CN113992353B - Login certificate processing method and device, electronic equipment and storage medium - Google Patents

Login certificate processing method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN113992353B
CN113992353B CN202111137088.8A CN202111137088A CN113992353B CN 113992353 B CN113992353 B CN 113992353B CN 202111137088 A CN202111137088 A CN 202111137088A CN 113992353 B CN113992353 B CN 113992353B
Authority
CN
China
Prior art keywords
virtual
user information
credential
login
party
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111137088.8A
Other languages
Chinese (zh)
Other versions
CN113992353A (en
Inventor
江之鉴
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Dajia Internet Information Technology Co Ltd
Original Assignee
Beijing Dajia Internet Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Dajia Internet Information Technology Co Ltd filed Critical Beijing Dajia Internet Information Technology Co Ltd
Priority to CN202111137088.8A priority Critical patent/CN113992353B/en
Publication of CN113992353A publication Critical patent/CN113992353A/en
Application granted granted Critical
Publication of CN113992353B publication Critical patent/CN113992353B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The disclosure relates to a processing method, a device, an electronic device and a storage medium of login credentials, wherein the method comprises the following steps: when a login request comprising a virtual three-party login credential is received, acquiring a configuration identifier and encrypted user information in the virtual three-party login credential, wherein the configuration identifier is a storage path corresponding to the configuration information of the virtual three-party login credential; acquiring configuration information of the virtual three-party login credentials according to the configuration identification; decrypting the encrypted user information according to the configuration information to obtain virtual user information; and after the virtual user information is successfully checked, returning the virtual user information to the request end of the login request. The method and the device for verifying the virtual three-party login credentials can not allow login for the virtual three-party login credentials which cannot decrypt user information and/or verify the user information, improve the safety of the virtual three-party login credentials, avoid the problem of poor service stability caused by the fact that visitors use more virtual three-party login credentials to login at the same time, and improve the service stability.

Description

Login certificate processing method and device, electronic equipment and storage medium
Technical Field
The disclosure relates to the technical field of internet, and in particular relates to a processing method and device of login credentials, electronic equipment and a storage medium.
Background
Currently, many websites and Application programs (APP) support three-party login, such as WeChat login, QQ login, newwave microblog login, and the like. The three-party login can request the related service provided by the third party to acquire the user information and complete the login behavior by means of the login credentials (code) issued by the third party service, so that the registration cost of the user can be reduced. But the user's information is stored and maintained at a third party, which creates an inconvenience for testing of the three-way login interface of the website and the application itself.
Fig. 1 is a flowchart of a related art login process using a three-party login credential, as shown in fig. 1, where a back-end service needs to transmit the login credential to a three-party service, and the three-party service checks and returns user information that is checked successfully, so as to complete the login process. When the pressure test is carried out, a large number of three-party login credentials are required to be obtained, or when the on-line automatic inspection test is carried out, the three-party login credentials are required to be continuously obtained for the operation of an automatic test script. If a real three-party login credential is used, a large number of three-party accounts need to be registered or a small number of accounts need to be reused frequently, but the risk control strategy of the three-party service is easily triggered by the two actions, so that the possibility of sealing the number is high.
To solve the problem that the three-way login credentials cannot be tested due to unavailability, a simulation (mock) mode is generally adopted for solving the problem. I.e. generating "false" login credentials according to fixed rules to simulate normal login credentials, while identifying these simulated login credentials in the code logic of the service. If the login credential is identified as a normal login credential, normally accessing a third party service to acquire real information of the user; if the login credentials are identified as simulated login credentials, the information parsed from the login credentials is associated with a simulated account. Simulation logic is simply implanted into the back-end service code, and on-line service is not affected under normal conditions, but a simulated login credential can be directly logged in, so that the security is low.
Disclosure of Invention
The disclosure provides a processing method, a device, an electronic device and a storage medium for login credentials, so as to at least solve the problem of low login credential security in the related art. The technical scheme of the present disclosure is as follows:
according to a first aspect of an embodiment of the present disclosure, there is provided a method for processing login credentials, including:
when a login request comprising a virtual three-party login credential is received, acquiring a configuration identifier and encrypted user information in the virtual three-party login credential, wherein the configuration identifier is a storage path corresponding to the configuration information of the virtual three-party login credential;
Acquiring configuration information of the virtual three-party login credentials according to the configuration identification;
decrypting the encrypted user information according to the configuration information to obtain virtual user information;
and after the virtual user information is successfully checked, returning the virtual user information to the request end of the login request.
Optionally, the virtual three-party login credential further includes an encrypted initial vector;
decrypting the encrypted user information according to the configuration information to obtain virtual user information, including:
and if the buffer memory comprises the encryption initial vector, decrypting the encrypted user information according to the key in the configuration information and the encryption initial vector to obtain virtual user information.
Optionally, the method further comprises:
receiving a virtual three-party login credential generation request, wherein the virtual three-party login credential generation request comprises the virtual user information and a configuration identifier;
acquiring configuration information of the virtual three-party login credentials to be generated according to the configuration identification;
checking the virtual user information according to the configuration information;
after the virtual user information is successfully checked, encrypting the virtual user information according to a secret key in the configuration information to obtain the encrypted user information;
And generating the virtual three-party login credential according to the configuration identifier and the encrypted user information, and returning the virtual three-party login credential to a request end of the virtual three-party login credential generation request.
Optionally, after the verification of the virtual user information is successful, encrypting the virtual user information according to a key in the configuration information, and before obtaining the encrypted user information, further including:
randomly generating an encryption initial vector, and storing the encryption initial vector into a cache;
generating the virtual three-party login credential according to the configuration identifier and the encrypted user information, including:
and generating the virtual three-party login credential according to the configuration identifier, the encrypted user information and the encrypted initial vector.
Optionally, after storing the encrypted initial vector in a cache, the method further includes:
and acquiring the effective time of the encryption initial vector from the configuration information, and configuring the effective time of the encryption initial vector in the cache.
Optionally, the method further comprises:
and deleting the encryption initial vector in the buffer memory when the effective time of the encryption initial vector is exceeded.
Optionally, when receiving a login request including a virtual three-party login credential, before obtaining the configuration identifier and the encrypted user information in the virtual three-party login credential, the method further includes:
and when a login request comprising a three-party login credential is received, acquiring a credential identifier in the three-party login credential, and determining that the three-party login credential is a virtual three-party login credential according to the credential identifier.
