CN113961909A - User operation-free login method and system for client - Google Patents

User operation-free login method and system for client Download PDF

Info

Publication number
CN113961909A
CN113961909A CN202111233142.9A CN202111233142A CN113961909A CN 113961909 A CN113961909 A CN 113961909A CN 202111233142 A CN202111233142 A CN 202111233142A CN 113961909 A CN113961909 A CN 113961909A
Authority
CN
China
Prior art keywords
client
module
account
token
login
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111233142.9A
Other languages
Chinese (zh)
Inventor
陈国庆
王维杰
张乾坤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Qitun Yunmeng Technology Co ltd
Original Assignee
Wuhan Qitun Yunmeng Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Qitun Yunmeng Technology Co ltd filed Critical Wuhan Qitun Yunmeng Technology Co ltd
Priority to CN202111233142.9A priority Critical patent/CN113961909A/en
Publication of CN113961909A publication Critical patent/CN113961909A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Abstract

The invention discloses a user operation-free login method and a user operation-free login system for a client, which specifically comprise the following steps: s1, when the client is started each time, firstly, whether the login token information is stored locally or not is obtained, if yes, the step is switched to S4, and if not, the step is switched to S2; s2, the client acquires the unique equipment code and stores the unique equipment code to the local, and the unique equipment code is reported after the client and the server are successfully linked in an encrypted manner. The login method and system free of user operation of the client can achieve the effect that a user does not need to register and login when entering the system for the first time, the client automatically acquires an equipment code, the equipment code is encrypted and then uploaded to the server to generate an account number and a password, the token returned by the server is automatically stored by the client, the subsequent entering of the client only needs to verify the token, the user can enter the system after entering the client for the first time and the user can enter the system without registering, and therefore the speed of entering the system is greatly improved.

Description

User operation-free login method and system for client
Technical Field
The invention relates to the technical field of mobile terminals and software application development, in particular to a user operation-free login method and system for a client.
Background
At present, along with entering a mobile information era, the application frequency of mobile phone APP is increasing day by day, and a plurality of current APPs are required to register a login flow when entering for the first time, which is very troublesome. The registration and login method is as follows: mobile phone number registration login, mailbox registration login, and third party (e.g., WeChat, Facebook, Apple) registration login.
Although the login state is kept when most of APPs subsequently re-enter, most of the APPs locally store the account and the password of the user, and when the client re-enters, the client can carry the account and the password to resend the network request, so that a large leak is caused, and a hacker can acquire the account and the password through network packet capturing, so that the pressure of a server is greatly increased, and the method is extremely unsafe.
Aiming at the current loophole, in order to solve the pain that a user needs to frequently enter and log in, the invention does not need to register and log in when the user enters the system for the first time, the client automatically acquires the equipment code, the equipment code is encrypted and then uploaded to the server to generate an account number and a password, the client automatically stores the token returned by the server, and the subsequent entry into the system only needs to verify the token.
Disclosure of Invention
Technical problem to be solved
Aiming at the defects of the prior art, the invention provides a login method and a login system of a client without user operation, which realize that a user can enter the client without registering for the first time, and greatly improve the speed of entering the system.
(II) technical scheme
In order to achieve the purpose, the invention is realized by the following technical scheme: a login method of a client without user operation specifically comprises the following steps:
s1, when the client is started each time, firstly, whether the login token information is stored locally or not is obtained, if yes, the step is switched to S4, and if not, the step is switched to S2;
s2, the client acquires the unique equipment code and stores the unique equipment code to the local, and the unique equipment code is encrypted and reported after the client and the server are successfully linked;
s3, the server decrypts the received device code to generate a unique account and a password, encrypts the unique account and the password and returns the unique account and the password to the client;
s4, after the client acquires the token, the token is stored locally to request for logging in the interface, if the token is invalid, the step is switched to S7, otherwise, the login is successful and the system is entered;
s5, after entering the system, the user sees the current login account number in the account number center interface, sets the password and binds a third party platform;
s6, after the user sets the password, the server side returns a new token, and the client side refreshes and stores the new token to the local after receiving the new token;
s7, when the token returned by the server is invalid, the token carries an error code, if the error code indicates that the account is sealed, the step goes to S10, and if the error code indicates that the token is overdue, the step goes to S2;
s8, sending out a request by a client terminal carrying a token of a user as a parameter during operation according to other requests of the subsequent user for operation in the system;
s9, when the user operates the switching account in the system, the client will return to the system initialization interface, and then go to step S10;
and S10, popping up a login box by the client, and enabling the user to input an account and a password for login or use a third party for login and enter the system after login is successful.
Preferably, the method for linking the client and the server in step S2 specifically includes the following steps:
t1, the client encryption module adopts MD5 encryption and AES-128-ECB encryption;
the T2 and the server side encryption module respectively adopt MD5 encryption and AES encryption, and the data transmitted and received by the client side are decrypted by adopting an AES encryption code;
and T3, the data transmission module adopts HTTPS encryption transmission and randomly dopes a URL suffix for confusion, and data sent by the client side adopts encryption operation in the transmission process.
Preferably, in the step T1, the AES-128-ECB encryption randomly uses a password to encrypt the data, and the password is agreed in advance by the client and the server, so that the password is known.
Preferably, the subsequent request of the user operating in the system in step S8 is to view a personal account or set a modified password.
The invention also provides a login system free of user operation for the client, which comprises a client acquisition equipment code module, a client encryption request module, a client user information storage module, a client user information reading module, a client account password setting module, a client binding third party account module, a client switching account module, a server account token generation module and a server decryption request module.
The client side equipment code acquisition module is used for acquiring whether login token information is stored locally or not after the system is started on the client side, and if the login token information is stored, sending a login state signal to the client side user information storage module; otherwise, the client side equipment code obtaining module sends an encryption signal to the client side encryption request module after obtaining the equipment code.
And the client side encryption request module is used for sending a request to the server side after receiving the equipment code encryption request signal and adopting MD5 and AES-128-ECB for encryption.
And the server side decryption request module is used for decrypting the encrypted character string in the request through an MD5 decryption algorithm and an AES-128-ECB encryption algorithm after receiving the client side login request, and sending an account generation signal to the server side account generation token module after the decryption is successful.
And the server side generation account token module is used for generating a corresponding unique account and token according to the equipment code after receiving the client side login request, and sending a signal to the client side user information storage module.
Preferably, the client user information saving module is configured to save the account information and token to the local after receiving the account information returned by the server.
Preferably, the client sets an account password module for setting the password of the account in the system after the user successfully logs in.
Preferably, the client-side binding third-party account module is used for binding a third-party platform account with the login account after the user successfully logs in, so that the user can conveniently reinstall and retrieve the account after uninstalling, and the client-side switching account module is used for switching to other accounts with the client-side binding third-party account module after the user successfully logs in, for example, the client-side binding third-party platform account with other devices.
(III) advantageous effects
The invention provides a user operation-free login method and system for a client. Compared with the prior art, the method has the following beneficial effects: the user operation-free login method and the user operation-free login system for the client specifically comprise the following steps: s1, when the client is started each time, firstly, whether the login token information is stored locally or not is obtained, if yes, the step is switched to S4, and if not, the step is switched to S2; s2, the client acquires the unique equipment code and stores the unique equipment code to the local, and the unique equipment code is encrypted and reported after the client and the server are successfully linked; s3, the server decrypts the received device code to generate a unique account and a password, encrypts the unique account and the password and returns the unique account and the password to the client; s4, after the client acquires the token, the token is stored locally to request for logging in the interface, if the token is invalid, the step is switched to S7, otherwise, the login is successful and the system is entered; s5, after entering the system, the user sees the current login account number in the account number center interface, sets the password and binds a third party platform; s6, after the user sets the password, the server side returns a new token, and the client side refreshes and stores the new token to the local after receiving the new token; s7, when the token returned by the server is invalid, the token carries an error code, if the error code indicates that the account is sealed, the step goes to S10, and if the error code indicates that the token is overdue, the step goes to S2; s8, sending out a request by a client terminal carrying a token of a user as a parameter during operation according to other requests of the subsequent user for operation in the system; s9, when the user operates the switching account in the system, the client will return to the system initialization interface, and then go to step S10; s10, popping up a login frame by the client, enabling the user to enter the system after login succeeds without registering or logging in when the user enters the system for the first time, automatically acquiring an equipment code by the client, uploading the equipment code to the server after encryption to generate an account and a password, automatically storing the token returned by the server by the client, and only verifying the token in a subsequent entering system, so that the user can enter the system without registering when entering the client for the first time, and greatly improving the speed of entering the system.
Drawings
FIG. 1 is a system schematic block diagram of a login system of the present invention;
FIG. 2 is a logic flow diagram of a log-in method of the present invention.
In the figure, 1 a client acquires an equipment code module, 2 a client encryption request module, 3 a client user information storage module, 4 a client user information reading module, 5 a client account password setting module, 6 a client binding third party account module, 7 a client switching account module, 8 a server generating account token module and 9 a server decryption request module.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1-2, an embodiment of the present invention provides a technical solution: a login method of a client without user operation specifically comprises the following steps:
s1, when the client is started each time, firstly, whether the login token information is stored locally or not is obtained, if yes, the step is switched to S4, and if not, the step is switched to S2;
s2, the client acquires the unique equipment code and stores the unique equipment code to the local, and the unique equipment code is encrypted and reported after the client and the server are successfully linked;
s3, the server decrypts the received device code to generate a unique account and a password, encrypts the unique account and the password and returns the unique account and the password to the client;
s4, after the client acquires the token, the token is stored locally to request for logging in the interface, if the token is invalid, the step is switched to S7, otherwise, the login is successful and the system is entered;
s5, after entering the system, the user sees the current login account number in the account number center interface, sets the password and binds a third party platform;
s6, after the user sets the password, the server side returns a new token, and the client side refreshes and stores the new token to the local after receiving the new token;
s7, when the token returned by the server is invalid, the token carries an error code, if the error code indicates that the account is sealed, the step goes to S10, and if the error code indicates that the token is overdue, the step goes to S2;
s8, sending out a request by the client terminal with the token of the user as a parameter during operation when other requests of subsequent users are operated in the system, wherein the other requests of the subsequent users are to view personal accounts or set modification passwords;
s9, when the user operates the switching account in the system, the client will return to the system initialization interface, and then go to step S10;
and S10, popping up a login box by the client, and enabling the user to input an account and a password for login or use a third party for login and enter the system after login is successful.
In the embodiment of the present invention, the method for linking the client and the server in step S2 specifically includes the following steps:
t1, the client side encryption module adopts MD5 encryption and AES-128-ECB encryption, the AES-128-ECB encryption randomly adopts a password to encrypt data, and the password is agreed by the client side and the server side in advance, so the password is known;
the T2 and the server side encryption module respectively adopt MD5 encryption and AES encryption, and the data transmitted and received by the client side are decrypted by adopting an AES encryption code;
and T3, the data transmission module adopts HTTPS encryption transmission and randomly dopes a URL suffix for confusion, and data sent by the client side adopts encryption operation in the transmission process.
The embodiment of the invention also provides a user operation-free login system of a client, which comprises a client acquisition equipment code module 1, a client encryption request module 2, a client user information storage module 3, a client user information reading module 4, a client account password setting module 5, a client binding third party account module 6, a client switching account module 7, a server account token generation module 8 and a server decryption request module 9.
The client side equipment code obtaining module 1 is used for obtaining whether the login token information is stored locally or not after the system is started on the client side, and if the login token information is stored, sending a login state signal to the client side user information storage module 3; otherwise, the client side equipment code obtaining module 1 obtains the equipment code and sends an encryption signal to the client side encryption request module 2.
The client side encryption request module 2 is used for sending a request to the server side after receiving the equipment code encryption request signal and adopting MD5 and AES-128-ECB for encryption.
The server side decryption request module 9 is configured to decrypt the encrypted character string in the request through the MD5 decryption algorithm and the AES-128-ECB encryption algorithm after receiving the client side login request, and send a generated account signal to the server side generated account token module 8 after the decryption is successful.
The server-side account number generating token module 8 is used for generating a corresponding unique account number and token according to the equipment code after receiving the client-side login request, and sending a signal to the client-side user information storage module 3.
In the embodiment of the invention, the client user information saving module 3 is used for saving the account information and token to the local after receiving the account information returned by the server.
In the embodiment of the invention, the client sets an account password module 5 for setting the password of the account in the system after the user successfully logs in.
In the embodiment of the invention, the client-side binding third party account module 6 is used for binding the account number of the third party platform by using the login account number after the user successfully logs in, so that the user can conveniently reinstall and retrieve the account number after uninstalling, and the client-side switching account module 7 is used for switching to other account numbers by using the module after the user successfully logs in, for example, the account number of the third party platform is bound on other equipment.
In conclusion, the invention can realize that the user does not need to register and log in when entering the system for the first time, the client automatically acquires the equipment code, the equipment code is encrypted and then uploaded to the server to generate the account number and the password, the token returned by the server is automatically stored by the client, the token can be only verified when the user enters the system subsequently, the user can enter the system without registering and logging in when entering the client for the first time, and the speed of entering the system is greatly improved.
And those not described in detail in this specification are well within the skill of those in the art.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (8)

1. A login method free of user operation of a client is characterized in that: the method specifically comprises the following steps:
s1, when the client is started each time, firstly, whether the login token information is stored locally or not is obtained, if yes, the step is switched to S4, and if not, the step is switched to S2;
s2, the client acquires the unique equipment code and stores the unique equipment code to the local, and the unique equipment code is encrypted and reported after the client and the server are successfully linked;
s3, the server decrypts the received device code to generate a unique account and a password, encrypts the unique account and the password and returns the unique account and the password to the client;
s4, after the client acquires the token, the token is stored locally to request for logging in the interface, if the token is invalid, the step is switched to S7, otherwise, the login is successful and the system is entered;
s5, after entering the system, the user sees the current login account number in the account number center interface, sets the password and binds a third party platform;
s6, after the user sets the password, the server side returns a new token, and the client side refreshes and stores the new token to the local after receiving the new token;
s7, when the token returned by the server is invalid, the token carries an error code, if the error code indicates that the account is sealed, the step goes to S10, and if the error code indicates that the token is overdue, the step goes to S2;
s8, sending out a request by a client terminal carrying a token of a user as a parameter during operation according to other requests of the subsequent user for operation in the system;
s9, when the user operates the switching account in the system, the client will return to the system initialization interface, and then go to step S10;
and S10, popping up a login box by the client, and enabling the user to input an account and a password for login or use a third party for login and enter the system after login is successful.
2. The login method of the client side without the user operation as claimed in claim 1, wherein: the method for linking the client and the server in step S2 specifically includes the following steps:
t1, the client encryption module adopts MD5 encryption and AES-128-ECB encryption;
the T2 and the server side encryption module respectively adopt MD5 encryption and AES encryption, and the data transmitted and received by the client side are decrypted by adopting an AES encryption code;
and T3, the data transmission module adopts HTTPS encryption transmission and randomly dopes a URL suffix for confusion, and data sent by the client side adopts encryption operation in the transmission process.
3. The login method of the client side without the user operation as claimed in claim 2, wherein: the AES-128-ECB encryption in step T1 randomly uses a password to encrypt the data, the password is agreed by the client and the server in advance, so the password is known.
4. The login method of the client side without the user operation as claimed in claim 1, wherein: other requests of the subsequent user operation in the system in step S8 are to view a personal account or set a modified password.
5. A system for implementing the login method of the client end without the operation of the user in any one of the claims 1-4, wherein: the system comprises a client side acquisition equipment code module (1), a client side encryption request module (2), a client side user information storage module (3), a client side user information reading module (4), a client side account number setting password module (5), a client side binding third party account number module (6), a client side switching account number module (7), a server side account number generating token module (8) and a server side decryption request module (9);
the client side equipment code acquiring module (1) is used for acquiring whether login token information is stored locally or not after a system is started on a client side, and if the login token information is stored, sending a login state signal to the client side user information storage module (3); otherwise, the client side equipment code acquisition module (1) acquires the equipment code and sends an encryption signal to the client side encryption request module (2);
the client side encryption request module (2) is used for sending a request to a server side after receiving the equipment code encryption request signal and adopting MD5 and AES-128-ECB for encryption;
the server side decryption request module (9) is used for decrypting the encrypted character string in the request through an MD5 decryption algorithm and an AES-128-ECB encryption algorithm after receiving the client side login request, and sending an account generation signal to the server side account generation token module (8) after the decryption is successful;
the server generates an account token module (8) which is used for generating a corresponding unique account and token according to the equipment code after receiving the client login request, and sending a signal to the client user information storage module (3).
6. The system of claim 5, wherein: and the client user information storage module (3) is used for storing the account information and token to the local after receiving the account information returned by the server.
7. The system of claim 5, wherein: the client sets an account password module (5) for setting the password of the account in the system after the user successfully logs in.
8. The system of claim 5, wherein: the client binding third party account module (6) is used for binding a third party platform account by using the login account after the user successfully logs in, and the client switching account module (7) is used for switching to other accounts by using the module after the user successfully logs in.
CN202111233142.9A 2021-10-22 2021-10-22 User operation-free login method and system for client Pending CN113961909A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111233142.9A CN113961909A (en) 2021-10-22 2021-10-22 User operation-free login method and system for client

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111233142.9A CN113961909A (en) 2021-10-22 2021-10-22 User operation-free login method and system for client

Publications (1)

Publication Number Publication Date
CN113961909A true CN113961909A (en) 2022-01-21

Family

ID=79466334

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111233142.9A Pending CN113961909A (en) 2021-10-22 2021-10-22 User operation-free login method and system for client

Country Status (1)

Country Link
CN (1) CN113961909A (en)

Similar Documents

Publication Publication Date Title
US10972290B2 (en) User authentication with self-signed certificate and identity verification
US10348715B2 (en) Computer-implemented systems and methods of device based, internet-centric, authentication
CN108650082B (en) Encryption and verification method of information to be verified, related device and storage medium
CN107302539B (en) Electronic identity registration and authentication login method and system
US8606234B2 (en) Methods and apparatus for provisioning devices with secrets
CN111615105B (en) Information providing and acquiring method, device and terminal
US20170063827A1 (en) Data obfuscation method and service using unique seeds
US20180124023A1 (en) Method, system and apparatus for storing website private key plaintext
CN109547198B (en) System for network transmission video file
CN111552935B (en) Block chain data authorized access method and device
US11356442B2 (en) Wearable device-based identity authentication method and system
CN108989848A (en) A kind of acquisition methods and management system of video resource file
JP2018517367A (en) Service provider certificate management
CN105447715A (en) Method and apparatus for anti-theft electronic coupon sweeping by cooperating with third party
WO2018099407A1 (en) Account authentication login method and device
KR102171377B1 (en) Method of login control
WO2017029708A1 (en) Personal authentication system
JP2012068930A (en) Password authentication system and method, and encrypted communication system and method
CN114158046B (en) Method and device for realizing one-key login service
Kaur et al. A comparative analysis of various multistep login authentication mechanisms
CN113961909A (en) User operation-free login method and system for client
CN102075933B (en) Method and system for running application software on intelligent terminal as well as related equipment
CN102045709B (en) Mobile terminal application data downloading method, system and mobile terminal
CN104184804A (en) Cloud storage system and system and method for downloading/providing data from cloud storage system
US20150302506A1 (en) Method for Securing an Order or Purchase Operation Means of a Client Device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination