CN113190812A - Login method, system, electronic equipment and storage medium - Google Patents

Login method, system, electronic equipment and storage medium Download PDF

Info

Publication number
CN113190812A
CN113190812A CN202110568485.4A CN202110568485A CN113190812A CN 113190812 A CN113190812 A CN 113190812A CN 202110568485 A CN202110568485 A CN 202110568485A CN 113190812 A CN113190812 A CN 113190812A
Authority
CN
China
Prior art keywords
identifier
communication connection
login
equipment
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110568485.4A
Other languages
Chinese (zh)
Inventor
孙玥
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202110568485.4A priority Critical patent/CN113190812A/en
Publication of CN113190812A publication Critical patent/CN113190812A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Abstract

The present disclosure provides a login method, which can be used in the financial field or other fields, including: establishing a communication connection with the first device, wherein the communication connection with the first device is continuously maintained by continuously identifying whether the first identifier sent by the first device is consistent with the locally stored identifier; establishing a communication connection with the second device and replacing the locally stored identity with a second identifier; and disconnecting the communication connection with the first equipment and sending prompt information to the first equipment. The disclosure also provides a positioning debugging system, an electronic device and a computer readable storage medium for abnormal transactions.

Description

Login method, system, electronic equipment and storage medium
Technical Field
The present disclosure relates to the field of computer applications, and in particular, to a login method, system, electronic device, and storage medium.
Background
With the rapid development of the internet, devices such as mobile phones and ipads are more and more closely related to the life of people, and the APP applications installed by taking the devices as carriers are increasingly providing services for the majority of users. People can enjoy the convenient service of clothes and eating and housing without going out. The user can smoothly and unhindered feel that all functions provided by the APP application are used only by successfully logging in through the account password.
The login method in the prior art has the following disadvantages: 1) the security of the account is low, once the account password of the user is obtained, the user can log in on different equipment, and the account fund and the like of the user have the risk of being stolen; 2) the information leakage degree is high, user information, picture videos, chat records and the like can be synchronously acquired on different devices, the user information, the picture videos, the chat records and the like belong to the privacy of users, once the user information is stolen by others, the risk of information leakage is generated, and adverse events such as extortion, lassitude, malicious release and the like can occur in extreme cases. Therefore, it is necessary to provide a fast and secure method for single-state login.
Disclosure of Invention
In order to solve the problems in the prior art, embodiments of the present disclosure provide a login method, system, electronic device, and storage medium, which aim to achieve the purpose of logging in later, logging out, and logging in first, and improve the security and validity of a user account.
A first aspect of the present disclosure provides a login method, including: establishing a communication connection with the first device, wherein the communication connection with the first device is continuously maintained by continuously identifying whether the first identifier sent by the first device is consistent with the locally stored identifier; establishing a communication connection with the second device and replacing the locally stored identity with a second identifier; and disconnecting the communication connection with the first equipment and sending prompt information to the first equipment.
Further, the disconnecting the communication connection with the first device and sending the prompt message to the first device includes: and after the communication connection with the second equipment is established, when the communication connection with the first equipment is established, judging whether the first identifier is consistent with the replaced second identifier, if not, disconnecting the communication connection with the first equipment, and sending prompt information to the first equipment.
Further, before establishing the communication connection with the first device, the method further includes: initiating a first login request through first equipment; in response to the first login request, a communication connection is established with the first device.
Further, establishing a communication connection with the first device in response to the first login request includes: responding to the first login request, and verifying whether the account name and the password in the first login request are consistent with corresponding information stored in the database; and if so, establishing communication connection with the first equipment.
Further, if the communication connection with the first device is established, the method further includes: searching corresponding user basic information in a database according to the account name and the password, packaging the user basic information into an identification object, and generating a first identifier; wherein, the user basic information at least comprises: user ID, user name; generating a corresponding key value pair < user ID according to the user ID, the first identifier and the identification object: first identifier > and < first identifier: identify object > and store.
Further, establishing a communication connection with the second device and replacing the locally stored identity with a second identifier comprises: establishing a communication connection with the second device and replacing the locally stored first identifier with the second identifier and generating a corresponding key-value pair < user ID: second identifier > with < second identifier: identify object > and store.
Further, the effective duration for continuously identifying whether the first identifier sent by the first device is consistent with the locally stored identifier is less than or equal to a first preset time; and the effective duration of continuously keeping the communication connection with the first equipment is less than or equal to a second preset time.
Further, a key-value pair < identifier: the effective duration of the identification object is less than or equal to a first preset time; key-value pair < user ID: the effective time length of the identifier is less than or equal to a second preset time.
Further, a communication connection with the second device is established, and the locally stored identifier is replaced by a second identifier, wherein the second identifier is generated after the communication connection with the second device is established.
A second aspect of the present disclosure provides a login system, comprising: the first communication module is used for establishing communication connection with the first equipment, and continuously maintaining the communication connection with the first equipment by continuously identifying whether the first identifier sent by the first equipment is consistent with the locally stored identifier; the second communication module is used for establishing communication connection with the second equipment and replacing the locally stored identification with a second identifier; and the communication disconnection module is used for disconnecting the communication connection with the first equipment and sending the prompt information to the first equipment.
Further, the communication disconnection module is configured to disconnect a communication connection with the first device and send a prompt message to the first device, and includes: and after the communication connection with the second equipment is established, when the communication connection with the first equipment is established, judging whether the first identifier is consistent with the replaced second identifier, if not, disconnecting the communication connection with the first equipment, and sending prompt information to the first equipment.
Further, the system further comprises: and the request initiating module is used for initiating a device login request.
A third aspect of the present disclosure provides an electronic device, comprising: the first aspect of the present disclosure provides a method for logging on a computer, the method comprising the steps of storing a computer program, executing the computer program, and logging on the computer.
A fourth aspect of the present disclosure provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the login method provided by the first aspect of the present disclosure.
According to the login method, the login system, the electronic equipment and the storage medium, only one device can log in the account at the same time, if the account of the user is logged in by other people, the user can fail to initiate any request again, information that the account is logged in by other devices is prompted to the user, the user is guided to perform safe operation of password modification subsequently, and the login method, the login system, the electronic equipment and the storage medium have the advantage of high account safety. In addition, if the account is logged in by other people, the system can feed back prompt information to the user in time, and warn the user to perform safety operations such as password modification, so that adverse effects caused by information leakage utilized by other people are avoided, and the problem that the user information is divulged can be avoided.
Drawings
For a more complete understanding of the present disclosure and the advantages thereof, reference is now made to the following descriptions taken in conjunction with the accompanying drawings, in which:
fig. 1 schematically illustrates an application scenario diagram of a login method according to an embodiment of the present disclosure;
FIG. 2 schematically shows a flow diagram of a login method according to an embodiment of the present disclosure;
FIG. 3 schematically shows an architecture diagram of a login method according to an embodiment of the present disclosure;
FIG. 4 schematically shows a flow chart of a login method according to another embodiment of the present disclosure;
FIG. 5 schematically illustrates a flow diagram of a login method according to yet another embodiment of the present disclosure;
FIG. 6 schematically illustrates a block diagram of a login system according to an embodiment of the present disclosure;
FIG. 7 schematically illustrates a block diagram of a login system according to another embodiment of the present disclosure;
fig. 8 schematically shows a block diagram of an electronic device adapted to implement the above described method according to an embodiment of the present disclosure.
Detailed Description
Hereinafter, embodiments of the present disclosure will be described with reference to the accompanying drawings. It should be understood that the description is illustrative only and is not intended to limit the scope of the present disclosure. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the disclosure. It may be evident, however, that one or more embodiments may be practiced without these specific details. Moreover, in the following description, descriptions of well-known structures and techniques are omitted so as to not unnecessarily obscure the concepts of the present disclosure.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. The terms "comprises," "comprising," and the like, as used herein, specify the presence of stated features, steps, operations, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, or components.
All terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art unless otherwise defined. It is noted that the terms used herein should be interpreted as having a meaning that is consistent with the context of this specification and should not be interpreted in an idealized or overly formal sense.
Where a convention analogous to "at least one of A, B and C, etc." is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., "a system having at least one of A, B and C" would include but not be limited to systems that have a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.). Where a convention analogous to "A, B or at least one of C, etc." is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., "a system having at least one of A, B or C" would include but not be limited to systems that have a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.).
Some block diagrams and/or flow diagrams are shown in the figures. It will be understood that some blocks of the block diagrams and/or flowchart illustrations, or combinations thereof, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus, such that the instructions, which execute via the processor, create means for implementing the functions/acts specified in the block diagrams and/or flowchart block or blocks. The techniques of this disclosure may be implemented in hardware and/or software (including firmware, microcode, etc.). In addition, the techniques of this disclosure may take the form of a computer program product on a computer-readable storage medium having instructions stored thereon for use by or in connection with an instruction execution system.
The embodiment of the disclosure provides a login method, which includes: establishing a communication connection with a first device, wherein the communication connection with the first device is continuously maintained by continuously identifying whether a first identifier sent by the first device is consistent with a locally stored identifier; establishing a communication connection with the second device and replacing the locally stored identity with a second identifier; and disconnecting the communication connection with the first equipment and sending prompt information to the first equipment.
According to the embodiment of the disclosure, only one device can log in the account at the same time, if the account of the user is logged in by other people, the user fails to initiate any request again, and the information that the account is logged in at other devices is prompted to the user, and the user is subsequently guided to perform the safe operation of password modification, so that the method has the advantage of high account security. In addition, if the account is logged in by other people, the system can feed back prompt information to the user in time, and warn the user to perform safety operations such as password modification, so that adverse effects caused by information leakage utilized by other people are avoided, and the problem that the user information is leaked is effectively avoided.
Fig. 1 schematically illustrates an exemplary system architecture 100 that may be applied to a login method according to an embodiment of the present disclosure. It should be noted that fig. 1 is only an example of a system architecture to which the embodiments of the present disclosure may be applied to help those skilled in the art understand the technical content of the present disclosure, and does not mean that the embodiments of the present disclosure may not be applied to other devices, systems, environments or scenarios.