Optionally, after the verification of the virtual user information is successful, before the virtual user information is returned to the request end of the login request, the method further includes:
obtaining a virtual user identification range in the configuration information;
if the virtual user identifier in the virtual user information is in the virtual user identifier range, determining that the virtual user information verification is successful; and if the virtual user identifier is out of the virtual user identifier range, determining that the virtual user information verification fails.
Optionally, the processing method of the login credential is executed by a credential simulation server, and the request end is a server to be tested;
the server to be tested is used for identifying a credential identifier in the three-party login credential when receiving a login request which is sent by the test server and comprises the three-party login credential, and sending the login request which comprises the virtual three-party login credential to the credential simulation server when determining that the three-party login credential is a virtual three-party login credential; and after receiving the virtual user information returned by the credential simulation server, generating a login state of the virtual user information, and sending the login state to the test server.
According to a second aspect of the embodiments of the present disclosure, there is provided a processing apparatus for login credentials, including:
the virtual three-party certificate analysis module is configured to acquire a configuration identifier and encrypted user information in a virtual three-party login certificate when a login request comprising the virtual three-party login certificate is received, wherein the configuration identifier is a storage path corresponding to the configuration information of the virtual three-party login certificate;
the first configuration information acquisition module is configured to acquire the configuration information of the virtual three-party login credential according to the configuration identifier;
the user information decryption module is configured to decrypt the encrypted user information according to the configuration information to obtain virtual user information;
and the user information return module is configured to execute the return of the virtual user information to the request end of the login request after the virtual user information is successfully checked.
Optionally, the virtual three-party login credential further includes an encrypted initial vector;
the user information decryption module is configured to perform:
and if the buffer memory comprises the encryption initial vector, decrypting the encrypted user information according to the key in the configuration information and the encryption initial vector to obtain virtual user information.
Optionally, the apparatus further includes:
a credential generation request receiving module configured to perform receiving a virtual three-party login credential generation request, the virtual three-party login credential generation request including the virtual user information and a configuration identification;
the first configuration information acquisition module is configured to acquire the configuration information of the virtual three-party login credentials to be generated according to the configuration identification;
the first user information verification module is configured to perform verification on the virtual user information according to the configuration information;
the user information encryption module is configured to encrypt the virtual user information according to a key in the configuration information after the virtual user information is successfully verified, so as to obtain the encrypted user information;
and the virtual three-party certificate generation module is configured to execute the generation of the virtual three-party login certificate according to the configuration identification and the encrypted user information, and return the virtual three-party login certificate to a request end of the virtual three-party login certificate generation request.
Optionally, the apparatus further includes:
the initial vector generation module is configured to encrypt the virtual user information according to a key in the configuration information after the virtual user information is successfully verified, randomly generate an encrypted initial vector before the encrypted user information is obtained, and store the encrypted initial vector into a cache;
The virtual three-party credential generation module comprises
And the virtual three-party credential generating unit is configured to generate the virtual three-party login credential according to the configuration identifier, the encrypted user information and the encrypted initial vector.
Optionally, the apparatus further includes:
and a valid time setting module configured to perform, after storing the encrypted initial vector in a cache, obtaining a valid time of the encrypted initial vector from the configuration information, and configuring the valid time of the encrypted initial vector in the cache.
Optionally, the apparatus further includes:
and the cache deleting module is configured to delete the encryption initial vector in the cache when the effective time of the encryption initial vector is exceeded.
Optionally, the apparatus further includes:
and the virtual credential identification module is configured to acquire a credential identifier in the three-party login credential when receiving a login request comprising the three-party login credential, and determine that the three-party login credential is a virtual three-party login credential according to the credential identifier.
Optionally, the apparatus further includes:
the virtual identification range acquisition module is configured to acquire a virtual user identification range in the configuration information;
The second user information verification module is configured to execute the verification of the virtual user information if the virtual user identifier in the virtual user information is in the virtual user identifier range; and if the virtual user identifier is out of the virtual user identifier range, determining that the virtual user information verification fails.
Optionally, the processing device of the login credential is configured in a credential simulation server, and the request end is a server to be tested;
the server to be tested is used for identifying a credential identifier in the three-party login credential when receiving a login request which is sent by the test server and comprises the three-party login credential, and sending the login request which comprises the virtual three-party login credential to the credential simulation server when determining that the three-party login credential is a virtual three-party login credential; and after receiving the virtual user information returned by the credential simulation server, generating a login state of the virtual user information, and sending the login state to the test server.
According to a third aspect of embodiments of the present disclosure, there is provided an electronic device, comprising:
a processor;
a memory for storing the processor-executable instructions;
Wherein the processor is configured to execute the instructions to implement the method of processing login credentials according to the first aspect.
According to a fourth aspect of embodiments of the present disclosure, there is provided a computer readable storage medium, which when executed by a processor of an electronic device, causes the electronic device to perform the method of processing login credentials according to the first aspect.
According to a fifth aspect of embodiments of the present disclosure, there is provided a computer program product comprising a computer program or computer instructions, characterized in that the computer program or computer instructions, when executed by a processor, implement the method for processing login credentials according to the first aspect.
The technical scheme provided by the embodiment of the disclosure at least brings the following beneficial effects:
according to the embodiment of the disclosure, when a login request comprising a virtual three-party login credential is received, configuration information is obtained according to the configuration identifier in the virtual three-party login credential, encrypted user information in the virtual three-party login credential is decrypted based on the configuration information to obtain virtual user information, the virtual user information is checked, the virtual user information is returned to a request end of the login request after the virtual user information is checked successfully, and login is not allowed for the virtual three-party login credential which cannot be decrypted and/or is not checked successfully, so that the security of the virtual three-party login credential is improved, the problem of poor service stability caused by the fact that visitors use more virtual three-party login credentials to log in at the same time is avoided, and the service stability is improved.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the disclosure and together with the description, serve to explain the principles of the disclosure and do not constitute an undue limitation on the disclosure.
FIG. 1 is a flow chart of a related art login using a three-party login credential;
FIG. 2 is a flow chart of a related art login using a three-party login credential and a simulated three-party login credential;
FIG. 3 is a flowchart illustrating a method of processing login credentials, according to an example embodiment;
FIG. 4 is a flowchart illustrating a method of processing login credentials, according to another example embodiment;
FIG. 5 is a flow chart of generating virtual three-party login credentials in an embodiment of the present disclosure;
FIG. 6 is an interactive flow chart of a method of processing login credentials in an embodiment of the present disclosure;
FIG. 7 is a block diagram of a processing device for login credentials, shown in accordance with an exemplary embodiment;
fig. 8 is a block diagram of an electronic device, according to an example embodiment.
Detailed Description
In order to enable those skilled in the art to better understand the technical solutions of the present disclosure, the technical solutions of the embodiments of the present disclosure will be clearly and completely described below with reference to the accompanying drawings.
It should be noted that the terms "first," "second," and the like in the description and claims of the present disclosure and in the foregoing figures are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments of the disclosure described herein may be capable of operation in sequences other than those illustrated or described herein. The implementations described in the following exemplary examples are not representative of all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with some aspects of the present disclosure as detailed in the accompanying claims.
FIG. 2 is a flowchart of a related art login process using a three-party login credential and a simulated three-party login credential, as shown in FIG. 2, after an application program or a front-end page obtains the three-party login credential, the application program or the front-end page requests a back-end service to login, and when the back-end service recognizes that the three-party login credential is a real three-party login credential, the three-party login credential is transmitted to the three-party service, the three-party service checks and returns user information with successful check, and the back-end service generates a service custom login state according to the three-party user information; when the back-end service identifies the three-party login credential as a simulated three-party login credential, acquiring associated virtual account information and generating a service custom login state; and after the back-end service generates the login state, completing the three-party login and returning the login state to the application program or the front-end page.
As can be seen, in the related art, simulation logic is simply implanted in the back-end service code, and in normal conditions, online service is not affected, but the simulated login credentials can be logged in directly, so that the security is low, once leakage occurs, risks are caused to online service, if no limitation exists, malicious visitors can acquire login states of a large number of users through the simulated login credentials, and more users are logged in simultaneously; the server pressure is further increased by having a large number of interfaces that require a user login state. In order to solve the technical problem, the embodiments of the present disclosure provide the following technical solutions.
Fig. 3 is a flowchart illustrating a method for processing login credentials according to an exemplary embodiment, and as shown in fig. 3, the method for processing login credentials may be used in an electronic device such as a server, including the following steps.
In step S31, when a login request including a virtual three-party login credential is received, a configuration identifier and encrypted user information in the virtual three-party login credential are obtained, where the configuration identifier is a storage path corresponding to the configuration information of the virtual three-party login credential.
The virtual three-party login credential (mock code) may be used in testing a three-party login interface of a server, and may include a configuration identifier and encrypted user information.
And when a login request comprising a virtual three-party login credential is received, analyzing the virtual three-party login credential to acquire a configuration identifier and encrypted user information in the three-party login credential.
The user information (including but not limited to user equipment information, user personal information, etc.) related to the present disclosure is information authorized by the user or sufficiently authorized by each party.
In step S32, according to the configuration identifier, configuration information of the virtual three-party login credential is obtained.
And inquiring a storage position of configuration information of the virtual three-party login credential according to the configuration identifier, and acquiring the configuration information of the virtual three-party login credential from the storage position. The configuration information is some information about the virtual three-party login credentials, which is pre-configured, and may include a key for encrypting user information in the virtual three-party login credentials, and may also include other configuration information, such as classification or use of the virtual three-party login credentials, virtual user identification range, virtual three-party login credential invalidation bit, and validity time of an encrypted initial vector. When a large number of virtual three-party login credentials of the same type are found to be leaked, the invalid position in the configuration information can be regarded as invalid, the leaked virtual three-party login credentials cannot be verified, and safety risks caused by the leakage of the virtual three-party login credentials are avoided.
In step S33, the encrypted user information is decrypted according to the configuration information, so as to obtain virtual user information.
The configuration information comprises a secret key, the secret key of the encrypted user information is obtained from the configuration information, and the secret key is used for decrypting the encrypted user information to obtain virtual user information. The virtual user information is simulated three-party user information.
In one exemplary embodiment, the virtual three-party login credentials further comprise an encrypted initial vector;
decrypting the encrypted user information according to the configuration information to obtain virtual user information, including: and if the buffer memory comprises the encryption initial vector, decrypting the encrypted user information according to the key in the configuration information and the encryption initial vector to obtain virtual user information.
The generated virtual three-party login credentials also comprise encryption initial vectors (Initialization Vector, IV), wherein the encryption initial vectors are random character strings generated when encryption user information is generated, the encryption initial vectors are simultaneously stored in a cache when the encryption initial vectors are generated, subsequently when a login request comprising the virtual three-party login credentials is received, the encryption initial vectors in the received virtual three-party login credentials are obtained, whether the encryption initial vectors in the virtual three-party login credentials are included in the cache is checked, if the encryption initial vectors are not included in the cache, the verification is not passed, and if the encryption initial vectors are included in the cache, the encryption user information can be decrypted by using a secret key in configuration information and the encryption initial vectors, so that the virtual user information is obtained. Wherein the initial vector is used in the wired equivalent privacy protocol to combine with the key into a key seed as input to the RC4 algorithm to produce an encrypted byte stream to encrypt the data.
By including the encrypted initial vector in the virtual three-party login credential and storing the encrypted initial vector in the cache, when a login request including the virtual three-party login credential is received, cache verification is performed on the encrypted initial vector in the virtual three-party login credential, and the forged virtual three-party login credential cannot pass the verification, so that the security of the virtual three-party login credential is further improved, and the security risk caused by rule leakage of the virtual three-party login credential can be avoided.
In an exemplary embodiment, if the buffer includes the encryption initial vector, decrypting the encrypted user information according to the key in the configuration information and the encryption initial vector to obtain virtual user information, further includes: deleting the encrypted initial vector in the cache.
The cached encryption initial vector can be deleted after the verification is completed once, so that the virtual three-party login credentials are all once, and the security of the virtual three-party login credentials is further improved.
In step S34, after the verification of the virtual user information is successful, the virtual user information is returned to the request end of the login request.
