CN111600888B - Method and device for login verification and login verification system - Google Patents

Method and device for login verification and login verification system Download PDF

Info

Publication number
CN111600888B
CN111600888B CN202010418937.6A CN202010418937A CN111600888B CN 111600888 B CN111600888 B CN 111600888B CN 202010418937 A CN202010418937 A CN 202010418937A CN 111600888 B CN111600888 B CN 111600888B
Authority
CN
China
Prior art keywords
account
login
request information
local area
area network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010418937.6A
Other languages
Chinese (zh)
Other versions
CN111600888A (en
Inventor
匡东波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Haier Uplus Intelligent Technology Beijing Co Ltd
Original Assignee
Haier Uplus Intelligent Technology Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Haier Uplus Intelligent Technology Beijing Co Ltd filed Critical Haier Uplus Intelligent Technology Beijing Co Ltd
Priority to CN202010418937.6A priority Critical patent/CN111600888B/en
Publication of CN111600888A publication Critical patent/CN111600888A/en
Application granted granted Critical
Publication of CN111600888B publication Critical patent/CN111600888B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication

Abstract

The application relates to the technical field of internet and discloses a method for login verification. The method for login verification comprises the following steps: the method comprises the steps that an intelligent device requesting to log in an account sends first login request information to a server, the server sends second login request information to the intelligent device already logging in the account in a local area network, the intelligent device already logging in the account sends a verification result to the server, the server sends a user token to the intelligent device requesting to log in the account under the condition that the verification result meets a preset condition, and the intelligent device requesting to log in the account logs in the account according to the user token. By adopting the method for login verification, the convenience of logging in the account on the intelligent equipment of the home network can be improved. The application also discloses a device and a system for login verification.

Description

Method and device for login verification and login verification system
Technical Field
The present application relates to the field of internet technologies, and for example, to a method, an apparatus, and a system for login authentication.
Background
At present, code scanning login is a mobile phone client application that a user installs and logs in a certain service on a mobile phone, when other providing terminals (a computer, a flat panel or a television and the like) of the service need the user to log in an account, the other providing terminals of the service display a two-dimensional code, the user can realize the login of the account by using the mobile phone client to scan the code, the input of a complex user name and a complex password is avoided, and the method is quick and obvious in safety.
In the process of implementing the embodiments of the present disclosure, it is found that at least the following problems exist in the related art:
in the code scanning login manner, verification needs to be performed one-to-one, for example, in a process of scanning a two-dimensional code of account equipment to be logged in by using a corresponding client in a mobile phone to realize login, the client in the mobile phone needs to correspond to the equipment to be logged in one-to-one. In an intelligent home application scene, under the condition that intelligent equipment in a home network needs to log in an account, the intelligent equipment cannot log in the account conveniently by adopting the login mode.
Disclosure of Invention
The following presents a simplified summary in order to provide a basic understanding of some aspects of the disclosed embodiments. This summary is not an extensive overview nor is intended to identify key/critical elements or to delineate the scope of such embodiments but rather as a prelude to the more detailed description that is presented later.
The embodiment of the disclosure provides a method and a device for login verification and a login verification system, which are used for solving the technical problem of inconvenience when an account is logged in on intelligent equipment of a home network.
In some embodiments, a method for login verification is applied to a smart device requesting to login to an account, the method comprising:
sending first login request information; the first login request information comprises first equipment information of intelligent equipment requesting to login an account and an address of a local area network router;
receiving a returned user token;
and logging in an account according to the user token.
In some embodiments, a method for login verification is applied to a server, the method comprising:
receiving first login request information; the first login request information comprises first equipment information of intelligent equipment requesting to login an account and an address of a local area network router;
sending second login request information according to the address of the local area network router;
and sending the user token under the condition that a preset condition is met.
In some embodiments, a method for login verification is applied to a smart device for a logged-in account, the method comprising:
receiving second login request information, wherein the second login request information is forwarded after a local area network router receives first login request information, and the first login request information comprises first equipment information of intelligent equipment requesting to login an account and an address of the local area network router;
obtaining a verification result of the second login request information;
and sending the verification result.
In some embodiments, the apparatus for login authentication is applied to a smart device requesting to login to an account, the apparatus comprising:
a first sending module configured to send first login request information; the first login request information comprises first equipment information of intelligent equipment requesting to login an account and an address of a local area network router;
a first receiving module configured to receive a returned user token;
an account login module configured to log in to an account according to the user token.
In some embodiments, the apparatus for login authentication is applied to a server, the apparatus comprising:
a second receiving module configured to receive the first login request information; the first login request information comprises first equipment information of intelligent equipment requesting to login an account and an address of a local area network router;
the second sending module is configured to send second login request information according to the address of the local area network router;
and the third sending module is configured to send the user token under the condition that a preset condition is met.
In some embodiments, the means for login verification is applied to a smart device for a logged-in account, the means comprising:
the fourth receiving module is configured to receive second login request information, wherein the second login request information is forwarded after the local area network router receives first login request information, and the first login request information comprises first device information of the intelligent device requesting to login an account and an address of the local area network router;
an obtaining module configured to obtain a verification result of the second login request information;
a fourth transmitting module configured to transmit the verification result.
In some embodiments, a device for login authentication comprises a processor and a memory storing program instructions, the processor being configured to, when executing the program instructions, perform the method for login authentication provided by the preceding embodiments.
In some embodiments, the login authentication system comprises the means for login authentication provided by the previous embodiments.
The method, the device and the system for login verification provided by the embodiment of the disclosure can realize the following technical effects:
when the intelligent device in the local area network needs to log in, the intelligent device requesting to log in the account sends login request information comprising the address of the router of the local area network, whether the account can be logged in on the intelligent device requesting to log in the account can be confirmed through the intelligent device of the logged in account in the local area network, and in the process, the login request information of the intelligent device requesting to log in the account is not verified through the unique client side, but is verified through any intelligent device of the logged in account in the local area network. Therefore, when the intelligent device needs to log in the account and sends the login request information, the intelligent device which requests to log in the account can verify the login request information of the intelligent device which requests to log in the account through the intelligent device which has logged in the account, so that the account can be conveniently logged in the intelligent device which requests to log in the account.
The foregoing general description and the following description are exemplary and explanatory only and are not restrictive of the application.
Drawings
One or more embodiments are illustrated in drawings corresponding to, and not limiting to, embodiments in which elements having the same reference number designation are illustrated as similar elements and in which:
fig. 1 is a schematic diagram of a method for login verification according to an embodiment of the present disclosure;
FIG. 2 is a schematic diagram of a method for login verification provided by an embodiment of the present disclosure;
fig. 3 is a schematic diagram for determining whether a preset condition is met according to an embodiment of the present disclosure;
FIG. 4 is a schematic diagram of a method for login verification provided by an embodiment of the present disclosure;
FIG. 5 is a schematic diagram for obtaining a verification result according to an embodiment of the disclosure;
FIG. 6 is a schematic diagram of a method for login verification provided by an embodiment of the present disclosure;
FIG. 7 is a schematic diagram of an apparatus for login authentication provided by an embodiment of the present disclosure;
FIG. 8 is a schematic diagram of an apparatus for login authentication provided by an embodiment of the present disclosure;
FIG. 9 is a schematic diagram of an apparatus for login authentication provided by an embodiment of the present disclosure;
FIG. 10 is a schematic diagram of an apparatus for login authentication provided by an embodiment of the present disclosure;
FIG. 11 is a schematic diagram of an apparatus for login authentication provided by an embodiment of the present disclosure;
fig. 12 is a schematic diagram of an apparatus for login authentication according to an embodiment of the present disclosure.
Detailed Description
So that the manner in which the features and elements of the disclosed embodiments can be understood in detail, a more particular description of the disclosed embodiments, briefly summarized above, may be had by reference to the embodiments, some of which are illustrated in the appended drawings. In the following description of the technology, for purposes of explanation, numerous details are set forth in order to provide a thorough understanding of the disclosed embodiments. However, one or more embodiments may be practiced without these details. In other instances, well-known structures and devices may be shown in simplified form in order to simplify the drawing.
The terms "first," "second," and the like in the description and in the claims, and the above-described drawings of embodiments of the present disclosure, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It should be understood that the data so used may be interchanged under appropriate circumstances such that embodiments of the present disclosure described herein may be made. Furthermore, the terms "comprising" and "having," as well as any variations thereof, are intended to cover non-exclusive inclusions.
The term "plurality" means two or more unless otherwise specified.
In the embodiment of the present disclosure, the smart device is a smart device having a voice interaction function, or a smart device having a control panel. Smart devices include, but are not limited to, televisions, speakers, and cell phones.
The method for login verification provided in the embodiment of the disclosure is realized by the intelligent device requesting to login an account, the server and the intelligent device already logged in the account. The method for login authentication will be described first from the perspective of the smart device requesting to login to an account.
As shown in fig. 1, a method for login verification provided in an embodiment of the present disclosure includes:
s101, sending first login request information.
The first login request information comprises first device information of the intelligent device requesting to login the account and the address of the local area network router.
Optionally, the first device information includes: a name of the smart device requesting to log in the account, a function of the smart device requesting to log in the account, an IP (Internet Protocol) address of the smart device requesting to log in the account, a port number of the smart device requesting to log in the account, and a MAC (Media Access Control) address of the smart device requesting to log in the account. For example, the first device information includes a name of the smart device requesting to log in the account, and a public network IP and a port number of a local area network in which the smart device requesting to log in the account is located.
Optionally, the router and the intelligent device requesting to log in the account are in the same local area network, or the router and the intelligent device requesting to log in the account are in different local area networks.
The address of the local area network router includes a public network IP address of the local area network router and a MAC address of the local area network router.
The address of the local area network router is used for the server to send second login request information to the local area network. The second login request information comprises second device information of the intelligent device requesting to login the account. The second device information is used for distinguishing the intelligent device requesting to log in the account from other intelligent devices. For example, the second device information includes one or more of a name of the smart device requesting to log in to the account and a function of the smart device requesting to log in to the account.
In other prior art, for example, software at a mobile phone end scans a two-dimensional code on a related webpage/software in a computer, and a user clicks a confirmation key on the mobile phone to log in an account on the computer; or when the user needs to log in the account on the computer, the user firstly inputs an account number and a password in the computer, the corresponding software of the mobile phone end prompts whether to allow the login, and the login is realized by the user executing the operation of allowing the login in the corresponding software of the mobile phone. It can be seen that, in the prior art, verification is performed in an end-to-end manner, for example, a login operation of software/website corresponding to a software verification computer side of a logged-in account of a mobile phone side is performed.
In the embodiment of the present disclosure, an "end-to-end" authentication manner is adopted, that is, the second login request information is sent to the local area network ("face") according to the address of the local area network router, so as to log in the account on the intelligent device ("end") requesting to log in the account. This is completely different from the technical idea in the prior art.
In some application scenarios, the method for login authentication may be performed in the event that the smart device initially logs into the account, or may be performed in the event that a user token in the smart device expires.
And S102, receiving the returned user token.
For example, the server sends the user token to the intelligent device requesting to log in the account according to the public network IP and the port number of the intelligent device requesting to log in the account.
And in the case of receiving the user token returned by the server, indicating that the first login request information sent by the intelligent device requesting to login the account is authenticated, and allowing the intelligent device to login the account.
And S103, logging in an account according to the user token.
The intelligent device requesting to log in the account stores the user token after receiving the user token returned by the server, and only needs to send request information carrying the user token when the intelligent device requesting to log in the account requests data from the server.
When the intelligent device in the local area network needs to log in, the intelligent device requesting to log in the account sends login request information comprising the address of the router of the local area network, whether the account can be logged in on the intelligent device requesting to log in the account can be confirmed through the intelligent device of the logged in account in the local area network, and in the process, the login request information of the intelligent device requesting to log in the account is not verified through the unique client side, but is verified through any intelligent device of the logged in account in the local area network. Therefore, when the intelligent device needs to log in the account and sends the login request information, the intelligent device which requests to log in the account can verify the login request information of the intelligent device which requests to log in the account through the intelligent device which has logged in the account, so that the account can be conveniently logged in the intelligent device which requests to log in the account.
Optionally, logging in the account according to the user token includes: and automatically logging in the account under the condition that the user token is within the validity period. Therefore, the verification times can be reduced, and the convenience of logging in the account is further improved.
The method for login authentication is described above mainly from the perspective of the smart device requesting to login to an account, and will be described below from the perspective of the server.
As shown in fig. 2, a method for login verification provided in an embodiment of the present disclosure includes:
s201, first login request information is received.
The first login request information comprises equipment information of the intelligent equipment requesting to login the account and the address of the local area network router.
Optionally, the first device information includes: the name of the intelligent device requesting to log in the account, the function of the intelligent device requesting to log in the account, the IP address of the intelligent device requesting to log in the account, the port number of the intelligent device requesting to log in the account, and the MAC address of the intelligent device requesting to log in the account. For example, the first device information includes a name of the smart device requesting to log in the account, and a public network IP and a port number of a local area network in which the smart device requesting to log in the account is located.
Optionally, the router and the intelligent device requesting to log in the account are in the same local area network, or the router and the intelligent device requesting to log in the account are in different local area networks.
The address of the local area network router includes a public network IP address of the local area network router and a MAC address of the local area network router.
In some application scenarios, the method for login authentication may be performed in the event that the smart device initially logs into the account, or may be performed in the event that a user token in the smart device expires.
S202, second login request information is sent according to the address of the local area network router.
The second login request information comprises second device information of the intelligent device requesting to login the account. The second device information is used for distinguishing the intelligent device requesting to log in the account from other intelligent devices. For example, the second device information includes one or more of a name of the smart device requesting to log in to the account and a function of the smart device requesting to log in to the account.
And the server sends the second login request information to the local area network router according to the address of the local area network router, and the local area network router forwards the second login request information to the intelligent equipment which has logged in the account. Namely, the second login request information is sent to the intelligent device which has logged in the account in the local area network according to the address of the local area router.
Optionally, the intelligent device that has logged into the account is determined by the local area network router according to the intranet IP or port number when the user token is forwarded historically. That is, when the local area network router forwards the user token, the intranet IP and the port number are recorded, and the intelligent device corresponding to the intranet IP or the port number is the intelligent device that has logged in the account.
Optionally, the second login request information is sent to the intelligent device of the active account in the local area network according to the address of the local area network router. The intelligent device of the active account is a logged-in account and has data interaction with the server. The account on one intelligent device is active, which indicates that the user is using the intelligent device, and second login request information is sent to the intelligent device, so that the second login request information can be more accurately sent to the user.
In other prior art, for example, software at a mobile phone end scans a two-dimensional code on a related webpage/software in a computer, and a user clicks a confirmation key on the mobile phone to log in an account on the computer; or when the user needs to log in the account on the computer, the user firstly inputs an account number and a password in the computer, the corresponding software of the mobile phone end prompts whether to allow the login, and the login is realized by the user executing the operation of allowing the login in the corresponding software of the mobile phone. It can be seen that, in the prior art, verification is performed in an end-to-end manner, for example, a login operation of software/website corresponding to a software verification computer side of a logged-in account of a mobile phone side is performed.
In the embodiment of the present disclosure, an "end-to-end" authentication manner is adopted, that is, the second login request information is sent to the local area network ("face") according to the address of the local area network router, so as to log in the account on the intelligent device ("end") requesting to log in the account. This is completely different from the technical idea in the prior art.
And S203, sending the user token under the condition that a preset condition is met.
And the intelligent equipment which requests to log in the account is allowed to log in the account by verification if the preset condition is met.
And under the condition that the preset conditions are met, the server sends a user token to the intelligent equipment requesting to log in the account according to the public network IP and the port number of the intelligent equipment requesting to log in the account.
When the intelligent device in the local area network needs to log in, the intelligent device requesting to log in the account sends login request information comprising the address of the router of the local area network, whether the account can be logged in on the intelligent device requesting to log in the account can be confirmed through the intelligent device of the logged in account in the local area network, and in the process, the login request information of the intelligent device requesting to log in the account is not verified through the unique client side, but is verified through any intelligent device of the logged in account in the local area network. Therefore, when the intelligent device needs to log in the account and sends the login request information, the intelligent device which requests to log in the account can verify the login request information of the intelligent device which requests to log in the account through the intelligent device which has logged in the account, so that the account can be conveniently logged in the intelligent device which requests to log in the account.
Referring to fig. 3, whether the preset condition is satisfied is determined by the following steps:
s301, receiving user confirmation information.
Wherein, the user confirmation information comprises the login agreement and the login disagreement.
The user confirmation information is derived from the intelligent device of the logged account, that is, the server receives the user confirmation information sent by the intelligent device of the logged account.
In some practical applications, the intelligent device which has logged in the account obtains user confirmation information through voice interaction; or the intelligent device having logged in the account prompts second login request information in the display screen, and then obtains user operation to obtain user confirmation information, for example, in the case that the display screen is a touch screen, the user operation is read to click a relevant virtual button on the touch screen to obtain user confirmation information; or, in the case of prompting the second login request information through the indicator light, the intelligent device which has logged in the account obtains the operation of the user on the relevant physical button on the console so as to obtain the user confirmation information.
And S302, confirming that the preset condition is met under the condition that the user confirms that the information is login approval.
The user can log in the account in the intelligent device requesting for logging in the account without inputting an account number and a password in the intelligent device requesting for logging in the account, and the method is convenient and quick.
The method for login authentication is described above from the perspective of the smart device requesting to login to the account and the server, respectively, and the method for login authentication is described below from the perspective of the smart device having logged into the account.
As shown in fig. 4, a method for login verification provided by an embodiment of the present disclosure includes:
s401, second login request information is received.
The second login request information is forwarded after the local area network router receives the first login request information, and the first login request information comprises first device information of the intelligent device requesting to login the account and the address of the local area network router.
Optionally, the first device information includes: the name of the smart device requesting to log in the account, the function of the smart device requesting to log in the account, the IP address of the smart device requesting to log in the account, the port number of the smart device requesting to log in the account, and the MAC address of the smart device requesting to log in the account.
For example, the first device information includes a name of the smart device requesting to log in the account, and a public network IP and a port number of a local area network in which the smart device requesting to log in the account is located.
Optionally, the router and the intelligent device requesting to log in the account are in the same local area network, or the router and the intelligent device requesting to log in the account are in different local area networks.
The address of the local area network router includes a public network IP address of the local area network router and a MAC address of the local area network router.
In some application scenarios, the method for login authentication may be performed in the event that the smart device initially logs into the account, or may be performed in the event that a user token in the smart device expires.
Optionally, the second login request information includes second device information of the smart device requesting to login to the account. The second device information is used for distinguishing the intelligent device requesting to log in the account from other intelligent devices. For example, the second device information includes one or more of a name of the smart device requesting to log in to the account and a function of the smart device requesting to log in to the account.
Optionally, the intelligent device of the logged account receives the second login request information through the router. The intranet IP address of the intelligent device with the account logged in or the port number corresponding to the intranet IP address of the intelligent device with the account logged in are stored in the router in advance.
Optionally, the intelligent device of the logged account performs data interaction with the server within a preset time period. The intelligent device of the logged account performs data interaction with the server within the preset time period, which indicates that the user is using the intelligent device of the logged account.
In other prior art, for example, software at a mobile phone end scans a two-dimensional code on a related webpage/software in a computer, and a user clicks a confirmation key on the mobile phone to log in an account on the computer; or when the account needs to be logged in on the computer, the user firstly inputs an account number and a password into the computer, the corresponding software of the mobile phone end prompts whether the login is allowed, and the login is realized by the computer end through the operation that the user performs the login permission in the corresponding software of the mobile phone. It can be seen that, in the prior art, verification is performed in an end-to-end manner, for example, a login operation of software/website corresponding to a software verification computer side of a logged-in account of a mobile phone side is performed.
In the embodiment of the present disclosure, an "end-to-end" authentication manner is adopted, that is, the second login request information is sent to the local area network ("face") according to the address of the local area network router, so as to log in the account on the intelligent device ("end") requesting to log in the account. This is completely different from the technical idea in the prior art.
S402, obtaining the verification result of the second login request information.
Wherein, the verification result comprises authorized login and unauthorized login.
And S403, sending the verification result.
In this step, it means that the authentication result is sent to the server.
The intelligent device of the account which is requested to log in can verify the login request information of the intelligent device which is requested to log in the account through the intelligent device of the account which is logged in, so that the account can be conveniently logged in the intelligent device which is requested to log in the account.
As shown in fig. 5, obtaining the verification result of the second login request information includes:
and S501, prompting second login request information.
Optionally, prompting the second login request information through sound; or prompting second login request information through a display screen; or prompting the second login request information through an indicator light.
And S502, obtaining user confirmation information.
Optionally, obtaining user confirmation information through voice interaction; or, in a case that the second login request information is prompted in the display screen, obtaining a user operation to obtain user confirmation information, for example, in a case that the display screen is a touch screen, reading a click action of a user on a relevant virtual button on the touch screen to obtain the user confirmation information; or, in the case of prompting the second login request information through the indicator lamp, the operation of the user on the relevant physical button on the console is obtained to obtain the user confirmation information.
Wherein, the confirmation information comprises the login agreement and the login disagreement. Under the condition that the confirmation information is the login agreement, the verification result is the authorized login; and under the condition that the confirmation information is not approved to log in, the verification result is unauthorized login.
Therefore, when an account needs to be logged in on one intelligent device, a user can log in the account in the intelligent device requesting for logging in the account without inputting an account number and a password in the intelligent device requesting for logging in the account, and the method is convenient and quick.
The method for login authentication is described above from the perspective of the smart device requesting to login to the account, the perspective of the server, and the perspective of the smart device having logged in to the account, respectively, and the method for login authentication is described below from the interactive process of the smart device requesting to login to the account, the server, and the smart device having logged in to the account.
As shown in fig. 6, a method for login verification provided by an embodiment of the present disclosure includes:
s601, the intelligent device requesting for logging in the account sends first login request information to the server.
The first login request information comprises first device information of the intelligent device requesting to login the account and the address of the local area network router.
S602, the server sends second login request information according to the address of the local area network router.
And the second login request information comprises second equipment information of the intelligent equipment requesting to login the account.
S603, the intelligent device of the logged account obtains the verification result of the second login request information.
S604, the intelligent device with the logged account sends a verification result to the server.
And S605, under the condition that the verification result meets the preset condition, the server sends a user token to the intelligent equipment requesting to log in the account.
And S606, the intelligent device requesting to log in the account logs in the account according to the user token.
In some application scenarios, a user is using a smart speaker in a home network, and when one smart device requests to log in an account, if an authentication method in the prior art is adopted, the user needs to find a dedicated smart device (for example, a mobile phone) for authenticating login request information, and then authenticates the login request information through the dedicated smart device; by adopting the login verification method in the embodiment of the disclosure, the user can directly verify the login request information through the intelligent sound box because the intelligent sound box is connected in the local area network, thereby avoiding the step of searching for special intelligent equipment. Obviously, compared with the prior art, the login verification method in the embodiment of the disclosure greatly improves the convenience of login verification.
The embodiment of the disclosure also provides a device for login verification.
The embodiment of the disclosure describes the device for login verification at the angle of the intelligent device requesting to login an account, the angle of the server and the angle of the intelligent device already logged in the account.
As shown in fig. 7, in the case where the apparatus for login authentication is applied to a smart device that requests to login an account, the apparatus for login authentication includes a first transmitting module 71, a first receiving module 72, and an account login module 73. The first sending module 71 is configured to send first login request information, wherein the first login request information includes device information of the smart device requesting to login to the account and an address of the local area network router, the first receiving module 72 is configured to receive a returned user token, and the account login module 73 is configured to login to the account according to the user token.
Optionally, the account login module is further configured to automatically login to the account if the user token is within the validity period.
As shown in fig. 8, in the case where the apparatus for login authentication is applied to a server, the apparatus for login authentication includes a second receiving module 81, a second transmitting module 82, and a third transmitting module 83. The second receiving module 81 is configured to receive first login request information, wherein the first login request information includes device information of a smart device requesting to login an account and an address of a local area network router, the second sending module 82 is configured to send the second login request information according to the address of the local area network router, and the third sending module 83 is configured to send a user token if a preset condition is met.
