CN109218326A - Login validation method, device, storage medium and server - Google Patents
Login validation method, device, storage medium and server Download PDFInfo
- Publication number
- CN109218326A CN109218326A CN201811180225.4A CN201811180225A CN109218326A CN 109218326 A CN109218326 A CN 109218326A CN 201811180225 A CN201811180225 A CN 201811180225A CN 109218326 A CN109218326 A CN 109218326A
- Authority
- CN
- China
- Prior art keywords
- user
- identity documents
- server
- client
- sent
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Storage Device Security (AREA)
Abstract
It includes: the logging request in response to user that the present invention, which provides a kind of login validation method, device, storage medium and server, the login validation method, obtain user's last time when logging in server transmission prestore identity documents;Wherein, the identity documents that prestore contain encrypted user information;Server will be sent to comprising the logging request for prestoring identity documents;Wherein, the server verifies the identity documents, and allows the user to log in after verification passes through;The update identity documents that server is sent are received, and prestore identity documents described in replacement, are used for login authentication next time.The present invention is verified by identity of the identity documents to user, user by account number cipher when being logged in first time, without saving password, and after closing client, when next time reopens client, it can complete to log in automatically according to identity documents, without re-entering password, it is easy to operate, it is highly-safe.
Description
Technical field
The present invention relates to user's login techniques fields of internet, specifically, the present invention relates to a kind of login authentication sides
Method, device, storage medium and server.
Background technique
Currently, user is mostly by input account and close when logining a certain webcast website or live streaming client for the first time
The mode of code is completed, and when needing to log in next time, can be logged on by way of re-entering password or remembeing password.
When by way of re-entering password, user needs to manage the users such as the username and password of oneself and logs in letter
Breath, and input log-on message is required every time, it is cumbersome;When password is remembered in selection, then the leakage of password, shadow are be easy to cause
Safety is rung.
Summary of the invention
The purpose of the present invention is intended to provide a kind of login validation method, to solve cumbersome, safety when user logs in
Poor problem.
A kind of login validation method provided by the invention, comprising:
In response to the logging request of user, what server was sent when acquisition user's last time logs in prestores identity documents;Its
In, the identity documents that prestore contain encrypted user information;
Server will be sent to comprising the logging request for prestoring identity documents;Wherein, the server is to described pre-
It deposits identity documents to be verified, and allows the user to log in after verification passes through;
The update identity documents that server is sent are received, and prestore identity documents described in replacement, are tested for logging in next time
Card uses.
Optionally, and after allowing the user to log in after verification passes through, further includes:
Receive the business voucher that server is sent;
When receiving user's operation, the business voucher and user's operation are sent to server;The server benefit
User's operation is verified with the business voucher.
Optionally, the identity documents include header and main body, and the header includes that the version number of the identity documents believes
Breath.
Optionally, the identity documents that prestore use syllable sequence identical with the backup identity documents of server to be stored in visitor
In the end of family.
A kind of login validation method provided by the invention, comprising:
Receive the access request for prestoring identity documents comprising user that client is sent;
It is verified according to prestore identity documents of the access request of the user to the user, and after verification passes through
The user is allowed to log in;
It is generated according to user information and updates identity documents, and be sent to the client, for replacing the client
Prestore identity documents.
Optionally, and after allowing the user to log in after verification passes through, further includes:
Business voucher is sent to client;
When receiving the user's operation and business voucher of client return, the user is grasped using the business voucher
It is verified, to verify user's operation.
Optionally, the step that prestores identity documents verified of the access request according to the user to the user
Suddenly, comprising:
The legitimacy for prestoring identity documents and validity period are verified;
When it is described prestore identity documents it is legal and not out of date when, allow the user login services device.
Optionally, the step that prestores identity documents verified of the access request according to the user to the user
Suddenly, comprising:
The access request for receiving the user obtains from access request and prestores identity documents;
The backup identity documents for prestoring identity documents and prestoring on the server are subjected to information matches, successful match
After allow the user log in.
Optionally, after the generation update identity documents according to user information, further includes:
The update identity documents are encrypted using a variety of symmetrical and/or asymmetric manners.
Optionally, described and allow after verification passes through the user log in after, further includes:
Detection caching or database are whether normal operation;
When the caching or database operate normally, executes and update identity documents are generated according to user information, and send
To the client, for replacing the step of prestoring identity documents of the client;
Otherwise, designated state position is set;Wherein, it is logged in the designated state position is for logging in next time when in conjunction with last
The identity documents that prestore used are logged in.
A kind of login authentication device provided by the invention, comprising:
Module is obtained, for the logging request in response to user, server is sent pre- when acquisition user's last time logs in
Deposit identity documents;Wherein, the identity documents that prestore contain encrypted user information;
Sending module, for will include that the logging request for prestoring identity documents is sent to server;Wherein, the clothes
Business device verifies the identity documents that prestore, and allows the user to log in after verification passes through;
Replacement module prestores identity documents for receiving the update identity documents of server transmission, and described in replacement, is used for
Login authentication uses next time.
A kind of login authentication device provided by the invention, comprising:
Receiving module, for receiving the access request for prestoring identity documents comprising user of client transmission;
Correction verification module, for being verified according to the access request of the user to the identity documents that prestore of the user,
And the user is allowed to log in after verification passes through;
Generation module updates identity documents for generating according to user information, and is sent to the client, for replacing
The client prestores identity documents.
A kind of storage medium provided by the invention, is stored thereon with computer program,
The computer program realizes login authentication side described in above-mentioned any one technical solution when being executed by processor
Method.
A kind of server provided by the invention, comprising:
One or more processors;
Storage device, for storing one or more programs;
When one or more of programs are executed by one or more of processors, so that one or more of places
Reason device realizes login validation method described in above-mentioned any one technical solution.
Compared with the existing technology, present invention has the advantage that
Login validation method provided by the invention, after user is logged in by account number cipher, server sends body to client
Part voucher, when next time logs in, obtain user's last time when logging in server transmission prestore identity documents, and pre- take shelter described
Part voucher is sent to server, prestores identity documents described in the server check and correction, the user is allowed to log in after verification passes through,
And sent to the client and update identity documents, identity documents are prestored described in replacement, are used for login authentication next time.Cause
This, the present invention is verified by identity of the identity documents to user, and user is not necessarily to when being logged in for the first time by account number cipher
Password is saved, after closing client, when next time reopens client, can complete to log in automatically according to identity documents, without weight
New input password, it is easy to operate, it is highly-safe.
Login validation method provided by the invention receives the business voucher that server is sent after client logins successfully,
The business voucher is used to verify the operation behavior of user, such as makes a speech, pays close attention to, operation behavior of giving gifts, with real-time school
The identity for testing user ensures the account safety of user.
Login validation method provided by the invention, client receive described in prestore identity documents after, prestore identity for described
Voucher is saved in the client using syllable sequence identical with the backup identity documents of server, is being verified to avoid identity documents
When, verification is influenced since syllable sequence is inconsistent.
Login validation method provided by the invention, when the caching of server or database can not normal use when, setting refers to
Determine mode bit, logged in the identity documents that prestore used according to the designated state position and last login, avoid due to
Caching or database lead to login failure extremely, to improve the availability of login authentication.
The additional aspect of the present invention and advantage will be set forth in part in the description, these will become from the following description
Obviously, or practice through the invention is recognized.
Detailed description of the invention
Above-mentioned and/or additional aspect and advantage of the invention will become from the following description of the accompanying drawings of embodiments
Obviously and it is readily appreciated that, in which:
Fig. 1 is the implementation environment figure of the login validation method provided in one embodiment of the invention;
Fig. 2 is a kind of flow diagram of embodiment of login validation method of the present invention;
Fig. 3 is the flow diagram of another embodiment of login validation method of the present invention;
Fig. 4 is the flow diagram of login validation method another kind embodiment of the present invention;
Fig. 5 is the flow diagram of login validation method another embodiment of the present invention;
Fig. 6 is a kind of module frame chart of embodiment of login authentication device of the present invention;
Fig. 7 is the module frame chart of login authentication device another kind embodiment of the present invention;
Fig. 8 is the structural schematic diagram of the server of one embodiment of the invention.
Specific embodiment
The embodiment of the present invention is described below in detail, examples of the embodiments are shown in the accompanying drawings, wherein from beginning to end
Same or similar label indicates same or similar element or element with the same or similar functions.Below with reference to attached
The embodiment of figure description is exemplary, and for explaining only the invention, and is not construed as limiting the claims.
Those skilled in the art of the present technique are appreciated that unless expressly stated, singular " one " used herein, " one
It is a ", " described " and "the" may also comprise plural form.It is to be further understood that being arranged used in specification of the invention
Diction " comprising " refer to that there are the feature, integer, step, operation, element and/or component, but it is not excluded that in the presence of or addition
Other one or more features, integer, step, operation, element, component and/or their group.It should be understood that when we claim member
Part is " connected " or when " coupled " to another element, it can be directly connected or coupled to other elements, or there may also be
Intermediary element.In addition, " connection " used herein or " coupling " may include being wirelessly connected or wirelessly coupling.It is used herein to arrange
Diction "and/or" includes one or more associated wholes for listing item or any cell and all combinations.
Those skilled in the art of the present technique are appreciated that unless otherwise defined, all terms used herein (including technology art
Language and scientific term), there is meaning identical with the general understanding of those of ordinary skill in fields of the present invention.Should also
Understand, those terms such as defined in the general dictionary, it should be understood that have in the context of the prior art
The consistent meaning of meaning, and unless idealization or meaning too formal otherwise will not be used by specific definitions as here
To explain.
Fig. 1 is the implementation environment figure of the login validation method provided in one embodiment, as shown in Figure 1, in the implementation ring
In border, including server 110, terminal 120.Wherein, client is installed, the terminal 120 passes through network in the terminal 120
It is connect with server 110, realizes the interaction between terminal 120 and server 110.Wherein, above-mentioned network may include internet,
2G/3G/4G, wifi etc..
It should be noted that server 110 can be independent physical server or terminal, it is also possible to multiple physics clothes
The server cluster for device composition of being engaged in can be to provide the basic cloud computing service such as Cloud Server, cloud database, cloud storage and CDN
Cloud Server.
The terminal 120 can be smart phone, tablet computer, laptop, desktop computer, intelligent sound box, intelligence
Energy wrist-watch etc., however, it is not limited to this.
As shown in Fig. 2, the present invention provides a kind of login validation method, to solve cumbersome, safety when user logs in
The poor problem of property.The login validation method includes:
S11, the logging request in response to user, obtain user's last time when logging in server transmission prestore identity with
Card;Wherein, the identity documents that prestore contain encrypted user information;
After receiving user and such as clicking the logging request of a certain client, the login of user described in the client end response is asked
It asks, what server was sent when whether detection locally logs in containing user's last time prestores identity documents, prestores if so, then obtaining this
Identity documents;Otherwise, prompt user passes through account and password login.Wherein, the identity documents may include user identity, close
The encryption information of key, identity documents validity period etc. can be the forms such as one section of binary data, an instruction parameter.
S12, server will be sent to comprising the logging request for prestoring identity documents;Wherein, the server is to institute
It states and prestores identity documents and verified, and allow the user to log in after verification passes through;
Described prestore may include unique identification in identity documents, can be a constant or character string, use for identification
Family, the corresponding user of a unique identification.When verification, server can be judged whether according to the unique identification in identity documents with
User is corresponding, if so, the user is allowed to log in.
S13, the update identity documents that server is sent are received, and prestores identity documents described in replacement, for stepping on next time
Record verifying uses;
The update identity documents can be upgraded on the basis of prestoring identity documents, and replacement prestores identity documents, be used
It is used in login authentication next time.After i.e. each user logs in, prestoring identity documents and all can once be replaced in client
It updates, is cracked to avoid identity documents are prestored, user information is caused to be revealed.
Specifically, when user logs in for the first time, server is logged on in such a way that user inputs account and password, is stepped on
After recording successfully, server generates identity documents according to user information, and the identity documents are sent to client, is stored in visitor
In the end of family.When user logs in next time, the logging request of client end response user is directly stepped on from local acquisition user the last time
What server was sent when record prestores identity documents, and the identity documents that prestore are back to server, is completed by server pre-
The verification of identity documents is deposited, after verification passes through, then allows the user to log in, and generate update identity documents, is sent to client;
After client receives the update identity documents that server is sent, identity documents are prestored described in replacement, for logging in next time
Verifying uses.
Login validation method provided by the invention, after user is logged in by account number cipher, server sends body to client
Part voucher, when next time logs in, obtain user's last time when logging in server transmission prestore identity documents, and pre- take shelter described
Part voucher is sent to server, prestores identity documents described in the server check and correction, the user is allowed to log in after verification passes through,
And sent to the client and update identity documents, identity documents are prestored described in replacement, are used for login authentication next time.Cause
This, the present invention is verified by identity of the identity documents to user, and user is not necessarily to when being logged in for the first time by account number cipher
Password is saved, after closing client, when next time reopens client, can complete to log in automatically according to identity documents, without weight
New input password, it is easy to operate, it is highly-safe.
Optionally, as shown in figure 3, in the S12 step, and the step of allowing after verification passes through the user to log in it
Afterwards, can also include the following steps:
S14, the business voucher that server is sent is received;
S15, when receiving user's operation, the business voucher and user's operation are sent to server, the service
Device verifies user's operation using the business voucher.
In the present embodiment, after identity documents verification passes through, user logins successfully, server is except one update body of generation
Outside part voucher, a business voucher is also generated, client is sent to, after client receives the business voucher, is stored in this
In ground, when user is such as made a speech in logging state, pays close attention to, gives gifts, pays operation, then industry on the client will be saved
Business voucher returns to server, is verified by server to user's operation, judges whether it is me and operates, to verify in real time
The identity of user ensures user account safety.Wherein, the business voucher is similar to identity documents, contains user information etc.
Encryption information.
In one embodiment, the identity documents include header and main body, and the header includes the version of the identity documents
This number information.
In the present embodiment, the identity documents include it is described prestore identity documents and the update identity documents, can be with
It may include the main body for the header and encryption not encrypted for one section of binary data.Wherein, the header may include identity
The version number information of voucher so that identity documents can be compatible with old identity documents, and is iterated upgrading.The main body
The user information for needing to verify is contained, before verification, needs that first the main body is decrypted, to obtain user information, thus
Carry out subsequent check.
Optionally, the identity documents that prestore use syllable sequence identical with the backup identity documents of server to be stored in visitor
In the end of family.
In embodiment, the syllable sequence is that multibyte data stores or when network transmission each word in calculator memory
The storage order of section, there are commonly little-endians and big end syllable sequence.To avoid identity documents when transmitting and parsing verification,
Verification is caused to fail since the syllable sequence difference that client and server uses makes identity documents difference occur, therefore, it is necessary to
Syllable sequence identical with server is used to save in the client the identity documents that prestore.
As shown in figure 4, a kind of login validation method provided by the invention, comprising:
S21, the access request for prestoring identity documents comprising user that client is sent is received;
After receiving user and such as clicking the logging request of a certain client, the login of user described in the client end response is asked
It asks, what whether when logging in containing user's last time in detection local server was sent prestores identity documents, if so, it is pre- then to obtain this
Identity documents are deposited, and this is prestored into identity documents and generates access request, are sent to server.Wherein, the identity documents can be with
Encryption information comprising user identity, key, identity documents validity period etc. can be one section of binary data, an instruction ginseng
The forms such as number.
S22, the identity documents that prestore of the user are verified according to the access request of the user, and logical in verification
Allow the user to log in later;
Described prestore may include unique identification in identity documents, can be a constant or character string, use for identification
Family, the corresponding user of a unique identification.When verification, server can be judged whether according to the unique identification in identity documents with
User is corresponding, if so, the user is allowed to log in.
S23, update identity documents are generated according to user information, and be sent to the client, for replacing the client
End prestores identity documents.
The update identity documents can be upgraded on the basis of prestoring identity documents, and replacement prestores identity documents,
It is tested for login authentication next time.After i.e. each user logs in, prestoring identity documents and all can once be replaced in client
Update is changed, is cracked to avoid identity documents are prestored, user information is caused to be revealed.
Specifically, when user logs in for the first time, server is logged on in such a way that user inputs account and password, is stepped on
After recording successfully, server generates identity documents according to user information, and the identity documents are sent to client, is stored in visitor
In the end of family.When user logs in next time, the logging request of client end response user is directly stepped on from local acquisition user the last time
What server was sent when record prestores identity documents, and the identity documents that prestore are back to server, and server receives client
After holding the access request for prestoring identity documents comprising user sent, the identity documents that prestore of the user are verified,
After verification passes through, then the user is allowed to log in.After login, server is generated according to user information updates identity documents, is sent to
Client;After client receives the update identity documents that server is sent, identity documents are prestored described in replacement, for next
Secondary login authentication uses.
Optionally, as shown in figure 5, in the S22 step, and the step of allowing after verification passes through the user to log in it
Afterwards, can also include the following:
S24, business voucher is sent to client;
S25, when the user's operation for receiving client return and when business voucher, using the business voucher to the use
Family operation is verified, to verify user's operation.
In the present embodiment, after identity documents verification passes through, user logins successfully, server is except one update body of generation
Outside part voucher, a business voucher is also produced, and be sent to client, after client receives the business voucher, is stored in
In local, when user is when logging state is such as made a speech, pays close attention to, gives gifts, pays operation, then client will be stored in local
Business voucher return to server, after server receives the business voucher of client return, the business voucher is carried out
Verification judges whether it is me and operates to verify to user's operation, to verify the identity of user in real time, ensures and uses
Family account safety.Wherein, the business voucher is similar to identity documents, and it comprises the encryption information such as user information.
In one embodiment, in the S22 step, body of the access request according to the user to the user
The step of part voucher is verified, may include as follows:
The legitimacy for prestoring identity documents and validity period are verified;When the identity documents that prestore are legal and not
When expired, allow the user login services device.
In the present embodiment, when server receives after prestoring identity documents of client return, judge described pre- take shelter
Whether part voucher is the corresponding identity documents of the user, when it is described prestore identity documents and user to it is corresponding when further judge this
It whether before the deadline to prestore identity documents, when the identity documents are legal and not out of date, then allows the user login services
Device, to improve the safety logged in.When it is described prestore identity documents it is illegal or expired when, then prompt user to step on by password
Record.
Optionally, in the S22 step, identity documents of the access request according to the user to the user
The step of being verified may include as follows:
The access request for receiving the user obtains from access request and prestores identity documents;
The backup identity documents for prestoring identity documents and prestoring on the server are subjected to information matches, successful match
After allow the user log in.
After server generates identity documents, in the server by identity documents backup, and identical body is sent to client
Part voucher, when receiving the access request of the user, the identity documents that server can be returned according to client and are stored in
Identity documents in server are matched, and the user is allowed to log in after successful match.Wherein, it is contained in the identity documents
Sequence number when for verifying, other than it need to match user information, also needs further to match sequence number, every time log at
After function, the sequence number adds up accordingly, to prevent from forging.
Optionally, the S23 step according to user information generate update identity documents after, can also include:
The update identity documents are encrypted using a variety of symmetrical and/or asymmetric manners.
In the present embodiment, when encrypting to update identity documents, a variety of symmetric modes or asymmetric side can be used
Formula is encrypted, and can also be prevented simultaneously using a variety of symmetric modes and asymmetric manner with improving the safety of identity documents
It is cracked.Wherein, the symmetric cryptography is that the same key can be used for encryption and decryption to user information simultaneously.It is described non-right
Encryption is claimed then to use two keys: public-key cryptography and private cipher key.Public-key cryptography is to exist in pairs with private cipher key, if with public affairs
It opens key pair user information to be encrypted, then could only be decrypted with corresponding private cipher key;If with private cipher key pair user
Information is encrypted, then could only be decrypted with corresponding public-key cryptography.
In one embodiment, in the S22 step, it is described and allow after verification passes through the user log in the step of it
Afterwards, can also include the following:
Detection caching or database are whether normal operation;
When the caching or database operate normally, executes and update identity documents are generated according to user information, and send
To the client, for replacing the step of prestoring identity documents of the client;
Otherwise, designated state position is set;Wherein, it is logged in the designated state position is for logging in next time when in conjunction with last
The identity documents that prestore used are logged in.
In the present embodiment, before server generates and updates identity documents, the caching or database of detection service device first
It can operate normally, when the caching or database normal operation, then be generated according to user information and update identity documents, and will
It updates identity documents and is sent to the client, prestore identity documents for replace the client;When next time logs in, according to
Identity documents are updated to be logged in.When the caching of the client or database are not available, then designated state position is set, with
Indicate that caching or database are not available;When logging in next time, after the logging request for receiving user, detects and be arranged on server
Designated state position, then user end to server send it is last log in use prestores identity documents, server passes through verification
Last time logs in the identity documents that prestore used and judges whether user can log in, to avoid since caching or database are abnormal
Lead to login failure, to improve the availability of login authentication.Wherein, it is logged in due to the identity documents in client using last
Identity documents, cause the sequence number in client smaller than the sequence number on server, therefore, when verification, allow in client
Sequence number it is smaller than the sequence number on server.
As shown in fig. 6, a kind of login authentication device provided by the invention, comprising:
Module 11 is obtained, for the logging request in response to user, server is sent when acquisition user's last time logs in
Prestore identity documents;Wherein, the identity documents that prestore contain encrypted user information;
Sending module 12, for will include that the logging request for prestoring identity documents is sent to server;Wherein, described
Server verifies the identity documents that prestore, and allows the user to log in after verification passes through;
Replacement module 13 prestores identity documents for receiving the update identity documents of server transmission, and described in replacement, uses
It is used in login authentication next time.
In the present embodiment, when user logs in for the first time, clothes are logged on in such a way that user inputs account and password
Business device, after logining successfully, server generates identity documents according to user information, and the identity documents are sent to client,
It saves in the client.When user logs in next time, the logging request of client end response user directly obtains user from local
What server was sent when the last time logs in prestores identity documents, and the identity documents that prestore are back to server, by servicing
Device is completed to prestore the verification of identity documents, after verification passes through, then allows the user to log in, and generate update identity documents, sends
To client;After client receives the update identity documents that server is sent, identity documents are prestored described in replacement, are used for down
One time login authentication uses.Wherein, the identity documents are the encryption comprising user identity, key, identity documents validity period etc.
Information can be realized using one section of binary data on data mode.
As shown in fig. 7, a kind of login authentication device provided by the invention, comprising:
Receiving module 21, for receiving the access request for prestoring identity documents comprising user of client transmission;
Correction verification module 22, for carrying out school to the identity documents that prestore of the user according to the access request of the user
It tests, and allows the user to log in after verification passes through;
Generation module 23 updates identity documents for generating according to user information, and is sent to the client, for replacing
That changes the client prestores identity documents.
In the present embodiment, when user logs in for the first time, clothes are logged on in such a way that user inputs account and password
Business device, after logining successfully, server generates identity documents according to user information, and the identity documents are sent to client,
It saves in the client.When user logs in next time, the logging request of client end response user directly obtains user from local
What server was sent when the last time logs in prestores identity documents, and the identity documents that prestore are back to server, server
Receive client send the access request for prestoring identity documents comprising user after, to the user prestore identity documents into
Row verification after verification passes through, then allows the user to log in.After login, server is generated according to user information updates identity documents,
It is sent to client;After client receives the update identity documents that server is sent, identity documents are prestored described in replacement, are used
It is used in login authentication next time.Wherein, the identity documents are to include user identity, key, identity documents validity period etc.
Encryption information can be realized using one section of binary data on data mode.
About the device in above-described embodiment, wherein modules execute the concrete mode of operation in related this method
Embodiment in be described in detail, no detailed explanation will be given here.
A kind of storage medium provided by the invention, is stored thereon with computer program,
The computer program realizes login authentication side described in above-mentioned any one technical solution when being executed by processor
Method.
Wherein, the storage medium include but is not limited to any kind of disk (including floppy disk, hard disk, CD, CD-ROM,
And magneto-optic disk), ROM (Read-Only Memory, read-only memory), (Random AcceSS Memory, stores RAM immediately
Device), EPROM (EraSable Programmable Read-Only Memory, Erarable Programmable Read only Memory),
(Electrically EraSable Programmable Read-Only Memory, electric erazable programmable is read-only to be deposited EEPROM
Reservoir), flash memory, magnetic card or light card.It is, storage medium includes by equipment (for example, computer) can read
Form storage or transmission information any medium.It can be read-only memory, disk or CD etc..
A kind of server provided by the invention, comprising:
One or more processors;
Storage device, for storing one or more programs;
When one or more of programs are executed by one or more of processors, so that one or more of places
Reason device realizes login validation method described in above-mentioned any one technical solution.
Fig. 8 be server of the present invention structural schematic diagram, including processor 820, storage device 830, input unit 840 with
And the equal devices of display unit 850.It will be understood by those skilled in the art that the structure devices shown in Fig. 8 are not constituted to all clothes
The restriction of business device may include than illustrating more or fewer components, or the certain components of combination.Storage device 830 can be used for
Application program 810 and each functional module are stored, processor 820 runs the application program 810 for being stored in storage device 830, from
And execute the various function application and data processing of equipment.Storage device 830 can be built-in storage or external memory, or
Including both built-in storage and external memory.Built-in storage may include that read-only memory, programming ROM (PROM), electricity can be compiled
Journey ROM (EPROM), electrically erasable programmable ROM (EEPROM), flash memory or random access memory.External memory can be with
Including hard disk, floppy disk, ZIP disk, USB flash disk, tape etc..Storage device disclosed in this invention includes but is not limited to depositing for these types
Storage device.Storage device 830 disclosed in this invention is only used as example rather than as restriction.
Input unit 840 is used to receive the access request of input and the user's input of signal.Input unit 840 can wrap
Include touch panel and other input equipments.Touch panel collects touch operation (such as the user of user on it or nearby
Use the operation of any suitable object or attachment such as finger, stylus on touch panel or near touch panel), and according to
The preset corresponding attachment device of driven by program;Other input equipments can include but is not limited to physical keyboard, function key
One of (such as broadcasting control button, switch key etc.), trace ball, mouse, operating stick etc. are a variety of.Display unit 850
It can be used for showing the information of user's input or be supplied to the information of user and the various menus of computer equipment.Display unit
850 can be used the forms such as liquid crystal display, Organic Light Emitting Diode.Processor 820 is the control centre of computer equipment, is utilized
The various pieces of various interfaces and the entire computer of connection, by running or executing the software being stored in storage device 830
Program and/or module, and the data being stored in storage device are called, perform various functions and handle data.
In one embodiment, server includes one or more processors 820, and one or more storage devices
830, one or more application program 810, wherein one or more of application programs 810 are stored in storage device 830
And be configured as being executed by one or more of processors 820, one or more of application programs 810 are configured to carry out
Login validation method described in above embodiments.
Login validation method, device, storage medium and server provided by the invention, user are logged in by account number cipher
Afterwards, server sends identity documents to client, and when next time logs in, what server was sent when acquisition user's last time logs in is prestored
Identity documents, and the identity documents that prestore are sent to server, the server proofreads the identity documents, logical in verification
Later allow the user to log in, and sent to the client and update identity documents, prestore identity documents described in replacement, be used for down
One time login authentication uses.Therefore, the present invention is verified by identity of the identity documents to user, and user passes through for the first time
It,, can be automatically according to identity when next time reopens client after closing client without saving password when account number cipher logs in
Voucher is completed to log in, easy to operate without re-entering password, highly-safe.
It should be understood that although each step in the flow chart of attached drawing is successively shown according to the instruction of arrow,
These steps are not that the inevitable sequence according to arrow instruction successively executes.Unless expressly stating otherwise herein, these steps
Execution there is no stringent sequences to limit, can execute in the other order.Moreover, at least one in the flow chart of attached drawing
Part steps may include that perhaps these sub-steps of multiple stages or stage are not necessarily in synchronization to multiple sub-steps
Completion is executed, but can be executed at different times, execution sequence, which is also not necessarily, successively to be carried out, but can be with other
At least part of the sub-step or stage of step or other steps executes in turn or alternately.
The above is only some embodiments of the invention, it is noted that for the ordinary skill people of the art
For member, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications are also answered
It is considered as protection scope of the present invention.
Claims (14)
1. a kind of login validation method characterized by comprising
In response to the logging request of user, what server was sent when acquisition user's last time logs in prestores identity documents;Wherein, institute
It states and prestores identity documents and contain encrypted user information;
Server will be sent to comprising the logging request for prestoring identity documents;Wherein, the server pre- is taken shelter to described
Part voucher is verified, and allows the user to log in after verification passes through;
The update identity documents that server is sent are received, and prestore identity documents described in replacement, are made for login authentication next time
With.
2. login validation method according to claim 1, which is characterized in that and the user is allowed to log in after verification passes through
Later, further includes:
Receive the business voucher that server is sent;
When receiving user's operation, the business voucher and user's operation are sent to server;The server by utilizing institute
Business voucher is stated to verify user's operation.
3. login validation method according to claim 1, which is characterized in that the identity documents include header and main body,
The header includes the version number information of the identity documents.
4. login validation method according to claim 1, which is characterized in that described to prestore identity documents use and server
The identical syllable sequence of backup identity documents save in the client.
5. a kind of login validation method characterized by comprising
Receive the access request for prestoring identity documents comprising user that client is sent;
It is verified according to prestore identity documents of the access request of the user to the user, and allowed after verification passes through
The user logs in;
It is generated according to user information and updates identity documents, and be sent to the client, for replacing prestoring for the client
Identity documents.
6. login validation method according to claim 5, which is characterized in that and the user is allowed to log in after verification passes through
Later, further includes:
Business voucher is sent to client;
When the user's operation for receiving client return and when business voucher, using the business voucher to the user's operation into
Row verification, to verify user's operation.
7. login validation method according to claim 5, which is characterized in that the access request pair according to the user
The user's prestores the step of identity documents verify, comprising:
The legitimacy for prestoring identity documents and validity period are verified;
When it is described prestore identity documents it is legal and not out of date when, allow the user login services device.
8. login validation method according to claim 5, which is characterized in that the access request pair according to the user
The user's prestores the step of identity documents verify, comprising:
The access request for receiving the user obtains from access request and prestores identity documents;
The backup identity documents for prestoring identity documents and prestoring on the server are subjected to information matches, are permitted after successful match
Perhaps the user logs in.
9. login validation method according to claim 5, which is characterized in that described generated according to user information updates identity
After voucher, further includes:
The update identity documents are encrypted using a variety of symmetrical and/or asymmetric manners.
10. login validation method according to claim 5, which is characterized in that described and allow the use after verification passes through
After family logs in, further includes:
Detection caching or database are whether normal operation;
When the caching or database operate normally, executes and update identity documents are generated according to user information, and be sent to institute
Client is stated, for replacing the step of prestoring identity documents of the client;
Otherwise, designated state position is set;Wherein, it is used the designated state position is for logging in next time when in conjunction with last log in
The identity documents that prestore logged in.
11. a kind of login authentication device characterized by comprising
Module is obtained, for the logging request in response to user, pre- the taking shelter of server transmission when acquisition user's last time logs in
Part voucher;Wherein, the identity documents that prestore contain encrypted user information;
Sending module, for will include that the logging request for prestoring identity documents is sent to server;Wherein, the server
The identity documents that prestore are verified, and allow the user to log in after verification passes through;
Replacement module prestores identity documents for receiving the update identity documents of server transmission, and described in replacement, for next
Secondary login authentication uses.
12. a kind of login authentication device characterized by comprising
Receiving module, for receiving the access request for prestoring identity documents comprising user of client transmission;
Correction verification module, for being verified according to the access request of the user to the identity documents that prestore of the user, and
Verification allows the user to log in after passing through;
Generation module updates identity documents for generating according to user information, and is sent to the client, described for replacing
Client prestores identity documents.
13. a kind of storage medium, is stored thereon with computer program, it is characterised in that:
The login as described in any one of Claims 1-4 or 5 to 10 is realized when the computer program is executed by processor
Verification method.
14. a kind of server characterized by comprising
One or more processors;
Storage device, for storing one or more programs;
When one or more of programs are executed by one or more of processors, so that one or more of processors
Realize the login validation method as described in any one of Claims 1-4 or 5 to 10.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811180225.4A CN109218326A (en) | 2018-10-10 | 2018-10-10 | Login validation method, device, storage medium and server |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811180225.4A CN109218326A (en) | 2018-10-10 | 2018-10-10 | Login validation method, device, storage medium and server |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109218326A true CN109218326A (en) | 2019-01-15 |
Family
ID=64982980
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811180225.4A Pending CN109218326A (en) | 2018-10-10 | 2018-10-10 | Login validation method, device, storage medium and server |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109218326A (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110287682A (en) * | 2019-07-01 | 2019-09-27 | 北京芯盾时代科技有限公司 | A kind of login method, apparatus and system |
CN110298162A (en) * | 2019-05-22 | 2019-10-01 | 深圳壹账通智能科技有限公司 | Application client login method, device, computer equipment and storage medium |
CN110769402A (en) * | 2019-10-31 | 2020-02-07 | 广东美的制冷设备有限公司 | Operation control method and device, air conditioner and computer storage medium |
CN111262869A (en) * | 2020-01-17 | 2020-06-09 | 珠海格力电器股份有限公司 | Login method, storage medium and computer equipment |
CN111565179A (en) * | 2020-04-27 | 2020-08-21 | 北京奇艺世纪科技有限公司 | Identity verification method and device, electronic equipment and storage medium |
CN112417401A (en) * | 2020-11-26 | 2021-02-26 | 深圳创维-Rgb电子有限公司 | Account verification method, device and system and computer readable storage medium |
CN113395275A (en) * | 2021-06-10 | 2021-09-14 | 杭州安恒信息技术股份有限公司 | Cloud platform safety protection function control method, system and storage medium |
CN113422784A (en) * | 2021-07-12 | 2021-09-21 | 苏州达家迎信息技术有限公司 | Login certificate updating method and device, computer equipment and storage medium |
CN114124382A (en) * | 2021-12-01 | 2022-03-01 | 深圳市大头兄弟科技有限公司 | Voucher updating method, system, equipment and storage medium |
WO2023077748A1 (en) * | 2021-11-04 | 2023-05-11 | 苏州浪潮智能科技有限公司 | Account management method and apparatus, and computer device and storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9215224B2 (en) * | 2002-11-27 | 2015-12-15 | Assa Abloy Ab | Automated security token administrative services |
CN106453396A (en) * | 2016-11-18 | 2017-02-22 | 传线网络科技(上海)有限公司 | Double token account login method and login verification device |
CN106657068A (en) * | 2016-12-23 | 2017-05-10 | 腾讯科技(深圳)有限公司 | Login authorization method and device, login method and device |
CN107147644A (en) * | 2017-05-10 | 2017-09-08 | 四川长虹电器股份有限公司 | It is a kind of to realize the method that mobile APP user logs in single equipment |
-
2018
- 2018-10-10 CN CN201811180225.4A patent/CN109218326A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9215224B2 (en) * | 2002-11-27 | 2015-12-15 | Assa Abloy Ab | Automated security token administrative services |
CN106453396A (en) * | 2016-11-18 | 2017-02-22 | 传线网络科技(上海)有限公司 | Double token account login method and login verification device |
CN106657068A (en) * | 2016-12-23 | 2017-05-10 | 腾讯科技(深圳)有限公司 | Login authorization method and device, login method and device |
CN107147644A (en) * | 2017-05-10 | 2017-09-08 | 四川长虹电器股份有限公司 | It is a kind of to realize the method that mobile APP user logs in single equipment |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110298162A (en) * | 2019-05-22 | 2019-10-01 | 深圳壹账通智能科技有限公司 | Application client login method, device, computer equipment and storage medium |
CN110287682B (en) * | 2019-07-01 | 2020-12-04 | 北京芯盾时代科技有限公司 | Login method, device and system |
CN110287682A (en) * | 2019-07-01 | 2019-09-27 | 北京芯盾时代科技有限公司 | A kind of login method, apparatus and system |
CN110769402A (en) * | 2019-10-31 | 2020-02-07 | 广东美的制冷设备有限公司 | Operation control method and device, air conditioner and computer storage medium |
CN111262869A (en) * | 2020-01-17 | 2020-06-09 | 珠海格力电器股份有限公司 | Login method, storage medium and computer equipment |
CN111565179B (en) * | 2020-04-27 | 2022-12-06 | 北京奇艺世纪科技有限公司 | Identity verification method and device, electronic equipment and storage medium |
CN111565179A (en) * | 2020-04-27 | 2020-08-21 | 北京奇艺世纪科技有限公司 | Identity verification method and device, electronic equipment and storage medium |
CN112417401A (en) * | 2020-11-26 | 2021-02-26 | 深圳创维-Rgb电子有限公司 | Account verification method, device and system and computer readable storage medium |
CN113395275B (en) * | 2021-06-10 | 2022-05-24 | 杭州安恒信息技术股份有限公司 | Cloud platform safety protection function control method, system and storage medium |
CN113395275A (en) * | 2021-06-10 | 2021-09-14 | 杭州安恒信息技术股份有限公司 | Cloud platform safety protection function control method, system and storage medium |
CN113422784A (en) * | 2021-07-12 | 2021-09-21 | 苏州达家迎信息技术有限公司 | Login certificate updating method and device, computer equipment and storage medium |
WO2023077748A1 (en) * | 2021-11-04 | 2023-05-11 | 苏州浪潮智能科技有限公司 | Account management method and apparatus, and computer device and storage medium |
CN114124382A (en) * | 2021-12-01 | 2022-03-01 | 深圳市大头兄弟科技有限公司 | Voucher updating method, system, equipment and storage medium |
CN114124382B (en) * | 2021-12-01 | 2024-04-09 | 深圳市闪剪智能科技有限公司 | Credential updating method, system, device and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109218326A (en) | Login validation method, device, storage medium and server | |
JP7042842B2 (en) | How to generate offline verification code based on smart door lock system and its system | |
US7930735B2 (en) | Service management framework | |
CN105871838B (en) | A kind of log-in control method and customer center platform of third party's account | |
US20140181931A1 (en) | Multi-platform user device malicious website protection system | |
US20120266228A1 (en) | Secure management of user rights during accessing of external systems | |
CN109873805A (en) | Cloud desktop login method, device, equipment and storage medium based on cloud security | |
CN107493291A (en) | A kind of identity identifying method and device based on safety element SE | |
CN111177735B (en) | Identity authentication method, device, system and equipment and storage medium | |
CN104025505A (en) | Method, Device, And System For Managing User Authentication | |
CN108681662A (en) | A kind of method and device of installation procedure | |
CN106559223B (en) | Application signature method and device | |
CN101426009A (en) | Identity management platform, service server, uniform login system and method | |
US11063926B1 (en) | Devices and methods for single sign-on and regulatory compliance | |
EP3005210A1 (en) | Secure automatic authorized access to any application through a third party | |
US9756031B1 (en) | Portable access to auditing information | |
US20240054068A1 (en) | Systems and methods for software integration validation | |
CN113852628A (en) | Decentralized single sign-on method, decentralized single sign-on device and storage medium | |
Stobert et al. | Bypass: Reconsidering the usability of password managers | |
CN105681291B (en) | A kind of realization multi-client uniform authentication method and system | |
US11750597B2 (en) | Unattended authentication in HTTP using time-based one-time passwords | |
US20220311616A1 (en) | Connection resilient multi-factor authentication | |
WO2019125181A1 (en) | Secure mobile platform | |
CN114095154B (en) | Method, device, equipment and medium for realizing dynamic password of App login | |
Rivera-Dourado | DebAuthn: a Relying Party Implementation as a WebAuthn Authenticator Debugging Tool |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190115 |
|
RJ01 | Rejection of invention patent application after publication |