CN111181927A - Login method and server - Google Patents
Login method and server Download PDFInfo
- Publication number
- CN111181927A CN111181927A CN201911279552.XA CN201911279552A CN111181927A CN 111181927 A CN111181927 A CN 111181927A CN 201911279552 A CN201911279552 A CN 201911279552A CN 111181927 A CN111181927 A CN 111181927A
- Authority
- CN
- China
- Prior art keywords
- login
- abnormal
- mode
- modes
- preset time
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/14—Network analysis or design
- H04L41/142—Network analysis or design using statistical or mathematical methods
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/16—Threshold monitoring
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mathematical Physics (AREA)
- Probability & Statistics with Applications (AREA)
- Pure & Applied Mathematics (AREA)
- Mathematical Optimization (AREA)
- Mathematical Analysis (AREA)
- General Physics & Mathematics (AREA)
- Algebra (AREA)
- Physics & Mathematics (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The invention discloses a login method and a server, which are used for acquiring all dependent services of each login mode and acquiring a dependent service list of each login mode; recording the first abnormal times of each dependent service in each login mode of the current user within first preset time, judging whether the first abnormal times within the first preset time reach a first preset threshold value, and inquiring other login modes associated with the current login credentials according to the received current login credentials if the first abnormal times within the first preset time reach the first preset threshold value; returning a login mode which can normally provide login service; according to the invention, the abnormal login mode is eliminated, so that the user is guided to log in by using other login modes capable of logging in normally, and the usability of the login system and the experience of the user are improved.
Description
Technical Field
The invention relates to the technical field of internet, in particular to a login method and a server.
Background
In the current user side application products, there are various login methods, such as username and password login, sms login, code scanning login, H5 and applet login, and various third party login methods. Different login modes have different dependency relationships with other services, such as the user name and password login depends on the cache and the database function of a rear end, the short message login depends on the stability of a short message channel, the third party login strongly depends on the services of various third party platforms, namely, each login mode may depend on one or more dependent services of the rear end, and when the dependent services have problems, a certain login mode cannot be used.
In our old program, the general processing mode is that when the login is not available or the service is abnormal, the abnormality is directly thrown out, and the front end replaces corresponding information according to the abnormal code information or directly uses the abnormal information to prompt a user. For example, when the short message channel is abnormal, the short message cannot be sent out, the short message login failure or the short message login cannot be performed is directly prompted, then, the user either tries the short message login until the login is successful, or abandons the login, and therefore the user experience is poor.
Disclosure of Invention
The technical problem to be solved by the invention is as follows: a login method and a server are provided to improve user experience and usability of a login system.
In order to solve the technical problems, the invention adopts the technical scheme that:
a login method, comprising the steps of:
s1, acquiring all dependent services of each login mode to obtain a dependent service list of each login mode;
s2, recording the first abnormal times of each dependent service in each login mode of the current user within first preset time, judging whether the first abnormal times within the first preset time reaches a first preset threshold value, and if so, inquiring other login modes associated with the current login credentials according to the received current login credentials;
and S3, returning the login mode which can normally provide the login service.
In order to solve the technical problem, the invention adopts another technical scheme as follows:
a login server comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor implementing the following steps when executing the computer program:
s1, acquiring all dependent services of each login mode to obtain a dependent service list of each login mode;
s2, recording the first abnormal times of each dependent service in each login mode of the current user within first preset time, judging whether the first abnormal times within the first preset time reaches a first preset threshold value, and if so, inquiring other login modes associated with the current login credentials according to the received current login credentials;
and S3, returning the login mode which can normally provide the login service.
The invention has the beneficial effects that: a login method and a server side are characterized in that a first abnormal frequency of each dependent service in each login mode of a current user within first preset time is recorded, when the first abnormal frequency within the first preset time reaches a first preset threshold value, other login modes related to a current login certificate are inquired according to the received current login certificate, and a login mode capable of normally providing login services is returned, namely the returned login mode eliminates the login mode in which the first abnormal frequency within the first preset time reaches the first preset threshold value, so that the user is guided to log in by using other login modes capable of normally logging in, and the availability of a login system and the experience of the user are improved.
Drawings
Fig. 1 is a schematic flowchart of a login method according to an embodiment of the present invention;
fig. 2 is a schematic diagram illustrating a connection between a login server and a user according to an embodiment of the present invention.
Description of reference numerals:
1. a login server; 2. a processor; 3. a memory; 4. and a user side.
Detailed Description
In order to explain technical contents, achieved objects, and effects of the present invention in detail, the following description is made with reference to the accompanying drawings in combination with the embodiments.
Referring to fig. 1, a login method includes the steps of:
s1, acquiring all dependent services of each login mode to obtain a dependent service list of each login mode;
s2, recording the first abnormal times of each dependent service in each login mode of the current user within first preset time, judging whether the first abnormal times within the first preset time reaches a first preset threshold value, and if so, inquiring other login modes associated with the current login credentials according to the received current login credentials;
and S3, returning the login mode which can normally provide the login service.
From the above description, the beneficial effects of the present invention are: the method comprises the steps of recording the first abnormal times of each dependent service in each login mode of a current user within first preset time, inquiring other login modes associated with the current login certificate according to the received current login certificate when the first abnormal times within the first preset time reach a first preset threshold value, and returning the login modes capable of normally providing login services, namely eliminating the login modes with the first abnormal times within the first preset time reaching the first preset threshold value, so as to guide the user to log in by using other login modes capable of normally logging in, thereby improving the availability of a login system and the experience of the user.
Further, the step S2 is specifically:
s21, obtaining login abnormal information, inquiring whether an abnormal record corresponding to the login abnormal information exists according to the login mode of the current user and the abnormal dependent service, if so, accumulating the first abnormal data in the abnormal record, if not, adding the abnormal record, and setting the initial value of the first abnormal data in the added abnormal record to be 1;
s22, setting a first preset time for each time of login abnormal information, and removing statistics of the login abnormal information in the first abnormal data if the login abnormal information reaches the first preset time;
s23, judging whether the first abnormal data reach a first preset threshold value, if so, inquiring a related user ID according to the current login credential, inquiring other login credentials according to the user ID, and inquiring other login modes according to the other login credentials.
It can be known from the above description that, when a user logs in at a user side, if an abnormal phenomenon occurs, the abnormal times of the dependent service in the first preset time are recorded for the dependent service causing the abnormality, and when the abnormal times are reached, the dependent service is considered to be abnormal, that is, the login mode corresponding to the dependent service cannot be normally used, at this time, the associated user ID is queried according to the current user login credential, other login credentials are queried according to the user ID, and then other login modes of the user can be queried. Therefore, whether the login mode is available or not can be judged more accurately by depending on the service, and other login credentials of the user can be comprehensively and accurately searched by associating the user ID, so that the login mode in which the user can normally log in can be accurately obtained.
Further, the step S2 further includes:
marking the login mode that the first abnormal times in the first preset time reach a first preset threshold value as an unavailable login mode;
the step S3 specifically includes:
and judging whether the other login modes have unavailable login modes, if so, removing the unavailable login modes from the other login modes to obtain and return the available login modes.
As can be seen from the above description, the login manner in which the first abnormal number of times within the first preset time reaches the first preset threshold is marked as the unavailable login manner, so that the returned login manner does not include the unavailable login manner, and thus the returned login manner is the login manner capable of normally providing the login service, and the availability of the login system and the experience of the user are improved.
Further, the step S2 further includes:
receiving login information and regional coding information, wherein the regional coding information is coding information of a region where a user side obtains according to positioning information;
recording the second abnormal times of each login mode in each regional code information within second preset time, judging whether the second abnormal times within the second preset time reach a second preset threshold value, and if so, marking the login mode of which the second abnormal times within the second preset time reach the second preset threshold value as a regional abnormal login mode;
the step S3 further includes:
and returning a login mode which can normally provide login service, and prompting the abnormal region login mode.
It can be known from the above description that, when logging in, the server carries area code information to the server, and after receiving the area code information, the server counts the number of abnormal times corresponding to the area code information to determine the logging status of a certain logging mode in a certain area, and when the certain logging mode in the certain area is abnormal, only the user logging in the area is prompted for abnormality, so as to avoid wasting time and reducing user experience due to the abnormal logging mode in the area, thereby more quickly implementing normal logging service.
Further, in step S3, specifically, the method includes:
and judging whether the other login modes have the area abnormal login mode, if so, removing the area abnormal login mode from the other login modes to obtain and return the available login mode.
As can be seen from the above description, the area abnormal registration method is directly masked, but the case where the area abnormal registration method is masked is explained as necessary at the registration interface, so that the user can understand the reason why the area abnormal registration method is masked, thereby improving the user experience.
Referring to fig. 2, a login server includes a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor executes the computer program to implement the following steps:
s1, acquiring all dependent services of each login mode to obtain a dependent service list of each login mode;
s2, recording the first abnormal times of each dependent service in each login mode of the current user within first preset time, judging whether the first abnormal times within the first preset time reaches a first preset threshold value, and if so, inquiring other login modes associated with the current login credentials according to the received current login credentials;
and S3, returning the login mode which can normally provide the login service.
From the above description, the beneficial effects of the present invention are: the method comprises the steps of recording the first abnormal times of each dependent service in each login mode of a current user within first preset time, inquiring other login modes associated with the current login certificate according to the received current login certificate when the first abnormal times within the first preset time reach a first preset threshold value, and returning the login modes capable of normally providing login services, namely eliminating the login modes with the first abnormal times within the first preset time reaching the first preset threshold value, so as to guide the user to log in by using other login modes capable of normally logging in, thereby improving the availability of a login system and the experience of the user.
Further, when the processor executes the step S2 of the computer program, the following steps are specifically implemented:
s21, obtaining login abnormal information, inquiring whether an abnormal record corresponding to the login abnormal information exists according to the login mode of the current user and the abnormal dependent service, if so, accumulating the first abnormal data in the abnormal record, if not, adding the abnormal record, and setting the initial value of the first abnormal data in the added abnormal record to be 1;
s22, setting a first preset time for each time of login abnormal information, and removing statistics of the login abnormal information in the first abnormal data if the login abnormal information reaches the first preset time;
s23, judging whether the first abnormal data reach a first preset threshold value, if so, inquiring a related user ID according to the current login credential, inquiring other login credentials according to the user ID, and inquiring other login modes according to the other login credentials.
It can be known from the above description that, when a user logs in at a user side, if an abnormal phenomenon occurs, the abnormal times of the dependent service in the first preset time are recorded for the dependent service causing the abnormality, and when the abnormal times are reached, the dependent service is considered to be abnormal, that is, the login mode corresponding to the dependent service cannot be normally used, at this time, the associated user ID is queried according to the current user login credential, other login credentials are queried according to the user ID, and then other login modes of the user can be queried. Therefore, whether the login mode is available or not can be judged more accurately by depending on the service, and other login credentials of the user can be comprehensively and accurately searched by associating the user ID, so that the login mode in which the user can normally log in can be accurately obtained.
Further, the processor, when executing the step S2 of the computer program, further includes implementing the following steps:
marking the login mode that the first abnormal times in the first preset time reach a first preset threshold value as an unavailable login mode;
when the processor executes the step S3 of the computer program, the following steps are specifically implemented:
and judging whether the other login modes have unavailable login modes, if so, removing the unavailable login modes from the other login modes to obtain and return the available login modes.
As can be seen from the above description, the login manner in which the first abnormal number of times within the first preset time reaches the first preset threshold is marked as the unavailable login manner, so that the returned login manner does not include the unavailable login manner, and thus the returned login manner is the login manner capable of normally providing the login service, and the availability of the login system and the experience of the user are improved.
Further, the processor, when executing the step S2 of the computer program, further includes implementing the following steps:
receiving login information and regional coding information, wherein the regional coding information is coding information of a region where a user side obtains according to positioning information;
recording the second abnormal times of each login mode in each regional code information within second preset time, judging whether the second abnormal times within the second preset time reach a second preset threshold value, and if so, marking the login mode of which the second abnormal times within the second preset time reach the second preset threshold value as a regional abnormal login mode;
the step S3 of the processor executing the computer program further comprises implementing the steps of:
and returning a login mode which can normally provide login service, and prompting the abnormal region login mode.
It can be known from the above description that, when logging in, the server carries area code information to the server, and after receiving the area code information, the server counts the number of abnormal times corresponding to the area code information to determine the logging status of a certain logging mode in a certain area, and when the certain logging mode in the certain area is abnormal, only the user logging in the area is prompted for abnormality, so as to avoid wasting time and reducing user experience due to the abnormal logging mode in the area, thereby more quickly implementing normal logging service.
Further, when the processor executes the step S3 of the computer program, the following steps are specifically implemented:
and judging whether the other login modes have the area abnormal login mode, if so, removing the area abnormal login mode from the other login modes to obtain and return the available login mode.
As can be seen from the above description, the area abnormal registration method is directly masked, but the case where the area abnormal registration method is masked is explained as necessary at the registration interface, so that the user can understand the reason why the area abnormal registration method is masked, thereby improving the user experience.
Referring to fig. 1, a first embodiment of the present invention is:
in this embodiment, the description is made by using short message login, but in other equivalent embodiments, the login may be performed by using a username and password method, a code scanning login, H5 and applet login, and various third party login methods.
A login method, comprising the steps of:
s1, acquiring all the dependent services of each login manner, and obtaining a list of the dependent services of each login manner, i.e. analyzing each login manner, and counting up all the dependent services, in this embodiment, the short message logs in the dependent short message database, the short message cache, and the short message channel have 3 dependent services;
s2, recording the first abnormal times of each dependent service in each login mode of the current user within first preset time, judging whether the first abnormal times within the first preset time reaches a first preset threshold value, and if so, inquiring other login modes associated with the current login credentials according to the received current login credentials;
the method comprises the following specific steps:
s21, obtaining login abnormal information, inquiring whether an abnormal record corresponding to the current user exists according to the login mode of the current user and the abnormal dependent service, if so, accumulating the first abnormal data in the abnormal record, if not, adding the abnormal record newly, setting the initial value of the first abnormal data in the newly added abnormal record to be 1, assuming that the short message is logged in to be sms, the short message database is data, the short message cache is cache, and the short message channel is channel, namely, when the dependent service is in error or abnormal, inquiring into the service cache according to the login type _ dependent service key in advance, if not, adding the record newly, and if so, adding +1 on the basis of the old value;
s22, setting a first preset time for each login abnormal information, and if the login abnormal information reaches the first preset time, removing statistics of the login abnormal information from the first abnormal data, that is, setting a cache expiration time for the login abnormal information, where in this embodiment, the first preset time is any value within 10 seconds to 3 minutes;
s23, judging whether the first abnormal data reaches a first preset threshold value, if so, inquiring related user ID according to the current login credential, inquiring other login credentials according to the user ID, inquiring other login modes according to the other login credentials, marking the login mode of which the first abnormal times reaches the first preset threshold value within first preset time as an unavailable login mode, for example, if the first abnormal data of sms _ channel reaches 3 times in the embodiment, judging that a short message channel depended by short message login is unavailable, namely, the short message login is unavailable, inquiring the user ID according to the current login credentials of the user such as mobile phone number, login name and third party open _ ID, and inquiring other login credentials according to the user ID so as to obtain other login modes of the user;
and S3, returning a login mode capable of normally providing login service, specifically, judging whether other login modes have unavailable login modes, if so, removing the unavailable login modes from the other login modes to obtain and return the available login modes, namely removing the unavailable login modes from the service cache, so that the login modes in the information returned to the user side are all login modes which are considered by the system to normally provide login service.
Therefore, whether the login mode is available or not can be judged more accurately by judging the dependence service corresponding to the login mode, other login credentials of the user can be comprehensively and accurately searched by associating the user ID, the unavailable login mode is eliminated, the returned login modes are all login modes capable of normally providing the login service, and the usability of the login system and the experience of the user are comprehensively improved.
Referring to fig. 1, the second embodiment of the present invention is:
in this embodiment, the description is made by using short message login, but in other equivalent embodiments, the login may be performed by using a username and password method, a code scanning login, H5 and applet login, and various third party login methods.
A login method, based on the first embodiment, the step S2 further includes:
receiving login information and area coding information, wherein the area coding information is the coding information of the area where the user terminal obtains according to the positioning information, and in the embodiment, it is assumed that the coding information of the area where the user terminal obtains according to the positioning information is 350101, namely, the area is a tympanites district in fuzhou city;
recording the second abnormal times of each login mode in each regional code information within second preset time, judging whether the second abnormal times within the second preset time reaches a second preset threshold, if so, marking the login mode that the second abnormal times within the second preset time reaches the second preset threshold as a regional abnormal login mode, in the embodiment, 350101_ sms is used as a key, and the abnormal times are used as values for counting, at the moment, if the user with the regional code information of 350101 fails to log in the short message for more than 10 times within one minute, the short message login with the regional code information of 350101 is considered to be abnormal;
step S3 further includes:
and returning a login mode capable of normally providing login service, prompting the abnormal area login mode, specifically, judging whether the abnormal area login mode exists in other login modes, if so, removing the abnormal area login mode from the other login modes to obtain and return an available login mode, and prompting the abnormal area login mode.
Therefore, when a certain login mode in a certain area is abnormal, only the user login in the area is subjected to abnormal prompt, so that the time waste and the user experience sense reduction caused by the abnormal login mode in the area are avoided, the normal login service is realized more quickly, and for users in other areas, the normal login service can be normally used without being influenced by the abnormal login mode in the certain area, namely, the usability of the login system and the user experience sense can be further improved on the whole.
It should be noted that the abnormal times refer to system service abnormality, such as a password error, a user name absence and other normal service execution failures, which do not belong to login abnormality; in addition, the preset time may be a whole time of the interval, such as nine o ' clock to nine o ' clock, or a real time, such as nine o ' clock to nine o ' clock, and the next second becomes nine o ' clock to one second.
Referring to fig. 2, a third embodiment of the present invention is:
a login server 1 comprises a memory 3, a processor 2 and a computer program which is stored on the memory 3 and can run on the processor 2, and the steps in the first embodiment or the second embodiment are realized when the processor 2 executes the computer program.
Correspondingly, the login system comprises a user terminal 4 corresponding to a login server 1, and the user performs login operation on the user terminal 4 so as to communicate with the login server 1 in real time to complete login service.
In summary, according to the login method and the server provided by the present invention, by recording the first abnormal times of each dependent service in the first preset time in each login manner of the current user, when the first abnormal times in the first preset time reaches the first preset threshold, the other login manners associated with the current login credential can be comprehensively and accurately queried according to the user ID associated with the received current login credential, the login status of a certain login manner in a certain area is determined by counting the abnormal times corresponding to the region coding information, when the certain login manner in the certain area is abnormal, the user login in the area is abnormally prompted, the user in other areas is normally used, and finally the login manner capable of normally providing the login service is returned, i.e. the returned login manner removes the unavailable login manner and the area abnormal login manner, the user is guided to log in by using other login modes which can log in normally, so that the usability of the login system and the experience of the user are improved comprehensively.
The above description is only an embodiment of the present invention, and not intended to limit the scope of the present invention, and all equivalent changes made by using the contents of the present specification and the drawings, or applied directly or indirectly to the related technical fields, are included in the scope of the present invention.
Claims (10)
1. A login method, comprising the steps of:
s1, acquiring all dependent services of each login mode to obtain a dependent service list of each login mode;
s2, recording the first abnormal times of each dependent service in each login mode of the current user within first preset time, judging whether the first abnormal times within the first preset time reaches a first preset threshold value, and if so, inquiring other login modes associated with the current login credentials according to the received current login credentials;
and S3, returning the login mode which can normally provide the login service.
2. The login method according to claim 1, wherein the step S2 specifically comprises:
s21, obtaining login abnormal information, inquiring whether an abnormal record corresponding to the login abnormal information exists according to the login mode of the current user and the abnormal dependent service, if so, accumulating the first abnormal data in the abnormal record, if not, adding the abnormal record, and setting the initial value of the first abnormal data in the added abnormal record to be 1;
s22, setting a first preset time for each time of login abnormal information, and removing statistics of the login abnormal information in the first abnormal data if the login abnormal information reaches the first preset time;
s23, judging whether the first abnormal data reach a first preset threshold value, if so, inquiring a related user ID according to the current login credential, inquiring other login credentials according to the user ID, and inquiring other login modes according to the other login credentials.
3. The login method according to claim 1, wherein the step S2 further comprises:
marking the login mode that the first abnormal times in the first preset time reach a first preset threshold value as an unavailable login mode;
the step S3 specifically includes:
and judging whether the other login modes have unavailable login modes, if so, removing the unavailable login modes from the other login modes to obtain and return the available login modes.
4. The login method according to claim 1, wherein the step S2 further comprises:
receiving login information and regional coding information, wherein the regional coding information is coding information of a region where a user side obtains according to positioning information;
recording the second abnormal times of each login mode in each regional code information within second preset time, judging whether the second abnormal times within the second preset time reach a second preset threshold value, and if so, marking the login mode of which the second abnormal times within the second preset time reach the second preset threshold value as a regional abnormal login mode;
the step S3 further includes:
and returning a login mode which can normally provide login service, and prompting the abnormal region login mode.
5. The login method according to claim 4, wherein the step S3 specifically comprises:
and judging whether the other login modes have the area abnormal login mode, if so, removing the area abnormal login mode from the other login modes to obtain and return the available login mode.
6. A login server comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein the processor executes the computer program to perform the steps of:
s1, acquiring all dependent services of each login mode to obtain a dependent service list of each login mode;
s2, recording the first abnormal times of each dependent service in each login mode of the current user within first preset time, judging whether the first abnormal times within the first preset time reaches a first preset threshold value, and if so, inquiring other login modes associated with the current login credentials according to the received current login credentials;
and S3, returning the login mode which can normally provide the login service.
7. The login server according to claim 6, wherein the processor, when executing the step S2 of the computer program, implements the following steps:
s21, obtaining login abnormal information, inquiring whether an abnormal record corresponding to the login abnormal information exists according to the login mode of the current user and the abnormal dependent service, if so, accumulating the first abnormal data in the abnormal record, if not, adding the abnormal record, and setting the initial value of the first abnormal data in the added abnormal record to be 1;
s22, setting a first preset time for each time of login abnormal information, and removing statistics of the login abnormal information in the first abnormal data if the login abnormal information reaches the first preset time;
s23, judging whether the first abnormal data reach a first preset threshold value, if so, inquiring a related user ID according to the current login credential, inquiring other login credentials according to the user ID, and inquiring other login modes according to the other login credentials.
8. The login server according to claim 6, wherein the processor when executing the step S2 of the computer program further comprises implementing the following steps:
marking the login mode that the first abnormal times in the first preset time reach a first preset threshold value as an unavailable login mode;
when the processor executes the step S3 of the computer program, the following steps are specifically implemented:
and judging whether the other login modes have unavailable login modes, if so, removing the unavailable login modes from the other login modes to obtain and return the available login modes.
9. The login server according to claim 6, wherein the processor when executing the step S2 of the computer program further comprises implementing the following steps:
receiving login information and regional coding information, wherein the regional coding information is coding information of a region where a user side obtains according to positioning information;
recording the second abnormal times of each login mode in each regional code information within second preset time, judging whether the second abnormal times within the second preset time reach a second preset threshold value, and if so, marking the login mode of which the second abnormal times within the second preset time reach the second preset threshold value as a regional abnormal login mode;
the step S3 of the processor executing the computer program further comprises implementing the steps of:
and returning a login mode which can normally provide login service, and prompting the abnormal region login mode.
10. The login server according to claim 9, wherein the processor implements the following steps when executing the step S3 of the computer program:
and judging whether the other login modes have the area abnormal login mode, if so, removing the area abnormal login mode from the other login modes to obtain and return the available login mode.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911279552.XA CN111181927B (en) | 2019-12-13 | 2019-12-13 | Login method and server |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911279552.XA CN111181927B (en) | 2019-12-13 | 2019-12-13 | Login method and server |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111181927A true CN111181927A (en) | 2020-05-19 |
CN111181927B CN111181927B (en) | 2021-12-28 |
Family
ID=70657286
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911279552.XA Active CN111181927B (en) | 2019-12-13 | 2019-12-13 | Login method and server |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111181927B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112346793A (en) * | 2020-09-18 | 2021-02-09 | 长沙市到家悠享网络科技有限公司 | Data processing method and device, electronic equipment and computer readable medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150189080A1 (en) * | 2014-01-02 | 2015-07-02 | Chung-Yu Lin | Authentication method and system for screening network caller ID spoofs and malicious phone calls |
CN107438049A (en) * | 2016-05-25 | 2017-12-05 | 百度在线网络技术(北京)有限公司 | A kind of malice logs in recognition methods and device |
CN108462704A (en) * | 2018-02-27 | 2018-08-28 | 平安科技(深圳)有限公司 | Login validation method, device, computer equipment and storage medium |
US10078851B2 (en) * | 2015-01-13 | 2018-09-18 | Live Nation Entertainment, Inc. | Systems and methods for leveraging social queuing to identify and prevent ticket purchaser simulation |
CN109862029A (en) * | 2019-03-01 | 2019-06-07 | 论客科技(广州)有限公司 | A kind of method and system of the reply Brute Force behavior using big data analysis |
-
2019
- 2019-12-13 CN CN201911279552.XA patent/CN111181927B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150189080A1 (en) * | 2014-01-02 | 2015-07-02 | Chung-Yu Lin | Authentication method and system for screening network caller ID spoofs and malicious phone calls |
US10078851B2 (en) * | 2015-01-13 | 2018-09-18 | Live Nation Entertainment, Inc. | Systems and methods for leveraging social queuing to identify and prevent ticket purchaser simulation |
CN107438049A (en) * | 2016-05-25 | 2017-12-05 | 百度在线网络技术(北京)有限公司 | A kind of malice logs in recognition methods and device |
CN108462704A (en) * | 2018-02-27 | 2018-08-28 | 平安科技(深圳)有限公司 | Login validation method, device, computer equipment and storage medium |
CN109862029A (en) * | 2019-03-01 | 2019-06-07 | 论客科技(广州)有限公司 | A kind of method and system of the reply Brute Force behavior using big data analysis |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112346793A (en) * | 2020-09-18 | 2021-02-09 | 长沙市到家悠享网络科技有限公司 | Data processing method and device, electronic equipment and computer readable medium |
CN112346793B (en) * | 2020-09-18 | 2024-05-07 | 长沙市到家悠享网络科技有限公司 | Data processing method, device, electronic equipment and computer readable medium |
Also Published As
Publication number | Publication date |
---|---|
CN111181927B (en) | 2021-12-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105847447B (en) | Message pushing method and device | |
CN110417747B (en) | Method and device for detecting violent cracking behavior | |
US9197646B2 (en) | Verifying source of email | |
CN106572081B (en) | The method of logon rights verifying | |
CN106656998B (en) | server communication method and device | |
US9680814B2 (en) | Method, device, and system for registering terminal application | |
CN106534119A (en) | Method and device for prompting client software login information | |
KR102060262B1 (en) | Method and apparatus for recognizing service request for changing mobile phone number | |
US20070174462A1 (en) | Reporting information to a network | |
CN111181927B (en) | Login method and server | |
CN115396192A (en) | User identity verification method and device, computer equipment and storage medium | |
CN115529154A (en) | Login management method, login management device, electronic device and readable storage medium | |
CN109547427A (en) | Black list user's recognition methods, device, computer equipment and storage medium | |
CN107872688B (en) | Method and system for counting authorization data of television function items | |
EP3079329B1 (en) | Terminal application registration method, device and system | |
CN113067802A (en) | User identification method, device, equipment and computer readable storage medium | |
CN111585978A (en) | Method, client, server and system for intercepting false requests | |
CN106685914A (en) | Information authentication method, server and client | |
CN108449367B (en) | Method and device for managing user login security, electronic equipment and readable medium | |
CN112929397B (en) | User information processing method and device, computer equipment and storage medium | |
CN107786525B (en) | Account verification method and device for webpage | |
CN110087201B (en) | Information processing method, device and storage medium | |
US8380165B1 (en) | Identifying a cloned mobile device in a communications network | |
CN116707844A (en) | Behavior tracking method and device based on public account number, electronic equipment and medium | |
CN107959683B (en) | User name locking method and server |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |