08 | Tencent Technology (Shenzhen) Company Limited | User login methods, devices, and systems |
CN103491092A (en) * | 2013-09-24 | 2014-01-01 | 长沙裕邦软件开发有限公司 | Method and system for separating and binding of application platform and databank |
CN104657851A (en) * | 2013-11-19 | 2015-05-27 | 腾讯科技(深圳)有限公司 | Payment binding management method, payment server, client side and system |
CN104767713A (en) * | 2014-01-02 | 2015-07-08 | 腾讯科技(深圳)有限公司 | Account binding method, server and account binding system |
CN104780042A (en) * | 2014-01-13 | 2015-07-15 | 深圳中兴网信科技有限公司 | Two-layer authentication method, device and system for instant messaging |
CN105100190A (en) * | 2015-05-21 | 2015-11-25 | 小米科技有限责任公司 | Methods, devices and system for managing control relation of account and device |
CN105656948A (en) * | 2016-03-30 | 2016-06-08 | 北京小米移动软件有限公司 | Account login method and device |
CN106022013A (en) * | 2016-05-03 | 2016-10-12 | 北京小米移动软件有限公司 | Method and device for relieving application program authorization |
CN106656978A (en) * | 2016-10-19 | 2017-05-10 | 广东欧珀移动通信有限公司 | Account login method and server |
CN106354540A (en) * | 2016-10-31 | 2017-01-25 | 广州云移信息科技有限公司 | Terminal-spanning application program loading method and terminal-spanning application program loading system |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110012109A (en) * | 2019-04-15 | 2019-07-12 | 珠海格力电器股份有限公司 | The method for building up of the engineering information of high accuracy can be achieved |
CN112398695A (en) * | 2020-11-19 | 2021-02-23 | 上海浦东发展银行股份有限公司 | Large-scale terminal equipment management and control method, system, equipment and storage medium |
CN112737825A (en) * | 2020-12-23 | 2021-04-30 | 携程旅游信息技术(上海)有限公司 | Log-based network device association method, system, device and storage medium |
CN112737825B (en) * | 2020-12-23 | 2022-12-02 | 携程旅游信息技术(上海)有限公司 | Log-based network device association method, system, device and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN109040146B (en) | 2022-07-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3574625B1 (en) | Method for carrying out an authentication | |
CN108183924A (en) | A kind of login validation method and terminal device | |
CN104184705B (en) | Verification method, device, server, subscriber data center and system | |
US8515847B2 (en) | System and method for password-free access for validated users | |
CN104917749B (en) | account registration method and device | |
CN105246073B (en) | The access authentication method and server of wireless network | |
CN108200050A (en) | Single logging-on server, method and computer readable storage medium | |
CN106453205B (en) | identity verification method and device | |
CN109784031B (en) | Account identity verification processing method and device | |
CN109639723A (en) | A kind of micro services access method and server based on ERP system | |
CN109040146A (en) | Account logs in authorization method, server, computer equipment and storage medium | |
CN107463838A (en) | Method for safety monitoring, device, system and storage medium based on SGX | |
CN105554018B (en) | Genuine cyber identification verification method | |
CN109670968A (en) | Processing method, device, equipment and the computer storage medium of insurance data | |
CN109639724A (en) | Password method for retrieving, password device for retrieving, computer equipment and storage medium | |
CN104184709A (en) | Verification method, device, server, service data center and system | |
US11444936B2 (en) | Managing security credentials | |
CN107645471A (en) | A kind of method and system for mobile terminal user identity certification | |
CN103975567B (en) | Two-factor authentication method and virtual machine facility | |
CN107196914A (en) | Identity identifying method and device | |
CN110049028A (en) | Monitor method, apparatus, computer equipment and the storage medium of domain control administrator | |
CN107358763A (en) | A kind of method, apparatus and system of ATM checking identity | |
CN110706143A (en) | Identity authentication method and device based on government affair service | |
CN108960820A (en) | A kind of real name identification method based on block chain, system and storage medium | |
CN107872446B (en) | Communication account management method and device and server |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |