CN109218326A - Login validation method, device, storage medium and server - Google Patents

Login validation method, device, storage medium and server Download PDF

Info

Publication number
CN109218326A
CN109218326A CN201811180225.4A CN201811180225A CN109218326A CN 109218326 A CN109218326 A CN 109218326A CN 201811180225 A CN201811180225 A CN 201811180225A CN 109218326 A CN109218326 A CN 109218326A
Authority
CN
China
Prior art keywords
user
identity documents
server
client
sent
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811180225.4A
Other languages
Chinese (zh)
Inventor
徐伟堂
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Huya Information Technology Co Ltd
Original Assignee
Guangzhou Huya Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Huya Information Technology Co Ltd filed Critical Guangzhou Huya Information Technology Co Ltd
Priority to CN201811180225.4A priority Critical patent/CN109218326A/en
Publication of CN109218326A publication Critical patent/CN109218326A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Storage Device Security (AREA)

Abstract

It includes: the logging request in response to user that the present invention, which provides a kind of login validation method, device, storage medium and server, the login validation method, obtain user's last time when logging in server transmission prestore identity documents;Wherein, the identity documents that prestore contain encrypted user information;Server will be sent to comprising the logging request for prestoring identity documents;Wherein, the server verifies the identity documents, and allows the user to log in after verification passes through;The update identity documents that server is sent are received, and prestore identity documents described in replacement, are used for login authentication next time.The present invention is verified by identity of the identity documents to user, user by account number cipher when being logged in first time, without saving password, and after closing client, when next time reopens client, it can complete to log in automatically according to identity documents, without re-entering password, it is easy to operate, it is highly-safe.

Description

Login validation method, device, storage medium and server
Technical field
The present invention relates to user's login techniques fields of internet, specifically, the present invention relates to a kind of login authentication sides Method, device, storage medium and server.
Background technique
Currently, user is mostly by input account and close when logining a certain webcast website or live streaming client for the first time The mode of code is completed, and when needing to log in next time, can be logged on by way of re-entering password or remembeing password.
When by way of re-entering password, user needs to manage the users such as the username and password of oneself and logs in letter Breath, and input log-on message is required every time, it is cumbersome;When password is remembered in selection, then the leakage of password, shadow are be easy to cause Safety is rung.
Summary of the invention
The purpose of the present invention is intended to provide a kind of login validation method, to solve cumbersome, safety when user logs in Poor problem.
A kind of login validation method provided by the invention, comprising:
In response to the logging request of user, what server was sent when acquisition user's last time logs in prestores identity documents;Its In, the identity documents that prestore contain encrypted user information;
Server will be sent to comprising the logging request for prestoring identity documents;Wherein, the server is to described pre- It deposits identity documents to be verified, and allows the user to log in after verification passes through;
The update identity documents that server is sent are received, and prestore identity documents described in replacement, are tested for logging in next time Card uses.
Optionally, and after allowing the user to log in after verification passes through, further includes:
Receive the business voucher that server is sent;
When receiving user's operation, the business voucher and user's operation are sent to server;The server benefit User's operation is verified with the business voucher.
Optionally, the identity documents include header and main body, and the header includes that the version number of the identity documents believes Breath.
Optionally, the identity documents that prestore use syllable sequence identical with the backup identity documents of server to be stored in visitor In the end of family.
A kind of login validation method provided by the invention, comprising:
Receive the access request for prestoring identity documents comprising user that client is sent;
It is verified according to prestore identity documents of the access request of the user to the user, and after verification passes through The user is allowed to log in;
It is generated according to user information and updates identity documents, and be sent to the client, for replacing the client Prestore identity documents.
Optionally, and after allowing the user to log in after verification passes through, further includes:
Business voucher is sent to client;
When receiving the user's operation and business voucher of client return, the user is grasped using the business voucher It is verified, to verify user's operation.
Optionally, the step that prestores identity documents verified of the access request according to the user to the user Suddenly, comprising:
The legitimacy for prestoring identity documents and validity period are verified;
When it is described prestore identity documents it is legal and not out of date when, allow the user login services device.
Optionally, the step that prestores identity documents verified of the access request according to the user to the user Suddenly, comprising:
The access request for receiving the user obtains from access request and prestores identity documents;
The backup identity documents for prestoring identity documents and prestoring on the server are subjected to information matches, successful match After allow the user log in.
Optionally, after the generation update identity documents according to user information, further includes:
The update identity documents are encrypted using a variety of symmetrical and/or asymmetric manners.
Optionally, described and allow after verification passes through the user log in after, further includes:
Detection caching or database are whether normal operation;
When the caching or database operate normally, executes and update identity documents are generated according to user information, and send To the client, for replacing the step of prestoring identity documents of the client;
Otherwise, designated state position is set;Wherein, it is logged in the designated state position is for logging in next time when in conjunction with last The identity documents that prestore used are logged in.
A kind of login authentication device provided by the invention, comprising:
Module is obtained, for the logging request in response to user, server is sent pre- when acquisition user's last time logs in Deposit identity documents;Wherein, the identity documents that prestore contain encrypted user information;
Sending module, for will include that the logging request for prestoring identity documents is sent to server;Wherein, the clothes Business device verifies the identity documents that prestore, and allows the user to log in after verification passes through;
Replacement module prestores identity documents for receiving the update identity documents of server transmission, and described in replacement, is used for Login authentication uses next time.
A kind of login authentication device provided by the invention, comprising:
Receiving module, for receiving the access request for prestoring identity documents comprising user of client transmission;
Correction verification module, for being verified according to the access request of the user to the identity documents that prestore of the user, And the user is allowed to log in after verification passes through;
Generation module updates identity documents for generating according to user information, and is sent to the client, for replacing The client prestores identity documents.
A kind of storage medium provided by the invention, is stored thereon with computer program,
The computer program realizes login authentication side described in above-mentioned any one technical solution when being executed by processor Method.
A kind of server provided by the invention, comprising:
One or more processors;
Storage device, for storing one or more programs;
When one or more of programs are executed by one or more of processors, so that one or more of places Reason device realizes login validation method described in above-mentioned any one technical solution.
Compared with the existing technology, present invention has the advantage that
Login validation method provided by the invention, after user is logged in by account number cipher, server sends body to client Part voucher, when next time logs in, obtain user's last time when logging in server transmission prestore identity documents, and pre- take shelter described Part voucher is sent to server, prestores identity documents described in the server check and correction, the user is allowed to log in after verification passes through, And sent to the client and update identity documents, identity documents are prestored described in replacement, are used for login authentication next time.Cause This, the present invention is verified by identity of the identity documents to user, and user is not necessarily to when being logged in for the first time by account number cipher Password is saved, after closing client, when next time reopens client, can complete to log in automatically according to identity documents, without weight New input password, it is easy to operate, it is highly-safe.
Login validation method provided by the invention receives the business voucher that server is sent after client logins successfully, The business voucher is used to verify the operation behavior of user, such as makes a speech, pays close attention to, operation behavior of giving gifts, with real-time school The identity for testing user ensures the account safety of user.
Login validation method provided by the invention, client receive described in prestore identity documents after, prestore identity for described Voucher is saved in the client using syllable sequence identical with the backup identity documents of server, is being verified to avoid identity documents When, verification is influenced since syllable sequence is inconsistent.
Login validation method provided by the invention, when the caching of server or database can not normal use when, setting refers to Determine mode bit, logged in the identity documents that prestore used according to the designated state position and last login, avoid due to Caching or database lead to login failure extremely, to improve the availability of login authentication.
The additional aspect of the present invention and advantage will be set forth in part in the description, these will become from the following description Obviously, or practice through the invention is recognized.
Detailed description of the invention
Above-mentioned and/or additional aspect and advantage of the invention will become from the following description of the accompanying drawings of embodiments Obviously and it is readily appreciated that, in which:
Fig. 1 is the implementation environment figure of the login validation method provided in one embodiment of the invention;
Fig. 2 is a kind of flow diagram of embodiment of login validation method of the present invention;
Fig. 3 is the flow diagram of another embodiment of login validation method of the present invention;
Fig. 4 is the flow diagram of login validation method another kind embodiment of the present invention;
Fig. 5 is the flow diagram of login validation method another embodiment of the present invention;
Fig. 6 is a kind of module frame chart of embodiment of login authentication device of the present invention;
Fig. 7 is the module frame chart of login authentication device another kind embodiment of the present invention;
Fig. 8 is the structural schematic diagram of the server of one embodiment of the invention.
Specific embodiment
The embodiment of the present invention is described below in detail, examples of the embodiments are shown in the accompanying drawings, wherein from beginning to end Same or similar label indicates same or similar element or element with the same or similar functions.Below with reference to attached The embodiment of figure description is exemplary, and for explaining only the invention, and is not construed as limiting the claims.
Those skilled in the art of the present technique are appreciated that unless expressly stated, singular " one " used herein, " one It is a ", " described " and "the" may also comprise plural form.It is to be further understood that being arranged used in specification of the invention Diction " comprising " refer to that there are the feature, integer, step, operation, element and/or component, but it is not excluded that in the presence of or addition Other one or more features, integer, step, operation, element, component and/or their group.It should be understood that when we claim member Part is " connected " or when " coupled " to another element, it can be directly connected or coupled to other elements, or there may also be Intermediary element.In addition, " connection " used herein or " coupling " may include being wirelessly connected or wirelessly coupling.It is used herein to arrange Diction "and/or" includes one or more associated wholes for listing item or any cell and all combinations.
Those skilled in the art of the present technique are appreciated that unless otherwise defined, all terms used herein (including technology art Language and scientific term), there is meaning identical with the general understanding of those of ordinary skill in fields of the present invention.Should also Understand, those terms such as defined in the general dictionary, it should be understood that have in the context of the prior art The consistent meaning of meaning, and unless idealization or meaning too formal otherwise will not be used by specific definitions as here To explain.
Fig. 1 is the implementation environment figure of the login validation method provided in one embodiment, as shown in Figure 1, in the implementation ring In border, including server 110, terminal 120.Wherein, client is installed, the terminal 120 passes through network in the terminal 120 It is connect with server 110, realizes the interaction between terminal 120 and server 110.Wherein, above-mentioned network may include internet, 2G/3G/4G, wifi etc..
It should be noted that server 110 can be independent physical server or terminal, it is also possible to multiple physics clothes The server cluster for device composition of being engaged in can be to provide the basic cloud computing service such as Cloud Server, cloud database, cloud storage and CDN Cloud Server.
The terminal 120 can be smart phone, tablet computer, laptop, desktop computer, intelligent sound box, intelligence Energy wrist-watch etc., however, it is not limited to this.
As shown in Fig. 2, the present invention provides a kind of login validation method, to solve cumbersome, safety when user logs in The poor problem of property.The login validation method includes:
S11, the logging request in response to user, obtain user's last time when logging in server transmission prestore identity with Card;Wherein, the identity documents that prestore contain encrypted user information;
After receiving user and such as clicking the logging request of a certain client, the login of user described in the client end response is asked It asks, what server was sent when whether detection locally logs in containing user's last time prestores identity documents, prestores if so, then obtaining this Identity documents;Otherwise, prompt user passes through account and password login.Wherein, the identity documents may include user identity, close The encryption information of key, identity documents validity period etc. can be the forms such as one section of binary data, an instruction parameter.
S12, server will be sent to comprising the logging request for prestoring identity documents;Wherein, the server is to institute It states and prestores identity documents and verified, and allow the user to log in after verification passes through;
Described prestore may include unique identification in identity documents, can be a constant or character string, use for identification Family, the corresponding user of a unique identification.When verification, server can be judged whether according to the unique identification in identity documents with User is corresponding, if so, the user is allowed to log in.
S13, the update identity documents that server is sent are received, and prestores identity documents described in replacement, for stepping on next time Record verifying uses;
The update identity documents can be upgraded on the basis of prestoring identity documents, and replacement prestores identity documents, be used It is used in login authentication next time.After i.e. each user logs in, prestoring identity documents and all can once be replaced in client It updates, is cracked to avoid identity documents are prestored, user information is caused to be revealed.
Specifically, when user logs in for the first time, server is logged on in such a way that user inputs account and password, is stepped on After recording successfully, server generates identity documents according to user information, and the identity documents are sent to client, is stored in visitor In the end of family.When user logs in next time, the logging request of client end response user is directly stepped on from local acquisition user the last time What server was sent when record prestores identity documents, and the identity documents that prestore are back to server, is completed by server pre- The verification of identity documents is deposited, after verification passes through, then allows the user to log in, and generate update identity documents, is sent to client; After client receives the update identity documents that server is sent, identity documents are prestored described in replacement, for logging in next time Verifying uses.
Login validation method provided by the invention, after user is logged in by account number cipher, server sends body to client Part voucher, when next time logs in, obtain user's last time when logging in server transmission prestore identity documents, and pre- take shelter described Part voucher is sent to server, prestores identity documents described in the server check and correction, the user is allowed to log in after verification passes through, And sent to the client and update identity documents, identity documents are prestored described in replacement, are used for login authentication next time.Cause This, the present invention is verified by identity of the identity documents to user, and user is not necessarily to when being logged in for the first time by account number cipher Password is saved, after closing client, when next time reopens client, can complete to log in automatically according to identity documents, without weight New input password, it is easy to operate, it is highly-safe.
Optionally, as shown in figure 3, in the S12 step, and the step of allowing after verification passes through the user to log in it Afterwards, can also include the following steps:
S14, the business voucher that server is sent is received;
S15, when receiving user's operation, the business voucher and user's operation are sent to server, the service Device verifies user's operation using the business voucher.
In the present embodiment, after identity documents verification passes through, user logins successfully, server is except one update body of generation Outside part voucher, a business voucher is also generated, client is sent to, after client receives the business voucher, is stored in this In ground, when user is such as made a speech in logging state, pays close attention to, gives gifts, pays operation, then industry on the client will be saved Business voucher returns to server, is verified by server to user's operation, judges whether it is me and operates, to verify in real time The identity of user ensures user account safety.Wherein, the business voucher is similar to identity documents, contains user information etc. Encryption information.
In one embodiment, the identity documents include header and main body, and the header includes the version of the identity documents This number information.
In the present embodiment, the identity documents include it is described prestore identity documents and the update identity documents, can be with It may include the main body for the header and encryption not encrypted for one section of binary data.Wherein, the header may include identity The version number information of voucher so that identity documents can be compatible with old identity documents, and is iterated upgrading.The main body The user information for needing to verify is contained, before verification, needs that first the main body is decrypted, to obtain user information, thus Carry out subsequent check.
Optionally, the identity documents that prestore use syllable sequence identical with the backup identity documents of server to be stored in visitor In the end of family.
In embodiment, the syllable sequence is that multibyte data stores or when network transmission each word in calculator memory The storage order of section, there are commonly little-endians and big end syllable sequence.To avoid identity documents when transmitting and parsing verification, Verification is caused to fail since the syllable sequence difference that client and server uses makes identity documents difference occur, therefore, it is necessary to Syllable sequence identical with server is used to save in the client the identity documents that prestore.
As shown in figure 4, a kind of login validation method provided by the invention, comprising:
S21, the access request for prestoring identity documents comprising user that client is sent is received;
After receiving user and such as clicking the logging request of a certain client, the login of user described in the client end response is asked It asks, what whether when logging in containing user's last time in detection local server was sent prestores identity documents, if so, it is pre- then to obtain this Identity documents are deposited, and this is prestored into identity documents and generates access request, are sent to server.Wherein, the identity documents can be with Encryption information comprising user identity, key, identity documents validity period etc. can be one section of binary data, an instruction ginseng The forms such as number.
S22, the identity documents that prestore of the user are verified according to the access request of the user, and logical in verification Allow the user to log in later;
Described prestore may include unique identification in identity documents, can be a constant or character string, use for identification Family, the corresponding user of a unique identification.When verification, server can be judged whether according to the unique identification in identity documents with User is corresponding, if so, the user is allowed to log in.
S23, update identity documents are generated according to user information, and be sent to the client, for replacing the client End prestores identity documents.
The update identity documents can be upgraded on the basis of prestoring identity documents, and replacement prestores identity documents, It is tested for login authentication next time.After i.e. each user logs in, prestoring identity documents and all can once be replaced in client Update is changed, is cracked to avoid identity documents are prestored, user information is caused to be revealed.
Specifically, when user logs in for the first time, server is logged on in such a way that user inputs account and password, is stepped on After recording successfully, server generates identity documents according to user information, and the identity documents are sent to client, is stored in visitor In the end of family.When user logs in next time, the logging request of client end response user is directly stepped on from local acquisition user the last time What server was sent when record prestores identity documents, and the identity documents that prestore are back to server, and server receives client After holding the access request for prestoring identity documents comprising user sent, the identity documents that prestore of the user are verified, After verification passes through, then the user is allowed to log in.After login, server is generated according to user information updates identity documents, is sent to Client;After client receives the update identity documents that server is sent, identity documents are prestored described in replacement, for next Secondary login authentication uses.
Optionally, as shown in figure 5, in the S22 step, and the step of allowing after verification passes through the user to log in it Afterwards, can also include the following:
S24, business voucher is sent to client;
S25, when the user's operation for receiving client return and when business voucher, using the business voucher to the use Family operation is verified, to verify user's operation.
In the present embodiment, after identity documents verification passes through, user logins successfully, server is except one update body of generation Outside part voucher, a business voucher is also produced, and be sent to client, after client receives the business voucher, is stored in In local, when user is when logging state is such as made a speech, pays close attention to, gives gifts, pays operation, then client will be stored in local Business voucher return to server, after server receives the business voucher of client return, the business voucher is carried out Verification judges whether it is me and operates to verify to user's operation, to verify the identity of user in real time, ensures and uses Family account safety.Wherein, the business voucher is similar to identity documents, and it comprises the encryption information such as user information.
In one embodiment, in the S22 step, body of the access request according to the user to the user The step of part voucher is verified, may include as follows:
The legitimacy for prestoring identity documents and validity period are verified;When the identity documents that prestore are legal and not When expired, allow the user login services device.
In the present embodiment, when server receives after prestoring identity documents of client return, judge described pre- take shelter Whether part voucher is the corresponding identity documents of the user, when it is described prestore identity documents and user to it is corresponding when further judge this It whether before the deadline to prestore identity documents, when the identity documents are legal and not out of date, then allows the user login services Device, to improve the safety logged in.When it is described prestore identity documents it is illegal or expired when, then prompt user to step on by password Record.
Optionally, in the S22 step, identity documents of the access request according to the user to the user The step of being verified may include as follows:
The access request for receiving the user obtains from access request and prestores identity documents;
The backup identity documents for prestoring identity documents and prestoring on the server are subjected to information matches, successful match After allow the user log in.
After server generates identity documents, in the server by identity documents backup, and identical body is sent to client Part voucher, when receiving the access request of the user, the identity documents that server can be returned according to client and are stored in Identity documents in server are matched, and the user is allowed to log in after successful match.Wherein, it is contained in the identity documents Sequence number when for verifying, other than it need to match user information, also needs further to match sequence number, every time log at After function, the sequence number adds up accordingly, to prevent from forging.
Optionally, the S23 step according to user information generate update identity documents after, can also include:
The update identity documents are encrypted using a variety of symmetrical and/or asymmetric manners.
In the present embodiment, when encrypting to update identity documents, a variety of symmetric modes or asymmetric side can be used Formula is encrypted, and can also be prevented simultaneously using a variety of symmetric modes and asymmetric manner with improving the safety of identity documents It is cracked.Wherein, the symmetric cryptography is that the same key can be used for encryption and decryption to user information simultaneously.It is described non-right Encryption is claimed then to use two keys: public-key cryptography and private cipher key.Public-key cryptography is to exist in pairs with private cipher key, if with public affairs It opens key pair user information to be encrypted, then could only be decrypted with corresponding private cipher key;If with private cipher key pair user Information is encrypted, then could only be decrypted with corresponding public-key cryptography.
In one embodiment, in the S22 step, it is described and allow after verification passes through the user log in the step of it Afterwards, can also include the following:
Detection caching or database are whether normal operation;
When the caching or database operate normally, executes and update identity documents are generated according to user information, and send To the client, for replacing the step of prestoring identity documents of the client;
Otherwise, designated state position is set;Wherein, it is logged in the designated state position is for logging in next time when in conjunction with last The identity documents that prestore used are logged in.
In the present embodiment, before server generates and updates identity documents, the caching or database of detection service device first It can operate normally, when the caching or database normal operation, then be generated according to user information and update identity documents, and will It updates identity documents and is sent to the client, prestore identity documents for replace the client;When next time logs in, according to Identity documents are updated to be logged in.When the caching of the client or database are not available, then designated state position is set, with Indicate that caching or database are not available;When logging in next time, after the logging request for receiving user, detects and be arranged on server Designated state position, then user end to server send it is last log in use prestores identity documents, server passes through verification Last time logs in the identity documents that prestore used and judges whether user can log in, to avoid since caching or database are abnormal Lead to login failure, to improve the availability of login authentication.Wherein, it is logged in due to the identity documents in client using last Identity documents, cause the sequence number in client smaller than the sequence number on server, therefore, when verification, allow in client Sequence number it is smaller than the sequence number on server.
As shown in fig. 6, a kind of login authentication device provided by the invention, comprising:
Module 11 is obtained, for the logging request in response to user, server is sent when acquisition user's last time logs in Prestore identity documents;Wherein, the identity documents that prestore contain encrypted user information;
Sending module 12, for will include that the logging request for prestoring identity documents is sent to server;Wherein, described Server verifies the identity documents that prestore, and allows the user to log in after verification passes through;
Replacement module 13 prestores identity documents for receiving the update identity documents of server transmission, and described in replacement, uses It is used in login authentication next time.
In the present embodiment, when user logs in for the first time, clothes are logged on in such a way that user inputs account and password Business device, after logining successfully, server generates identity documents according to user information, and the identity documents are sent to client, It saves in the client.When user logs in next time, the logging request of client end response user directly obtains user from local What server was sent when the last time logs in prestores identity documents, and the identity documents that prestore are back to server, by servicing Device is completed to prestore the verification of identity documents, after verification passes through, then allows the user to log in, and generate update identity documents, sends To client;After client receives the update identity documents that server is sent, identity documents are prestored described in replacement, are used for down One time login authentication uses.Wherein, the identity documents are the encryption comprising user identity, key, identity documents validity period etc. Information can be realized using one section of binary data on data mode.
As shown in fig. 7, a kind of login authentication device provided by the invention, comprising:
Receiving module 21, for receiving the access request for prestoring identity documents comprising user of client transmission;
Correction verification module 22, for carrying out school to the identity documents that prestore of the user according to the access request of the user It tests, and allows the user to log in after verification passes through;
Generation module 23 updates identity documents for generating according to user information, and is sent to the client, for replacing That changes the client prestores identity documents.
In the present embodiment, when user logs in for the first time, clothes are logged on in such a way that user inputs account and password Business device, after logining successfully, server generates identity documents according to user information, and the identity documents are sent to client, It saves in the client.When user logs in next time, the logging request of client end response user directly obtains user from local What server was sent when the last time logs in prestores identity documents, and the identity documents that prestore are back to server, server Receive client send the access request for prestoring identity documents comprising user after, to the user prestore identity documents into Row verification after verification passes through, then allows the user to log in.After login, server is generated according to user information updates identity documents, It is sent to client;After client receives the update identity documents that server is sent, identity documents are prestored described in replacement, are used It is used in login authentication next time.Wherein, the identity documents are to include user identity, key, identity documents validity period etc. Encryption information can be realized using one section of binary data on data mode.
About the device in above-described embodiment, wherein modules execute the concrete mode of operation in related this method Embodiment in be described in detail, no detailed explanation will be given here.
A kind of storage medium provided by the invention, is stored thereon with computer program,
The computer program realizes login authentication side described in above-mentioned any one technical solution when being executed by processor Method.
Wherein, the storage medium include but is not limited to any kind of disk (including floppy disk, hard disk, CD, CD-ROM, And magneto-optic disk), ROM (Read-Only Memory, read-only memory), (Random AcceSS Memory, stores RAM immediately Device), EPROM (EraSable Programmable Read-Only Memory, Erarable Programmable Read only Memory), (Electrically EraSable Programmable Read-Only Memory, electric erazable programmable is read-only to be deposited EEPROM Reservoir), flash memory, magnetic card or light card.It is, storage medium includes by equipment (for example, computer) can read Form storage or transmission information any medium.It can be read-only memory, disk or CD etc..
A kind of server provided by the invention, comprising:
One or more processors;
Storage device, for storing one or more programs;
When one or more of programs are executed by one or more of processors, so that one or more of places Reason device realizes login validation method described in above-mentioned any one technical solution.
Fig. 8 be server of the present invention structural schematic diagram, including processor 820, storage device 830, input unit 840 with And the equal devices of display unit 850.It will be understood by those skilled in the art that the structure devices shown in Fig. 8 are not constituted to all clothes The restriction of business device may include than illustrating more or fewer components, or the certain components of combination.Storage device 830 can be used for Application program 810 and each functional module are stored, processor 820 runs the application program 810 for being stored in storage device 830, from And execute the various function application and data processing of equipment.Storage device 830 can be built-in storage or external memory, or Including both built-in storage and external memory.Built-in storage may include that read-only memory, programming ROM (PROM), electricity can be compiled Journey ROM (EPROM), electrically erasable programmable ROM (EEPROM), flash memory or random access memory.External memory can be with Including hard disk, floppy disk, ZIP disk, USB flash disk, tape etc..Storage device disclosed in this invention includes but is not limited to depositing for these types Storage device.Storage device 830 disclosed in this invention is only used as example rather than as restriction.
Input unit 840 is used to receive the access request of input and the user's input of signal.Input unit 840 can wrap Include touch panel and other input equipments.Touch panel collects touch operation (such as the user of user on it or nearby Use the operation of any suitable object or attachment such as finger, stylus on touch panel or near touch panel), and according to The preset corresponding attachment device of driven by program;Other input equipments can include but is not limited to physical keyboard, function key One of (such as broadcasting control button, switch key etc.), trace ball, mouse, operating stick etc. are a variety of.Display unit 850 It can be used for showing the information of user's input or be supplied to the information of user and the various menus of computer equipment.Display unit 850 can be used the forms such as liquid crystal display, Organic Light Emitting Diode.Processor 820 is the control centre of computer equipment, is utilized The various pieces of various interfaces and the entire computer of connection, by running or executing the software being stored in storage device 830 Program and/or module, and the data being stored in storage device are called, perform various functions and handle data.
In one embodiment, server includes one or more processors 820, and one or more storage devices 830, one or more application program 810, wherein one or more of application programs 810 are stored in storage device 830 And be configured as being executed by one or more of processors 820, one or more of application programs 810 are configured to carry out Login validation method described in above embodiments.
Login validation method, device, storage medium and server provided by the invention, user are logged in by account number cipher Afterwards, server sends identity documents to client, and when next time logs in, what server was sent when acquisition user's last time logs in is prestored Identity documents, and the identity documents that prestore are sent to server, the server proofreads the identity documents, logical in verification Later allow the user to log in, and sent to the client and update identity documents, prestore identity documents described in replacement, be used for down One time login authentication uses.Therefore, the present invention is verified by identity of the identity documents to user, and user passes through for the first time It,, can be automatically according to identity when next time reopens client after closing client without saving password when account number cipher logs in Voucher is completed to log in, easy to operate without re-entering password, highly-safe.
It should be understood that although each step in the flow chart of attached drawing is successively shown according to the instruction of arrow, These steps are not that the inevitable sequence according to arrow instruction successively executes.Unless expressly stating otherwise herein, these steps Execution there is no stringent sequences to limit, can execute in the other order.Moreover, at least one in the flow chart of attached drawing Part steps may include that perhaps these sub-steps of multiple stages or stage are not necessarily in synchronization to multiple sub-steps Completion is executed, but can be executed at different times, execution sequence, which is also not necessarily, successively to be carried out, but can be with other At least part of the sub-step or stage of step or other steps executes in turn or alternately.
The above is only some embodiments of the invention, it is noted that for the ordinary skill people of the art For member, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications are also answered It is considered as protection scope of the present invention.

Claims (14)

1. a kind of login validation method characterized by comprising
In response to the logging request of user, what server was sent when acquisition user's last time logs in prestores identity documents;Wherein, institute It states and prestores identity documents and contain encrypted user information;
Server will be sent to comprising the logging request for prestoring identity documents;Wherein, the server pre- is taken shelter to described Part voucher is verified, and allows the user to log in after verification passes through;
The update identity documents that server is sent are received, and prestore identity documents described in replacement, are made for login authentication next time With.
2. login validation method according to claim 1, which is characterized in that and the user is allowed to log in after verification passes through Later, further includes:
Receive the business voucher that server is sent;
When receiving user's operation, the business voucher and user's operation are sent to server;The server by utilizing institute Business voucher is stated to verify user's operation.
3. login validation method according to claim 1, which is characterized in that the identity documents include header and main body, The header includes the version number information of the identity documents.
4. login validation method according to claim 1, which is characterized in that described to prestore identity documents use and server The identical syllable sequence of backup identity documents save in the client.
5. a kind of login validation method characterized by comprising
Receive the access request for prestoring identity documents comprising user that client is sent;
It is verified according to prestore identity documents of the access request of the user to the user, and allowed after verification passes through The user logs in;
It is generated according to user information and updates identity documents, and be sent to the client, for replacing prestoring for the client Identity documents.
6. login validation method according to claim 5, which is characterized in that and the user is allowed to log in after verification passes through Later, further includes:
Business voucher is sent to client;
When the user's operation for receiving client return and when business voucher, using the business voucher to the user's operation into Row verification, to verify user's operation.
7. login validation method according to claim 5, which is characterized in that the access request pair according to the user The user's prestores the step of identity documents verify, comprising:
The legitimacy for prestoring identity documents and validity period are verified;
When it is described prestore identity documents it is legal and not out of date when, allow the user login services device.
8. login validation method according to claim 5, which is characterized in that the access request pair according to the user The user's prestores the step of identity documents verify, comprising:
The access request for receiving the user obtains from access request and prestores identity documents;
The backup identity documents for prestoring identity documents and prestoring on the server are subjected to information matches, are permitted after successful match Perhaps the user logs in.
9. login validation method according to claim 5, which is characterized in that described generated according to user information updates identity After voucher, further includes:
The update identity documents are encrypted using a variety of symmetrical and/or asymmetric manners.
10. login validation method according to claim 5, which is characterized in that described and allow the use after verification passes through After family logs in, further includes:
Detection caching or database are whether normal operation;
When the caching or database operate normally, executes and update identity documents are generated according to user information, and be sent to institute Client is stated, for replacing the step of prestoring identity documents of the client;
Otherwise, designated state position is set;Wherein, it is used the designated state position is for logging in next time when in conjunction with last log in The identity documents that prestore logged in.
11. a kind of login authentication device characterized by comprising
Module is obtained, for the logging request in response to user, pre- the taking shelter of server transmission when acquisition user's last time logs in Part voucher;Wherein, the identity documents that prestore contain encrypted user information;
Sending module, for will include that the logging request for prestoring identity documents is sent to server;Wherein, the server The identity documents that prestore are verified, and allow the user to log in after verification passes through;
Replacement module prestores identity documents for receiving the update identity documents of server transmission, and described in replacement, for next Secondary login authentication uses.
12. a kind of login authentication device characterized by comprising
Receiving module, for receiving the access request for prestoring identity documents comprising user of client transmission;
Correction verification module, for being verified according to the access request of the user to the identity documents that prestore of the user, and Verification allows the user to log in after passing through;
Generation module updates identity documents for generating according to user information, and is sent to the client, described for replacing Client prestores identity documents.
13. a kind of storage medium, is stored thereon with computer program, it is characterised in that:
The login as described in any one of Claims 1-4 or 5 to 10 is realized when the computer program is executed by processor Verification method.
14. a kind of server characterized by comprising
One or more processors;
Storage device, for storing one or more programs;
When one or more of programs are executed by one or more of processors, so that one or more of processors Realize the login validation method as described in any one of Claims 1-4 or 5 to 10.
CN201811180225.4A 2018-10-10 2018-10-10 Login validation method, device, storage medium and server Pending CN109218326A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811180225.4A CN109218326A (en) 2018-10-10 2018-10-10 Login validation method, device, storage medium and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811180225.4A CN109218326A (en) 2018-10-10 2018-10-10 Login validation method, device, storage medium and server

Publications (1)

Publication Number Publication Date
CN109218326A true CN109218326A (en) 2019-01-15

Family

ID=64982980

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811180225.4A Pending CN109218326A (en) 2018-10-10 2018-10-10 Login validation method, device, storage medium and server

Country Status (1)

Country Link
CN (1) CN109218326A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110287682A (en) * 2019-07-01 2019-09-27 北京芯盾时代科技有限公司 A kind of login method, apparatus and system
CN110298162A (en) * 2019-05-22 2019-10-01 深圳壹账通智能科技有限公司 Application client login method, device, computer equipment and storage medium
CN110769402A (en) * 2019-10-31 2020-02-07 广东美的制冷设备有限公司 Operation control method and device, air conditioner and computer storage medium
CN111262869A (en) * 2020-01-17 2020-06-09 珠海格力电器股份有限公司 Login method, storage medium and computer equipment
CN111565179A (en) * 2020-04-27 2020-08-21 北京奇艺世纪科技有限公司 Identity verification method and device, electronic equipment and storage medium
CN112417401A (en) * 2020-11-26 2021-02-26 深圳创维-Rgb电子有限公司 Account verification method, device and system and computer readable storage medium
CN113395275A (en) * 2021-06-10 2021-09-14 杭州安恒信息技术股份有限公司 Cloud platform safety protection function control method, system and storage medium
CN113422784A (en) * 2021-07-12 2021-09-21 苏州达家迎信息技术有限公司 Login certificate updating method and device, computer equipment and storage medium
CN114124382A (en) * 2021-12-01 2022-03-01 深圳市大头兄弟科技有限公司 Voucher updating method, system, equipment and storage medium
WO2023077748A1 (en) * 2021-11-04 2023-05-11 苏州浪潮智能科技有限公司 Account management method and apparatus, and computer device and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9215224B2 (en) * 2002-11-27 2015-12-15 Assa Abloy Ab Automated security token administrative services
CN106453396A (en) * 2016-11-18 2017-02-22 传线网络科技(上海)有限公司 Double token account login method and login verification device
CN106657068A (en) * 2016-12-23 2017-05-10 腾讯科技(深圳)有限公司 Login authorization method and device, login method and device
CN107147644A (en) * 2017-05-10 2017-09-08 四川长虹电器股份有限公司 It is a kind of to realize the method that mobile APP user logs in single equipment

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9215224B2 (en) * 2002-11-27 2015-12-15 Assa Abloy Ab Automated security token administrative services
CN106453396A (en) * 2016-11-18 2017-02-22 传线网络科技(上海)有限公司 Double token account login method and login verification device
CN106657068A (en) * 2016-12-23 2017-05-10 腾讯科技(深圳)有限公司 Login authorization method and device, login method and device
CN107147644A (en) * 2017-05-10 2017-09-08 四川长虹电器股份有限公司 It is a kind of to realize the method that mobile APP user logs in single equipment

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110298162A (en) * 2019-05-22 2019-10-01 深圳壹账通智能科技有限公司 Application client login method, device, computer equipment and storage medium
CN110287682B (en) * 2019-07-01 2020-12-04 北京芯盾时代科技有限公司 Login method, device and system
CN110287682A (en) * 2019-07-01 2019-09-27 北京芯盾时代科技有限公司 A kind of login method, apparatus and system
CN110769402A (en) * 2019-10-31 2020-02-07 广东美的制冷设备有限公司 Operation control method and device, air conditioner and computer storage medium
CN111262869A (en) * 2020-01-17 2020-06-09 珠海格力电器股份有限公司 Login method, storage medium and computer equipment
CN111565179B (en) * 2020-04-27 2022-12-06 北京奇艺世纪科技有限公司 Identity verification method and device, electronic equipment and storage medium
CN111565179A (en) * 2020-04-27 2020-08-21 北京奇艺世纪科技有限公司 Identity verification method and device, electronic equipment and storage medium
CN112417401A (en) * 2020-11-26 2021-02-26 深圳创维-Rgb电子有限公司 Account verification method, device and system and computer readable storage medium
CN113395275B (en) * 2021-06-10 2022-05-24 杭州安恒信息技术股份有限公司 Cloud platform safety protection function control method, system and storage medium
CN113395275A (en) * 2021-06-10 2021-09-14 杭州安恒信息技术股份有限公司 Cloud platform safety protection function control method, system and storage medium
CN113422784A (en) * 2021-07-12 2021-09-21 苏州达家迎信息技术有限公司 Login certificate updating method and device, computer equipment and storage medium
WO2023077748A1 (en) * 2021-11-04 2023-05-11 苏州浪潮智能科技有限公司 Account management method and apparatus, and computer device and storage medium
CN114124382A (en) * 2021-12-01 2022-03-01 深圳市大头兄弟科技有限公司 Voucher updating method, system, equipment and storage medium
CN114124382B (en) * 2021-12-01 2024-04-09 深圳市闪剪智能科技有限公司 Credential updating method, system, device and storage medium

Similar Documents

Publication Publication Date Title
CN109218326A (en) Login validation method, device, storage medium and server
JP7042842B2 (en) How to generate offline verification code based on smart door lock system and its system
US7930735B2 (en) Service management framework
CN105871838B (en) A kind of log-in control method and customer center platform of third party's account
US20140181931A1 (en) Multi-platform user device malicious website protection system
US20120266228A1 (en) Secure management of user rights during accessing of external systems
CN109873805A (en) Cloud desktop login method, device, equipment and storage medium based on cloud security
CN107493291A (en) A kind of identity identifying method and device based on safety element SE
CN111177735B (en) Identity authentication method, device, system and equipment and storage medium
CN104025505A (en) Method, Device, And System For Managing User Authentication
CN108681662A (en) A kind of method and device of installation procedure
CN106559223B (en) Application signature method and device
CN101426009A (en) Identity management platform, service server, uniform login system and method
US11063926B1 (en) Devices and methods for single sign-on and regulatory compliance
EP3005210A1 (en) Secure automatic authorized access to any application through a third party
US9756031B1 (en) Portable access to auditing information
US20240054068A1 (en) Systems and methods for software integration validation
CN113852628A (en) Decentralized single sign-on method, decentralized single sign-on device and storage medium
Stobert et al. Bypass: Reconsidering the usability of password managers
CN105681291B (en) A kind of realization multi-client uniform authentication method and system
US11750597B2 (en) Unattended authentication in HTTP using time-based one-time passwords
US20220311616A1 (en) Connection resilient multi-factor authentication
WO2019125181A1 (en) Secure mobile platform
CN114095154B (en) Method, device, equipment and medium for realizing dynamic password of App login
Rivera-Dourado DebAuthn: a Relying Party Implementation as a WebAuthn Authenticator Debugging Tool

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190115

RJ01 Rejection of invention patent application after publication