As shown in fig. 1, the system architecture 100 according to this embodiment may include terminal devices 101, 102, 103, a network 104 and a server 105. The network 104 serves as a medium for providing communication links between the terminal devices 101, 102, 103 and the server 105. Network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few.
The user may use the terminal devices 101, 102, 103 to interact with the server 105 via the network 104 to receive or send messages or the like. The terminal devices 101, 102, 103 may have installed thereon various communication client applications, such as various software programming systems, software testing systems, web browser applications, mobile banking applications, instant messaging tools, mailbox clients, social platform software, etc. (by way of example only).
The terminal devices 101, 102, 103 may be various electronic devices having a display screen and supporting web browsing, including but not limited to smart phones, tablet computers, laptop portable computers, desktop computers, and the like.
The server 105 may be a server providing various services, such as a background management server (for example only) providing support for an application system according to which the user utilizes the terminal device 101, 102, 103. The background management server may analyze the received user request and feed back a processing result (e.g., an identifier generated according to the user request) to the terminal device.
It should be noted that the login method provided by the embodiment of the present disclosure may be executed by the server 105. Accordingly, the login system provided by the embodiments of the present disclosure may be deployed in the server 105. The login method provided by the embodiments of the present disclosure may also be performed by a server or a server cluster different from the server 105 and capable of communicating with the terminal devices 101, 102, 103 and/or the server 105. Accordingly, the login system provided by the embodiment of the present disclosure may also be disposed in a server or a server cluster different from the server 105 and capable of communicating with the terminal devices 101, 102, 103 and/or the server 105. Of course, in some embodiments, the login system provided by the embodiments of the present disclosure may also be deployed in the user terminal device, that is, the method may also be executed by the user terminal device.
It should be understood that the number of terminal devices, networks, and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
Fig. 2 schematically illustrates a flow chart of a method of locating debug of exception-bound transactions according to an embodiment of the present disclosure. As shown in fig. 2, the method includes: steps S201 to S203.
In operation S201, a communication connection with a first device is established, wherein the communication connection with the first device is continuously maintained by continuously recognizing whether a first identifier transmitted by the first device is consistent with a locally stored identifier.
In the embodiment of the present disclosure, the login method may be applied to an electronic device, and the electronic device may include, but is not limited to, a server cluster, and the like. Application systems (i.e., software apps, etc.) may be installed in the electronic device, such as: cell phone banking systems, and the like.
As shown in fig. 3, taking the first device as the terminal device 101 as an example, a user inputs information such as a user account and a password on an application system login interface on the terminal device 101, and when the user clicks login, the terminal device 101 initiates a first login request to an application system on the server 105, and at this time, the application system responds to the first login request and establishes a communication connection with the terminal device 101. In the embodiment of the present disclosure, a Redis database is deployed on the server 105, and is used for storing the user information of the application system and the key value peers generated according to the login request.
According to an embodiment of the present disclosure, the establishing, by the application system on the server 105, a communication connection with the first device in response to the first login request specifically includes: and responding to the first login request, verifying whether the account name and the password in the first login request are consistent with corresponding information stored in a database, and if so, establishing communication connection between the application system and the terminal device 101. Specifically, the login request can be successfully responded only when the account name and the password in the first login request are consistent with the user name and the password set when the user registers on the application system.
In the embodiment of the present disclosure, if the user successfully establishes a communication connection with the application system on the server 105 on the terminal device 101, at this time, the server 105 returns a first identifier (a first token id) to the terminal device 101, where the first token id is a universally unique identifier (UUID code) and has uniqueness, that is, a unique token id is returned every time a login request is initiated. Specifically, the server 105 searches the basic information of the user in Redis according to the account name and the password carried in the first login request, and encapsulates the basic information of the user into an identification object (token object), at this time, a key value pair whose key is the user ID and whose value is the first token ID is newly added to Redis, and the key value pair is < user ID: setting the effective duration of the first token ID > to be less than or equal to a second preset time; and generating a key-value pair with key as the first token id and value as the token object, and setting the key-value pair < the first token id: the valid duration of the token object > is set to be less than or equal to a first preset time, that is, after the login request initiated by the user at the terminal device 101 successfully logs in, the application system on the server 105 automatically generates a key value pair < user ID: first token id > and < first token id: token object >, and the key-value pairs all have a valid duration.
After the terminal device 101 successfully logs in the application system, when the user continues to perform subsequent application operations, at this time, the terminal device 101 loads the first token id returned by the server 105 to the application system along with the page operation request, and the application system, according to the first token id, in the < first token id: the token object is inquired in the key value pair, then the corresponding user ID is obtained according to the token object, the token ID corresponding to the token ID is inquired according to the user ID, whether the token ID is consistent with the token ID loaded in the operation request or not is judged, if yes, the communication connection with the terminal device 101 is continuously kept, the time length which is allowed to allow the user to continue to operate the application system after the operation is updated to first preset time, the total time length which is allowed to allow the user to operate the application system is second preset time, the second preset time represents whether the user continuously operates the application system or not in the first preset time or not, and when the time after the first login exceeds the second preset time, the login on the terminal device 101 can automatically fail.
In an embodiment of the present disclosure, after the first login request is successfully corresponded, the generated first token ID may be "aa.. 1", and the user ID queried according to the user request may be "0001", so that the corresponding generated key value pair is < 0001: 1> and < aa.. 1: {0001, Zhangthree, Man. It should be noted that the parameters of the key-value pair are merely exemplary, and do not limit the embodiments of the present disclosure.
In operation S202, a communication connection with the second device is established and the locally stored identity is replaced with the second identifier.
In the embodiment of the present disclosure, as shown in fig. 2, taking the second device as the terminal device 102 as an example, following the above-mentioned embodiment, the user initiates a second login request on the login interface of the application system on the terminal device 102, where the second login request includes the same account name and password as those of the first login request. At this time, the application system on the server 105 responds to the second login request, generates a second token ID, and the server 105 returns the second token ID to the terminal device 102, replaces the first token ID generated in step S201 with the second token ID value, and generates a key value pair < user ID: second token id > with < second token id: object > is identified and stored in the Redis database.
In the embodiment of the present disclosure, following the above embodiment, after the second login request is successfully responded, the generated second token ID may be "BB... 1", and the "BB... 1" is substituted for the "aa.... 1" generated in step S201, and meanwhile, the user ID queried according to the user request is "0001", and then the corresponding key value pair is < 0001: BB... 1> and < BB... 1: {0001, Zhangthree, Man. It should be noted that the parameters of these key value pairs are merely exemplary, and do not constitute a limitation of the embodiments of the present disclosure.
In operation S203, a communication connection with the first device is disconnected, and a prompt message is transmitted to the first device.
In the embodiment of the present disclosure, following the above-mentioned embodiment, after the terminal device 102 successfully logs in the application system, and at this time, when the user continues to operate the user interface of the application system on the terminal device 101, the terminal device 101 loads the first token id generated in step S201 to the application system on the server 105 according to the corresponding operation request, determines whether the first identifier is consistent with the replaced second identifier, and if not, disconnects the communication connection with the terminal device 101, returns the operation interface of the application system to the login interface, and simultaneously sends the prompt message to the terminal device 101. Specifically, after the terminal device 102 successfully logs in the application system, and at this time, when the user continues to operate the user interface of the application system on the terminal device 101, the application system may determine that the identifier "aa.. 1" loaded by the terminal device is not consistent with the identifier "BB... 1" generated after the terminal device 102 successfully logs in step 2, disconnect the communication connection with the terminal device 101, return the operation interface of the application system to the login interface, and send the prompt message to the terminal device 101.
In the embodiment of the disclosure, only when the login request is made, the system generates a unique identifier, and replaces the identifier generated by the last login request and stores the identifier.
According to the embodiment of the disclosure, the prompt information about login sent by the server to the terminal device may be information prompt such as "the account is logged in on other devices", or "whether the account password needs to be modified" or not. It should be noted that the prompt information is merely an exemplary illustration, and does not limit the content of the message prompt in the embodiment of the present disclosure.
The method shown in fig. 2-3 is further described with reference to fig. 4 in conjunction with specific embodiments.
Fig. 4 schematically shows a flow chart of a login method according to another embodiment of the present disclosure.
In this embodiment, when the login method performs a login operation on the same device (without involving a login with an account of another device), the method specifically includes the steps shown in fig. 4.
As shown in fig. 4, a user initiates a login request on an application system login interface on the electronic device, if an account name and a password in the login request are consistent with corresponding information stored in the database, the application system login is successful, otherwise, the interface is continuously maintained on the login interface and prompts the user that the account name or the password is wrong. If the login is successful, the server generates the token ID of the login request, searches the corresponding user ID, user name, gender, contact telephone and other user basic information in the database according to the account name and the password in the login request, packages the user basic information to generate a token object, and then adds a < user ID: token ID > key-value pair, according to preset aging rules, the < user ID: the aging of the token ID is set to be 3 days; and simultaneously adding < tokenID in Redis: token object > key-value pair and the < token id: and setting the aging of the token object > key value pair to be 1 hour, and finally returning the generated token ID to the electronic equipment initiating the login request by the server.
In the embodiment of the present disclosure, < token id: the aging of the token object > key value pair is set to 1 hour, which represents that within 1 hour, if the user has a behavior of operating the application system, the < token id: updating the time efficiency of the token object > key value pair to 1 hour, namely that the user can perform corresponding operation on the application system within the 1 hour; if the time exceeds 1 hour, the login of the electronic equipment on the application system fails, and at the moment, the user cannot continue to initiate the corresponding operation request on the application system. The < user ID: the age of the token id > key value pair is set to 3 days, which represents that after the application system is successfully logged in on the electronic device, if the user has a behavior of operating the application system, the < token id is always refreshed: token object > expiration time of key-value pair, even if the < token id: token object > is always valid, but the total length of time allowed for the user to perform the operation is 3 days, and if the total length of time exceeds 3 days, the < user ID: the token ID is larger than the key value pair time effectiveness, the token ID cannot be obtained by the next request operation of the user, the server judges that the system is not logged in, and the server needs to log in again at the moment. That is, each time the user requests a system login, the total time allowed for the user to continue to operate the request after the login request is successfully responded is 3 days.
It should be noted that the information included in the token object, where the first preset time is 1 hour, the second preset time is 3 days, is an exemplary description, and in other application scenarios, these parameters may also be determined according to actual application requirements, and do not constitute a limitation of these parameters in the embodiment of the present disclosure.
Fig. 5 schematically shows a flow chart of a login method according to yet another embodiment of the present disclosure.
In this embodiment, the login method specifically includes the steps shown in fig. 5 when the same account is logged in on different devices.
As shown in fig. 5, following the above embodiment, the user successfully logs in to the user account on the terminal device 101, and then successfully logs in to the same user account on the terminal device 102. At this time, the user performs corresponding operations on the user terminal 101, and whether the first token id generated when the user terminal 101 loads the first login request is consistent with the token id stored in the database or not is determined; if the account number is inconsistent with the login interface, the system prompts the user that the account number is logged in on other equipment, and the application interface is returned to the login interface; if the account number is consistent with the token id, the account number is not logged in on other equipment, and at this time, the < token id: the expiration time of the token object > key value pair is 1 hour, and the user can continue to perform corresponding operations on the application system, wherein each request for performing corresponding operations on the terminal device is also the process of establishing communication connection with the server.
In the embodiment of the present disclosure, only the token id generated at each user login request is different, and the token id generated at the current login replaces the token id generated at the last login and is stored. After the same successful login, the token ID is not updated again when corresponding operation is carried out on the system, and only the effective time of the corresponding key value pair is updated, so that after the preset time length is reached, the login fails, and the login of the application system is quitted on the current equipment. The login method provided by the embodiment of the disclosure ensures the safety and the privacy of the user information, and prevents unnecessary adverse effects generated after the user account forgets to log out after logging in on other equipment.
According to the login method provided by the disclosure, the purpose that the same account is only allowed to login on one device is achieved based on the setting of the key value pair in the Redis database, the effective duration of the key value pair is set, and the prompt information is timely fed back to the user under the condition that repeated login exists, so that the safety of the user account in the application system is ensured, and the occurrence of unnecessary information leakage events is effectively avoided.
FIG. 6 schematically shows a block diagram of a login system according to an embodiment of the present disclosure.
As shown in fig. 6, the login system 600 includes: a first communication module 610, a second communication module 620 and a communication disconnection module 630. The system 600 may be used to implement the login method described with reference to fig. 2.
A first communication module 610, configured to establish a communication connection with a first device, where the communication connection with the first device is continuously maintained by continuously identifying whether a first identifier sent by the first device is consistent with a locally stored identifier. According to an embodiment of the present disclosure, the first communication module 610 may be configured to perform the step S201 described above with reference to fig. 2, for example, and is not described herein again.
A second communication module 620 for establishing a communication connection with the second device and replacing the locally stored identity with a second identifier. According to an embodiment of the present disclosure, the second communication module 620 may be configured to perform the step S202 described above with reference to fig. 2, for example, and is not described herein again.
A communication disconnection module 630, configured to disconnect the communication connection with the first device and send the prompt message to the first device. According to an embodiment of the present disclosure, the communication disconnection module 630 may be configured to perform the step S203 described above with reference to fig. 2, for example, and is not described herein again.
In this embodiment of the disclosure, the second communication module 620 is configured to establish a communication connection with a second device, and replacing the locally stored identifier with a second identifier specifically includes: establishing a communication connection with the second device and replacing the locally stored first identifier with the second identifier and generating a corresponding key-value pair < user ID: second identifier > with < second identifier: identify object > and store.
In an embodiment of the present disclosure, the communication disconnection module 630 is configured to disconnect a communication connection with the first device and send a prompt message to the first device, and includes: and after the communication connection with the second equipment is established, when the communication connection with the first equipment is established, identifying whether the first identifier is consistent with the replaced second identifier, if not, disconnecting the communication connection with the first equipment, and sending prompt information to the first equipment.
As shown in fig. 7, the system 600 further includes: a request initiating module 640, configured to initiate a device login request. Specifically, a first login request is initiated through first equipment, and a server responds to the first login request and verifies whether an account name and a password in the first login request are consistent with corresponding information stored in a database; and if so, establishing communication connection with the first equipment. At this time, after establishing communication connection with the first device, searching corresponding user basic information in a database according to the account name and the password, packaging the user basic information into an identification object, and generating a first identifier; wherein, the user basic information at least comprises: user ID, user name; generating a corresponding key value pair < user ID according to the user ID, the first identifier and the identification object: first identifier > and < first identifier: identify object > and store.
Any number of modules, sub-modules, units, sub-units, or at least part of the functionality of any number thereof according to embodiments of the present disclosure may be implemented in one module. Any one or more of the modules, sub-modules, units, and sub-units according to the embodiments of the present disclosure may be implemented by being split into a plurality of modules. Any one or more of the modules, sub-modules, units, sub-units according to embodiments of the present disclosure may be implemented at least in part as a hardware circuit, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system on a chip, a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or may be implemented in any other reasonable manner of hardware or firmware by integrating or packaging a circuit, or in any one of or a suitable combination of software, hardware, and firmware implementations. Alternatively, one or more of the modules, sub-modules, units, sub-units according to embodiments of the disclosure may be at least partially implemented as a computer program module, which when executed may perform the corresponding functions.
For example, any plurality of the first communication module 610, the second communication module 620, and the communication disconnection module 630 may be combined and implemented in one module, or any one of them may be split into a plurality of modules. Alternatively, at least part of the functionality of one or more of these modules may be combined with at least part of the functionality of the other modules and implemented in one module. According to an embodiment of the present disclosure, at least one of the first communication module 610, the second communication module 620, and the communication disconnection module 630 may be implemented at least partially as a hardware circuit, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system on a chip, a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or may be implemented by hardware or firmware in any other reasonable manner of integrating or packaging a circuit, or implemented by any one of three implementations of software, hardware, and firmware, or any suitable combination of any of the three. Alternatively, at least one of the first communication module 610, the second communication module 620 and the communication disconnection module 630 may be at least partially implemented as a computer program module, which, when executed, may perform a corresponding function.
The login method and system provided by the present disclosure may be used in the financial field or other fields, and it should be noted that the login method and system provided by the present disclosure may be used in the financial field, for example, login of each business system in the financial field, and may also be used in other fields except the financial field.
Fig. 8 schematically shows a block diagram of an electronic device adapted to implement the above described method according to an embodiment of the present disclosure. The electronic device shown in fig. 8 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present disclosure.
As shown in fig. 8, the electronic device 800 described in this embodiment includes: a processor 801 which can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM)802 or a program loaded from a storage section 808 into a Random Access Memory (RAM) 803. The processor 801 may include, for example, a general purpose microprocessor (e.g., a CPU), an instruction set processor and/or associated chipset, and/or a special purpose microprocessor (e.g., an Application Specific Integrated Circuit (ASIC)), among others. The processor 801 may also include onboard memory for caching purposes. The processor 801 may include a single processing unit or multiple processing units for performing different actions of the method flows according to embodiments of the present disclosure.
In the RAM 803, various programs and data necessary for the operation of the system 800 are stored. The processor 801, the ROM 802, and the RAM 803 are connected to each other by a bus 804. The processor 801 performs various operations of the method flows according to the embodiments of the present disclosure by executing programs in the ROM 802 and/or RAM 803. Note that the programs may also be stored in one or more memories other than the ROM 802 and RAM 803. The processor 801 may also perform various operations of method flows according to embodiments of the present disclosure by executing programs stored in the one or more memories.
Electronic device 800 may also include input/output (I/O) interface 805, input/output (I/O) interface 805 also connected to bus 804, according to an embodiment of the present disclosure. The system 800 may also include one or more of the following components connected to the I/O interface 805: an input portion 806 including a keyboard, a mouse, and the like; an output section 807 including a signal such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage portion 808 including a hard disk and the like; and a communication section 809 including a network interface card such as a LAN card, a modem, or the like. The communication section 809 performs communication processing via a network such as the internet. A drive 810 is also connected to the I/O interface 805 as necessary. A removable medium 811 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 810 as necessary, so that a computer program read out therefrom is mounted on the storage section 808 as necessary.
According to embodiments of the present disclosure, method flows according to embodiments of the present disclosure may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable storage medium, the computer program containing program code for performing the method illustrated by the flow chart. In such an embodiment, the computer program can be downloaded and installed from a network through the communication section 809 and/or installed from the removable medium 811. The computer program, when executed by the processor 801, performs the above-described functions defined in the system of the embodiments of the present disclosure. The systems, devices, apparatuses, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the present disclosure.
An embodiment of the present invention further provides a computer-readable storage medium, which may be included in the apparatus/device/system described in the foregoing embodiment; or may exist separately and not be assembled into the device/apparatus/system. The computer-readable storage medium carries one or more programs which, when executed, implement a login method according to an embodiment of the present disclosure.
According to embodiments of the present disclosure, the computer-readable storage medium may be a non-volatile computer-readable storage medium, which may include, for example but is not limited to: a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In embodiments of the disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. For example, according to embodiments of the present disclosure, a computer-readable storage medium may include the ROM 802 and/or RAM 803 described above and/or one or more memories other than the ROM 802 and RAM 803.
It should be noted that each functional module in each embodiment of the present invention may be integrated into one processing module, or each module may exist alone physically, or two or more modules are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be substantially or partially embodied in the form of a software product, or all or part of the technical solution that contributes to the prior art.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
Those skilled in the art will appreciate that various combinations and/or combinations of features recited in the various embodiments and/or claims of the present disclosure can be made, even if such combinations or combinations are not expressly recited in the present disclosure. In particular, various combinations and/or combinations of the features recited in the various embodiments and/or claims of the present disclosure may be made without departing from the spirit or teaching of the present disclosure. All such combinations and/or associations are within the scope of the present disclosure.
While the disclosure has been shown and described with reference to certain exemplary embodiments thereof, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the disclosure as defined by the appended claims and their equivalents. Accordingly, the scope of the present disclosure should not be limited to the above-described embodiments, but should be defined not only by the appended claims, but also by equivalents thereof.

Claims (14)

1. A login method, comprising:
establishing a communication connection with a first device, wherein the communication connection with the first device is continuously maintained by continuously identifying whether a first identifier sent by the first device is consistent with a locally stored identifier;
establishing a communication connection with a second device and replacing the locally stored identity with a second identifier;
and disconnecting the communication connection with the first equipment, and sending prompt information to the first equipment.
2. The login method according to claim 1, wherein the disconnecting the communication connection with the first device and sending a prompt message to the first device comprises:
and when the communication connection with the first equipment is established after the communication connection with the second equipment is established, judging whether the first identifier is consistent with the replaced second identifier, if not, disconnecting the communication connection with the first equipment, and sending prompt information to the first equipment.
3. The login method of claim 1, wherein before establishing the communication connection with the first device, the method further comprises:
initiating a first login request through the first device;
and responding to the first login request, and establishing a communication connection with the first equipment.
4. The login method according to claim 3, wherein the establishing a communication connection with a first device in response to the first login request comprises:
responding to the first login request, and verifying whether an account name and a password in the first login request are consistent with corresponding information stored in a database;
and if so, establishing communication connection with the first equipment.
5. The login method of claim 4, wherein if the communication connection with the first device is established, the method further comprises:
searching corresponding user basic information in a database according to the account name and the password, packaging the user basic information into an identification object, and generating the first identifier; wherein the user basic information at least includes: user ID, user name;
generating a corresponding key value pair < user ID according to the user ID, the first identifier and the identification object: first identifier > and < first identifier: identify object > and store.
6. The login method of claim 5, wherein the establishing a communication connection with a second device and replacing the locally stored identity with a second identifier comprises:
establishing a communication connection with a second device, replacing the locally stored first identifier with a second identifier, and generating a corresponding key-value pair < user ID: second identifier > and < second identifier: identify object > and store.
7. The login method according to claim 1, wherein the validity duration of the first identifier transmitted by the first device, which is continuously identified whether the first identifier is consistent with the locally stored identifier, is less than or equal to a first preset time; and the effective duration of the continuous communication connection with the first equipment is less than or equal to a second preset time.
8. The login method according to claim 7, wherein the key-value pair < identifier: the effective duration of the identification object is less than or equal to a first preset time; key-value pair < user ID: the effective time length of the identifier is less than or equal to a second preset time.
9. The login method according to claim 1, wherein the communication connection with the second device is established, and the locally stored identifier is replaced by a second identifier, wherein the second identifier is an identifier generated after the communication connection with the second device is established.
10. A login system, comprising:
the first communication module is used for establishing communication connection with a first device, wherein the communication connection with the first device is continuously maintained by continuously identifying whether a first identifier sent by the first device is consistent with a locally stored identifier;
the second communication module is used for establishing communication connection with second equipment and replacing the locally stored identifier with a second identifier;
and the communication disconnection module is used for disconnecting the communication connection with the first equipment and sending prompt information to the first equipment.
11. The login system of claim 10, wherein the communication disconnection module is configured to disconnect the communication connection with the first device and send a prompt message to the first device, and comprises:
and when the communication connection with the first equipment is established after the communication connection with the second equipment is established, judging whether the first identifier is consistent with the replaced second identifier, if not, disconnecting the communication connection with the first equipment, and sending prompt information to the first equipment.
12. The login system of claim 10, further comprising:
and the request initiating module is used for initiating a device login request.
13. An electronic device, comprising: memory, processor and computer program stored on the memory and executable on the processor, characterized in that the processor implements the login method according to any one of claims 1 to 9 when executing the computer program.
14. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out a login method according to any one of claims 1 to 9.
CN202110568485.4A 2021-05-24 2021-05-24 Login method, system, electronic equipment and storage medium Pending CN113190812A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110568485.4A CN113190812A (en) 2021-05-24 2021-05-24 Login method, system, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110568485.4A CN113190812A (en) 2021-05-24 2021-05-24 Login method, system, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN113190812A true CN113190812A (en) 2021-07-30

Family

ID=76985150

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110568485.4A Pending CN113190812A (en) 2021-05-24 2021-05-24 Login method, system, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN113190812A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113746922A (en) * 2021-09-03 2021-12-03 杭州复杂美科技有限公司 Node connection method, computer device, and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120291114A1 (en) * 2011-05-13 2012-11-15 Cch Incorporated Single sign-on between applications
CN107277002A (en) * 2017-06-12 2017-10-20 环球智达科技(北京)有限公司 The method for limiting same user account registration terminal quantity
CN107689941A (en) * 2016-08-04 2018-02-13 中兴通讯股份有限公司 A kind of apparatus and method for preventing same user's repeat logon
CN110995682A (en) * 2019-11-26 2020-04-10 深圳市思迪信息技术股份有限公司 Method and device for preventing multiple terminals from logging in at different places
CN111565181A (en) * 2020-04-28 2020-08-21 中国联合网络通信集团有限公司 Single equipment login method, server and client

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120291114A1 (en) * 2011-05-13 2012-11-15 Cch Incorporated Single sign-on between applications
CN107689941A (en) * 2016-08-04 2018-02-13 中兴通讯股份有限公司 A kind of apparatus and method for preventing same user's repeat logon
CN107277002A (en) * 2017-06-12 2017-10-20 环球智达科技(北京)有限公司 The method for limiting same user account registration terminal quantity
CN110995682A (en) * 2019-11-26 2020-04-10 深圳市思迪信息技术股份有限公司 Method and device for preventing multiple terminals from logging in at different places
CN111565181A (en) * 2020-04-28 2020-08-21 中国联合网络通信集团有限公司 Single equipment login method, server and client

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113746922A (en) * 2021-09-03 2021-12-03 杭州复杂美科技有限公司 Node connection method, computer device, and storage medium
CN113746922B (en) * 2021-09-03 2023-10-20 杭州复杂美科技有限公司 Node connection method, computer device, and storage medium

Similar Documents

Publication Publication Date Title
US8832840B2 (en) Mobile application security and management service
US11003718B2 (en) Systems and methods for enabling a global aggregated search, while allowing configurable client anonymity
US9098707B2 (en) Mobile device application interaction reputation risk assessment
US11762979B2 (en) Management of login information affected by a data breach
US9235840B2 (en) Electronic transaction notification system and method
US20180302399A1 (en) Protocol-Level Identity Mapping
CN112491778A (en) Authentication method, device, system and medium
CN109889410B (en) Method, system, device, proxy equipment and storage medium for testing service function
CN113190812A (en) Login method, system, electronic equipment and storage medium
CN111818179A (en) User request processing method and device, computing equipment and medium
CN111666567A (en) Detection method, device, computer program and medium for malicious modification of application program
CN113132400B (en) Business processing method, device, computer system and storage medium
CN115733685A (en) Web session authentication management method and device, computer equipment and storage medium
CN112966286B (en) Method, system, device and computer readable medium for user login
CN114257632A (en) Disconnection reconnection method and device, electronic equipment and readable storage medium
CN113572763B (en) Data processing method and device, electronic equipment and storage medium
CN112769565B (en) Method, device, computing equipment and medium for upgrading cryptographic algorithm
CN112559825B (en) Service processing method, device, computing equipment and medium
CN111885006B (en) Page access and authorized access method and device
CN114785560B (en) Information processing method, device, equipment and medium
US8578492B2 (en) Application revocation
CN111125676B (en) Joint authorization method and device
CN113505397A (en) Authorization method, server, system and storage medium
CN116933226A (en) Request response method, request response device, electronic equipment and storage medium
CN117422416A (en) Block chain-based business handling method, device, equipment, medium and product

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination