Summary of the invention
The embodiment of the present application provides a kind of login method, device and electronic equipment, to realize quick registration purpose
Meanwhile improving the safety of login password.
In order to solve the above technical problems, the embodiment of the present application is achieved in that
In a first aspect, proposing a kind of login method, it is applied to client, which comprises
Receive the original password that user inputs in the login password input frame of the client;
Before user submits logging request to server-side, Xiang Suoshu server-side sends the original password, so that described
Server-side encrypts the original password according to predetermined encryption algorithm, obtains Crypted password;
It receives the Crypted password that the server-side returns and is backfilled to the login password input frame;
The operation for submitting logging request to the server-side in response to user, is committed to the service for the Crypted password
End caches the Crypted password to determine login result.
Second aspect proposes a kind of login method, is applied to server-side, which comprises
The original password from client is received, the original password is that the client is mentioned in user to the server-side
Transmission before logging request is handed over, and the original password is that user inputs in the login password input frame of the client
Password;
The original password is encrypted according to predetermined encryption algorithm, Crypted password is obtained and is back to the client
End;Wherein, the client is used to for the Crypted password being backfilled to the login password input frame, and is responding user to institute
When stating the operation of server-side submission logging request, the Crypted password is cached;
The logging request for carrying the Crypted password from the client is received, determines the Crypted password and pre-
If whether original password matches;
According to the matching result of the Crypted password and default original password, login result is determined.
The third aspect proposes a kind of entering device, is applied to client, and described device includes:
First receiving module, for receive user inputted in the login password input frame of the client it is original close
Code;
First sending module, described in front of user submits logging request to server-side, Xiang Suoshu server-side is sent
Original password obtains Crypted password so that the server-side encrypts the original password according to predetermined encryption algorithm;
Second receiving module, for receiving the Crypted password of the server-side return and being backfilled to the login password
Input frame;
Module is submitted in request, for submitting the operation of logging request to the server-side in response to user, by the encryption
Password is committed to the server-side to determine login result, and caches the Crypted password.
Fourth aspect proposes a kind of entering device, is applied to server-side, and described device includes:
Third receiving module, for receiving the original password from client, the original password is that the client exists
User submits transmission before logging request to the server-side, and the original password is login of the user in the client
The password inputted in Password Input frame;
Encrypting module, for being encrypted, obtaining Crypted password and being returned to the original password according to predetermined encryption algorithm
Reach the client;Wherein, the client is used to the Crypted password being backfilled to the login password input frame, and
When responding operation of the user to server-side submission logging request, the Crypted password is cached;
Second receiving module, for receiving the logging request for carrying the Crypted password from the client, really
Whether the fixed Crypted password matches with default original password;
Login result determining module determines according to the matching result of the Crypted password and default original password and logs in knot
Fruit.
5th aspect, proposes a kind of electronic equipment, comprising:
Processor;And
It is arranged to the memory of storage computer executable instructions, the executable instruction makes the place when executed
It manages device and executes following operation:
Receive the original password that user inputs in the login password input frame of the client;
Before user submits logging request to server-side, Xiang Suoshu server-side sends the original password, so that described
Server-side encrypts the original password according to predetermined encryption algorithm, obtains Crypted password;
It receives the Crypted password that the server-side returns and is backfilled to the login password input frame;
The operation for submitting logging request to the server-side in response to user, is committed to the service for the Crypted password
End caches the Crypted password to determine login result.
6th aspect, proposes a kind of computer readable storage medium, the computer-readable recording medium storage one
Or multiple programs, one or more of programs are when the electronic equipment for being included multiple application programs executes, so that the electricity
Sub- equipment executes following operation:
Receive the original password that user inputs in the login password input frame of the client;
Before user submits logging request to server-side, Xiang Suoshu server-side sends the original password, so that described
Server-side encrypts the original password according to predetermined encryption algorithm, obtains Crypted password;
It receives the Crypted password that the server-side returns and is backfilled to the login password input frame;
The operation for submitting logging request to the server-side in response to user, is committed to the service for the Crypted password
End caches the Crypted password to determine login result.
7th aspect, proposes a kind of electronic equipment, comprising:
Processor;And
It is arranged to the memory of storage computer executable instructions, the executable instruction makes the place when executed
It manages device and executes following operation:
Receive the original password that user inputs in the login password input frame of the client;
Before user submits logging request to server-side, Xiang Suoshu server-side sends the original password, so that described
Server-side encrypts the original password according to predetermined encryption algorithm, obtains Crypted password;
It receives the Crypted password that the server-side returns and is backfilled to the login password input frame;
The operation for submitting logging request to the server-side in response to user, is committed to the service for the Crypted password
End caches the Crypted password to determine login result.
Eighth aspect proposes a kind of computer readable storage medium, the computer-readable recording medium storage one
Or multiple programs, one or more of programs are when the electronic equipment for being included multiple application programs executes, so that the electricity
Sub- equipment executes following operation:
Receive the original password that user inputs in the login password input frame of the client;
Before user submits logging request to server-side, Xiang Suoshu server-side sends the original password, so that described
Server-side encrypts the original password according to predetermined encryption algorithm, obtains Crypted password;
It receives the Crypted password that the server-side returns and is backfilled to the login password input frame;
The operation for submitting logging request to the server-side in response to user, is committed to the service for the Crypted password
End caches the Crypted password to determine login result.
As can be seen from the technical scheme provided by the above embodiments of the present application, scheme provided by the embodiments of the present application at least have as
Lower a kind of technical effect: since when user submits the operation of logging request to the server-side, client-cache is service
The Crypted password that end encrypts original password, rather than the original password of user's input, therefore original password can be improved
Safety and reliability.
Specific embodiment
To keep the purposes, technical schemes and advantages of the application clearer, below in conjunction with the application specific embodiment and
Technical scheme is clearly and completely described in corresponding attached drawing.Obviously, described embodiment is only the application one
Section Example, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art are not doing
Every other embodiment obtained under the premise of creative work out, shall fall in the protection scope of this application.
In order to improve the safety of original password, this specification embodiment provides a kind of login method, device and equipment.For
The application scenarios of each technical solution of this specification embodiment offer are provided, first combine Fig. 1 to this explanation below
A kind of running environment of book embodiment is illustrated.
As shown in Figure 1, one or more user terminals 101 (one is only shown in Fig. 1) can by network 102 and one or
Multiple server-sides 103 (one is only shown in Fig. 1) are connected, to carry out data communication or interaction.Wherein, user terminal 101 can be with
It is PC (personal computer, PC), laptop, tablet computer, smart phone, electronic reader, network
TV, wearable device etc. being capable of smart machines connected to the network.
In this specification embodiment, client can be installed in user terminal 101, which can be third party
Application software is also possible to browser, which can provide the user with service together with server-side end, such as provide payment
Service, for pay to transaction, etc..
It should be noted that a kind of login method and device that this specification embodiment provides, can be applied to user's end
In the client installed in end 101;Another login method and device that this specification embodiment provides, can be applied to service
In end 103.
As shown in Fig. 2, this specification embodiment provides a kind of login method, user terminal shown in FIG. 1 can be applied to
In the client installed in 101, the method can include:
Step 202 receives the original password that user inputs in the login password input frame of the client.
Wherein, the client is either browser, is also possible to third-party application software.
Step 204, before user submits logging request to server-side, Xiang Suoshu server-side sends the original password,
So that the server-side encrypts the original password according to predetermined encryption algorithm, Crypted password is obtained.
As an example, it can be determined by monitoring input control focus described original close to server-side transmission
The opportunity of code.Specifically, can be after monitoring input control focus and leaving the login password input frame, and the input
Before controlling the submitting button that focus clicks logging request, Xiang Suoshu server-side sends the original password.
It for example, can be burnt by monitoring input control when input control focus (or cursor) is by mouse control
The position of point, to determine whether the input control focus leaves login password input frame, and the click by monitoring mouse
(click) event, to determine whether the input control focus clicks the submitting button of logging request.When input control focus
It, can be by monitoring the position of touch-control (touch) event, to determine the input control when for touch-control focus in touch panel
Whether focus leaves login password input frame, and can be by monitoring touch event, to determine that the input control focus is
The no submitting button for clicking logging request.
Optionally, before executing step 204, whether method shown in Fig. 2 can also comprise determining that the original password
Meet cryptographic check condition;Following step 204 is transferred to if meeting;If do not met, user is prompted to re-enter described
Original password, and the original password re-entered is sent to the server-side after meeting cryptographic check condition.
As first example, it is preset characters number that above-mentioned cryptographic check condition, which can be the number of characters that password includes,
Whether the i.e. above-mentioned determination original password meets cryptographic check condition, comprising: determines the number of characters that the original password includes
It whether is preset characters number;If it is, determining that the original password meets cryptographic check condition;Otherwise, it determines described original
Cryptographic check condition is not met.
As second example, above-mentioned cryptographic check condition can be password be made of letter and number namely it is above-mentioned really
Whether the fixed original password meets cryptographic check condition, comprising: determines whether the original password includes letter and number;Such as
Fruit is, it is determined that the original password meets cryptographic check condition;Original cryptographic check condition is not met otherwise, it determines described.
As third example, above-mentioned cryptographic check condition may include: that password is made of and password letter and number
The number of characters for including is preset characters number.That is, the cryptographic check condition in third example can be above-mentioned first
The combination of example and the cryptographic check condition in second example.
It should be understood that cryptographic check condition can flexible setting according to actual needs, and be not limited to above three example.
Further, client can after monitoring input control focus and leaving the login password input frame,
And the input control focus click logging request submitting button before and the original password meet cryptographic check condition
In the case where, Xiang Suoshu server-side sends the original password.
In step 204, the server-side encrypts the original password according to predetermined encryption algorithm, is encrypted
The process of password can wouldn't repeat herein with reference to hereinafter to the explanation of the step 304 in embodiment shown in Fig. 3.
Optionally, before the step 204, namely before user submits logging request to server-side, method shown in Fig. 2
It can also include: to send target information to the server-side.
Wherein, the target information can include but is not limited at least one of following message: user is in the client
The mark and encryption algorithm identification of the equipment of the account, the installation client that are inputted in the account input frame at end.The target
Information can be used for the server-side and determine the predetermined encryption algorithm.
For example, when the target information includes installing the mark of the equipment of the client, server-side can choose with
The predetermined encryption algorithm of device identification binding encrypts the original password, to further enhance the hidden of original password
Property, to improve the safety of original password.For another example, when the target information includes account, server-side can choose and be somebody's turn to do
The predetermined encryption algorithm of account binding encrypts the original password, to further enhance the concealment of original password, from
And improve the safety of original password.It is appreciated that server-side can be straight when the target information includes encryption algorithm identification
It connects and the original password is encrypted using the encryption algorithm identification corresponding predetermined encryption algorithm.
Step 206, the Crypted password for receiving the server-side return are simultaneously backfilled to the login password input frame.
If being returned after server-side encrypts for example, the original password of the user's input received in step 202 is 123456
The character string that the Crypted password returned is 32, then be backfilled to login password input frame for 32 character strings.
Step 208, the operation for submitting logging request to the server-side in response to user, the Crypted password is committed to
The server-side caches the Crypted password to determine login result.
Specifically, after receiving user and clicking the submitting button for submitting (Submit) logging request, by the encryption
Password is committed to the server-side to determine login result, and caches the Crypted password.
More specifically, it after receiving user and clicking the submitting button for submitting logging request, can select to remember in user
Firmly in the case where password, the Crypted password is cached.For example, if the client is browser, when Inputd object
When Types is set as password, after user clicks submitting button, browser can remember institute in login password input frame automatically
The password filled out, to facilitate next automated log on.
A kind of login method that embodiment shown in Fig. 2 provides, due to submitting logging request to the server-side in user
Operation when, client-cache is Crypted password that server-side encrypts original password, rather than the original of user's input
Beginning password, therefore the safety and reliability of original password can be improved.
It is appreciated that illegal user steals client by modes such as duplications after client-cache (remembers) Crypted password
The password of end caching is Crypted password, and can not know original password, therefore the reliability of original password can be improved.
It should be noted that it is shown in Fig. 2 this before user submits logging request, original password is sent to service
End, returns to Crypted password by server-side, and be backfilled to login password input frame, and logging request is then submitted to send to server-side again
The mode of Crypted password is properly termed as a kind of asynchronous process mode of password.It is so-called asynchronous, refer to that asynchronous both sides do not need jointly
Clock.
It is the explanation to a kind of login method for being applied to client above, below with reference to Fig. 3 to this specification embodiment
Another login method applied to server-side provided is introduced.
As shown in figure 3, another login method that this specification embodiment provides, can be used for service shown in Fig. 1
In end, this method may include:
Step 302 receives the original password from client, and the original password is the client in user to described
Server-side submits transmission before logging request, and the original password is login password input frame of the user in the client
The password of middle input.
Step 304 encrypts the original password according to predetermined encryption algorithm, obtains Crypted password and is back to institute
State client;Wherein, the client is used to for the Crypted password being backfilled to the login password input frame, and uses in response
When the operation of logging request is submitted at family to the server-side, the Crypted password is cached.
It in the first instance, may include: according to random algorithm, with the machine transplanting of rice in the original password in step 304
Enter at least one number and/or at least one letter, obtains Crypted password.
Random algorithm is a concept Turing machine, that is, introduces enchancement factor in the algorithm, selects to calculate by random number
The next step of method.
If for example, user input original password be " 123456 ", it is available after being handled according to random algorithm
Crypted password as " 1r2c3f4g5h6f ", wherein the abcd of insertion is randomly generated, the insertion position of abcd be also with
What machine determined.
In second example, in order to improve the difficulty that Crypted password is cracked, can first it be calculated according to random in step 304
Method, at least one number of radom insertion and/or at least one letter, obtain initial encryption password in the original password;So
Afterwards further according to Message Digest Algorithm 5 (Message Digest Algorithm, md5) md5 to the initial encryption password
It is encrypted, obtains final Crypted password.
If after can first being handled according to random algorithm, can be obtained for example, the original password of user's input is " 123456 "
To Crypted password as " 1r2c3f4g5h6f ", wherein the abcd of insertion is to be randomly generated, the insertion position of abcd be also with
What machine determined;Then " 1r2c3f4g5h6f " is encrypted using md5 algorithm, obtains 32 bit encryption passwords.
It is appreciated that the ciphering process of md5 algorithm is irreversible, even if to make illegal user steal encryption close for this
Code, it is also difficult to crack out original password, therefore can further promote the safety and reliability of original password.
Certain server-side can also encrypt the original password using other predetermined encryption algorithms, on limiting to
State Encryption Algorithm described in two examples.
Optionally, before step 304, method shown in Fig. 3 can also include: to receive the target from the client
Information determines the predetermined encryption algorithm according to the target information.
Wherein, the target information can include but is not limited at least one of following message: user is in the client
Mark and encryption algorithm identification of the equipment that account, the client inputted in the account input frame at end is depended on etc..
For example, when the target information includes installing the mark of the equipment of the client, server-side can choose with
The predetermined encryption algorithm of device identification binding encrypts the original password, to further enhance the hidden of original password
Property, to improve the safety of original password.For another example, when the target information includes account, server-side can choose and be somebody's turn to do
The predetermined encryption algorithm of account binding encrypts the original password, to further enhance the concealment of original password, from
And improve the safety of original password.It is appreciated that server-side can be straight when the target information includes encryption algorithm identification
It connects and the original password is encrypted using the encryption algorithm identification corresponding predetermined encryption algorithm.
Step 306 receives the logging request for carrying the Crypted password from the client, determines the encryption
Whether password matches with default original password.
As an example, it determines whether the Crypted password matches with default original password, may include: described pre-
If Encryption Algorithm is irreversible cryptographic algorithm, the Crypted password is decrypted to obtain clear crytpographic key, if the decryption is close
Code is identical as the default original password, determines that the Crypted password is matched with the default original password;Otherwise, it determines described
Crypted password and the default original password mismatch.
As another example, it determines whether the Crypted password matches with default original password, may include: described
When predetermined encryption algorithm is irreversible encryption algorithm, the default original password is added using the predetermined encryption algorithm
It is close, it obtains with reference to Crypted password;If the Crypted password carried in the logging request is identical as the reference Crypted password, really
The Crypted password carried in the fixed logging request is matched with the default original password;Otherwise, it determines in the logging request
The Crypted password of carrying and the default original password mismatch.
Step 308, according to the matching result of the Crypted password and default original password, determine login result.
Specifically, determining that login result is successfully under the Crypted password and the matched situation of default original password;In
Under the Crypted password and the unmatched situation of default original password, determine login result for failure.
Further, login result can also be returned to the client.
A kind of login method that embodiment shown in Fig. 3 provides, due to before user submits logging request to server-side,
Server-side has carried out encryption in the original password that client inputs to user and has obtained Crypted password, and Crypted password is returned to visitor
Family end, so that Crypted password is backfilled to the defeated input frame of login password by client, in this way, mention in user to the server-side
When handing over logging request, the password that the password and client that client is submitted to server-side are remembered is Crypted password, rather than
The original password of user's input, therefore the safety and reliability of original password can be improved.
It is that a kind of explanation of login method applied to server-side is provided this specification above, this specification is mentioned below
The electronic equipment of confession is introduced.
Fig. 4 is the structural schematic diagram for the electronic equipment that one embodiment of this specification provides.Referring to FIG. 4, in hardware
Level, the electronic equipment include processor, optionally further comprising internal bus, network interface, memory.Wherein, memory can
It can include memory, such as high-speed random access memory (Random-Access Memory, RAM), it is also possible to further include non-easy
The property lost memory (non-volatile memory), for example, at least 1 magnetic disk storage etc..Certainly, which is also possible to
Including hardware required for other business.
Processor, network interface and memory can be connected with each other by internal bus, which can be ISA
(Industry Standard Architecture, industry standard architecture) bus, PCI (Peripheral
Component Interconnect, Peripheral Component Interconnect standard) bus or EISA (Extended Industry Standard
Architecture, expanding the industrial standard structure) bus etc..The bus can be divided into address bus, data/address bus, control always
Line etc..Only to be indicated with a four-headed arrow in Fig. 4, it is not intended that an only bus or a type of convenient for indicating
Bus.
Memory, for storing program.Specifically, program may include program code, and said program code includes calculating
Machine operational order.Memory may include memory and nonvolatile memory, and provide instruction and data to processor.
Processor is from the then operation into memory of corresponding computer program is read in nonvolatile memory, in logical layer
Entering device is formed on face.Processor executes the program that memory is stored, and is specifically used for executing following operation:
Receive the original password that user inputs in the login password input frame of the client;
Before user submits logging request to server-side, Xiang Suoshu server-side sends the original password, so that described
Server-side encrypts the original password according to predetermined encryption algorithm, obtains Crypted password;
It receives the Crypted password that the server-side returns and is backfilled to the login password input frame;
The operation for submitting logging request to the server-side in response to user, is committed to the service for the Crypted password
End caches the Crypted password to determine login result.
Alternatively, processor, executes the program that memory is stored, and it is specifically used for executing following operation:
The original password from client is received, the original password is that the client is mentioned in user to the server-side
Transmission before logging request is handed over, and the original password is that user inputs in the login password input frame of the client
Password;
The original password is encrypted according to predetermined encryption algorithm, Crypted password is obtained and is back to the client
End;Wherein, the client is used to for the Crypted password being backfilled to the login password input frame, and is responding user to institute
When stating the operation of server-side submission logging request, the Crypted password is cached;
The logging request for carrying the Crypted password from the client is received, determines the Crypted password and pre-
If whether original password matches;
According to the matching result of the Crypted password and default original password, login result is determined.
The above-mentioned login method as disclosed in this specification Fig. 2 or embodiment illustrated in fig. 3 can be applied in processor, or
It is realized by processor.Processor may be a kind of IC chip, the processing capacity with signal.During realization, on
Each step for stating method can be completed by the integrated logic circuit of the hardware in processor or the instruction of software form.It is above-mentioned
Processor can be general processor, including central processing unit (Central Processing Unit, CPU), network processes
Device (Network Processor, NP) etc.;Can also be digital signal processor (Digital Signal Processor,
DSP), specific integrated circuit (Application Specific Integrated Circuit, ASIC), field programmable gate
Array (Field-Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or crystalline substance
Body pipe logical device, discrete hardware components.It may be implemented or execute and is in this specification one or more embodiment disclosed
Each method, step and logic diagram.General processor can be microprocessor or the processor be also possible to it is any conventional
Processor etc..The step of method in conjunction with disclosed in this specification one or more embodiment, can be embodied directly in hardware decoding
Processor executes completion, or in decoding processor hardware and software module combination execute completion.Software module can position
In random access memory, flash memory, read-only memory, programmable read only memory or electrically erasable programmable memory, register
In the storage medium of equal this fields maturation.The storage medium is located at memory, and processor reads the information in memory, in conjunction with it
Hardware completes the step of above method.
The electronic equipment can also carry out the login method of Fig. 2 or Fig. 3, and details are not described herein for this specification.
Certainly, other than software realization mode, other implementations are not precluded in the electronic equipment of this specification, such as
Logical device or the mode of software and hardware combining etc., that is to say, that the executing subject of following process flow is not limited to each
Logic unit is also possible to hardware or logical device.
This specification embodiment also proposed a kind of computer readable storage medium, the computer-readable recording medium storage
One or more programs, the one or more program include instruction, and the instruction is when by the portable electric including multiple application programs
When sub- equipment executes, the method that the portable electronic device can be made to execute embodiment illustrated in fig. 2, and be specifically used for executing following
Operation:
Receive the original password that user inputs in the login password input frame of the client;
Before user submits logging request to server-side, Xiang Suoshu server-side sends the original password, so that described
Server-side encrypts the original password according to predetermined encryption algorithm, obtains Crypted password;
It receives the Crypted password that the server-side returns and is backfilled to the login password input frame;
The operation for submitting logging request to the server-side in response to user, is committed to the service for the Crypted password
End caches the Crypted password to determine login result.
This specification embodiment also proposed a kind of computer readable storage medium, the computer-readable recording medium storage
One or more programs, the one or more program include instruction, and the instruction is when by the portable electric including multiple application programs
When sub- equipment executes, the method that the portable electronic device can be made to execute embodiment illustrated in fig. 3, and be specifically used for executing following
Operation:
The original password from client is received, the original password is that the client is mentioned in user to the server-side
Transmission before logging request is handed over, and the original password is that user inputs in the login password input frame of the client
Password;
The original password is encrypted according to predetermined encryption algorithm, Crypted password is obtained and is back to the client
End;Wherein, the client is used to for the Crypted password being backfilled to the login password input frame, and is responding user to institute
When stating the operation of server-side submission logging request, the Crypted password is cached;
The logging request for carrying the Crypted password from the client is received, determines the Crypted password and pre-
If whether original password matches;
According to the matching result of the Crypted password and default original password, login result is determined.
The entering device provided below this specification is illustrated.
As shown in figure 5, one embodiment of this specification provides a kind of entering device 500, can be applied to shown in FIG. 1
In the client that terminal device 101 is installed, in a kind of Software Implementation, the entering device 500 can include: first receives mould
Module 504 is submitted in block 501, the first sending module 502, the second receiving module 503 and request.
First receiving module 501 is inputted for receiving user in the login password input frame of the client original
Password.
First sending module 502, for before user submits logging request to server-side, Xiang Suoshu server-side to send institute
Original password is stated, so that the server-side encrypts the original password according to predetermined encryption algorithm, obtains Crypted password.
As an example, the first sending module 502 can be determined by monitoring input control focus to the service
End sends the opportunity of the original password.Specifically, the login password input can be left monitoring input control focus
After frame, and before the submitting button of input control focus click logging request, Xiang Suoshu server-side sends described original
Password.
Optionally, entering device 500 can also include: the first determining module, for described in server-side transmission
Before original password, determine whether the original password meets cryptographic check condition;The first sending module is triggered if meeting
502;If do not met, user is prompted to re-enter the original password, and trigger first after meeting cryptographic check condition
Sending module 502.
Further, the first sending module 502 can to leave the login password defeated monitoring input control focus
After entering frame, and the input control focus click logging request submitting button before and the original password meet it is close
In the case where code check condition, Xiang Suoshu server-side sends the original password.
Optionally, entering device 500 can also include: the second sending module, log in for submitting in user to server-side
Before request, Xiang Suoshu server-side sends target information.
Wherein, the target information can include but is not limited at least one of following message: user is in the client
The mark and encryption algorithm identification of the equipment of the account, the installation client that are inputted in the account input frame at end.The target
Information can be used for the server-side and determine the predetermined encryption algorithm.
Second receiving module 503, for receiving the Crypted password of the server-side return and being backfilled to the login
Password Input frame.
It requests to submit module 504, for submitting the operation of logging request to the server-side in response to user, described will add
Password is committed to the server-side to determine login result, and caches the Crypted password.
Specifically, module 504 is submitted in request, it can be in the submission for receiving user's click submission (Submit) logging request
After button, the Crypted password is committed to the server-side to determine login result, and cache the Crypted password.
More specifically, request submit module 504, receive user click submit logging request submitting button it
Afterwards, the Crypted password can be cached in the case where user selects to remember password.
A kind of entering device 500 that embodiment shown in fig. 5 provides is asked due to submitting to log in the server-side in user
When the operation asked, client-cache is Crypted password that server-side encrypts original password, rather than user's input
Original password, therefore the safety and reliability of original password can be improved.
It should be noted that the method that entering device 500 can be realized the embodiment of the method for Fig. 2, specifically refers to Fig. 2 institute
The login method for showing embodiment, repeats no more.
As shown in fig. 6, one embodiment of this specification provides a kind of entering device 600, can be applied to shown in FIG. 1
In server-side, in a kind of Software Implementation, the entering device 600 can include: third receiving module 601, encrypting module
602, the 4th receiving module 603 and login result determining module 604.
Third receiving module 601, for receiving the original password from client, the original password is the client
It is sent before user submits logging request to the server-side, and the original password is user's stepping in the client
The password inputted in record Password Input frame.
Encrypting module 602 obtains Crypted password simultaneously for encrypting according to predetermined encryption algorithm to the original password
It is back to the client;Wherein, the client is used to the Crypted password being backfilled to the login password input frame, and
When responding operation of the user to server-side submission logging request, the Crypted password is cached.
In the first instance, encrypting module 602 is particularly used in: according to random algorithm, in the original password with
The machine transplanting of rice enters at least one number and/or at least one letter, obtains Crypted password.
In second example, in order to improve the difficulty that Crypted password is cracked, encrypting module 602 is particularly used in: root
According to random algorithm, at least one number of radom insertion and/or at least one letter, obtain initial encryption in the original password
Password;The initial encryption password is encrypted according to md5, obtains final Crypted password.
It is appreciated that the ciphering process of md5 algorithm is irreversible, even if to make illegal user steal encryption close for this
Code, it is also difficult to crack out original password, therefore can further promote the safety and reliability of original password.
Certain server-side can also encrypt the original password using other predetermined encryption algorithms, on limiting to
State Encryption Algorithm described in two examples.
Optionally, before step 304, entering device 600 shown in fig. 6 can also include: target information receiving module,
For receiving the target information from the client, and according to the mesh before user submits logging request to server-side
Mark information determines the predetermined encryption algorithm.
Wherein, the target information can include but is not limited at least one of following message: user is in the client
Mark and encryption algorithm identification of the equipment that account, the client inputted in the account input frame at end is depended on etc..
For example, encrypting module 602 can select when the target information includes installing the mark of the equipment of the client
It selects and the original password is encrypted with the predetermined encryption algorithm of device identification binding, to further enhance original password
Concealment, to improve the safety of original password.For another example, when the target information includes account, encrypting module 602 can be with
The predetermined encryption algorithm bound with the account is selected to encrypt the original password, to further enhance the hidden of original password
Covering property, to improve the safety of original password.It is appreciated that when the target information includes encryption algorithm identification, encryption
Module 602 can directly encrypt the original password using the corresponding predetermined encryption algorithm of the encryption algorithm identification.
4th receiving module 603, for receiving the logging request for carrying the Crypted password from the client,
Determine whether the Crypted password matches with default original password.
As an example, the 4th receiving module 603 is particularly used in: being reversible encryption calculation in the predetermined encryption algorithm
When method, the Crypted password is decrypted to obtain clear crytpographic key, if the clear crytpographic key and the default original password phase
Together, determine that the Crypted password is matched with the default original password;Otherwise, it determines the Crypted password with it is described preset it is original
Password mismatches.
As another example, the 4th receiving module 603 is particularly used in: being irreversible add in the predetermined encryption algorithm
When close algorithm, the default original password is encrypted using the predetermined encryption algorithm, is obtained with reference to Crypted password;If
The Crypted password carried in the logging request is identical as the reference Crypted password, determines that is carried in the logging request adds
Password is matched with the default original password;Otherwise, it determines the Crypted password carried in the logging request is preset with described
Original password mismatches.
Login result determining module 604 is determined and is logged according to the matching result of the Crypted password and default original password
As a result.
Specifically, determining that login result is successfully under the Crypted password and the matched situation of default original password;In
Under the Crypted password and the unmatched situation of default original password, determine login result for failure.
A kind of entering device 600 that embodiment shown in fig. 6 provides, due to user to server-side submit logging request it
Before, the encrypting module of server-side has carried out encryption in the original password that client inputs to user and has obtained Crypted password, and will add
Password returns to client, so that Crypted password is backfilled to the defeated input frame of login password by client, in this way, in user
When submitting logging request to the server-side, the password that the password and client that client is submitted to server-side are remembered is to add
Password, rather than the original password of user's input, therefore the safety and reliability of original password can be improved.
It should be noted that the method that entering device 600 can be realized the embodiment of the method for Fig. 3, specifically refers to Fig. 2 institute
The login method for showing embodiment, repeats no more.
Above-mentioned that this specification specific embodiment is described, other embodiments are in the scope of the appended claims
It is interior.In some cases, the movement recorded in detail in the claims or step can be come according to the sequence being different from embodiment
It executes and desired result still may be implemented.In addition, process depicted in the drawing not necessarily require show it is specific suitable
Sequence or consecutive order are just able to achieve desired result.In some embodiments, multitasking and parallel processing be also can
With or may be advantageous.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment
Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for device reality
For applying example, since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to embodiment of the method
Part explanation.
In short, being not intended to limit the protection of this specification the foregoing is merely the preferred embodiment of this specification
Range.With within principle, made any modification, changes equivalent replacement all spirit in this specification one or more embodiment
Into etc., it should be included within the protection scope of this specification one or more embodiment.
System, device, module or the unit that above-described embodiment illustrates can specifically realize by computer chip or entity,
Or it is realized by the product with certain function.It is a kind of typically to realize that equipment is computer.Specifically, computer for example may be used
Think personal computer, laptop computer, cellular phone, camera phone, smart phone, personal digital assistant, media play
It is any in device, navigation equipment, electronic mail equipment, game console, tablet computer, wearable device or these equipment
The combination of equipment.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method
Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data.
The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), moves
State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable
Programmable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM),
Digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or other magnetic storage devices
Or any other non-transmission medium, can be used for storage can be accessed by a computing device information.As defined in this article, it calculates
Machine readable medium does not include temporary computer readable media (transitory media), such as the data-signal and carrier wave of modulation.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability
It include so that the process, method, commodity or the equipment that include a series of elements not only include those elements, but also to wrap
Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic want
Element.When not limiting more, the element that is limited by sentence "including a ...", it is not excluded that in the mistake including the element
There is also other identical elements in journey, method, commodity or equipment.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment
Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for system reality
For applying example, since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to embodiment of the method
Part explanation.