As shown in fig. 9, in the case that the apparatus for login authentication is applied to a server, the apparatus for login authentication further includes a third receiving module 84 and a confirming module 85, wherein the third receiving module 84 is configured to receive user confirmation information, and the confirming module 85 is configured to confirm that a preset condition is met if the user information is a login approval.
In the case that the apparatus for login authentication is applied to a smart device of a logged-in account, as shown in fig. 10, the apparatus for login authentication includes a fourth receiving module 101, an obtaining module 102 and a fourth sending module 103, the fourth receiving module 101 is configured to receive second login request information, where the second login request information is forwarded by a local area network router after receiving first login request information, the first login request information includes device information of the smart device requesting to login an account and an address of the local area network router, the obtaining module 102 is configured to obtain an authentication result of the second login request information, and the fourth sending module 103 is configured to send the authentication result.
As shown in fig. 11, the obtaining module 102 includes a prompting unit 1021 and an obtaining unit 1022, where the prompting unit 1021 is configured to prompt the second login request information, and the obtaining unit 1022 is configured to obtain the user confirmation information.
In some embodiments, an apparatus for login authentication includes a processor and a memory storing program instructions, the processor being configured to, when executing the program instructions, perform the method for login authentication provided by the previous embodiments.
As shown in fig. 12, an apparatus for login authentication provided in an embodiment of the present disclosure includes:
a processor (processor)121 and a memory (memory)122, and may further include a Communication Interface (Communication Interface)123 and a bus 124. The processor 121, the communication interface 123 and the memory 122 can communicate with each other through the bus 124. Communication interface 123 may be used for information transfer. Processor 121 may invoke logic instructions in memory 122 to perform the methods for login authentication provided by the foregoing embodiments.
Furthermore, the logic instructions in the memory 122 may be implemented in software functional units and stored in a computer readable storage medium when sold or used as a stand-alone product.
The memory 122 is a computer-readable storage medium, and can be used for storing software programs, computer-executable programs, such as program instructions/modules corresponding to the methods in the embodiments of the present disclosure. The processor 121 executes the functional application and data processing by executing the software program, instructions and modules stored in the memory 122, that is, implements the method in the above-described method embodiments.
The memory 122 may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data created according to the use of the terminal device, and the like. Further, the memory 122 may include high speed random access memory, and may also include non-volatile memory.
The embodiment of the disclosure provides a login verification system, which comprises the device for login verification provided by the embodiment.
The embodiment of the disclosure provides a login verification system. The login verification system comprises intelligent equipment requesting to login an account, a server and intelligent equipment already logged in the account, wherein the intelligent equipment requesting to login the account sends first login request information to the server, and the first login request information comprises first equipment information of the intelligent equipment requesting to login the account and an address of a local area network router; the server sends second login request information to the intelligent equipment which has logged in the account according to the address of the local area network router, wherein the second login request information comprises second equipment information of the intelligent equipment which requests to log in the account; the intelligent device of the logged account obtains the verification result of the second login request information; the intelligent device which logs in the account sends a verification result to the server; under the condition that the verification result meets the preset condition, the server sends a user token to the intelligent equipment requesting to log in the account; and the intelligent device requesting to log in the account logs in the account according to the user token.
Embodiments of the present disclosure provide a computer-readable storage medium storing computer-executable instructions configured to perform the method for login verification provided by the foregoing embodiments.
Embodiments of the present disclosure provide a computer program product comprising a computer program stored on a computer readable storage medium, the computer program comprising program instructions which, when executed by a computer, cause the computer to perform the method for login verification provided by the preceding embodiments.
The computer-readable storage medium described above may be a transitory computer-readable storage medium or a non-transitory computer-readable storage medium.
The technical solution of the embodiments of the present disclosure may be embodied in the form of a software product, where the computer software product is stored in a storage medium and includes one or more instructions to enable a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method in the embodiments of the present disclosure. And the aforementioned storage medium may be a non-transitory storage medium comprising: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes, and may also be a transient storage medium.
The above description and the drawings sufficiently illustrate embodiments of the disclosure to enable those skilled in the art to practice them. Other embodiments may incorporate structural, logical, electrical, process, and other changes. The examples merely typify possible variations. Individual components and functions are optional unless explicitly required, and the sequence of operations may vary. Portions and features of some embodiments may be included in or substituted for those of others. Furthermore, the words used in the specification are words of description only and are not intended to limit the claims. As used in the description of the embodiments and the claims, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. Furthermore, the terms "comprises" and/or "comprising," when used in this application, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method or device comprising the element. In this document, each embodiment may be described with emphasis on differences from other embodiments, and the same and similar parts between the respective embodiments may be referred to each other. For methods, products, etc. of the embodiment disclosures, reference may be made to the description of the method section for relevance if it corresponds to the method section of the embodiment disclosure.
Those of skill in the art would appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software may depend upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the disclosed embodiments. It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the system, the apparatus and the unit described above may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the embodiments disclosed herein, the disclosed methods, products (including but not limited to devices, apparatuses, etc.) may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, a division of a unit may be merely a division of a logical function, and an actual implementation may have another division, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form. Units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to implement the present embodiment. In addition, functional units in the embodiments of the present disclosure may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). In some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. Each block of the block diagrams and/or flowchart illustrations, and combinations of blocks in the block diagrams and/or flowchart illustrations, can be implemented by special purpose hardware-based systems that perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.

Claims (12)

1. A method for login verification, which is applied to an intelligent device requesting to login an account, and is characterized in that the method comprises the following steps:
sending first login request information to a server; the first login request information comprises first equipment information of intelligent equipment requesting to login an account and an address of a local area network router; the address of the local area network router is used for the server to send second login request information to the local area network router, the local area network router forwards the second login request information to an intelligent device of a logged account, the intelligent device of the logged account is determined by the local area network router according to an intranet IP or a port number when a user token is forwarded historically, the intelligent device of the logged account obtains a verification result of the second login request information and sends the verification result to the server, and a user card is sent to the intelligent device requesting to log in the account when the verification result is verified; the second login request information comprises second equipment information of the intelligent equipment requesting to login the account;
receiving the returned user token;
and logging in an account according to the user token.
2. The method of claim 1, wherein logging into an account based on the user token comprises:
and automatically logging in the account under the condition that the user token is within the validity period.
3. A method for login verification, applied to a server, the method comprising:
receiving first login request information; the first login request information comprises first equipment information of intelligent equipment requesting to login an account and an address of a local area network router;
sending second login request information according to the address of the local area network router; enabling a local area network router to forward the second login request information to the intelligent equipment of the logged account, wherein the intelligent equipment of the logged account is determined by the local area network router according to an intranet IP or port number when a user token is forwarded historically, and the intelligent equipment of the logged account obtains a verification result of the second login request information and sends the verification result to the server;
and sending a user token to the intelligent equipment requesting to log in the account under the condition that the verification result is that the verification is passed.
4. The method of claim 3, further comprising:
receiving user confirmation information;
and confirming that a preset condition is met under the condition that the user confirms that the information is the login agreement.
5. A method for login verification, which is applied to a smart device of a logged-in account, and is characterized in that the method comprises the following steps:
receiving second login request information, wherein the second login request information is sent to a local area network router according to the address of the local area network router after a server receives first login request information, the local area network router forwards the second login request information to an intelligent device of a logged account, the intelligent device of the logged account is determined by the local area network router according to the intranet IP or port number when a user token is forwarded historically, the first login request information is sent to the server by the intelligent device requesting the login account, and the first login request information comprises first device information of the intelligent device requesting the login account and the address of the local area network router;
obtaining a verification result of the second login request information;
sending the verification result; and the server sends a user token to the intelligent equipment requesting to log in the account under the condition that the verification result is that the verification is passed.
6. The method of claim 5, wherein obtaining the verification result of the second login request information comprises:
prompting the second login request information;
user confirmation information is obtained.
7. An apparatus for login authentication, applied to an intelligent device requesting to login an account, the apparatus comprising:
a first sending module configured to send first login request information to a server; the first login request information comprises first equipment information of intelligent equipment requesting to login an account and an address of a local area network router; the address of the local area network router is used for the server to send second login request information to the local area network router, the local area network router forwards the second login request information to the intelligent equipment of the logged account, the intelligent equipment of the logged account is determined by the local area network router according to the intranet IP or port number when the local area network router forwards the user token historically, the intelligent equipment of the logged account obtains the verification result of the second login request information and sends the verification result to the server, and under the condition that the verification result is verified, a user card is sent to the intelligent equipment requesting to log in the account; the second login request information comprises second equipment information of the intelligent equipment requesting to login the account;
a first receiving module configured to receive the returned user token;
an account login module configured to log in to an account according to the user token.
8. An apparatus for login authentication, applied to a server, the apparatus comprising:
a second receiving module configured to receive the first login request information; the first login request information comprises first equipment information of intelligent equipment requesting to login an account and an address of a local area network router;
the second sending module is configured to send second login request information according to the address of the local area network router; enabling a local area network router to forward the second login request information to the intelligent equipment of the logged account, wherein the intelligent equipment of the logged account is determined by the local area network router according to an intranet IP or port number when a user token is forwarded historically, and the intelligent equipment of the logged account obtains a verification result of the second login request information and sends the verification result to the server;
and the third sending module is configured to send the user token to the intelligent device requesting to log in the account if the verification result is that the verification is passed.
9. An apparatus for login verification, applied to a smart device of a logged-in account, the apparatus comprising:
a fourth receiving module, configured to receive second login request information, where the second login request information is sent to a local area network router according to an address of the local area network router after a server receives first login request information, the local area network router forwards the second login request information to an intelligent device of a logged-in account, the intelligent device of the logged-in account is determined by the local area network router according to an intranet IP or port number when a user token is forwarded historically, the first login request information is sent to the server by the intelligent device requesting the login account, and the first login request information includes first device information of the intelligent device requesting the login account and an address of the local area network router;
an obtaining module configured to obtain a verification result of the second login request information;
a fourth transmitting module configured to transmit the verification result; and the server sends a user token to the intelligent equipment requesting to log in the account under the condition that the verification result is that the verification is passed.
10. An apparatus for login authentication, comprising a processor and a memory storing program instructions, characterized in that the processor is configured to perform the method for login authentication according to any of claims 1 to 6 when executing the program instructions.
11. A login verification system is characterized by comprising an intelligent device for requesting to login an account, a server and an intelligent device for the logged-in account, wherein,
the intelligent device requesting to log in the account sends first login request information to the server; the first login request information comprises first equipment information of the intelligent equipment requesting to login the account and an address of a local area network router;
the server sends second login request information to the intelligent equipment which logs in the account in the local area network according to the address of the local area network router; the intelligent equipment of the logged account is determined by the local area network router according to the intranet IP or the port number when the user token is forwarded historically;
the intelligent device of the logged account obtains the verification result of the second login request information;
the intelligent device of the logged account sends the verification result to the server;
under the condition that the verification result is that the verification is passed, the server sends a user token to the intelligent equipment requesting to log in the account;
and the intelligent device requesting to log in the account logs in the account according to the user token.
12. A login authentication system comprising an apparatus for login authentication according to any one of claims 7 to 10.
CN202010418937.6A 2020-05-18 2020-05-18 Method and device for login verification and login verification system Active CN111600888B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010418937.6A CN111600888B (en) 2020-05-18 2020-05-18 Method and device for login verification and login verification system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010418937.6A CN111600888B (en) 2020-05-18 2020-05-18 Method and device for login verification and login verification system

Publications (2)

Publication Number Publication Date
CN111600888A CN111600888A (en) 2020-08-28
CN111600888B true CN111600888B (en) 2022-08-26

Family

ID=72191511

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010418937.6A Active CN111600888B (en) 2020-05-18 2020-05-18 Method and device for login verification and login verification system

Country Status (1)

Country Link
CN (1) CN111600888B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113965350A (en) * 2021-09-14 2022-01-21 海信视像科技股份有限公司 Terminal device and login control method of terminal device
CN115001887B (en) * 2022-04-29 2024-03-22 青岛海尔科技有限公司 Login identification sending method and device, storage medium and electronic device

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140173695A1 (en) * 2012-12-18 2014-06-19 Google Inc. Token based account access
CN104506492B (en) * 2014-11-28 2018-04-13 北京奇艺世纪科技有限公司 A kind of method and device of multiple terminals account number synchronization
CN107359996B (en) * 2016-05-09 2020-05-05 阿里巴巴集团控股有限公司 Automatic login method and device among multiple network stations
CN106101122A (en) * 2016-06-30 2016-11-09 乐视控股(北京)有限公司 A kind of login method and device
CN110278187B (en) * 2019-05-13 2021-11-16 网宿科技股份有限公司 Multi-terminal single sign-on method, system, synchronous server and medium

Also Published As

Publication number Publication date
CN111600888A (en) 2020-08-28

Similar Documents

Publication Publication Date Title
US9871791B2 (en) Multi factor user authentication on multiple devices
KR102375777B1 (en) Payment authentication method, device and system for on-board terminal
CA2923431C (en) Network connection automation
KR101177456B1 (en) Method for authenticating a user by using server and image forming apparatus using it
US20120297187A1 (en) Trusted Mobile Device Based Security
KR101451359B1 (en) User account recovery
CN104253784A (en) Logging and authorization method and system
US20100197293A1 (en) Remote computer access authentication using a mobile device
CN104160653A (en) Multi-factor certificate authority
US11489831B2 (en) Communication system and computer readable storage medium
CN103685139A (en) Authentication and authorization processing method and device
CN103023919A (en) Two-dimensional code based login control method and two-dimensional code based login control system
JP2018522323A (en) Voice communication processing method and system, electronic apparatus, and storage medium
CN106161475B (en) Method and device for realizing user authentication
WO2006073008A1 (en) Login-to-network-camera authentication system
CN111600888B (en) Method and device for login verification and login verification system
CN105429979A (en) Cross-platform user certificating method and intelligent router, Internet surfing system
CN111600900B (en) Single sign-on method, server and system based on block chain
KR102279582B1 (en) Conferencing apparatus and method for switching access terminal thereof
CN105141624A (en) Login method, account management server and client system
CN104660614A (en) Authentication method, electronic equipment and server
CN115022047A (en) Account login method and device based on multi-cloud gateway, computer equipment and medium
CN110048864B (en) Method and apparatus for authenticating an administrator of a device-specific message group
KR101879842B1 (en) User authentication method and system using one time password
CN115174181B (en) Method, device, equipment and storage medium for realizing single sign-on

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant