CN109040146A - Account logs in authorization method, server, computer equipment and storage medium - Google Patents

Account logs in authorization method, server, computer equipment and storage medium Download PDF

Info

Publication number
CN109040146A
CN109040146A CN201811246788.9A CN201811246788A CN109040146A CN 109040146 A CN109040146 A CN 109040146A CN 201811246788 A CN201811246788 A CN 201811246788A CN 109040146 A CN109040146 A CN 109040146A
Authority
CN
China
Prior art keywords
account
mac address
terminal
logs
log
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811246788.9A
Other languages
Chinese (zh)
Other versions
CN109040146B (en
Inventor
童小勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN201811246788.9A priority Critical patent/CN109040146B/en
Publication of CN109040146A publication Critical patent/CN109040146A/en
Application granted granted Critical
Publication of CN109040146B publication Critical patent/CN109040146B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Small-Scale Networks (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a kind of accounts to log in authorization method, server, computer equipment and storage medium, passes through the first mac address information of the account of the electric pin system of acquisition user's login, password and first terminal;Judge whether account is to first log into;When account is to first log into, the prompt information of account and the binding of the first MAC Address is sent to first terminal;When receiving the account and the information of the first MAC Address binding of first terminal transmission, account and the first MAC Address are bound, so that first terminal, which has permission, logs in electric pin system by account, and account is fixed to the login interface for being shown in electric pin system.Account provided by the invention, which logs in authorization method, server, computer equipment and storage medium, effectively account to be avoided to abuse, and largely eliminates the security risk of electric pin system.

Description

Account logs in authorization method, server, computer equipment and storage medium
Technical field
Authorization method, server, computer equipment are logged in the present invention relates to security monitoring field more particularly to account and are deposited Storage media.
Background technique
Currently, since sales force and administrative staff sell platform in electricity and uniformly commence business, selling people in electric pin system When the case where Misuse account is examined, inquires and is sold between member's Misuse administrator account and sales force There is generation.The behavior of the Misuse account abuse that does not only result in account in this way, while great safety is brought for electric pin system Hidden danger.
Summary of the invention
In view of this, the present invention proposes that a kind of account logs in authorization method, server, computer equipment and storage medium, Effectively account can be avoided to abuse, and largely eliminate the security risk of electric pin system.
Firstly, to achieve the above object, the present invention proposes that a kind of account logs in authorization method, is applied in server, it should Method comprising steps of
User, which is obtained, from first terminal logs in the electric log-on message of pin system and the first MAC Address of the first terminal Information, the log-on message include at least account and password;
Judge whether the account is to first log into;
When the account be first log into when, send the account and first MAC Address binding prompt information extremely The first terminal;
When receiving the information of the account and first MAC Address binding that the first terminal is sent, by institute Account and first MAC Address binding are stated, so that the first terminal, which has permission, logs in electricity pin system by the account System, and the account is fixed to the login interface for being shown in the electric pin system.
Optionally, described to judge whether the account is to further comprise the steps of: for the first time after login step
When the account is not to first log into, the second MAC Address with the second terminal of account binding is obtained;
Judge whether second MAC Address is first MAC Address;
When second MAC Address is not first MAC Address, send whether change the account and described first The prompt information of MAC Address binding is to the first terminal;And
When receiving the information for the change binding that the first terminal is sent, transmission verification information to third terminal, with The binding information of the account Yu second MAC Address is released, and the account and first MAC Address are bound and incited somebody to action The display interface of the fixed electric pin system for being shown in the first terminal installation of the account.
Optionally, this method further comprises the steps of:
When second MAC Address is first MAC Address, then verify the account and the password whether be Effective account and proper password;And
When the account and password authentification success, the electric pin system is logged in.
Optionally, this method further comprises the steps of:
Record first MAC Address and second MAC Address that the account logs in;
According to first MAC Address and second MAC Address of record, day monitoring information is generated;And
Whether it is abused according to account described in the day monitoring information early warning.
Optionally, the day monitoring information includes the account and first MAC Address and second MAC Address Login record.
It is optionally, described to judge whether the account is the step of first logging into, further includes:
Record the login times of the account;
Judge whether the login times are 1;And
When the login times are 1, then the account is judged to first log into.
Optionally, the third terminal is the terminal with verifying authorization, computer or manager including system manager Computer.
In addition, to achieve the above object, the present invention also provides a kind of servers comprising:
Obtain module, suitable for from first terminal obtain user log in electric pin system log-on message and the first terminal The first mac address information, the log-on message include at least account and password;
Judgment module, suitable for judging whether the account is to first log into;
First sending module, suitable for sending the account and first MAC Address when the account is to first log into The prompt information of binding is to the first terminal;And
Binding module, suitable for being bound when the account and first MAC Address that receive the first terminal transmission Information when, the account and first MAC Address are bound, stepped on so that the first terminal has permission by the account The electric pin system is recorded, and the account is fixed to the login interface for being shown in the electric pin system.
Optionally, the acquisition module is further adapted for when the account is not to first log into, and obtains and binds with the account Second terminal the second MAC Address;The server further includes the second judgment module and the second sending module, and described second Judgment module is suitable for judging whether second MAC Address is first MAC Address;First sending module is further adapted for working as When second MAC Address is not first MAC Address, sends and change the account and first MAC Address binding Prompt information is to the first terminal;And second sending module is suitable for tying up when the change for receiving the first terminal transmission When fixed information, verification information is sent to third terminal, to release the binding information of the account Yu second MAC Address, And the account and first MAC Address are bound.
Optionally, the server further includes authentication module and login module, and the authentication module is suitable for when described the Whether when two MAC Address are first MAC Address, then it is effective account and correct for verifying the account and the password Password;And the login module is suitable for when the account and password authentification success, logs in the electric pin system.
Optionally, the server further includes logging modle, generation module and warning module, wherein the record mould Block is suitable for recording first MAC Address and second MAC Address that the account logs in;The generation module is suitable for root According to first MAC Address and second MAC Address of record, day monitoring information is generated;And the warning module is suitable for Whether it is abused according to account described in the day monitoring information early warning.
Optionally, the day monitoring information includes the account and first MAC Address and second MAC Address Login record.
Optionally, when whether judge the account is to first log into, the logging modle is further adapted for recording the account Login times;The first judgment module is further adapted for judging whether the login times are 1;And second judgment module is also Suitable for when the login times are 1, then judging the account to first log into.
Optionally, the third terminal is the terminal with verifying authorization, computer or manager including system manager Computer.
To achieve the above object, it the present invention also provides a kind of computer equipment, including memory, processor and is stored in On memory and the computer program that can run on the processor, the processor are realized when executing the computer program The step of above method.
To achieve the above object, the present invention also provides computer readable storage mediums, are stored thereon with computer program, institute State the step of above method is realized when computer program is executed by processor.
Compared to the prior art, account proposed by the invention logs in authorization method, server, computer equipment and storage Medium is bound the MAC Address of account and terminal by that will detect the login record of account, when the terminal that account replacement logs in When, send verification information to another terminal with by the terminal MAC address of the account and binding unbind, and by the account with step at this time The MAC Address of record is bound, and effectively account can be avoided to abuse, and largely eliminates the security risk of electric pin system, and It can prevent the generation of account abuse condition to a certain extent.
Detailed description of the invention
Fig. 1 is the schematic diagram of the optional hardware structure of server one of the embodiment of the present invention;
Fig. 2 is the program module schematic diagram for the first embodiment that account of the present invention logs in authoring system;
Fig. 3 is the program module schematic diagram for the second embodiment that account of the present invention logs in authoring system;
Fig. 4 is the program module schematic diagram for the 3rd embodiment that account of the present invention logs in authoring system;
Fig. 5 is the program module schematic diagram for the fourth embodiment that account of the present invention logs in authoring system;
Fig. 6 is the flow diagram for the first embodiment that account of the present invention logs in authorization method;
Fig. 7 is the flow diagram for the second embodiment that account of the present invention logs in authorization method;
Fig. 8 is the flow diagram for the 3rd embodiment that account of the present invention logs in authorization method.
Appended drawing reference:
Server 1
Memory 11
Processor 12
Network interface 13
Account logs in authoring system 200
Obtain module 201
First judgment module 202
First sending module 203
Binding module 204
Second judgment module 205
Second sending module 206
Authentication module 207
Login module 208
Logging modle 209
Generation module 210
Warning module 211
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawings and embodiments, right The present invention is further elaborated.It should be appreciated that described herein, specific examples are only used to explain the present invention, not For limiting the present invention.Based on the embodiments of the present invention, those of ordinary skill in the art are not before making creative work Every other embodiment obtained is put, shall fall within the protection scope of the present invention.
It should be noted that the description for being related to " first ", " second " etc. in the present invention is used for description purposes only, and cannot It is interpreted as its relative importance of indication or suggestion or implicitly indicates the quantity of indicated technical characteristic.Define as a result, " the One ", the feature of " second " can explicitly or implicitly include at least one of the features.In addition, the skill between each embodiment Art scheme can be combined with each other, but must be based on can be realized by those of ordinary skill in the art, when technical solution Will be understood that the combination of this technical solution is not present in conjunction with there is conflicting or cannot achieve when, also not the present invention claims Protection scope within.
As shown in fig.1, being the schematic diagram of the optional hardware structure of server 1 one of the present invention.
In the present embodiment, the server 1 may include, but be not limited only to, and can be in communication with each other connection by system bus and deposit Reservoir 11, processor 12, network interface 13.It should be pointed out that Fig. 2 illustrates only the server 1 with component 11-13, but Be it should be understood that, it is not required that implement all components shown, the implementation that can be substituted is more or less component.
Wherein, the server 1 can be rack-mount server, blade server, tower server or cabinet-type clothes Business device etc. calculates equipment, which can be independent server, be also possible to server set composed by multiple servers Group.
The memory 11 include at least a type of readable storage medium storing program for executing, the readable storage medium storing program for executing include flash memory, Hard disk, multimedia card, card-type memory (for example, SD or DX memory etc.), random access storage device (RAM), static random are visited It asks memory (SRAM), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), may be programmed read-only deposit Reservoir (PROM), magnetic storage, disk, CD etc..In some embodiments, the memory 11 can be the server 2 internal storage unit, such as the hard disk or memory of the server 1.In further embodiments, the memory 11 can also be with It is the plug-in type hard disk being equipped on the External memory equipment of the server 1, such as the server 1, intelligent memory card (SmartMediaCard, SMC), secure digital (SecureDigital, SD) card, flash card (FlashCard) etc..Certainly, institute State memory 11 can also both including the server 1 internal storage unit and also including its External memory equipment.The present embodiment In, the memory 11 is installed on the operating system and types of applications software of the server 1, such as account commonly used in storage Log in the program code etc. of authoring system 200.In addition, the memory 11 can be also used for temporarily storing exported or The Various types of data that will be exported.
The processor 12 can be in some embodiments central processing unit (CentralProcessing Unit, CPU), controller, microcontroller, microprocessor or other data processing chips.The processor 12 is commonly used in the control clothes The overall operation of business device 1.In the present embodiment, the processor 12 for run the program code stored in the memory 11 or Person handles data, such as runs the account and log in authoring system 200 etc..
The network interface 13 may include radio network interface or wired network interface, which is commonly used in Communication connection is established between the server 1 and other electronic equipments.
So far, oneself is through describing the hardware configuration and function of relevant device of the present invention in detail.In the following, above-mentioned introduction will be based on It is proposed each embodiment of the invention.
Firstly, the present invention proposes that a kind of account logs in authoring system 200.
As shown in fig.2, being the program module schematic diagram for the first embodiment that account of the present invention logs in authoring system 200.
In the present embodiment, it includes a series of calculating being stored on memory 11 that the account, which logs in authoring system 200, Machine program instruction, when the computer program instructions are executed by processor 12, the account that various embodiments of the present invention may be implemented is stepped on Record Authorized operation.In some embodiments, the specific operation realized based on the computer program instructions each section, account are stepped on Record authoring system 200 can be divided into one or more modules.For example, the account logs in authoring system 200 in Fig. 2 It can be divided into and obtain module 201, first judgment module 202, the first sending module 203 and binding module 204.Wherein:
The acquisition module 201 logs in the log-on message of electric pin system and described suitable for obtaining user from first terminal First mac address information of first terminal, the log-on message include at least account and password.
In a preferred embodiment, when user is in electric pin system that first terminal is installed input login account and password, First mac address information for obtaining module 201 and obtaining the account, the password and the first terminal.
The first judgment module 202, suitable for judging whether the account is to first log into.
In a preferred embodiment, the first judgment module 202 is according to the account for logging in the electric pin system got Number judge whether user is to log in electric pin system for the first time.Specifically, the server 1 preserves the login times of the account Information, user log in once, and the number that the login times information is shown adds 1.When user is to first log into, the login time Number information shows that number is 1.
First sending module 203, suitable for sending the account and described first when the account is to first log into The prompt information of MAC Address binding is to the first terminal.
The binding module 204, suitable for when the account and described first for receiving the first terminal transmission When the information of MAC Address binding, the account and first MAC Address are bound so that the first terminal have permission it is logical It crosses the account and logs in the electric pin system, and the account is fixed to the login interface for being shown in the electric pin system.
In a preferred embodiment, described when the first judgment module 202 judges that the user is to first log into The prompt that first sending module 203 binds the first MAC Address of the account for logging in the electric pin system and the first terminal Information is sent to the first terminal, so that the account is tied to the first terminal and logs in, while working as and using the account When logging in the electric pin system, the fixed login interface for being shown in the electric pin system of the account.When the binding module 204 When receiving the information that the first MAC Address of account and the first terminal that the first terminal is sent is bound, by described the First MAC Address of one account and the first terminal is bound.It is described in the case where not changing binding after the completion of binding Account can only log in the electricity pin system in the first terminal, effectively avoid to a certain extent other users abuse the account and Password is the occurrence of other terminals log in electric pin system.
As shown in fig.3, being the program module schematic diagram for the second embodiment that account of the present invention logs in authoring system 200.
In the present embodiment, the account logs in authoring system 200 in addition to including the acquisition module in first embodiment It 201, further include the second judgment module 205 except first judgment module 202, the first sending module 203 and binding module 204 And second sending module 206.Module 201 and first sending module 203 of obtaining is except execution first embodiment Except operation further include:
The acquisition module 201 is further adapted for when the account is not to first log into, and obtains the with account binding Second MAC Address of two terminals.
Second judgment module 205, suitable for judging whether second MAC Address is first MAC Address.
In a preferred embodiment, the with the second terminal of account binding is got in the acquisition module 201 After two MAC Address, second judgment module 205 judges whether first MAC Address is the second terminal first logged into Second MAC Address.
First sending module 203 is further adapted for when second MAC Address is not first MAC Address, sends The prompt information of the account and first MAC Address binding is changed to the first terminal.
Second sending module 206, suitable for sending out when receiving the information for the change binding that the first terminal is sent Send verification information to third terminal, to release the binding information of the account Yu second MAC Address, and by the account with The first MAC Address binding.Wherein, the third terminal is the terminal with verifying authorization, the electricity including system manager Brain or the computer of manager.
In a preferred embodiment, if the login times information saved in server shows that number is greater than 1, the account Not to first log into electric pin system, the MAC Address for logging in the terminal of the electric pin system at this time is obtained.Getting terminal at this time MAC Address after, judge the MAC Address whether be last login terminal MAC Address.If logon account is described at this time The MAC Address of terminal is not the MAC Address of the terminal of last login, then represents the owning user replacement terminal of the account either Other people abuse the electric pin system of account login, send the prompt of the MAC Address binding of change account and last login terminal at this time Information prompts user to change account binding to present terminal.
When user is when present terminal (terminal has been replaced) input account logs in electric pin system, and clicks and determine change account The button of binding, server receives the information that the change account that present terminal is sent is bound, and sends verification information and test to having The terminal (such as: the computer of system manager or the computer of manager) for demonstrate,proving permission, in the terminal authentication with verifying authorization After the success of the MAC Address of the account and present terminal, the binding for releasing the MAC Address of the account and last time terminal is believed Breath, and the MAC Address of the account and present terminal is bound, so that the account is obtained in present terminal logs in the electricity pin The permission of system, and the account is fixed to the login interface for being shown in present terminal electricity pin system.It, can by this embodiment Greatly to avoid other users from logging in electric pin system by the account of the user in other terminals, and then greatly push one The implementation of one account of people (account) system.Specifically, when user is when new terminal A logs in electric pin system, and according to the display of terminal A " whether binding the MAC Address of account and terminal A " prompt information of screen display, clicks ACK button, server receives eventually The information for binding the MAC Address of account and terminal A that A is sent is held, and " whether is agreed to account and end with lettergram mode transmission The mailbox of the prompt information extremely manager of the MAC Address binding of end A ".After the completion of manager's confirmation, server receives the confirmation message And the binding relationship of the MAC Address of account and last time terminal is released, account and the MAC Address of terminal A are bound again, this When user obtain the permission that the account logs in electric pin system in terminal A, successful log electricity pin system, while account fixation is shown in The login interface of the electric pin system of terminal A.
As shown in fig.4, being the program module schematic diagram for the 3rd embodiment that account of the present invention logs in authoring system 200.
In the present embodiment, the account logs in authoring system 200 in addition to including the acquisition module in second embodiment 201, first judgment module 202, the first sending module 203, binding module 204, the second judgment module 205 and second send mould It further include authentication module 207 and login module 208 except block 206.
The authentication module 207, suitable for when second MAC Address is first MAC Address, then verifying the account Number and the password whether be effective account and proper password.
The login module 208 is suitable for when the account and password authentification success, logs in the electric pin system.
In a preferred embodiment, when user is not to first log into electric pin system, and server 1 judges present terminal MAC Address when being the MAC Address of last time terminal, state of the MAC Address of account and last time terminal still in binding at this time, clothes Whether the device verifying account of being engaged in and the password are effective account and proper password.If the account and password authentification at Function, representing the account has the permission for logging in electric pin system, then logs in electric pin system.
As shown in fig.5, being the program module schematic diagram for the fourth embodiment that account of the present invention logs in authoring system 200.
In the present embodiment, the account logs in authoring system 200 in addition to including the acquisition module in 3rd embodiment 201, first judgment module 202, the first sending module 203, binding module 204, the second judgment module 205, the second sending module It 206, further include logging modle 209, generation module 210 and warning module except authentication module 207 and login module 208 211。
The logging modle 209, suitable for recording the account logs within one day first MAC Address and described Second MAC Address.
In a preferred embodiment, when user logs in every time daily, the logging modle 207 records the account and is stepped on The MAC Address of the terminal of record, the first MAC of the first terminal including the second MAC Address and subsequent login that first log into Location.
The generation module 210 is generated suitable for first MAC Address and second MAC Address according to record Day monitoring information.Wherein, the day monitoring information includes the account and first MAC Address and the 2nd MAC The login record of location.Specifically, all MAC Address (packets that the generation module 208 is recorded according to the logging modle 207 Include the first MAC Address of the first terminal of the second MAC Address and subsequent login that first log into) day monitoring information is generated, with The account is monitored in the historical log situation of different terminals.
Whether the warning module 211 is abused suitable for the account according to the day monitoring information early warning.For example, root According to day monitoring information, if terminal A, terminal B and terminal C login account are fixed in user one month daily, and day monitoring letter User's today is shown in breath in the day monitoring information of terminal D login account, then user described in early warning may be abused.
Through this embodiment, other users can further be avoided to log in electricity by the account of the user in other terminals Pin system improves the security level of electric pin system.
In addition, the present invention also proposes that a kind of account logs in authorization method.
As shown in fig.6, being the flow diagram for the first embodiment that account of the present invention logs in authorization method.The account Authorization method is logged in be applied in server 1.In the present embodiment, the step in flow chart shown in fig. 6 according to different requirements, Rapid execution sequence can change, and certain steps can be omitted.
Step S600, from first terminal obtain user log in electric pin system log-on message and the first terminal the One mac address information, the log-on message include at least account and password.
Step S602 judges whether the account is to first log into, if the account is to first log into, is thened follow the steps S604, it is no to then follow the steps S608.
Step S604 sends the prompt information of the account and first MAC Address binding to the first terminal.
Step S606 is bound when receiving the account that the first terminal is sent with first MAC Address Information when, the account and first MAC Address are bound, stepped on so that the first terminal has permission by the account The electric pin system is recorded, and the account is fixed to the login interface for being shown in the electric pin system.
Step S608 obtains the second MAC Address with the second terminal of account binding.
Step S610 judges whether second MAC Address is first MAC Address, if second MAC Address is not It is first MAC Address, thens follow the steps S612, it is no to then follow the steps S616.
Step S612, the prompt information that the transmission change account is bound with first MAC Address to described first is eventually End.
Step S614 sends verification information to the when receiving the information for the change binding that the first terminal is sent Three terminals, to release the binding information of the account Yu second MAC Address, and by the account and the first MAC Bind and fix the account display interface for being shown in the electric pin system of the first terminal installation in location, wherein institute Stating third terminal is the terminal with verifying authorization, the computer of computer or manager including system manager.
Step S616, verifies whether the account and the password are effective account and proper password.
Step S618 logs in the electric pin system when the account and password authentification success.In a preferred embodiment In, if the account and password authentification success, representing the account has the permission for logging in electric pin system, then logs in the electricity pin System.
The generation of account abuse condition can effectively be avoided by logging in authorization method by the above account, while greatly be mentioned The high security level of electric pin system.
As shown in fig.7, being the flow diagram for the second embodiment that account of the present invention logs in authorization method.The account Authorization method is logged in be applied in server 1.In the present embodiment, the account logs in the step of authorization method in addition to including the Except step S600~S618 of one embodiment, the server 1 is every time in the MAC Address for obtaining the terminal that the account logs in When, it further include step S700~S704.
Step S700, first MAC Address and the 2nd MAC that the account logs within record one day Location.
Step S702 generates day monitoring information according to first MAC Address and second MAC Address of record. Wherein, the day monitoring information includes the login note of the account and first MAC Address and second MAC Address Record.All MAC Address that specifically, the generation module 208 is recorded according to the logging modle 207 (including first log into The second MAC Address and subsequent login first terminal the first MAC Address) generate day monitoring information, to monitor the account Number different terminals historical log situation.
Whether step S704 is abused according to account described in the day monitoring information early warning.Believe for example, being monitored according to day Breath if being fixed on terminal A, terminal B and terminal C login account in user one month daily, and shows the present in day monitoring information Its user is in the day monitoring information of terminal D login account, then server 1 shows the terminal D in the day monitoring information It for red, and is flashed, by the way that terminal D is carried out highlight indication to remind the user account that may be abused.
As shown in fig.8, being the flow diagram for the 3rd embodiment that account of the present invention logs in authorization method.The account Authorization method is logged in be applied in server 1.In the present embodiment, the account logs in the step of authorization method in addition to including the It is described to judge whether the account is the step first logged into except the step S600~S618 and S700~S704 of two embodiments It suddenly further include step S800~S806.
Step S800 records the login times of the account.
Step S802 judges whether the login times are 1, if judging, the login times for 1, are thened follow the steps S804, it is no to then follow the steps S806.
Step S804 judges that the account is to first log into.
Step S806 judges that the account does not first log into.
Through this embodiment, effectively account can be avoided to abuse, largely eliminates the security risk of electric pin system, simultaneously It can prevent the generation of account abuse condition.
The embodiment of the present invention also provides a kind of computer equipment, can such as execute the smart phone, tablet computer, pen of program Remember that this computer, desktop computer, rack-mount server, blade server, tower server or Cabinet-type server are (including only Server cluster composed by vertical server or multiple servers) etc..The computer equipment of the present embodiment include at least but It is not limited to: memory, processor of connection etc. can be in communication with each other by system bus.
The present embodiment also provides a kind of computer readable storage medium, such as flash memory, hard disk, multimedia card, card-type memory (for example, SD or DX memory etc.), random access storage device (RAM), static random-access memory (SRAM), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), programmable read only memory (PROM), magnetic storage, magnetic Disk, CD, server, App are stored thereon with computer program, phase are realized when program is executed by processor using store etc. Answer function.The computer readable storage medium of the present embodiment logs in authoring system 200 for storing account, when being executed by processor Realize that account of the invention logs in authorization method.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art The part contributed out can be embodied in the form of software products, which is stored in a storage medium In (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal device (can be mobile phone, computer, clothes Business device, air conditioner or the network equipment etc.) execute method described in each embodiment of the present invention.
The above is only a preferred embodiment of the present invention, is not intended to limit the scope of the invention, all to utilize this hair Equivalent structure or equivalent flow shift made by bright specification and accompanying drawing content is applied directly or indirectly in other relevant skills Art field, is included within the scope of the present invention.

Claims (10)

1. a kind of account logs in authorization method, it is applied in server, which is characterized in that the method includes the steps:
User, which is obtained, from first terminal logs in the log-on message of electric pin system and the first MAC Address letter of the first terminal Breath, the log-on message include at least account and password;
Judge whether the account is to first log into;
When the account is to first log into, prompt information that the account and first MAC Address are bound is sent to described First terminal;And
When receiving the information of the account and first MAC Address binding that the first terminal is sent, by the account Number and first MAC Address binding so that the first terminal, which has permission, logs in the electric pin system by the account, and By the fixed login interface for being shown in the electric pin system of the account.
2. account as described in claim 1 logs in authorization method, which is characterized in that described to judge whether the account is for the first time After login step, further includes:
When the account is not to first log into, the second MAC Address with the second terminal of account binding is obtained;
Judge whether second MAC Address is first MAC Address;
When second MAC Address is not first MAC Address, sends and change the account and first MAC Address The prompt information of binding is to the first terminal;And
When receiving the information for the change binding that the first terminal is sent, verification information is sent to third terminal, to release The binding information of the account and second MAC Address, and the account and first MAC Address are bound and will be described The display interface of the fixed electric pin system for being shown in the first terminal installation of account.
3. account as claimed in claim 2 logs in authorization method, which is characterized in that the method also includes steps:
When second MAC Address is first MAC Address, then verify whether the account and the password are effective Account and proper password;And
When the account and password authentification success, the electric pin system is logged in.
4. account as claimed in claim 2 logs in authorization method, which is characterized in that the method also includes steps:
First MAC Address and second MAC Address that the account logs within record one day;
According to first MAC Address and second MAC Address of record, day monitoring information is generated;And
Whether it is abused according to account described in the day monitoring information early warning.
5. account as claimed in claim 4 logs in authorization method, which is characterized in that the day monitoring information includes the account With the login record of first MAC Address and second MAC Address.
6. account as described in claim 1 logs in authorization method, which is characterized in that described to judge whether the account is for the first time The step of login, further includes:
Record the login times of the account;
Judge whether the login times are 1;And
When the login times are 1, then the account is judged to first log into.
7. account as claimed in claim 2 logs in authorization method, which is characterized in that the third terminal is with verifying authorization Terminal, the computer of computer or manager including system manager.
8. a kind of server, characterized in that it comprises:
Obtain module, suitable for from first terminal obtain user log in electric pin system log-on message and the first terminal the One mac address information, the log-on message include at least account and password;
Judgment module, suitable for judging whether the account is to first log into;
First sending module, suitable for sending the account and first MAC Address being bound when the account is to first log into Prompt information to the first terminal;And
Binding module, suitable for when the letter for receiving the account and the first MAC address binding that the first terminal is sent When breath, the account and first MAC Address are bound, so that the first terminal, which has permission, logs in institute by the account Electric pin system is stated, and the account is fixed to the login interface for being shown in the electric pin system.
9. a kind of computer equipment, can run on a memory and on a processor including memory, processor and storage Computer program, which is characterized in that the processor realizes any one of claim 1 to 7 institute when executing the computer program The account stated logs in the step of authorization method.
10. a kind of computer readable storage medium, is stored thereon with computer program, it is characterised in that: the computer program The step of account of any of claims 1-7 logs in authorization method is realized when being executed by processor.
CN201811246788.9A 2018-10-25 2018-10-25 Account login authorization method, server, computer equipment and storage medium Active CN109040146B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811246788.9A CN109040146B (en) 2018-10-25 2018-10-25 Account login authorization method, server, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811246788.9A CN109040146B (en) 2018-10-25 2018-10-25 Account login authorization method, server, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN109040146A true CN109040146A (en) 2018-12-18
CN109040146B CN109040146B (en) 2022-07-22

Family

ID=64614162

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811246788.9A Active CN109040146B (en) 2018-10-25 2018-10-25 Account login authorization method, server, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN109040146B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110012109A (en) * 2019-04-15 2019-07-12 珠海格力电器股份有限公司 The method for building up of the engineering information of high accuracy can be achieved
CN112398695A (en) * 2020-11-19 2021-02-23 上海浦东发展银行股份有限公司 Large-scale terminal equipment management and control method, system, equipment and storage medium
CN112737825A (en) * 2020-12-23 2021-04-30 携程旅游信息技术(上海)有限公司 Log-based network device association method, system, device and storage medium

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103491092A (en) * 2013-09-24 2014-01-01 长沙裕邦软件开发有限公司 Method and system for separating and binding of application platform and databank
CN104125062A (en) * 2013-04-26 2014-10-29 腾讯科技(深圳)有限公司 Login method, device, login authentication device, server, terminals and system
CN104657851A (en) * 2013-11-19 2015-05-27 腾讯科技(深圳)有限公司 Payment binding management method, payment server, client side and system
CN104767713A (en) * 2014-01-02 2015-07-08 腾讯科技(深圳)有限公司 Account binding method, server and account binding system
CN104780042A (en) * 2014-01-13 2015-07-15 深圳中兴网信科技有限公司 Two-layer authentication method, device and system for instant messaging
CN105100190A (en) * 2015-05-21 2015-11-25 小米科技有限责任公司 Methods, devices and system for managing control relation of account and device
CN105656948A (en) * 2016-03-30 2016-06-08 北京小米移动软件有限公司 Account login method and device
CN106022013A (en) * 2016-05-03 2016-10-12 北京小米移动软件有限公司 Method and device for relieving application program authorization
CN106354540A (en) * 2016-10-31 2017-01-25 广州云移信息科技有限公司 Terminal-spanning application program loading method and terminal-spanning application program loading system
CN106656978A (en) * 2016-10-19 2017-05-10 广东欧珀移动通信有限公司 Account login method and server
US20170163628A1 (en) * 2013-07-02 2017-06-08 Tencent Technology (Shenzhen) Company Limited User login methods, devices, and systems

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104125062A (en) * 2013-04-26 2014-10-29 腾讯科技(深圳)有限公司 Login method, device, login authentication device, server, terminals and system
US20170163628A1 (en) * 2013-07-02 2017-06-08 Tencent Technology (Shenzhen) Company Limited User login methods, devices, and systems
CN103491092A (en) * 2013-09-24 2014-01-01 长沙裕邦软件开发有限公司 Method and system for separating and binding of application platform and databank
CN104657851A (en) * 2013-11-19 2015-05-27 腾讯科技(深圳)有限公司 Payment binding management method, payment server, client side and system
CN104767713A (en) * 2014-01-02 2015-07-08 腾讯科技(深圳)有限公司 Account binding method, server and account binding system
CN104780042A (en) * 2014-01-13 2015-07-15 深圳中兴网信科技有限公司 Two-layer authentication method, device and system for instant messaging
CN105100190A (en) * 2015-05-21 2015-11-25 小米科技有限责任公司 Methods, devices and system for managing control relation of account and device
CN105656948A (en) * 2016-03-30 2016-06-08 北京小米移动软件有限公司 Account login method and device
CN106022013A (en) * 2016-05-03 2016-10-12 北京小米移动软件有限公司 Method and device for relieving application program authorization
CN106656978A (en) * 2016-10-19 2017-05-10 广东欧珀移动通信有限公司 Account login method and server
CN106354540A (en) * 2016-10-31 2017-01-25 广州云移信息科技有限公司 Terminal-spanning application program loading method and terminal-spanning application program loading system

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110012109A (en) * 2019-04-15 2019-07-12 珠海格力电器股份有限公司 The method for building up of the engineering information of high accuracy can be achieved
CN112398695A (en) * 2020-11-19 2021-02-23 上海浦东发展银行股份有限公司 Large-scale terminal equipment management and control method, system, equipment and storage medium
CN112737825A (en) * 2020-12-23 2021-04-30 携程旅游信息技术(上海)有限公司 Log-based network device association method, system, device and storage medium
CN112737825B (en) * 2020-12-23 2022-12-02 携程旅游信息技术(上海)有限公司 Log-based network device association method, system, device and storage medium

Also Published As

Publication number Publication date
CN109040146B (en) 2022-07-22

Similar Documents

Publication Publication Date Title
EP3574625B1 (en) Method for carrying out an authentication
CN108183924A (en) A kind of login validation method and terminal device
CN104184705B (en) Verification method, device, server, subscriber data center and system
US8515847B2 (en) System and method for password-free access for validated users
CN104917749B (en) account registration method and device
CN105246073B (en) The access authentication method and server of wireless network
CN108200050A (en) Single logging-on server, method and computer readable storage medium
CN106453205B (en) identity verification method and device
CN109784031B (en) Account identity verification processing method and device
CN109639723A (en) A kind of micro services access method and server based on ERP system
CN109040146A (en) Account logs in authorization method, server, computer equipment and storage medium
CN107463838A (en) Method for safety monitoring, device, system and storage medium based on SGX
CN105554018B (en) Genuine cyber identification verification method
CN109670968A (en) Processing method, device, equipment and the computer storage medium of insurance data
CN109639724A (en) Password method for retrieving, password device for retrieving, computer equipment and storage medium
CN104184709A (en) Verification method, device, server, service data center and system
US11444936B2 (en) Managing security credentials
CN107645471A (en) A kind of method and system for mobile terminal user identity certification
CN103975567B (en) Two-factor authentication method and virtual machine facility
CN107196914A (en) Identity identifying method and device
CN110049028A (en) Monitor method, apparatus, computer equipment and the storage medium of domain control administrator
CN107358763A (en) A kind of method, apparatus and system of ATM checking identity
CN110706143A (en) Identity authentication method and device based on government affair service
CN108960820A (en) A kind of real name identification method based on block chain, system and storage medium
CN107872446B (en) Communication account management method and device and server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant