CN110445768A - A kind of login method, device and electronic equipment - Google Patents

A kind of login method, device and electronic equipment Download PDF

Info

Publication number
CN110445768A
CN110445768A CN201910650577.XA CN201910650577A CN110445768A CN 110445768 A CN110445768 A CN 110445768A CN 201910650577 A CN201910650577 A CN 201910650577A CN 110445768 A CN110445768 A CN 110445768A
Authority
CN
China
Prior art keywords
password
server
original
crypted
client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910650577.XA
Other languages
Chinese (zh)
Other versions
CN110445768B (en
Inventor
石佳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Advantageous New Technologies Co Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201910650577.XA priority Critical patent/CN110445768B/en
Publication of CN110445768A publication Critical patent/CN110445768A/en
Application granted granted Critical
Publication of CN110445768B publication Critical patent/CN110445768B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords

Abstract

The invention discloses a kind of login method, device and electronic equipments, wherein, the described method includes: client, which sends the original password that user inputs in the client to the server-side, obtains Crypted password so that the server-side encrypts the original password according to predetermined encryption algorithm;Then it receives the Crypted password that the server-side returns and is backfilled to the login password input frame;The operation for finally submitting logging request to the server-side in response to user, is committed to the server-side for the Crypted password to determine login result, and cache the Crypted password.

Description

A kind of login method, device and electronic equipment
Technical field
This application involves field of computer technology more particularly to a kind of login methods, device and electronic equipment.
Background technique
Currently, user's quick registration applies (such as network application) account for convenience, when user inputs account in client With login password and after clicking login (or submit), if password is remembered in user's selection, client can be stepped on what user inputted Record password is saved, and is automatically entered login password when logging in next time so as to user and is logged in.
Although this can be realized quick registration in such a way that client saves login password automated log on application account Purpose, but there are security risks.
Summary of the invention
The embodiment of the present application provides a kind of login method, device and electronic equipment, to realize quick registration purpose Meanwhile improving the safety of login password.
In order to solve the above technical problems, the embodiment of the present application is achieved in that
In a first aspect, proposing a kind of login method, it is applied to client, which comprises
Receive the original password that user inputs in the login password input frame of the client;
Before user submits logging request to server-side, Xiang Suoshu server-side sends the original password, so that described Server-side encrypts the original password according to predetermined encryption algorithm, obtains Crypted password;
It receives the Crypted password that the server-side returns and is backfilled to the login password input frame;
The operation for submitting logging request to the server-side in response to user, is committed to the service for the Crypted password End caches the Crypted password to determine login result.
Second aspect proposes a kind of login method, is applied to server-side, which comprises
The original password from client is received, the original password is that the client is mentioned in user to the server-side Transmission before logging request is handed over, and the original password is that user inputs in the login password input frame of the client Password;
The original password is encrypted according to predetermined encryption algorithm, Crypted password is obtained and is back to the client End;Wherein, the client is used to for the Crypted password being backfilled to the login password input frame, and is responding user to institute When stating the operation of server-side submission logging request, the Crypted password is cached;
The logging request for carrying the Crypted password from the client is received, determines the Crypted password and pre- If whether original password matches;
According to the matching result of the Crypted password and default original password, login result is determined.
The third aspect proposes a kind of entering device, is applied to client, and described device includes:
First receiving module, for receive user inputted in the login password input frame of the client it is original close Code;
First sending module, described in front of user submits logging request to server-side, Xiang Suoshu server-side is sent Original password obtains Crypted password so that the server-side encrypts the original password according to predetermined encryption algorithm;
Second receiving module, for receiving the Crypted password of the server-side return and being backfilled to the login password Input frame;
Module is submitted in request, for submitting the operation of logging request to the server-side in response to user, by the encryption Password is committed to the server-side to determine login result, and caches the Crypted password.
Fourth aspect proposes a kind of entering device, is applied to server-side, and described device includes:
Third receiving module, for receiving the original password from client, the original password is that the client exists User submits transmission before logging request to the server-side, and the original password is login of the user in the client The password inputted in Password Input frame;
Encrypting module, for being encrypted, obtaining Crypted password and being returned to the original password according to predetermined encryption algorithm Reach the client;Wherein, the client is used to the Crypted password being backfilled to the login password input frame, and When responding operation of the user to server-side submission logging request, the Crypted password is cached;
Second receiving module, for receiving the logging request for carrying the Crypted password from the client, really Whether the fixed Crypted password matches with default original password;
Login result determining module determines according to the matching result of the Crypted password and default original password and logs in knot Fruit.
5th aspect, proposes a kind of electronic equipment, comprising:
Processor;And
It is arranged to the memory of storage computer executable instructions, the executable instruction makes the place when executed It manages device and executes following operation:
Receive the original password that user inputs in the login password input frame of the client;
Before user submits logging request to server-side, Xiang Suoshu server-side sends the original password, so that described Server-side encrypts the original password according to predetermined encryption algorithm, obtains Crypted password;
It receives the Crypted password that the server-side returns and is backfilled to the login password input frame;
The operation for submitting logging request to the server-side in response to user, is committed to the service for the Crypted password End caches the Crypted password to determine login result.
6th aspect, proposes a kind of computer readable storage medium, the computer-readable recording medium storage one Or multiple programs, one or more of programs are when the electronic equipment for being included multiple application programs executes, so that the electricity Sub- equipment executes following operation:
Receive the original password that user inputs in the login password input frame of the client;
Before user submits logging request to server-side, Xiang Suoshu server-side sends the original password, so that described Server-side encrypts the original password according to predetermined encryption algorithm, obtains Crypted password;
It receives the Crypted password that the server-side returns and is backfilled to the login password input frame;
The operation for submitting logging request to the server-side in response to user, is committed to the service for the Crypted password End caches the Crypted password to determine login result.
7th aspect, proposes a kind of electronic equipment, comprising:
Processor;And
It is arranged to the memory of storage computer executable instructions, the executable instruction makes the place when executed It manages device and executes following operation:
Receive the original password that user inputs in the login password input frame of the client;
Before user submits logging request to server-side, Xiang Suoshu server-side sends the original password, so that described Server-side encrypts the original password according to predetermined encryption algorithm, obtains Crypted password;
It receives the Crypted password that the server-side returns and is backfilled to the login password input frame;
The operation for submitting logging request to the server-side in response to user, is committed to the service for the Crypted password End caches the Crypted password to determine login result.
Eighth aspect proposes a kind of computer readable storage medium, the computer-readable recording medium storage one Or multiple programs, one or more of programs are when the electronic equipment for being included multiple application programs executes, so that the electricity Sub- equipment executes following operation:
Receive the original password that user inputs in the login password input frame of the client;
Before user submits logging request to server-side, Xiang Suoshu server-side sends the original password, so that described Server-side encrypts the original password according to predetermined encryption algorithm, obtains Crypted password;
It receives the Crypted password that the server-side returns and is backfilled to the login password input frame;
The operation for submitting logging request to the server-side in response to user, is committed to the service for the Crypted password End caches the Crypted password to determine login result.
As can be seen from the technical scheme provided by the above embodiments of the present application, scheme provided by the embodiments of the present application at least have as Lower a kind of technical effect: since when user submits the operation of logging request to the server-side, client-cache is service The Crypted password that end encrypts original password, rather than the original password of user's input, therefore original password can be improved Safety and reliability.
Detailed description of the invention
The drawings described herein are used to provide a further understanding of the present application, constitutes part of this application, this Shen Illustrative embodiments and their description please are not constituted an undue limitation on the present application for explaining the application.In the accompanying drawings:
Fig. 1 is a kind of running environment schematic diagram of this specification embodiment.
Fig. 2 is a kind of flow diagram for login method that this specification embodiment provides.
Fig. 3 is the flow diagram for another login method that this specification embodiment provides.
Fig. 4 is the structural schematic diagram for a kind of electronic equipment that this specification embodiment provides.
Fig. 5 is a kind of structural schematic diagram for entering device that this specification embodiment provides.
Fig. 6 is the structural schematic diagram for another entering device that this specification embodiment provides.
Specific embodiment
To keep the purposes, technical schemes and advantages of the application clearer, below in conjunction with the application specific embodiment and Technical scheme is clearly and completely described in corresponding attached drawing.Obviously, described embodiment is only the application one Section Example, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art are not doing Every other embodiment obtained under the premise of creative work out, shall fall in the protection scope of this application.
In order to improve the safety of original password, this specification embodiment provides a kind of login method, device and equipment.For The application scenarios of each technical solution of this specification embodiment offer are provided, first combine Fig. 1 to this explanation below A kind of running environment of book embodiment is illustrated.
As shown in Figure 1, one or more user terminals 101 (one is only shown in Fig. 1) can by network 102 and one or Multiple server-sides 103 (one is only shown in Fig. 1) are connected, to carry out data communication or interaction.Wherein, user terminal 101 can be with It is PC (personal computer, PC), laptop, tablet computer, smart phone, electronic reader, network TV, wearable device etc. being capable of smart machines connected to the network.
In this specification embodiment, client can be installed in user terminal 101, which can be third party Application software is also possible to browser, which can provide the user with service together with server-side end, such as provide payment Service, for pay to transaction, etc..
It should be noted that a kind of login method and device that this specification embodiment provides, can be applied to user's end In the client installed in end 101;Another login method and device that this specification embodiment provides, can be applied to service In end 103.
As shown in Fig. 2, this specification embodiment provides a kind of login method, user terminal shown in FIG. 1 can be applied to In the client installed in 101, the method can include:
Step 202 receives the original password that user inputs in the login password input frame of the client.
Wherein, the client is either browser, is also possible to third-party application software.
Step 204, before user submits logging request to server-side, Xiang Suoshu server-side sends the original password, So that the server-side encrypts the original password according to predetermined encryption algorithm, Crypted password is obtained.
As an example, it can be determined by monitoring input control focus described original close to server-side transmission The opportunity of code.Specifically, can be after monitoring input control focus and leaving the login password input frame, and the input Before controlling the submitting button that focus clicks logging request, Xiang Suoshu server-side sends the original password.
It for example, can be burnt by monitoring input control when input control focus (or cursor) is by mouse control The position of point, to determine whether the input control focus leaves login password input frame, and the click by monitoring mouse (click) event, to determine whether the input control focus clicks the submitting button of logging request.When input control focus It, can be by monitoring the position of touch-control (touch) event, to determine the input control when for touch-control focus in touch panel Whether focus leaves login password input frame, and can be by monitoring touch event, to determine that the input control focus is The no submitting button for clicking logging request.
Optionally, before executing step 204, whether method shown in Fig. 2 can also comprise determining that the original password Meet cryptographic check condition;Following step 204 is transferred to if meeting;If do not met, user is prompted to re-enter described Original password, and the original password re-entered is sent to the server-side after meeting cryptographic check condition.
As first example, it is preset characters number that above-mentioned cryptographic check condition, which can be the number of characters that password includes, Whether the i.e. above-mentioned determination original password meets cryptographic check condition, comprising: determines the number of characters that the original password includes It whether is preset characters number;If it is, determining that the original password meets cryptographic check condition;Otherwise, it determines described original Cryptographic check condition is not met.
As second example, above-mentioned cryptographic check condition can be password be made of letter and number namely it is above-mentioned really Whether the fixed original password meets cryptographic check condition, comprising: determines whether the original password includes letter and number;Such as Fruit is, it is determined that the original password meets cryptographic check condition;Original cryptographic check condition is not met otherwise, it determines described.
As third example, above-mentioned cryptographic check condition may include: that password is made of and password letter and number The number of characters for including is preset characters number.That is, the cryptographic check condition in third example can be above-mentioned first The combination of example and the cryptographic check condition in second example.
It should be understood that cryptographic check condition can flexible setting according to actual needs, and be not limited to above three example.
Further, client can after monitoring input control focus and leaving the login password input frame, And the input control focus click logging request submitting button before and the original password meet cryptographic check condition In the case where, Xiang Suoshu server-side sends the original password.
In step 204, the server-side encrypts the original password according to predetermined encryption algorithm, is encrypted The process of password can wouldn't repeat herein with reference to hereinafter to the explanation of the step 304 in embodiment shown in Fig. 3.
Optionally, before the step 204, namely before user submits logging request to server-side, method shown in Fig. 2 It can also include: to send target information to the server-side.
Wherein, the target information can include but is not limited at least one of following message: user is in the client The mark and encryption algorithm identification of the equipment of the account, the installation client that are inputted in the account input frame at end.The target Information can be used for the server-side and determine the predetermined encryption algorithm.
For example, when the target information includes installing the mark of the equipment of the client, server-side can choose with The predetermined encryption algorithm of device identification binding encrypts the original password, to further enhance the hidden of original password Property, to improve the safety of original password.For another example, when the target information includes account, server-side can choose and be somebody's turn to do The predetermined encryption algorithm of account binding encrypts the original password, to further enhance the concealment of original password, from And improve the safety of original password.It is appreciated that server-side can be straight when the target information includes encryption algorithm identification It connects and the original password is encrypted using the encryption algorithm identification corresponding predetermined encryption algorithm.
Step 206, the Crypted password for receiving the server-side return are simultaneously backfilled to the login password input frame.
If being returned after server-side encrypts for example, the original password of the user's input received in step 202 is 123456 The character string that the Crypted password returned is 32, then be backfilled to login password input frame for 32 character strings.
Step 208, the operation for submitting logging request to the server-side in response to user, the Crypted password is committed to The server-side caches the Crypted password to determine login result.
Specifically, after receiving user and clicking the submitting button for submitting (Submit) logging request, by the encryption Password is committed to the server-side to determine login result, and caches the Crypted password.
More specifically, it after receiving user and clicking the submitting button for submitting logging request, can select to remember in user Firmly in the case where password, the Crypted password is cached.For example, if the client is browser, when Inputd object When Types is set as password, after user clicks submitting button, browser can remember institute in login password input frame automatically The password filled out, to facilitate next automated log on.
A kind of login method that embodiment shown in Fig. 2 provides, due to submitting logging request to the server-side in user Operation when, client-cache is Crypted password that server-side encrypts original password, rather than the original of user's input Beginning password, therefore the safety and reliability of original password can be improved.
It is appreciated that illegal user steals client by modes such as duplications after client-cache (remembers) Crypted password The password of end caching is Crypted password, and can not know original password, therefore the reliability of original password can be improved.
It should be noted that it is shown in Fig. 2 this before user submits logging request, original password is sent to service End, returns to Crypted password by server-side, and be backfilled to login password input frame, and logging request is then submitted to send to server-side again The mode of Crypted password is properly termed as a kind of asynchronous process mode of password.It is so-called asynchronous, refer to that asynchronous both sides do not need jointly Clock.
It is the explanation to a kind of login method for being applied to client above, below with reference to Fig. 3 to this specification embodiment Another login method applied to server-side provided is introduced.
As shown in figure 3, another login method that this specification embodiment provides, can be used for service shown in Fig. 1 In end, this method may include:
Step 302 receives the original password from client, and the original password is the client in user to described Server-side submits transmission before logging request, and the original password is login password input frame of the user in the client The password of middle input.
Step 304 encrypts the original password according to predetermined encryption algorithm, obtains Crypted password and is back to institute State client;Wherein, the client is used to for the Crypted password being backfilled to the login password input frame, and uses in response When the operation of logging request is submitted at family to the server-side, the Crypted password is cached.
It in the first instance, may include: according to random algorithm, with the machine transplanting of rice in the original password in step 304 Enter at least one number and/or at least one letter, obtains Crypted password.
Random algorithm is a concept Turing machine, that is, introduces enchancement factor in the algorithm, selects to calculate by random number The next step of method.
If for example, user input original password be " 123456 ", it is available after being handled according to random algorithm Crypted password as " 1r2c3f4g5h6f ", wherein the abcd of insertion is randomly generated, the insertion position of abcd be also with What machine determined.
In second example, in order to improve the difficulty that Crypted password is cracked, can first it be calculated according to random in step 304 Method, at least one number of radom insertion and/or at least one letter, obtain initial encryption password in the original password;So Afterwards further according to Message Digest Algorithm 5 (Message Digest Algorithm, md5) md5 to the initial encryption password It is encrypted, obtains final Crypted password.
If after can first being handled according to random algorithm, can be obtained for example, the original password of user's input is " 123456 " To Crypted password as " 1r2c3f4g5h6f ", wherein the abcd of insertion is to be randomly generated, the insertion position of abcd be also with What machine determined;Then " 1r2c3f4g5h6f " is encrypted using md5 algorithm, obtains 32 bit encryption passwords.
It is appreciated that the ciphering process of md5 algorithm is irreversible, even if to make illegal user steal encryption close for this Code, it is also difficult to crack out original password, therefore can further promote the safety and reliability of original password.
Certain server-side can also encrypt the original password using other predetermined encryption algorithms, on limiting to State Encryption Algorithm described in two examples.
Optionally, before step 304, method shown in Fig. 3 can also include: to receive the target from the client Information determines the predetermined encryption algorithm according to the target information.
Wherein, the target information can include but is not limited at least one of following message: user is in the client Mark and encryption algorithm identification of the equipment that account, the client inputted in the account input frame at end is depended on etc..
For example, when the target information includes installing the mark of the equipment of the client, server-side can choose with The predetermined encryption algorithm of device identification binding encrypts the original password, to further enhance the hidden of original password Property, to improve the safety of original password.For another example, when the target information includes account, server-side can choose and be somebody's turn to do The predetermined encryption algorithm of account binding encrypts the original password, to further enhance the concealment of original password, from And improve the safety of original password.It is appreciated that server-side can be straight when the target information includes encryption algorithm identification It connects and the original password is encrypted using the encryption algorithm identification corresponding predetermined encryption algorithm.
Step 306 receives the logging request for carrying the Crypted password from the client, determines the encryption Whether password matches with default original password.
As an example, it determines whether the Crypted password matches with default original password, may include: described pre- If Encryption Algorithm is irreversible cryptographic algorithm, the Crypted password is decrypted to obtain clear crytpographic key, if the decryption is close Code is identical as the default original password, determines that the Crypted password is matched with the default original password;Otherwise, it determines described Crypted password and the default original password mismatch.
As another example, it determines whether the Crypted password matches with default original password, may include: described When predetermined encryption algorithm is irreversible encryption algorithm, the default original password is added using the predetermined encryption algorithm It is close, it obtains with reference to Crypted password;If the Crypted password carried in the logging request is identical as the reference Crypted password, really The Crypted password carried in the fixed logging request is matched with the default original password;Otherwise, it determines in the logging request The Crypted password of carrying and the default original password mismatch.
Step 308, according to the matching result of the Crypted password and default original password, determine login result.
Specifically, determining that login result is successfully under the Crypted password and the matched situation of default original password;In Under the Crypted password and the unmatched situation of default original password, determine login result for failure.
Further, login result can also be returned to the client.
A kind of login method that embodiment shown in Fig. 3 provides, due to before user submits logging request to server-side, Server-side has carried out encryption in the original password that client inputs to user and has obtained Crypted password, and Crypted password is returned to visitor Family end, so that Crypted password is backfilled to the defeated input frame of login password by client, in this way, mention in user to the server-side When handing over logging request, the password that the password and client that client is submitted to server-side are remembered is Crypted password, rather than The original password of user's input, therefore the safety and reliability of original password can be improved.
It is that a kind of explanation of login method applied to server-side is provided this specification above, this specification is mentioned below The electronic equipment of confession is introduced.
Fig. 4 is the structural schematic diagram for the electronic equipment that one embodiment of this specification provides.Referring to FIG. 4, in hardware Level, the electronic equipment include processor, optionally further comprising internal bus, network interface, memory.Wherein, memory can It can include memory, such as high-speed random access memory (Random-Access Memory, RAM), it is also possible to further include non-easy The property lost memory (non-volatile memory), for example, at least 1 magnetic disk storage etc..Certainly, which is also possible to Including hardware required for other business.
Processor, network interface and memory can be connected with each other by internal bus, which can be ISA (Industry Standard Architecture, industry standard architecture) bus, PCI (Peripheral Component Interconnect, Peripheral Component Interconnect standard) bus or EISA (Extended Industry Standard Architecture, expanding the industrial standard structure) bus etc..The bus can be divided into address bus, data/address bus, control always Line etc..Only to be indicated with a four-headed arrow in Fig. 4, it is not intended that an only bus or a type of convenient for indicating Bus.
Memory, for storing program.Specifically, program may include program code, and said program code includes calculating Machine operational order.Memory may include memory and nonvolatile memory, and provide instruction and data to processor.
Processor is from the then operation into memory of corresponding computer program is read in nonvolatile memory, in logical layer Entering device is formed on face.Processor executes the program that memory is stored, and is specifically used for executing following operation:
Receive the original password that user inputs in the login password input frame of the client;
Before user submits logging request to server-side, Xiang Suoshu server-side sends the original password, so that described Server-side encrypts the original password according to predetermined encryption algorithm, obtains Crypted password;
It receives the Crypted password that the server-side returns and is backfilled to the login password input frame;
The operation for submitting logging request to the server-side in response to user, is committed to the service for the Crypted password End caches the Crypted password to determine login result.
Alternatively, processor, executes the program that memory is stored, and it is specifically used for executing following operation:
The original password from client is received, the original password is that the client is mentioned in user to the server-side Transmission before logging request is handed over, and the original password is that user inputs in the login password input frame of the client Password;
The original password is encrypted according to predetermined encryption algorithm, Crypted password is obtained and is back to the client End;Wherein, the client is used to for the Crypted password being backfilled to the login password input frame, and is responding user to institute When stating the operation of server-side submission logging request, the Crypted password is cached;
The logging request for carrying the Crypted password from the client is received, determines the Crypted password and pre- If whether original password matches;
According to the matching result of the Crypted password and default original password, login result is determined.
The above-mentioned login method as disclosed in this specification Fig. 2 or embodiment illustrated in fig. 3 can be applied in processor, or It is realized by processor.Processor may be a kind of IC chip, the processing capacity with signal.During realization, on Each step for stating method can be completed by the integrated logic circuit of the hardware in processor or the instruction of software form.It is above-mentioned Processor can be general processor, including central processing unit (Central Processing Unit, CPU), network processes Device (Network Processor, NP) etc.;Can also be digital signal processor (Digital Signal Processor, DSP), specific integrated circuit (Application Specific Integrated Circuit, ASIC), field programmable gate Array (Field-Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or crystalline substance Body pipe logical device, discrete hardware components.It may be implemented or execute and is in this specification one or more embodiment disclosed Each method, step and logic diagram.General processor can be microprocessor or the processor be also possible to it is any conventional Processor etc..The step of method in conjunction with disclosed in this specification one or more embodiment, can be embodied directly in hardware decoding Processor executes completion, or in decoding processor hardware and software module combination execute completion.Software module can position In random access memory, flash memory, read-only memory, programmable read only memory or electrically erasable programmable memory, register In the storage medium of equal this fields maturation.The storage medium is located at memory, and processor reads the information in memory, in conjunction with it Hardware completes the step of above method.
The electronic equipment can also carry out the login method of Fig. 2 or Fig. 3, and details are not described herein for this specification.
Certainly, other than software realization mode, other implementations are not precluded in the electronic equipment of this specification, such as Logical device or the mode of software and hardware combining etc., that is to say, that the executing subject of following process flow is not limited to each Logic unit is also possible to hardware or logical device.
This specification embodiment also proposed a kind of computer readable storage medium, the computer-readable recording medium storage One or more programs, the one or more program include instruction, and the instruction is when by the portable electric including multiple application programs When sub- equipment executes, the method that the portable electronic device can be made to execute embodiment illustrated in fig. 2, and be specifically used for executing following Operation:
Receive the original password that user inputs in the login password input frame of the client;
Before user submits logging request to server-side, Xiang Suoshu server-side sends the original password, so that described Server-side encrypts the original password according to predetermined encryption algorithm, obtains Crypted password;
It receives the Crypted password that the server-side returns and is backfilled to the login password input frame;
The operation for submitting logging request to the server-side in response to user, is committed to the service for the Crypted password End caches the Crypted password to determine login result.
This specification embodiment also proposed a kind of computer readable storage medium, the computer-readable recording medium storage One or more programs, the one or more program include instruction, and the instruction is when by the portable electric including multiple application programs When sub- equipment executes, the method that the portable electronic device can be made to execute embodiment illustrated in fig. 3, and be specifically used for executing following Operation:
The original password from client is received, the original password is that the client is mentioned in user to the server-side Transmission before logging request is handed over, and the original password is that user inputs in the login password input frame of the client Password;
The original password is encrypted according to predetermined encryption algorithm, Crypted password is obtained and is back to the client End;Wherein, the client is used to for the Crypted password being backfilled to the login password input frame, and is responding user to institute When stating the operation of server-side submission logging request, the Crypted password is cached;
The logging request for carrying the Crypted password from the client is received, determines the Crypted password and pre- If whether original password matches;
According to the matching result of the Crypted password and default original password, login result is determined.
The entering device provided below this specification is illustrated.
As shown in figure 5, one embodiment of this specification provides a kind of entering device 500, can be applied to shown in FIG. 1 In the client that terminal device 101 is installed, in a kind of Software Implementation, the entering device 500 can include: first receives mould Module 504 is submitted in block 501, the first sending module 502, the second receiving module 503 and request.
First receiving module 501 is inputted for receiving user in the login password input frame of the client original Password.
First sending module 502, for before user submits logging request to server-side, Xiang Suoshu server-side to send institute Original password is stated, so that the server-side encrypts the original password according to predetermined encryption algorithm, obtains Crypted password.
As an example, the first sending module 502 can be determined by monitoring input control focus to the service End sends the opportunity of the original password.Specifically, the login password input can be left monitoring input control focus After frame, and before the submitting button of input control focus click logging request, Xiang Suoshu server-side sends described original Password.
Optionally, entering device 500 can also include: the first determining module, for described in server-side transmission Before original password, determine whether the original password meets cryptographic check condition;The first sending module is triggered if meeting 502;If do not met, user is prompted to re-enter the original password, and trigger first after meeting cryptographic check condition Sending module 502.
Further, the first sending module 502 can to leave the login password defeated monitoring input control focus After entering frame, and the input control focus click logging request submitting button before and the original password meet it is close In the case where code check condition, Xiang Suoshu server-side sends the original password.
Optionally, entering device 500 can also include: the second sending module, log in for submitting in user to server-side Before request, Xiang Suoshu server-side sends target information.
Wherein, the target information can include but is not limited at least one of following message: user is in the client The mark and encryption algorithm identification of the equipment of the account, the installation client that are inputted in the account input frame at end.The target Information can be used for the server-side and determine the predetermined encryption algorithm.
Second receiving module 503, for receiving the Crypted password of the server-side return and being backfilled to the login Password Input frame.
It requests to submit module 504, for submitting the operation of logging request to the server-side in response to user, described will add Password is committed to the server-side to determine login result, and caches the Crypted password.
Specifically, module 504 is submitted in request, it can be in the submission for receiving user's click submission (Submit) logging request After button, the Crypted password is committed to the server-side to determine login result, and cache the Crypted password.
More specifically, request submit module 504, receive user click submit logging request submitting button it Afterwards, the Crypted password can be cached in the case where user selects to remember password.
A kind of entering device 500 that embodiment shown in fig. 5 provides is asked due to submitting to log in the server-side in user When the operation asked, client-cache is Crypted password that server-side encrypts original password, rather than user's input Original password, therefore the safety and reliability of original password can be improved.
It should be noted that the method that entering device 500 can be realized the embodiment of the method for Fig. 2, specifically refers to Fig. 2 institute The login method for showing embodiment, repeats no more.
As shown in fig. 6, one embodiment of this specification provides a kind of entering device 600, can be applied to shown in FIG. 1 In server-side, in a kind of Software Implementation, the entering device 600 can include: third receiving module 601, encrypting module 602, the 4th receiving module 603 and login result determining module 604.
Third receiving module 601, for receiving the original password from client, the original password is the client It is sent before user submits logging request to the server-side, and the original password is user's stepping in the client The password inputted in record Password Input frame.
Encrypting module 602 obtains Crypted password simultaneously for encrypting according to predetermined encryption algorithm to the original password It is back to the client;Wherein, the client is used to the Crypted password being backfilled to the login password input frame, and When responding operation of the user to server-side submission logging request, the Crypted password is cached.
In the first instance, encrypting module 602 is particularly used in: according to random algorithm, in the original password with The machine transplanting of rice enters at least one number and/or at least one letter, obtains Crypted password.
In second example, in order to improve the difficulty that Crypted password is cracked, encrypting module 602 is particularly used in: root According to random algorithm, at least one number of radom insertion and/or at least one letter, obtain initial encryption in the original password Password;The initial encryption password is encrypted according to md5, obtains final Crypted password.
It is appreciated that the ciphering process of md5 algorithm is irreversible, even if to make illegal user steal encryption close for this Code, it is also difficult to crack out original password, therefore can further promote the safety and reliability of original password.
Certain server-side can also encrypt the original password using other predetermined encryption algorithms, on limiting to State Encryption Algorithm described in two examples.
Optionally, before step 304, entering device 600 shown in fig. 6 can also include: target information receiving module, For receiving the target information from the client, and according to the mesh before user submits logging request to server-side Mark information determines the predetermined encryption algorithm.
Wherein, the target information can include but is not limited at least one of following message: user is in the client Mark and encryption algorithm identification of the equipment that account, the client inputted in the account input frame at end is depended on etc..
For example, encrypting module 602 can select when the target information includes installing the mark of the equipment of the client It selects and the original password is encrypted with the predetermined encryption algorithm of device identification binding, to further enhance original password Concealment, to improve the safety of original password.For another example, when the target information includes account, encrypting module 602 can be with The predetermined encryption algorithm bound with the account is selected to encrypt the original password, to further enhance the hidden of original password Covering property, to improve the safety of original password.It is appreciated that when the target information includes encryption algorithm identification, encryption Module 602 can directly encrypt the original password using the corresponding predetermined encryption algorithm of the encryption algorithm identification.
4th receiving module 603, for receiving the logging request for carrying the Crypted password from the client, Determine whether the Crypted password matches with default original password.
As an example, the 4th receiving module 603 is particularly used in: being reversible encryption calculation in the predetermined encryption algorithm When method, the Crypted password is decrypted to obtain clear crytpographic key, if the clear crytpographic key and the default original password phase Together, determine that the Crypted password is matched with the default original password;Otherwise, it determines the Crypted password with it is described preset it is original Password mismatches.
As another example, the 4th receiving module 603 is particularly used in: being irreversible add in the predetermined encryption algorithm When close algorithm, the default original password is encrypted using the predetermined encryption algorithm, is obtained with reference to Crypted password;If The Crypted password carried in the logging request is identical as the reference Crypted password, determines that is carried in the logging request adds Password is matched with the default original password;Otherwise, it determines the Crypted password carried in the logging request is preset with described Original password mismatches.
Login result determining module 604 is determined and is logged according to the matching result of the Crypted password and default original password As a result.
Specifically, determining that login result is successfully under the Crypted password and the matched situation of default original password;In Under the Crypted password and the unmatched situation of default original password, determine login result for failure.
A kind of entering device 600 that embodiment shown in fig. 6 provides, due to user to server-side submit logging request it Before, the encrypting module of server-side has carried out encryption in the original password that client inputs to user and has obtained Crypted password, and will add Password returns to client, so that Crypted password is backfilled to the defeated input frame of login password by client, in this way, in user When submitting logging request to the server-side, the password that the password and client that client is submitted to server-side are remembered is to add Password, rather than the original password of user's input, therefore the safety and reliability of original password can be improved.
It should be noted that the method that entering device 600 can be realized the embodiment of the method for Fig. 3, specifically refers to Fig. 2 institute The login method for showing embodiment, repeats no more.
Above-mentioned that this specification specific embodiment is described, other embodiments are in the scope of the appended claims It is interior.In some cases, the movement recorded in detail in the claims or step can be come according to the sequence being different from embodiment It executes and desired result still may be implemented.In addition, process depicted in the drawing not necessarily require show it is specific suitable Sequence or consecutive order are just able to achieve desired result.In some embodiments, multitasking and parallel processing be also can With or may be advantageous.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for device reality For applying example, since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to embodiment of the method Part explanation.
In short, being not intended to limit the protection of this specification the foregoing is merely the preferred embodiment of this specification Range.With within principle, made any modification, changes equivalent replacement all spirit in this specification one or more embodiment Into etc., it should be included within the protection scope of this specification one or more embodiment.
System, device, module or the unit that above-described embodiment illustrates can specifically realize by computer chip or entity, Or it is realized by the product with certain function.It is a kind of typically to realize that equipment is computer.Specifically, computer for example may be used Think personal computer, laptop computer, cellular phone, camera phone, smart phone, personal digital assistant, media play It is any in device, navigation equipment, electronic mail equipment, game console, tablet computer, wearable device or these equipment The combination of equipment.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data. The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), moves State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable Programmable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM), Digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or other magnetic storage devices Or any other non-transmission medium, can be used for storage can be accessed by a computing device information.As defined in this article, it calculates Machine readable medium does not include temporary computer readable media (transitory media), such as the data-signal and carrier wave of modulation.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability It include so that the process, method, commodity or the equipment that include a series of elements not only include those elements, but also to wrap Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic want Element.When not limiting more, the element that is limited by sentence "including a ...", it is not excluded that in the mistake including the element There is also other identical elements in journey, method, commodity or equipment.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for system reality For applying example, since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to embodiment of the method Part explanation.

Claims (17)

1. a kind of login method is applied to client, which comprises
Receive the original password that user inputs in the login password input frame of the client;
Before user submits logging request to server-side, Xiang Suoshu server-side sends the original password, so that the service End encrypts the original password according to predetermined encryption algorithm, obtains Crypted password;
It receives the Crypted password that the server-side returns and is backfilled to the login password input frame;
In response to user to the server-side submit logging request operation, by the Crypted password be committed to the server-side with It determines login result, and caches the Crypted password.
2. according to the method described in claim 1, wherein, caching the Crypted password, comprising:
In the case where password is remembered in user's selection, the Crypted password is cached.
3. according to the method described in claim 1, wherein, Xiang Suoshu server-side sends the original password, comprising:
Determine whether the original password meets cryptographic check condition;
If met, Xiang Suoshu server-side sends the original password;
If do not met, user is prompted to re-enter the original password, and to the clothes after meeting cryptographic check condition Business end sends the original password re-entered.
4. according to the method described in claim 3, wherein it is determined that whether the original password meets cryptographic check condition, comprising:
Determine whether the number of characters that the original password includes is preset characters number.
5. method according to claim 1-4, wherein before user submits logging request to server-side, to The server-side sends the original password, comprising:
After monitoring input control focus and leaving the login password input frame, and the input control focus is clicked and is logged in Before the submitting button of request, Xiang Suoshu server-side sends the original password.
6. according to the method described in claim 5, user to server-side submit logging request before, the method also includes:
Target information is sent to the server-side;
Wherein, the target information includes at least one of following message: user is in the account input frame of the client Account, the mark and encryption algorithm identification of the equipment of the installation client of input;The target information is used for the service End determines the predetermined encryption algorithm.
7. a kind of login method is applied to server-side, which comprises
The original password from client is received, the original password is that the client is stepped in user to server-side submission It is sent before record request, and to be that user inputs in the login password input frame of the client close for the original password Code;
The original password is encrypted according to predetermined encryption algorithm, Crypted password is obtained and is back to the client;Its In, the client is used to for the Crypted password being backfilled to the login password input frame, and is responding user to the clothes When the operation for end submission logging request of being engaged in, the Crypted password is cached;
The logging request for carrying the Crypted password from the client is received, determines the Crypted password and default original Whether beginning password matches;
According to the matching result of the Crypted password and default original password, login result is determined.
8. according to the method described in claim 7, wherein, being encrypted, being obtained to the original password according to predetermined encryption algorithm To Crypted password, comprising:
At least one number of radom insertion and/or at least one letter, obtain Crypted password in the original password;
The initial encryption password is encrypted according to Message Digest Algorithm 5 md5, obtains final Crypted password.
9. according to the method described in claim 7, being added being encrypted according to predetermined encryption algorithm to the original password Before password, the method also includes:
The target information from the client is received, the target information includes at least one of following message: Yong Hu The mark and Encryption Algorithm mark for the equipment that account, the client inputted in the account input frame of the client is depended on Know;
The predetermined encryption algorithm is determined according to the target information.
10. according to the method described in claim 7, wherein, according to the matching result of the Crypted password and default original password, Determine login result, comprising:
Under the Crypted password and the matched situation of default original password, determine that login result is successfully;
Under the Crypted password and the unmatched situation of default original password, determine login result for failure.
11. according to the described in any item methods of claim 7-10, wherein determine that the Crypted password is with default original password No matching, comprising:
When the predetermined encryption algorithm is irreversible cryptographic algorithm, the Crypted password is decrypted to obtain clear crytpographic key, such as Clear crytpographic key described in fruit is identical as the default original password, determines that the Crypted password is matched with the default original password; Otherwise, it determines the Crypted password and the default original password mismatch;
The predetermined encryption algorithm be irreversible encryption algorithm when, using the predetermined encryption algorithm to it is described preset it is original close Code is encrypted, and is obtained with reference to Crypted password;If the Crypted password carried in the logging request encrypts close with the reference Code is identical, determines that the Crypted password carried in the logging request is matched with the default original password;Otherwise, it determines described step on The Crypted password and the default original password carried in record request mismatches.
12. a kind of entering device, is applied to client, described device includes:
First receiving module, the original password inputted in the login password input frame of the client for receiving user;
First sending module, for before user submits logging request to server-side, Xiang Suoshu server-side to send described original Password obtains Crypted password so that the server-side encrypts the original password according to predetermined encryption algorithm;
Second receiving module, for receiving the Crypted password of the server-side return and being backfilled to the login password input Frame;
Module is submitted in request, for submitting the operation of logging request to the server-side in response to user, by the Crypted password The server-side is committed to determine login result, and caches the Crypted password.
13. a kind of entering device, is applied to server-side, described device includes:
Third receiving module, for receiving the original password from client, the original password is the client in user Transmission before logging request is submitted to the server-side, and the original password is login password of the user in the client The password inputted in input frame;
Encrypting module obtains Crypted password and is back to for being encrypted according to predetermined encryption algorithm to the original password The client;Wherein, the client is used to the Crypted password being backfilled to the login password input frame, and is responding When user submits the operation of logging request to the server-side, the Crypted password is cached;
4th receiving module determines institute for receiving the logging request for carrying the Crypted password from the client State whether Crypted password matches with default original password;
Login result determining module determines login result according to the matching result of the Crypted password and default original password.
14. a kind of electronic equipment, comprising:
Processor;And
It is arranged to the memory of storage computer executable instructions, the executable instruction makes the processor when executed Execute following operation:
Receive the original password that user inputs in the login password input frame of the client;
Before user submits logging request to server-side, Xiang Suoshu server-side sends the original password, so that the service End encrypts the original password according to predetermined encryption algorithm, obtains Crypted password;
It receives the Crypted password that the server-side returns and is backfilled to the login password input frame;
In response to user to the server-side submit logging request operation, by the Crypted password be committed to the server-side with It determines login result, and caches the Crypted password.
15. a kind of computer readable storage medium, the computer-readable recording medium storage one or more program, described one A or multiple programs are when the electronic equipment for being included multiple application programs executes, so that the electronic equipment executes following behaviour Make:
Receive the original password that user inputs in the login password input frame of the client;
Before user submits logging request to server-side, Xiang Suoshu server-side sends the original password, so that the service End encrypts the original password according to predetermined encryption algorithm, obtains Crypted password;
It receives the Crypted password that the server-side returns and is backfilled to the login password input frame;
In response to user to the server-side submit logging request operation, by the Crypted password be committed to the server-side with It determines login result, and caches the Crypted password.
16. a kind of electronic equipment, comprising:
Processor;And
It is arranged to the memory of storage computer executable instructions, the executable instruction makes the processor when executed Execute following operation:
The original password from client is received, the original password is that the client is stepped in user to server-side submission It is sent before record request, and to be that user inputs in the login password input frame of the client close for the original password Code;
The original password is encrypted according to predetermined encryption algorithm, Crypted password is obtained and is back to the client;Its In, the client is used to for the Crypted password being backfilled to the login password input frame, and is responding user to the clothes When the operation for end submission logging request of being engaged in, the Crypted password is cached;
The logging request for carrying the Crypted password from the client is received, determines the Crypted password and default original Whether beginning password matches;
According to the matching result of the Crypted password and default original password, login result is determined.
17. a kind of computer readable storage medium, the computer-readable recording medium storage one or more program, described one A or multiple programs are when the electronic equipment for being included multiple application programs executes, so that the electronic equipment executes following behaviour Make:
The original password from client is received, the original password is that the client is stepped in user to server-side submission It is sent before record request, and to be that user inputs in the login password input frame of the client close for the original password Code;
The original password is encrypted according to predetermined encryption algorithm, Crypted password is obtained and is back to the client;Its In, the client is used to for the Crypted password being backfilled to the login password input frame, and is responding user to the clothes When the operation for end submission logging request of being engaged in, the Crypted password is cached;
The logging request for carrying the Crypted password from the client is received, determines the Crypted password and default original Whether beginning password matches;
According to the matching result of the Crypted password and default original password, login result is determined.
CN201910650577.XA 2019-07-18 2019-07-18 Login method and device and electronic equipment Active CN110445768B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910650577.XA CN110445768B (en) 2019-07-18 2019-07-18 Login method and device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910650577.XA CN110445768B (en) 2019-07-18 2019-07-18 Login method and device and electronic equipment

Publications (2)

Publication Number Publication Date
CN110445768A true CN110445768A (en) 2019-11-12
CN110445768B CN110445768B (en) 2021-11-09

Family

ID=68430720

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910650577.XA Active CN110445768B (en) 2019-07-18 2019-07-18 Login method and device and electronic equipment

Country Status (1)

Country Link
CN (1) CN110445768B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111107060A (en) * 2019-11-29 2020-05-05 视联动力信息技术股份有限公司 Login request processing method, server, electronic equipment and storage medium
CN111104655A (en) * 2019-12-22 2020-05-05 苏州浪潮智能科技有限公司 BMC login method and related device
CN112101947A (en) * 2020-08-27 2020-12-18 江西台德智慧科技有限公司 Method for improving voice payment security

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103067339A (en) * 2011-10-20 2013-04-24 深圳市快播科技有限公司 Multi-account secure login method and system of client-side web games
CN103227786A (en) * 2013-04-08 2013-07-31 优视科技有限公司 Method and device for filling in website login information
CN103428221A (en) * 2013-08-26 2013-12-04 百度在线网络技术(北京)有限公司 Safety logging method, system and device of mobile application
CN105450408A (en) * 2014-08-04 2016-03-30 阿里巴巴集团控股有限公司 Password checking method and device
CN106873862A (en) * 2016-08-23 2017-06-20 阿里巴巴集团控股有限公司 A kind of data inputting method and device
CN107819751A (en) * 2017-10-27 2018-03-20 浙江码博士防伪科技有限公司 A kind of safe automated log on management system
CN108040048A (en) * 2017-12-11 2018-05-15 福建福诺移动通信技术有限公司 A kind of mobile client end subscriber dynamic secret key encryption communication method based on http protocol
CN108234458A (en) * 2017-12-21 2018-06-29 广东汇泰龙科技有限公司 Method, the system of encryption storage and the decryption extraction of a kind of cloud lock cipher
CN109362074A (en) * 2018-09-05 2019-02-19 福建福诺移动通信技术有限公司 The method of h5 and server-side safety communication in a kind of mixed mode APP
CN109409045A (en) * 2018-09-21 2019-03-01 天津海泰方圆科技有限公司 Browser automated log on account number safety guard method and device
CN109815659A (en) * 2018-12-15 2019-05-28 深圳壹账通智能科技有限公司 Safety certifying method, device, electronic equipment and storage medium based on WEB project
CN109815656A (en) * 2018-12-11 2019-05-28 平安科技(深圳)有限公司 Login authentication method, device, equipment and computer readable storage medium

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103067339A (en) * 2011-10-20 2013-04-24 深圳市快播科技有限公司 Multi-account secure login method and system of client-side web games
CN103227786A (en) * 2013-04-08 2013-07-31 优视科技有限公司 Method and device for filling in website login information
CN103428221A (en) * 2013-08-26 2013-12-04 百度在线网络技术(北京)有限公司 Safety logging method, system and device of mobile application
CN105450408A (en) * 2014-08-04 2016-03-30 阿里巴巴集团控股有限公司 Password checking method and device
CN106873862A (en) * 2016-08-23 2017-06-20 阿里巴巴集团控股有限公司 A kind of data inputting method and device
CN107819751A (en) * 2017-10-27 2018-03-20 浙江码博士防伪科技有限公司 A kind of safe automated log on management system
CN108040048A (en) * 2017-12-11 2018-05-15 福建福诺移动通信技术有限公司 A kind of mobile client end subscriber dynamic secret key encryption communication method based on http protocol
CN108234458A (en) * 2017-12-21 2018-06-29 广东汇泰龙科技有限公司 Method, the system of encryption storage and the decryption extraction of a kind of cloud lock cipher
CN109362074A (en) * 2018-09-05 2019-02-19 福建福诺移动通信技术有限公司 The method of h5 and server-side safety communication in a kind of mixed mode APP
CN109409045A (en) * 2018-09-21 2019-03-01 天津海泰方圆科技有限公司 Browser automated log on account number safety guard method and device
CN109815656A (en) * 2018-12-11 2019-05-28 平安科技(深圳)有限公司 Login authentication method, device, equipment and computer readable storage medium
CN109815659A (en) * 2018-12-15 2019-05-28 深圳壹账通智能科技有限公司 Safety certifying method, device, electronic equipment and storage medium based on WEB project

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111107060A (en) * 2019-11-29 2020-05-05 视联动力信息技术股份有限公司 Login request processing method, server, electronic equipment and storage medium
CN111104655A (en) * 2019-12-22 2020-05-05 苏州浪潮智能科技有限公司 BMC login method and related device
CN111104655B (en) * 2019-12-22 2023-01-10 苏州浪潮智能科技有限公司 BMC login method and related device
CN112101947A (en) * 2020-08-27 2020-12-18 江西台德智慧科技有限公司 Method for improving voice payment security

Also Published As

Publication number Publication date
CN110445768B (en) 2021-11-09

Similar Documents

Publication Publication Date Title
US10491379B2 (en) System, device, and method of secure entry and handling of passwords
US9577829B1 (en) Multi-party computation services
US7748031B2 (en) Mass storage device with automated credentials loading
CN112333198A (en) Secure cross-domain login method, system and server
CN103051451A (en) Encryption authentication of security service execution environment
CN110445768A (en) A kind of login method, device and electronic equipment
CN103338219A (en) Terminal device performance evaluation information acquisition and processing method, and corresponding device and processing system thereof
US10885516B2 (en) Secure validation using hardware security modules
US11128453B2 (en) Visual image authentication
CN113574828A (en) Security chip, security processing method and related equipment
US11258819B1 (en) Security scoring based on multi domain telemetry data
CN107835075A (en) The processing method and processing device of local password
US20200153827A1 (en) Reputation tracking based on token exchange
US10990982B2 (en) Authenticating a payment card
US20220286291A1 (en) Secure environment for cryptographic key generation
CN109547404B (en) Data acquisition method and server
US11379618B2 (en) Secure sensitive personal information dependent transactions
KR102102179B1 (en) Embedded system, authentication system comprising the same, method of authenticating the system
US20220353081A1 (en) User authentication techniques across applications on a user device
US20180341402A1 (en) Method for executing of security keyboard, apparatus and system for executing the method
CN101110098A (en) Generation and management method for digital content use trace based on reliable computing technology
CN114448722A (en) Cross-browser login method and device, computer equipment and storage medium
US20150007293A1 (en) User authentication utilizing patterns
WO2019224516A1 (en) Authenticating an entity
Henzl et al. A security formal verification method for protocols using cryptographic contactless smart cards

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20201012

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Applicant after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Applicant before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20201012

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Applicant after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Applicant before: Alibaba Group Holding Ltd.

GR01 Patent grant
GR01 Patent grant