And checking the virtual user information according to the configuration information, if the virtual user information in the virtual three-party login credentials is the virtual user information, determining that the virtual user information check is successful, returning the virtual user information to a request end of the login request, and generating the login state of the virtual user information after the request end receives the virtual user information. The request end can be a test server or a server to be tested, the test server is used for testing a three-party login interface of the server to be tested, and the electronic equipment for executing the login credential processing method can be the server to be tested or an independent server for verifying the virtual login credential. The login state is a credential that characterizes the login state.
According to the processing method of the login credential, when the login request comprising the virtual three-party login credential is received, configuration information is obtained according to the configuration identifier in the virtual three-party login credential, encryption user information in the virtual three-party login credential is decrypted based on the configuration information to obtain virtual user information, the virtual user information is verified, the virtual user information is returned to a request end of the login request after the verification is successful, and login cannot be allowed for the virtual three-party login credential which cannot decrypt the user information and/or is unsuccessful in verification, so that the security of the virtual three-party login credential is improved, the problem of poor service stability caused by the fact that visitors use more virtual three-party login credentials to perform login at the same time can be avoided, and the service stability is improved.
Based on the technical scheme, when a login request comprising a virtual three-party login credential is received, before the configuration identifier and the encrypted user information in the virtual three-party login credential are acquired, the method further comprises the steps of: and when a login request comprising a three-party login credential is received, acquiring a credential identifier in the three-party login credential, and determining that the three-party login credential is a virtual three-party login credential according to the credential identifier.
When a login request comprising a three-party login credential is received, a credential identifier in the three-party login credential is acquired, the credential identifier is identified to determine whether the three-party login credential is a virtual three-party login credential or a real three-party login credential, and if the three-party login credential is a virtual three-party login credential, subsequent processing of the virtual three-party login credential can be performed.
When the server to be tested receives a login request which is sent by the test server and comprises a three-party login credential, whether the three-party login credential is a virtual three-party login credential or not can be identified based on the credential identification in the three-party login credential, if the three-party login credential is the virtual three-party login credential, the subsequent processing of the virtual three-party login credential can be executed, if the three-party login credential is a real three-party login credential, the login request can be sent to a third-party server, and the third-party server can verify the three-party login credential.
By including the credential identification in the three-party login credentials, virtual three-party login credentials and real three-party login credentials can be distinguished.
On the basis of the technical scheme, after the virtual user information is successfully checked, before the virtual user information is returned to the request end of the login request, the method further comprises the following steps: obtaining a virtual user identification range in the configuration information; if the virtual user identifier in the virtual user information is in the virtual user identifier range, determining that the virtual user information verification is successful; and if the virtual user identifier is out of the virtual user identifier range, determining that the virtual user information verification fails.
The configuration information comprises a virtual user identification range, such as an ID range of a virtual user, a mobile phone number segment and the like, the virtual user identification range is obtained from the configuration information, if the virtual user identification in the virtual user information in the virtual three-party login certificate is positioned in the virtual user identification range in the configuration information, the virtual user information is determined to be legal virtual user data instead of real online user data, the virtual user information is determined to pass the verification, namely the virtual user information is determined to be successfully verified, and if the virtual user identification is positioned outside the virtual user identification range in the configuration information, the virtual user information is determined to fail the verification and the virtual user information cannot be returned. The forged virtual three-party login credentials can be effectively excluded through the preconfigured virtual user identification range.
On the basis of the technical scheme, the processing method of the login credentials is executed by a credential simulation server, and the request end is a server to be tested;
the server to be tested is used for identifying a credential identifier in the three-party login credential when receiving a login request which is sent by the test server and comprises the three-party login credential, and sending the login request which comprises the virtual three-party login credential to the credential simulation server when determining that the three-party login credential is a virtual three-party login credential; and after receiving the virtual user information returned by the credential simulation server, generating a login state of the virtual user information, and sending the login state to the test server.
The credential simulation server may be a device independent of the server to be tested, and may be used alone to provide services that simulate credentials, such as generating virtual three-way login credentials from requests of the test server, and verifying the virtual three-way login credentials based on the requests of the server to be tested.
When the test server tests the three-party login interface of the server to be tested, the credential simulation server can be requested in advance to generate a virtual three-party login credential, the credential simulation server generates the virtual three-party login credential based on the request of the test server, the virtual three-party login credential is returned to the test server, the test server can send a login request comprising the virtual three-party login credential to the server to be tested, when the server to be tested receives the login request comprising the three-party login credential sent by the test server or other equipment, the credential identification in the three-party login credential is identified, when the three-party login credential is determined to be the virtual three-party login credential, the credential simulation server sends the login request comprising the virtual three-party login credential to the credential simulation server, the credential simulation server performs the verification processing on the virtual three-party login credential, when verification is passed, virtual user information is returned to the server to be tested, after the server to be tested receives the virtual user information returned by the simulation server, the login state of the virtual user information is generated, and the login state is sent to the server to be tested, and the server to be tested is realized.
By using the device independent of the server to be tested as the credential simulation server, the version of the simulation function of the three-party login credential can be flexibly controlled, and the simulation function is updated without the need of re-servicing the server to be tested.
It should be noted that, besides the above-mentioned credential simulation server being independent of the server to be tested, the credential simulation service may be configured on the server to be tested, and the above-mentioned processing of the login credential may also be implemented.
Fig. 4 is a flowchart illustrating a method for processing login credentials according to an exemplary embodiment, and as shown in fig. 4, the method for processing login credentials may be used in an electronic device such as a server, and includes the following steps.
In step S41, a virtual three-party login credential generation request is received, the virtual three-party login credential generation request including virtual user information and a configuration identification.
When the test server tests the three-party login interface of the server to be tested, the virtual three-party login credentials are required to be used for logging in the three-party login interface of the server to be tested, so that the virtual three-party login credentials are required to be requested to be generated, the electronic equipment executing the processing method of the login credentials can receive the virtual three-party login credentials generation request sent by the test server, analyze the virtual three-party login credentials generation request, and acquire virtual user information and configuration identification in the virtual three-party login credentials generation request. The configuration identifier is a storage path of configuration information of the virtual three-party login credential to be generated.
In step S42, according to the configuration identifier, configuration information of the virtual three-party login credential to be generated is obtained.
According to the configuration identification in the virtual three-party login credential generation request, the configuration information of the virtual three-party login credential to be generated can be read.
In step S43, the virtual user information is checked according to the configuration information.
The configuration information comprises a virtual user identification range, such as an ID range of a virtual user, a mobile phone number segment and the like, if the virtual user information is positioned in the virtual user identification range in the configuration information, through verification, if the virtual user information is positioned outside the virtual user identification range in the configuration information, the verification fails, and a corresponding virtual three-party login credential cannot be generated.
In step S44, after the verification of the virtual user information is successful, the virtual user information is encrypted according to the key in the configuration information, so as to obtain the encrypted user information.
After the virtual user information in the virtual three-party login credential generation request is successfully checked, a key in the configuration information can be obtained, and the key is used for encrypting the virtual user information to obtain encrypted user information.
In step S45, the virtual three-party login credential is generated according to the configuration identifier and the encrypted user information, and the virtual three-party login credential is returned to the request end of the virtual three-party login credential generation request.
A virtual three-party login credential including the configuration identification and the encrypted user information is generated, and the virtual three-party login credential may also include a credential identification to distinguish the virtual three-party login credential from the real three-party login credential based on the credential identification. After the virtual three-party login credentials are generated, the virtual three-party login credentials are returned to the requesting end of the virtual three-party login credential generation request. The request end of the virtual three-party login credential generation request may be a test server, and after the test server receives the virtual three-party login credential, the test server may carry the virtual three-party login credential to request the three-party login interface of the server to be tested, so as to test the three-party login interface of the server to be tested.
In step S46, when a login request including a virtual three-party login credential is received, a configuration identifier and encrypted user information in the virtual three-party login credential are obtained, where the configuration identifier is a storage path corresponding to the configuration information of the virtual three-party login credential.
In step S47, according to the configuration identifier, configuration information of the virtual three-party login credential is obtained.
In step S48, the encrypted user information is decrypted according to the configuration information, so as to obtain virtual user information.
In step S49, after the verification of the virtual user information is successful, the virtual user information is returned to the request end of the login request.
According to the processing method of the login credential, when the virtual three-party login credential generation request is received, configuration information of the virtual three-party login credential to be generated is obtained according to the configuration identification in the virtual three-party login credential generation request, virtual user information in the virtual three-party login credential generation request is verified based on the configuration information, after the virtual user information is verified successfully, the virtual user information is encrypted according to the secret key in the configuration information to obtain encrypted user information, and then the virtual three-party login credential is generated according to the configuration identification and the encrypted user information, so that the mode of generating the virtual three-party login credential is not easy to leak, even if the virtual user information is leaked, the virtual three-party login credential is encrypted and needs to be verified, fake virtual three-party login credential is not easy to pass verification, and safety of the generated virtual three-party login credential is improved.
On the basis of the technical scheme, after the virtual user information is successfully checked, encrypting the virtual user information according to the key in the configuration information, and before obtaining the encrypted user information, further comprising: randomly generating an encryption initial vector, and storing the encryption initial vector into a cache;
generating the virtual three-party login credential according to the configuration identifier and the encrypted user information, including: and generating the virtual three-party login credential according to the configuration identifier, the encrypted user information and the encrypted initial vector.
After the virtual user information is successfully checked, the virtual user information can be encrypted, at the moment, an encryption initial vector can be randomly generated, and the security of the randomly generated encryption initial vector is higher. After the encryption initial vector is generated, the encryption initial vector is stored in a cache for later cache verification of the encryption initial vector in the virtual three-party login credential.
When the virtual three-party login credential is generated, the virtual three-party login credential comprising the configuration identifier, the encrypted initial vector and the encrypted user information is generated, and the generated virtual three-party login credential can also comprise the credential identifier. The format of the virtual three-party login credentials may be: the location of each piece of information in the virtual three-party login credential is not limited to this, any combination can be performed, and the separator between each piece of information can also adopt other symbols besides the symbol "-".
The encryption initial vector is randomly generated, the encryption initial vector and the secret key are used for encrypting the virtual user information, so that the security of the virtual user information can be improved, the security of the virtual three-party login certificate is improved, and the encryption initial vector is stored in the cache for carrying out cache verification on the encryption initial vector in the virtual three-party login certificate, so that the security of the virtual three-party login certificate can be further improved.
On the basis of the above technical solution, after storing the encrypted initial vector in a cache, the method further includes: and acquiring the effective time of the encryption initial vector from the configuration information, and configuring the effective time of the encryption initial vector in the cache.
The configuration information may further include an effective time of the encrypted initial vector, the effective time of the encrypted initial vector is obtained from the configuration information, and the effective time of the encrypted initial vector in the cache is configured, so that the encrypted initial vector in the cache is effective only in the effective time, and after the effective time is exceeded, the encrypted initial vector in the cache is invalid, and therefore if the effective time of the encrypted initial vector in the virtual three-party login credential is exceeded, the encrypted initial vector in the virtual three-party login credential cannot be checked to pass, and the security of the virtual three-party login credential is further improved.
On the basis of the technical scheme, the method further comprises the following steps: and deleting the encryption initial vector in the buffer memory when the effective time of the encryption initial vector is exceeded.
When the current time exceeds the effective time of the encryption initial vector, deleting the encryption initial vector in the cache, and timely cleaning the outdated encryption initial vector to release the storage space.
The following is an example of a credential simulation server for a device independent of the server to be tested.
FIG. 5 is a flow chart of generating a virtual three-party login credential in an embodiment of the present disclosure, as shown in FIG. 5, a test server sending a virtual three-party login credential generation request to a credential simulation server that includes virtual user information and a configuration identification; the credential simulation server reads configuration information according to the configuration identifier; the credential simulation server verifies virtual user information according to the configuration information; after the verification is successful, the credential simulation server randomly generates an encryption initial vector and stores the encryption initial vector into a cache; the credential simulation server encrypts the virtual user information according to the secret key and the encryption initial vector in the configuration information to obtain encrypted user information; the credential simulation server generates a virtual three-party login credential comprising a credential identifier, a configuration identifier, an encrypted initial vector and encrypted user information; the credential simulation server returns the virtual three-party login credentials to the test server.
FIG. 6 is an interactive flow diagram of a method of processing login credentials in an embodiment of the present disclosure, as shown in FIG. 6, a test server requesting a credential simulation server to generate a virtual three-party login credential; the certificate simulation server returns the generated virtual three-party login certificate; the test server sends a login request comprising a virtual three-party login credential to the server to be tested; the test server analyzes the virtual three-party login credentials, and when the virtual three-party login credentials are determined, a login request comprising the virtual three-party login credentials is sent to the credential simulation server; the credential simulation server analyzes the virtual three-party login credentials to obtain configuration identifiers, encrypted initial vectors and encrypted user information; the certificate simulation server reads configuration information; the credential simulation server verifies the encrypted initial vector in the cache; after the verification of the credential simulation server is successful, decrypting the encrypted user information according to the secret key and the encrypted initial vector in the configuration information to obtain virtual user information; the credential simulation server verifies virtual user information according to the configuration information; the credential simulation server returns the virtual user information to the server to be tested; the server to be tested generates a service custom login state based on virtual user information; and finishing the three-party login, and returning the login state to the test server by the server to be tested.
The embodiment of the disclosure supports online test of the three-party login service in a simulation mode, supports custom configuration of the virtual three-party login credentials, has higher safety, and can quickly stop damage through configuration even if leakage occurs; the issuing and checking logic of the service virtual three-party login credentials are provided, and the control capability of the virtual three-party login credentials is enhanced; and a configuration and cache verification mechanism is introduced, so that each virtual three-party login credential issued by the credential simulation server service has a configurable validity period, the leakage hazard is effectively reduced, the encryption initial vector and the configured secret key which need to be cached together complete the encryption and decryption process, and the malicious forged virtual three-party login credential cannot pass verification.
FIG. 7 is a block diagram illustrating a processing device for login credentials, according to an example embodiment. Referring to fig. 7, the apparatus includes a virtual three-party credential parsing module 71, a first configuration information acquisition module 72, a user information decryption module 73, and a user information return module 74.
The virtual three-party certificate analysis module 71 is configured to obtain a configuration identifier and encrypted user information in a virtual three-party login certificate when receiving a login request comprising the virtual three-party login certificate, wherein the configuration identifier is a storage path corresponding to the configuration information of the virtual three-party login certificate;
The first configuration information obtaining module 72 is configured to obtain configuration information of the virtual three-party login credential according to the configuration identifier;
the user information decryption module 73 is configured to perform decryption on the encrypted user information according to the configuration information, so as to obtain virtual user information;
the user information return module 74 is configured to perform a return of the virtual user information to the requesting end of the login request after the virtual user information verification is successful.
Optionally, the virtual three-party login credential further includes an encrypted initial vector;
the user information decryption module is configured to perform:
and if the buffer memory comprises the encryption initial vector, decrypting the encrypted user information according to the key in the configuration information and the encryption initial vector to obtain virtual user information.
Optionally, the apparatus further includes:
an initial vector deletion module configured to perform deleting the encrypted initial vector in the cache.
Optionally, the apparatus further includes:
a credential generation request receiving module configured to perform receiving a virtual three-party login credential generation request, the virtual three-party login credential generation request including the virtual user information and a configuration identification;
The first configuration information acquisition module is configured to acquire the configuration information of the virtual three-party login credentials to be generated according to the configuration identification;
the first user information verification module is configured to perform verification on the virtual user information according to the configuration information;
the user information encryption module is configured to encrypt the virtual user information according to a key in the configuration information after the virtual user information is successfully verified, so as to obtain the encrypted user information;
and the virtual three-party certificate generation module is configured to execute the generation of the virtual three-party login certificate according to the configuration identification and the encrypted user information, and return the virtual three-party login certificate to a request end of the virtual three-party login certificate generation request.
Optionally, the apparatus further includes:
the initial vector generation module is configured to encrypt the virtual user information according to a key in the configuration information after the virtual user information is successfully verified, randomly generate an encrypted initial vector before the encrypted user information is obtained, and store the encrypted initial vector into a cache;
The virtual three-party credential generation module comprises
And the virtual three-party credential generating unit is configured to generate the virtual three-party login credential according to the configuration identifier, the encrypted user information and the encrypted initial vector.
Optionally, the apparatus further includes:
and a valid time setting module configured to perform, after storing the encrypted initial vector in a cache, obtaining a valid time of the encrypted initial vector from the configuration information, and configuring the valid time of the encrypted initial vector in the cache.
Optionally, the apparatus further includes:
and the cache deleting module is configured to delete the encryption initial vector in the cache when the effective time of the encryption initial vector is exceeded.
Optionally, the apparatus further includes:
and the virtual credential identification module is configured to acquire a credential identifier in the three-party login credential when receiving a login request comprising the three-party login credential, and determine that the three-party login credential is a virtual three-party login credential according to the credential identifier.
Optionally, the apparatus further includes:
the virtual identification range acquisition module is configured to acquire a virtual user identification range in the configuration information;
The second user information verification module is configured to execute the verification of the virtual user information if the virtual user identifier in the virtual user information is in the virtual user identifier range; and if the virtual user identifier is out of the virtual user identifier range, determining that the virtual user information verification fails.
Optionally, the processing device of the login credential is configured in a credential simulation server, and the request end is a server to be tested;
the server to be tested is used for identifying a credential identifier in the three-party login credential when receiving a login request which is sent by the test server and comprises the three-party login credential, and sending the login request which comprises the virtual three-party login credential to the credential simulation server when determining that the three-party login credential is a virtual three-party login credential; and after receiving the virtual user information returned by the credential simulation server, generating a login state of the virtual user information, and sending the login state to the test server.
The specific manner in which the various modules perform the operations in the apparatus of the above embodiments have been described in detail in connection with the embodiments of the method, and will not be described in detail herein.
Fig. 8 is a block diagram of an electronic device, according to an example embodiment. For example, the electronic device 800 may be provided as a computer or server. Referring to fig. 8, the electronic device 800 includes a processing component 822 that further includes one or more processors and memory resources, represented by memory 832, for storing instructions, such as application programs, executable by the processing component 822. The application programs stored in memory 832 may include one or more modules each corresponding to a set of instructions. Further, the processing component 822 is configured to execute instructions to perform the processing method of login credentials described above.
The electronic device 800 may also include a power component 826 configured to perform power management of the electronic device 800, a wired or wireless network interface 850 configured to connect the electronic device 800 to a network, and an input-output (I/O) interface 858. The electronic device 800 may operate based on an operating system stored in the memory 832, such as Windows Server, mac OS XTM, unixTM, linuxTM, freeBSDTM, or the like.
In an exemplary embodiment, a computer-readable storage medium is also provided, such as memory 832 including instructions executable by processing component 822 of electronic device 800 to perform the above-described method of processing login credentials. Alternatively, the computer readable storage medium may be ROM, random Access Memory (RAM), CD-ROM, magnetic tape, floppy disk, optical data storage device, etc.
In an exemplary embodiment, a computer program product is also provided, comprising a computer program or computer instructions which, when executed by a processor, implement the above-described method of processing login credentials.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any adaptations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It is to be understood that the invention is not limited to the precise arrangements and instrumentalities shown in the drawings, which have been described above, and that various modifications and changes may be effected without departing from the scope thereof. The scope of the invention is limited only by the appended claims.

Claims (20)

1. A method for processing login credentials, comprising:
when a login request comprising a virtual three-party login credential is received, acquiring a configuration identifier and encrypted user information in the virtual three-party login credential, wherein the configuration identifier is a storage path corresponding to the configuration information of the virtual three-party login credential;
Acquiring configuration information of the virtual three-party login credentials according to the configuration identification;
decrypting the encrypted user information according to the configuration information to obtain virtual user information;
and after the virtual user information is successfully checked, returning the virtual user information to the request end of the login request.
2. The method of claim 1, wherein the virtual three-party logon credential further comprises an encrypted initial vector;
decrypting the encrypted user information according to the configuration information to obtain virtual user information, including:
and if the buffer memory comprises the encryption initial vector, decrypting the encrypted user information according to the key in the configuration information and the encryption initial vector to obtain virtual user information.
3. The method according to claim 1, wherein the method further comprises:
receiving a virtual three-party login credential generation request, wherein the virtual three-party login credential generation request comprises the virtual user information and a configuration identifier;
acquiring configuration information of the virtual three-party login credentials to be generated according to the configuration identification;
checking the virtual user information according to the configuration information;
After the virtual user information is successfully checked, encrypting the virtual user information according to a secret key in the configuration information to obtain the encrypted user information;
and generating the virtual three-party login credential according to the configuration identifier and the encrypted user information, and returning the virtual three-party login credential to a request end of the virtual three-party login credential generation request.
4. The method of claim 3, wherein after the virtual user information is successfully verified, encrypting the virtual user information according to the key in the configuration information, and before obtaining the encrypted user information, further comprising:
randomly generating an encryption initial vector, and storing the encryption initial vector into a cache;
generating the virtual three-party login credential according to the configuration identifier and the encrypted user information, including:
and generating the virtual three-party login credential according to the configuration identifier, the encrypted user information and the encrypted initial vector.
5. The method of claim 4, further comprising, after storing the encrypted initial vector in a cache:
and acquiring the effective time of the encryption initial vector from the configuration information, and configuring the effective time of the encryption initial vector in the cache.
6. The method as recited in claim 5, further comprising:
and deleting the encryption initial vector in the buffer memory when the effective time of the encryption initial vector is exceeded.
7. The method of claim 1, wherein upon receiving a login request comprising a virtual three-party login credential, prior to obtaining the configuration identification and encrypted user information in the virtual three-party login credential, further comprising:
and when a login request comprising a three-party login credential is received, acquiring a credential identifier in the three-party login credential, and determining that the three-party login credential is a virtual three-party login credential according to the credential identifier.
8. The method of claim 1, wherein after the virtual user information is successfully verified, before returning the virtual user information to the requesting end of the login request, further comprising:
obtaining a virtual user identification range in the configuration information;
if the virtual user identifier in the virtual user information is in the virtual user identifier range, determining that the virtual user information verification is successful; and if the virtual user identifier is out of the virtual user identifier range, determining that the virtual user information verification fails.
9. The method according to claim 1, wherein the processing method of the login credentials is performed by a credential simulation server, the requesting end being a server to be tested;
the server to be tested is used for identifying a credential identifier in the three-party login credential when receiving a login request which is sent by the test server and comprises the three-party login credential, and sending the login request which comprises the virtual three-party login credential to the credential simulation server when determining that the three-party login credential is a virtual three-party login credential; and after receiving the virtual user information returned by the credential simulation server, generating a login state of the virtual user information, and sending the login state to the test server.
10. A processing apparatus for login credentials, comprising:
the virtual three-party certificate analysis module is configured to acquire a configuration identifier and encrypted user information in a virtual three-party login certificate when a login request comprising the virtual three-party login certificate is received, wherein the configuration identifier is a storage path corresponding to the configuration information of the virtual three-party login certificate;
the first configuration information acquisition module is configured to acquire the configuration information of the virtual three-party login credential according to the configuration identifier;
The user information decryption module is configured to decrypt the encrypted user information according to the configuration information to obtain virtual user information;
and the user information return module is configured to execute the return of the virtual user information to the request end of the login request after the virtual user information is successfully checked.
11. The apparatus of claim 10, wherein the virtual three-party logon credential further comprises an encrypted initial vector;
the user information decryption module is configured to perform:
and if the buffer memory comprises the encryption initial vector, decrypting the encrypted user information according to the key in the configuration information and the encryption initial vector to obtain virtual user information.
12. The apparatus of claim 10, wherein the apparatus further comprises:
a credential generation request receiving module configured to perform receiving a virtual three-party login credential generation request, the virtual three-party login credential generation request including the virtual user information and a configuration identification;
the first configuration information acquisition module is configured to acquire the configuration information of the virtual three-party login credentials to be generated according to the configuration identification;
The first user information verification module is configured to perform verification on the virtual user information according to the configuration information; the user information encryption module is configured to encrypt the virtual user information according to a key in the configuration information after the virtual user information is successfully verified, so as to obtain the encrypted user information;
and the virtual three-party certificate generation module is configured to execute the generation of the virtual three-party login certificate according to the configuration identification and the encrypted user information, and return the virtual three-party login certificate to a request end of the virtual three-party login certificate generation request.
13. The apparatus of claim 12, wherein the apparatus further comprises:
the initial vector generation module is configured to encrypt the virtual user information according to a key in the configuration information after the virtual user information is successfully verified, randomly generate an encrypted initial vector before the encrypted user information is obtained, and store the encrypted initial vector into a cache;
the virtual three-party credential generation module comprises
And the virtual three-party credential generating unit is configured to generate the virtual three-party login credential according to the configuration identifier, the encrypted user information and the encrypted initial vector.
14. The apparatus of claim 13, wherein the apparatus further comprises:
and a valid time setting module configured to perform, after storing the encrypted initial vector in a cache, obtaining a valid time of the encrypted initial vector from the configuration information, and configuring the valid time of the encrypted initial vector in the cache.
15. The apparatus of claim 14, wherein the apparatus further comprises:
and the cache deleting module is configured to delete the encryption initial vector in the cache when the effective time of the encryption initial vector is exceeded.
16. The apparatus of claim 10, wherein the apparatus further comprises:
and the virtual credential identification module is configured to acquire a credential identifier in the three-party login credential when receiving a login request comprising the three-party login credential, and determine that the three-party login credential is a virtual three-party login credential according to the credential identifier.
17. The apparatus of claim 10, wherein the apparatus further comprises:
the virtual identification range acquisition module is configured to acquire a virtual user identification range in the configuration information;
The second user information verification module is configured to execute the verification of the virtual user information if the virtual user identifier in the virtual user information is in the virtual user identifier range; and if the virtual user identifier is out of the virtual user identifier range, determining that the virtual user information verification fails.
18. The apparatus of claim 10, wherein the processing means for logging in credentials is configured in a credential simulation server, the requesting end being a server to be tested;
the server to be tested is used for identifying a credential identifier in the three-party login credential when receiving a login request which is sent by the test server and comprises the three-party login credential, and sending the login request which comprises the virtual three-party login credential to the credential simulation server when determining that the three-party login credential is a virtual three-party login credential; and after receiving the virtual user information returned by the credential simulation server, generating a login state of the virtual user information, and sending the login state to the test server.
19. An electronic device, comprising:
a processor;
A memory for storing the processor-executable instructions;
wherein the processor is configured to execute the instructions to implement the method of processing login credentials of any of claims 1 to 9.
20. A computer readable storage medium, which when executed by a processor of an electronic device, causes the electronic device to perform the method of processing login credentials of any of claims 1 to 9.
CN202111137088.8A 2021-09-27 2021-09-27 Login certificate processing method and device, electronic equipment and storage medium Active CN113992353B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111137088.8A CN113992353B (en) 2021-09-27 2021-09-27 Login certificate processing method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111137088.8A CN113992353B (en) 2021-09-27 2021-09-27 Login certificate processing method and device, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN113992353A CN113992353A (en) 2022-01-28
CN113992353B true CN113992353B (en) 2024-01-09

Family

ID=79736904

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111137088.8A Active CN113992353B (en) 2021-09-27 2021-09-27 Login certificate processing method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN113992353B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115150176B (en) * 2022-07-07 2023-10-17 北京达佳互联信息技术有限公司 Replay attack prevention method and device, electronic equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018113690A1 (en) * 2016-12-23 2018-06-28 腾讯科技(深圳)有限公司 Login authorisation method and apparatus, and login method and apparatus
CN108833361A (en) * 2018-05-23 2018-11-16 国政通科技股份有限公司 A kind of identity identifying method and device based on virtual account
US10205717B1 (en) * 2013-04-01 2019-02-12 Amazon Technologies, Inc. Virtual machine logon federation
CN110351269A (en) * 2019-07-05 2019-10-18 苏州思必驰信息科技有限公司 The method for logging in open platform by third-party server
CN111931144A (en) * 2020-06-03 2020-11-13 南京南瑞信息通信科技有限公司 Unified safe login authentication method and device for operating system and service application

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10432592B2 (en) * 2015-05-10 2019-10-01 Citrix Systems, Inc. Password encryption for hybrid cloud services

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10205717B1 (en) * 2013-04-01 2019-02-12 Amazon Technologies, Inc. Virtual machine logon federation
WO2018113690A1 (en) * 2016-12-23 2018-06-28 腾讯科技(深圳)有限公司 Login authorisation method and apparatus, and login method and apparatus
CN108833361A (en) * 2018-05-23 2018-11-16 国政通科技股份有限公司 A kind of identity identifying method and device based on virtual account
CN110351269A (en) * 2019-07-05 2019-10-18 苏州思必驰信息科技有限公司 The method for logging in open platform by third-party server
CN111931144A (en) * 2020-06-03 2020-11-13 南京南瑞信息通信科技有限公司 Unified safe login authentication method and device for operating system and service application

Also Published As

Publication number Publication date
CN113992353A (en) 2022-01-28

Similar Documents

Publication Publication Date Title
US10305902B2 (en) Two-channel authentication proxy system capable of detecting application tampering and method therefor
EP2963958B1 (en) Network device, terminal device and information security improving method
CN114900338B (en) Encryption and decryption method, device, equipment and medium
CN109039987A (en) A kind of user account login method, device, electronic equipment and storage medium
CN112333198A (en) Secure cross-domain login method, system and server
CN108322416B (en) Security authentication implementation method, device and system
CN106612180A (en) Method and device for realizing session identifier synchronization
CN105447715A (en) Method and apparatus for anti-theft electronic coupon sweeping by cooperating with third party
CN112838951B (en) Operation and maintenance method, device and system of terminal equipment and storage medium
CN111241555A (en) Access method and device for simulating user login, computer equipment and storage medium
CN112883357A (en) Stateless login authentication method and device
CN113992353B (en) Login certificate processing method and device, electronic equipment and storage medium
CN109889410B (en) Method, system, device, proxy equipment and storage medium for testing service function
CN111510442A (en) User verification method and device, electronic equipment and storage medium
CN109697163B (en) Program testing method and device
CN102055764A (en) Method and device for monitoring operation of accessing business system
CN109495458A (en) A kind of method, system and the associated component of data transmission
CN117375986A (en) Application access method, device and server
CN105577657A (en) SSL/TLS algorithm suite expansion method
CN114938313B (en) Man-machine identification method and device based on dynamic token
KR101745919B1 (en) User authentication method and system using software-based HSM without password exposure
KR20190012026A (en) System and method for login authentication processing
CN106130996A (en) A kind of website attack protection checking system and method
CN112328986A (en) User identity authentication method, device, server and storage medium
CN113271306B (en) Data request and transmission method, device and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant