CN114006700A - Client login method and device, computer equipment and storage medium - Google Patents
Client login method and device, computer equipment and storage medium Download PDFInfo
- Publication number
- CN114006700A CN114006700A CN202110908187.5A CN202110908187A CN114006700A CN 114006700 A CN114006700 A CN 114006700A CN 202110908187 A CN202110908187 A CN 202110908187A CN 114006700 A CN114006700 A CN 114006700A
- Authority
- CN
- China
- Prior art keywords
- token
- server
- information
- mobile terminal
- login
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 72
- 238000012545 processing Methods 0.000 claims abstract description 13
- 238000004590 computer program Methods 0.000 claims description 29
- 238000010586 diagram Methods 0.000 description 11
- 238000004891 communication Methods 0.000 description 10
- 230000000694 effects Effects 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 3
- 239000004973 liquid crystal related substance Substances 0.000 description 2
- 238000013475 authorization Methods 0.000 description 1
- 238000004898 kneading Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
- H04L9/3213—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
- G06K17/0022—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device
- G06K17/0025—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device the arrangement consisting of a wireless interrogation device in combination with a device for optically marking the record carrier
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0807—Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Telephonic Communication Services (AREA)
Abstract
The application relates to a client login method, a client login device, computer equipment and a storage medium. The method comprises the following steps: the mobile terminal scans the two-dimensional code image displayed on the computer equipment to acquire the encrypted information carried in the two-dimensional code image, and then the mobile terminal decrypts the encrypted information to acquire Token, so that the mobile terminal can access the server by using the Token, wherein the two-dimensional code image is acquired by encrypting a service Token sent by the server by the computer equipment, and the Token is used for the mobile terminal to access the server. By adopting the method, the mobile terminal can work, and the flexibility and the convenience of processing the service by the user are improved.
Description
Technical Field
The present application relates to the field of information security technologies, and in particular, to a client login method, an apparatus, a computer device, and a storage medium.
Background
Typically, an enterprise is under information security concerns and a worker may log onto a client of the enterprise system on a computer device at an office location to access a server of the enterprise system. For example, for a business in the financial field such as a bank, a worker usually can only log in the financial system of the business at the business office of the business.
Because the account number of the staff is bound with the computer equipment used by the staff, the staff cannot use the client at other places, cannot process the service on the client in time, and has poor flexibility in service processing.
Disclosure of Invention
In view of the foregoing, it is desirable to provide a client login method, device, computer device, and storage medium capable of improving flexibility and convenience of service processing.
A client login method, the method comprising:
scanning a two-dimensional code image displayed on computer equipment through a mobile terminal to obtain encrypted information carried in the two-dimensional code image; the two-dimensional code image is obtained by encrypting a service Token sent by a server by computer equipment, wherein the Token is used for a mobile terminal to access the server;
decrypting the encrypted information to obtain Token;
and adopting Token to log in the client of the server on the mobile terminal.
In one embodiment, a client using Token login server includes: and adopting Token to log in the client of the server within the preset effective duration.
In one embodiment, the method further comprises: receiving a Token failure instruction sent by a server; and responding to the Token failure instruction, and quitting the client on the mobile terminal.
In one embodiment, the method further comprises: the Token invalidation instruction is sent by the server under the condition that the server receives the Token updating request sent by the computer equipment and generates the target Token based on the Token updating request.
A client login method, the method comprising:
acquiring login information input by a user, and sending the login information and identification information of computer equipment to a server;
receiving a service Token returned by the server based on the login information; the Token is generated according to the login information and the identification information after the server verifies the login information; the Token is used for the mobile terminal to access the server;
encrypting Token to obtain a two-dimensional code image; the two-dimension code image is used for the mobile terminal to scan the two-dimension code image and obtain the encryption information carried in the two-dimension code image, the Token is obtained after the encryption information is decrypted, and the Token is adopted to log in the client side of the server on the mobile terminal.
In one embodiment, the method further comprises: sending a token updating instruction to a server; receiving a target Token generated by the server based on the Token updating instruction; and encrypting the target Token to obtain the updated two-dimensional code image.
In one embodiment, the method further comprises: collecting hardware information of computer equipment; and processing the hardware information according to a preset abstract algorithm to generate identification information.
In one embodiment, the method further comprises: acquiring registration information input by a user, and sending the registration information and identification information to a server; receiving a registration result returned by the server; the registration result is obtained by matching the registration information with registrable personnel information after the server obtains the registrable personnel information corresponding to the identification information in the preset corresponding relationship; the preset corresponding relation comprises registrable personnel information corresponding to a plurality of identification information respectively.
A client login apparatus, the apparatus comprising: scanning module, decryption module and login module, wherein:
the scanning module is used for scanning the two-dimensional code image displayed on the computer equipment through the mobile terminal to obtain the encrypted information carried in the two-dimensional code image; the two-dimensional code image is obtained by encrypting a service Token sent by a server by computer equipment, wherein the Token is used for a mobile terminal to access the server;
the decryption module is used for decrypting the encrypted information to obtain Token;
and the login module is used for logging in the client of the server by adopting Token on the mobile terminal.
A client login apparatus, the apparatus comprising: the device comprises an acquisition module, a receiving module and an encryption module, wherein:
the acquisition module is used for acquiring login information input by a user and sending the login information and the identification information of the computer equipment to the server;
the receiving module is used for receiving a service Token Token returned by the server based on the login information; the Token is generated according to the login information and the identification information after the server verifies the login information; the Token is used for the mobile terminal to access the server;
the encryption module is used for encrypting the Token to obtain a two-dimensional code image; the two-dimension code image is used for the mobile terminal to scan the two-dimension code image and obtain the encryption information carried in the two-dimension code image, the Token is obtained after the encryption information is decrypted, and the Token is adopted to log in the client side of the server on the mobile terminal.
A mobile terminal comprising a memory and a processor, the memory storing a computer program, the processor when executing the computer program implementing the steps of:
scanning a two-dimensional code image displayed on computer equipment through a mobile terminal to obtain encrypted information carried in the two-dimensional code image; the two-dimensional code image is obtained by encrypting a service Token sent by a server by computer equipment, wherein the Token is used for a mobile terminal to access the server;
decrypting the encrypted information to obtain Token;
and adopting Token to log in the client of the server on the mobile terminal.
A computer device comprising a memory and a processor, the memory storing a computer program, the processor implementing the following steps when executing the computer program:
acquiring login information input by a user, and sending the login information and identification information of computer equipment to a server;
receiving a service Token returned by the server based on the login information; the Token is generated according to the login information and the identification information after the server verifies the login information; the Token is used for the mobile terminal to access the server;
encrypting Token to obtain a two-dimensional code image; the two-dimension code image is used for the mobile terminal to scan the two-dimension code image and obtain the encryption information carried in the two-dimension code image, the Token is obtained after the encryption information is decrypted, and the Token is adopted to log in the client side of the server on the mobile terminal.
A computer-readable storage medium, on which a computer program is stored which, when executed by a processor, carries out the steps of:
scanning a two-dimensional code image displayed on computer equipment through a mobile terminal to obtain encrypted information carried in the two-dimensional code image; the two-dimensional code image is obtained by encrypting a service Token sent by a server by computer equipment, wherein the Token is used for a mobile terminal to access the server;
decrypting the encrypted information to obtain Token;
and adopting Token to log in the client of the server on the mobile terminal.
A computer-readable storage medium, on which a computer program is stored which, when executed by a processor, carries out the steps of:
acquiring login information input by a user, and sending the login information and identification information of computer equipment to a server;
receiving a service Token returned by the server based on the login information; the Token is generated according to the login information and the identification information after the server verifies the login information; the Token is used for the mobile terminal to access the server;
encrypting Token to obtain a two-dimensional code image; the two-dimension code image is used for the mobile terminal to scan the two-dimension code image and obtain the encryption information carried in the two-dimension code image, the Token is obtained after the encryption information is decrypted, and the Token is adopted to log in the client side of the server on the mobile terminal.
According to the client login method, the client login device, the computer device and the storage medium, the computer device obtains login information input by a user, sends the login information and identification information of the computer device to the server, then the computer device can receive a service Token returned by the server based on the login information and encrypt the Token to obtain a two-dimensional code image, then the mobile terminal scans the two-dimensional code image displayed on the computer device to obtain encrypted information carried in the two-dimensional code image, and further decrypts the encrypted information to obtain the Token, and the mobile terminal can login the client of the server by adopting the Token. Because the Token used when the mobile terminal accesses the server comes from the computer equipment and the account with the client authority of logging in the server, the office work of the mobile terminal can be realized on the basis of improving the information security and the traceability after illegal operation, and the flexibility and the convenience of processing services by users are improved.
Drawings
FIG. 1 is a diagram of an application environment for a client login method in one embodiment;
FIG. 2 is a flowchart illustrating a method for client login in one embodiment;
FIG. 3 is a flowchart illustrating a method for client login in one embodiment;
FIG. 4 is a flowchart illustrating a method for client login in one embodiment;
FIG. 5 is a flowchart illustrating a method for client login in one embodiment;
FIG. 6 is a flowchart illustrating a method for client login in one embodiment;
FIG. 7 is a flowchart illustrating a method for client login in one embodiment;
FIG. 7-a is a flowchart illustrating a method for client login in one embodiment;
FIG. 8 is a block diagram showing the structure of a client login device in one embodiment;
FIG. 9 is a block diagram showing the structure of a client login device in one embodiment;
FIG. 10 is a block diagram showing the structure of a client login device in one embodiment;
FIG. 11 is a block diagram showing the structure of a client login device in one embodiment;
FIG. 12 is a block diagram showing the structure of a client login device in one embodiment;
FIG. 13 is a block diagram showing the structure of a client login device in one embodiment;
FIG. 14 is an internal block diagram of a mobile terminal in one embodiment;
FIG. 15 is a diagram showing an internal structure of a computer device according to an embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
The client login method provided by the application can be applied to the application environment shown in fig. 1. Wherein the mobile terminal 102 and the computer device 104 communicate with the server 106 via a network, respectively. The computer device 104 acquires login information input by a user, and sends the login information and identification information of the computer device to the server, and then the computer device 104 can receive a service Token returned by the server based on the login information, encrypt the Token and acquire a two-dimensional code image; the mobile terminal 102 may obtain the encrypted information carried in the two-dimensional code image by scanning the two-dimensional code image displayed on the computer device, and further decrypt the encrypted information, thereby obtaining Token, and the mobile terminal may log in the client of the server by using Token. The mobile terminal 102 may be, but is not limited to, various smart phones, tablet computers, and portable wearable devices, the computer device 104 may include, but is not limited to, a personal computer, a notebook computer, and the like, and the server 106 may be implemented by an independent server or a server cluster formed by a plurality of servers.
In one embodiment, as shown in fig. 2, a client login method is provided, which is described by taking the application of the method to the mobile terminal in fig. 1 as an example, and includes the following steps:
s202, scanning the two-dimensional code image displayed on the computer equipment through the mobile terminal to obtain encrypted information carried in the two-dimensional code image; the two-dimensional code image is obtained by encrypting a service Token sent by the server by the computer equipment, and the Token is used for the mobile terminal to access the server.
The service Token may be a string of randomly generated character strings of the server, and may be of any length and composed of any characters due to different generated algorithms. The service Token may be generated when the server detects that the client of the computer device logs in the server, or may be generated based on a Token generation instruction sent by the client of the computer device. On the basis of acquiring Token, the computer equipment or the mobile terminal can access the server without a user name and a password.
After the server generates the Token, the Token may be transmitted to the computer device. To facilitate a user to access the server using Token, the computer device may convert Token into a form of a two-dimensional code. Further, in order to ensure login security and prevent an illegal login user from accessing the server by using the Token, the computer device may encrypt the Token to obtain encrypted information, and then convert the encrypted information into a two-dimensional code image, so that a device scanning the two-dimensional code image may obtain the encrypted information carried in the two-dimensional code.
The encryption information may be obtained by encrypting the service Token sent by the server in a symmetric encryption manner, or obtained by encrypting the service Token sent by the server in an asymmetric encryption manner, where the encryption manner is not limited herein.
In particular, limited by office space, office hours, and office equipment, a user may not be able to handle emergency services in a timely manner, e.g., the user is on business or on vacation, and is unable to perform money transfer operations in a timely manner via a dedicated computer within the enterprise. Based on the above situation, the user can scan the two-dimensional code displayed on the computer device through the client APP or the applet installed in the mobile terminal for processing the service, and obtain the encrypted information carried in the two-dimensional code image. Further, the mobile terminal may decrypt the encrypted information to obtain the Token, so that the Token may be used to access the server.
S204, decrypting the encrypted information to obtain Token.
Specifically, the server may adopt a decryption method corresponding to the encryption method of the computer device when decrypting the encrypted information. If the encrypted information is generated by the computer device in a symmetric encryption manner, the mobile terminal can decrypt the encrypted information carried in the two-dimensional code image through the built-in secret key, so as to obtain Token. If the encrypted information is generated in an asymmetric encryption manner, the computer device may encrypt Token by using a mobile terminal public key, so that the mobile terminal may decrypt the encrypted information by using a built-in mobile terminal private key, thereby obtaining Token.
Furthermore, the mobile terminal can also locally store the Token, so that the mobile terminal does not need to scan the two-dimensional code again to obtain the Token when accessing the server later.
S206, adopting Token to log in the client of the server on the mobile terminal.
In a possible implementation manner, the server may store a plurality of tokens with access rights, which are generated and sent by the server, in the server; when the mobile terminal logs in the client to access the server, the user can send an access request to the server by using the locally stored Token without inputting an account password on the mobile terminal. The server can match and compare the Token with a plurality of tokens with access rights sent by the server, and if the Token used by the mobile terminal for accessing the server is matched with the Token sent by the server, the mobile terminal is considered to have the access rights and can be authorized to access the server.
In another possible implementation manner, the server may also add digital signature information to Token when generating Token. When the mobile terminal sends an access request to the server by using the locally stored Token, the server can extract the signature information from the received Token, authenticate and verify the signature information, and complete authorization and authentication if the authentication is passed, so that the mobile terminal can successfully log in the client of the server.
In the client login method, the mobile terminal can acquire the encrypted information carried in the two-dimensional code image by scanning the two-dimensional code image displayed on the computer equipment, wherein the two-dimensional code image is obtained by encrypting a service Token sent by the server by the computer equipment, the Token is used for the mobile terminal to access the server, and then the mobile terminal can decrypt the encrypted information to obtain the Token, so that the mobile terminal can use the Token to log in the client of the server. In the client login method, when the mobile terminal accesses the server, the used Token comes from the account and the computer equipment with the client authority of logging in the server, so that the mobile terminal office is realized on the basis of ensuring the safety of information and the traceability after illegal operation, and the flexibility and the convenience of processing services by the user are improved.
In an embodiment, on the basis of the above embodiment, the mobile terminal may use Token to log in the client of the server within a preset effective duration.
The valid duration may be a valid period that Token can use to log in the server client, and the period may be set autonomously by the user according to the actual work requirement, for example, 1 month.
Specifically, in a possible implementation manner, when the mobile terminal locally stores the Token, one local timer may be started to time, and after the time counted by the timer exceeds a preset effective duration, the mobile terminal may automatically delete the Token, so as to ensure that the mobile terminal can only use the Token to log in the client of the server within the preset effective duration.
In another possible implementation manner, after the server generates the Token, when the Token is locally stored, a local timer may be started to time at the same time, and after the time counted by the local timer exceeds a preset effective duration, the server automatically deletes the Token. When the mobile terminal accesses the server using the invalid Token, the server may determine that the Token currently accessed does not match the stored Token, thereby restricting the access request of the mobile terminal.
In another possible implementation manner, when the server generates the Token, digital signature information may be added to the Token for authentication, the digital signature information may further include preset valid duration information, after the server receives the Token sent when the mobile terminal logs in, the server may extract the digital signature information in the Token for authentication, if the current login time of the mobile terminal exceeds the preset valid duration in the digital signature information, the server confirms that the Token is invalid, the mobile terminal cannot log in the client of the server through the Token, for example, the digital signature information included in the Token further includes a preset valid duration which is up to 7/15 days in 2020, and indicates that the Token is invalid after 7/15 days in 2020.
In addition, the preset time length can also be set by computer equipment. The method comprises the steps that when local storage is carried out on the Token after the Token sent by a server is received by computer equipment, a local timer can be started simultaneously for timing, after the timing time of the timer exceeds a preset effective duration, the computer equipment can send a Token updating request to the server, the server regenerates a new Token based on the Token updating request and covers the original Token, the original Token is made invalid, and therefore the mobile terminal can only adopt the original Token to log in a client of the server within the preset effective duration.
In this embodiment, by setting the effective duration of Token, the security risk caused by Token leakage can be reduced, and the security of the client of the server for Token login of the mobile terminal is improved.
In an embodiment, on the basis of the foregoing embodiment, as shown in fig. 3, after the Token acquired by the mobile terminal exceeds the valid duration, the method for logging in the client of the server by the mobile terminal further includes the following steps:
s302, receiving a Token failure instruction sent by the server.
Specifically, the mobile terminal may receive a Token invalidation instruction sent by the server in the process of logging in the client of the server or in a logged-in state. The Token invalidation instruction may be sent by the server after the preset effective duration of the Token is exceeded, or may be sent by the server after the server receives a Token updating instruction sent by the computer device corresponding to the Token, where the Token updating instruction is used to instruct the server to regenerate a new Token and to overwrite the original Token.
The invalidation command may be an invalidation prompting command or an exit logging command, which is not limited herein. The failure prompt instruction can be used for prompting that the Token acquired by the mobile terminal is failed and cannot be continuously used for accessing the server.
S304, responding to the Token failure instruction, and quitting the client on the mobile terminal.
Specifically, in the process of logging in the client of the server or in the logged state, after receiving the Token invalidation instruction sent by the server, the mobile terminal may respond to the Token invalidation instruction and exit from the client.
If the current mobile terminal is in a state of accessing the server, the server can send a log-out instruction to the mobile terminal, so that the mobile terminal logs out of the log-in state after receiving the log-out instruction.
If the mobile terminal is sending a login request to the server by using the Token, after the server determines that the Token exceeds the effective duration, a failure instruction can be sent to the mobile terminal, and the mobile terminal is refused to access the server. The mobile terminal may also pop up a prompt message in a visual manner in the display screen to remind the user that Token has expired, where the prompt message may include a limited term of Token, etc.
In this embodiment, when the mobile terminal uses the client of the Token login server after the Token preset effective duration is exceeded, the server may send a Token invalidation instruction to the mobile terminal, so that the mobile terminal responds to the Token invalidation instruction and exits from the client on the mobile terminal, thereby avoiding using an overdue client of the Token login server and improving the security of the client using the Token login server.
In one embodiment, the Token invalidation command is sent by the server when receiving a Token update request sent by the computer device and generating a target Token based on the Token update request.
Wherein, the target Token is different from the original Token and is a regenerated Token. After the original Token is invalid, the mobile terminal may rescan the target two-dimensional code generated after the target Token is encrypted by the computer device, acquire the target Token by decrypting the target two-dimensional code, and log in the client of the server by using the target Token.
The computer device may automatically send a Token update request to the server after the Token preset effective duration, and the server may send a Token invalidation instruction to the mobile terminal after receiving the Token update request sent by the computer device. Or, in an emergency situation, for example, the existing Token has been revealed, and the user needs to update the new Token immediately to reduce the security risk, the user may actively send a Token update request to the server through the computer device; after receiving a Token updating request sent by the computer equipment, the server can send a Token invalidation instruction to the mobile terminal, so that the existing Token is immediately invalidated without waiting for a preset valid duration and then invalidating.
In this embodiment, the Token invalidation instruction received by the mobile terminal may be sent by the server when the server receives a Token update request sent by the computer device and generates a target Token based on the Token update request, so that the mobile terminal can be prevented from using an expired Token to log in a client of the server, and meanwhile, the login authority can be controlled immediately, and the security of the mobile terminal using the client of the Token to log in the server is improved.
In one embodiment, as shown in fig. 4, a client login method is provided, which is exemplified by the method applied to the computer device in fig. 1, and includes the following steps:
s402, obtaining login information input by a user, and sending the login information and identification information of the computer equipment to a server.
The login information may include identification information such as an account number, a password, a verification code, and the like, the identification information of the computer device may be information for uniquely identifying the computer device, and the identification information is different between different computer devices.
Specifically, the computer device may obtain login information input by a user, and send the login information and identification information of the computer device itself to the server.
S404, receiving a service Token returned by the server based on the login information; the Token is generated according to the login information and the identification information after the server verifies the login information; token is used for the mobile terminal to access the server.
The service Token may be a string of character strings randomly generated by the server according to the login information of the login account and the identification information of the computer device. The Token may be of any length and may be composed of any characters, depending on the algorithm to be generated. Because the login information of different login accounts is different and the identification information of different computer devices is also different, the service Token generated by the server according to the login information and the identification information has uniqueness, that is, each Token corresponds to one login account in one computer device.
Specifically, the server receives the login information sent by the computer device and the identification information of the computer device, and may generate a corresponding service Token, through which the mobile terminal may access the server. Further, the server may send Token to the corresponding computer device.
S406, encrypting the Token to obtain a two-dimensional code image; the two-dimension code image is used for the mobile terminal to scan the two-dimension code image and obtain the encryption information carried in the two-dimension code image, the Token is obtained after the encryption information is decrypted, and the Token is adopted to log in the client side of the server on the mobile terminal.
The computer device can encrypt the service Token sent by the server by using a public key shared between the computer device and the mobile terminal in a symmetric encryption mode, so as to obtain encrypted data, and convert the encrypted data into a two-dimensional code image. The computer device can also encrypt the service Token sent by the server by using the public key of the mobile terminal in an asymmetric encryption mode, so as to obtain encrypted data, and convert the encrypted data into a two-dimensional code image.
Specifically, the computer device may encrypt Token, obtain encrypted encryption information, and convert the encryption information into a two-dimensional code image. The mobile terminal can obtain the encrypted information carried in the two-dimensional code image by scanning the two-dimensional code image, and then decrypt the encrypted information through a key arranged in the mobile terminal to obtain Token. When the mobile terminal logs in the client to access the server, the user can send an access request to the server by using the Token without inputting an account password on the mobile terminal. The server can match and compare the Token with a plurality of tokens sent by the server, and if the Token used by the mobile terminal for accessing the server is matched with the Token sent by the server, the mobile terminal is considered to have access right and can be authorized to access the server.
In this embodiment, the computer device obtains login information input by a user, sends the login information and identification information of the computer device to the server, and then receives a service Token returned by the server based on the login information, encrypts the Token, and obtains a two-dimensional code image. In the client login method, the service Token received by the computer device is generated for the server according to the login information and the identification information of the computer device, and the service Token has uniqueness. That is to say, each Token corresponds to one login account in one computer device, so that when the mobile terminal uses the client of the Token login server, the mobile terminal can work on the basis of guaranteeing the information security and the traceability after illegal operation, thereby improving the flexibility and convenience of user service processing.
In an embodiment, on the basis of the above embodiments, as shown in fig. 5, this embodiment relates to an implementation manner of updating Token by a computer device, and includes the following steps:
s502, sending a token updating command to the server.
The Token updating instruction is used for indicating the server to generate the target Token and covering the original Token. The target Token is different from the original Token and is a regenerated Token. After the original Token is invalid, the mobile terminal may rescan the target two-dimensional code generated after the target Token is encrypted by the computer device, acquire the target Token by decrypting the target two-dimensional code, and log in the client of the server by using the target Token.
The computer device may automatically send a Token update request to the server after a Token preset validity duration. Alternatively, in an emergency situation, for example, where an existing Token has been revealed and the user needs to update a new Token immediately to reduce security risk, the user may actively send a Token update request to the server through the computer device.
S504, receiving a target Token generated by the server based on the Token updating instruction.
Specifically, after the server generates the target Token based on the Token update instruction, the target Token may be sent to the computer device. The computer device may, after receiving the target Token, store it locally and overwrite the original Token.
S506, encrypting the target Token to obtain the updated two-dimensional code image.
The updated two-dimensional code image may include encrypted information of the target Token after encryption.
Specifically, after the computer device receives the target Token sent by the server, the computer device may encrypt the target Token sent by the server in a symmetric encryption or asymmetric encryption manner, so as to obtain encrypted information, and convert the encrypted information into the two-dimensional code image, where the specific encryption manner is described in the above embodiments, and is not described here any further.
In this embodiment, the computer device may send a Token update instruction to the server, and the server generates the target Token based on the Token update instruction sent by the computer device, and sends the target Token to the computer device. Then, the computer device may encrypt the target Token, thereby obtaining encrypted information of the encrypted target Token, and convert the encrypted information into a two-dimensional code image. In the client login method, the computer device can immediately send the Token updating instruction, so that the original Token is immediately invalidated without waiting for the end of the valid period of the original Token, the flexibility of the computer device for managing and controlling the login authority can be improved, and the login security of the mobile terminal is improved.
In one embodiment, on the basis of the above-mentioned embodiments, as shown in fig. 6, the present embodiment relates to an implementation manner of generating identification information by a computer device, and includes the following steps:
s602, collecting hardware information of the computer equipment.
The hardware information of the computer may include at least one of a motherboard serial number, a hard disk serial number, a CPU serial number, an IP address, a Mac address, and the like.
Specifically, the computer device may collect native hardware information.
And S604, processing the hardware information according to a preset abstract algorithm to generate identification information.
The abstract algorithm can be an algorithm for generating pseudo-random input with fixed length by kneading input with any length, and as long as input messages are different, abstract messages generated after the input messages are abstracted are also different, but the same input can generate the same output. Because the hardware information of the computer equipment is fixed and not repeated, the identification information generated by the abstract algorithm is also unique, and the identity of the computer equipment can be uniquely identified. The above-mentioned digest algorithm may be MD5 algorithm or SHA-1 algorithm and its variants, and the identification information may be digital information such as machine code.
Specifically, the computer device may process hardware information of the computer device according to a preset digest algorithm to generate identification information, where the identification information can uniquely identify the identity of the computer device.
In this embodiment, the computer device collects the hardware information of the computer device, processes the hardware information through a preset abstract algorithm, and can generate identification information capable of uniquely identifying the identity of the computer device, so that the Token generated by the server according to the login information and the identification information can be in one-to-one correspondence with the computer device, the binding of the computer device and the login authority is realized, and the login security and the traceability of illegal operations of the computer device are improved.
In an embodiment, on the basis of the above embodiments, as shown in fig. 7, the present embodiment relates to an implementation manner of registering by a computer device, including:
s702, acquiring registration information input by a user, and sending the registration information and identification information to a server;
the registration information may include, but is not limited to, information such as the affiliated enterprise, name, gender, identification card/passport, and related certificate number, mobile phone number, and mailbox.
Specifically, the computer device may obtain registration information input by the user and send the registration information and the identification information to the server.
S704, receiving a registration result returned by the server; the registration result is obtained by matching the registration information with registrable personnel information after the server obtains the registrable personnel information corresponding to the identification information in the preset corresponding relationship; the preset corresponding relation comprises registrable personnel information corresponding to a plurality of identification information respectively.
The registrable personnel information may be personnel information which is already recorded in the server and can access the server, including but not limited to the affiliated enterprise, name, gender, identity card/passport and related certificate number, mobile phone number, mailbox and the like. The registration result may be that the registration is successful or that the registration is failed, and the computer device may use the account number with which the registration is successful to access the server. In the preset corresponding relationship, each identification information may correspond to a plurality of registrable personal information, and each registrable personal information may also correspond to a plurality of identification information.
Specifically, the server may receive registration information and identification information sent by the computer, acquire registrable person information corresponding to the identification information in a preset corresponding relationship, match the registration information with the registrable person information according to a preset rule, and if the matching is successful, judge that the registration of the registration account in the registration information is successful, and may be used to access the server. The preset rule may include a plurality of information items that must be the same as the matching result, for example, the preset rule may be that, in the registration information and the registrable person information, the name and the identification number of both parties are the same, and the matching is successful, and no limitation is imposed on the remaining information items.
In this embodiment, the computer device collects hardware information of the computer device, processes the hardware information through a preset abstract algorithm, and can generate identification information capable of uniquely identifying the identity of the computer device, so that Token generated by the server according to the login information and the identification information can be in one-to-one correspondence with the computer device, binding among the server, the computer device and an account with login authority is realized, and login security and traceability of illegal operations of the computer device are improved.
In one embodiment, on the basis of the above embodiments, as shown in fig. 7-a, a client login method is involved, which includes:
s701, the computer equipment collects hardware information of the computer and generates a machine code through a summary algorithm.
And S703, the computer equipment acquires the registration information input by the user and sends the registration information and the machine code to a server.
S705, the server matches the received registration information with locally stored registrable personnel information to obtain a registration result.
And S707, the server returns the registration result to the computer equipment.
And S709, the computer equipment logs in the client of the server by using the account number which is successfully registered.
And S711, after detecting that the account which is successfully registered logs in the client, the server generates a corresponding service Token based on the login information and the corresponding machine code, wherein the Token is used for the mobile terminal to access the server.
S713, the server sends the Token to the corresponding computer equipment.
And S715, the computer equipment encrypts the received Token to obtain encrypted information and converts the encrypted information into a corresponding two-dimensional code.
And S717, the mobile terminal scans the two-dimensional code to obtain the encrypted information.
And S719, the mobile terminal decrypts the encrypted data through the built-in key to obtain the Token, and locally stores the Token.
S721, the mobile terminal accesses the server by using Token.
In this embodiment, after detecting that the account successfully registered logs in the client, the server may generate a corresponding service Token based on the login information and the machine code of the computer device, and send the Token to the corresponding computer device. The computer device can encrypt the Token, generate encrypted information, and convert the encrypted information into a two-dimensional code image. The mobile terminal can acquire the encrypted information carried in the two-dimensional code image by scanning the two-dimensional code image displayed on the computer equipment, and can decrypt the encrypted information through the built-in secret key, so that Token is acquired. Further, after storing the Token, the mobile terminal may use the Token to access the server at any time within the validity period of the Token. In the client login method, the Token used by the mobile terminal when accessing the server is generated by the server based on the login information and the machine code of the computer equipment, and the binding among people, the account and the computer equipment can be realized, so that the office work of the mobile terminal is realized on the basis of ensuring the safety of the information and the traceability after illegal operation, and the flexibility and the convenience of processing services by the user are improved.
It should be understood that although the various steps in the flow charts of fig. 2-7 are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least some of the steps in fig. 2-7 may include multiple steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, which are not necessarily performed in sequence, but may be performed in turn or alternately with other steps or at least some of the other steps.
In one embodiment, as shown in fig. 8, there is provided a client login apparatus applied to the mobile terminal in fig. 1, including: a scanning module 110, a decryption module 120, and a login module 130, wherein:
the scanning module 110 is configured to scan a two-dimensional code image displayed on a computer device through a mobile terminal, and acquire encrypted information carried in the two-dimensional code image; the two-dimensional code image is obtained by encrypting a service Token sent by a server by computer equipment, wherein the Token is used for a mobile terminal to access the server;
the decryption module 120 is configured to decrypt the encrypted information to obtain Token;
and a login module 130, configured to login the client of the server by using Token on the mobile terminal.
In an embodiment, on the basis of the above embodiment, the login module 130 is further configured to login the client of the server by using Token within a preset effective time duration.
In an embodiment, on the basis of the above embodiment, as shown in fig. 9, the client login apparatus further includes an exit module 140, configured to receive a Token invalidation instruction sent by the server; and responding to the Token failure instruction, and quitting the client on the mobile terminal.
In one embodiment, on the basis of the above embodiment, the Token invalidation instruction is sent by the server in the case of receiving the Token update request sent by the computer device and generating the target Token based on the Token update request.
Specifically, the device for client login provided above may implement the above-mentioned embodiment of the client login method, and its implementation principle and technical effect are similar, which are not described herein again.
In one embodiment, as shown in fig. 10, there is provided a client login apparatus, applied to the computer device in fig. 1, including: an obtaining module 210, a first receiving module 220, and an encrypting module 230, wherein:
the obtaining module 210 is configured to obtain login information input by a user, and send the login information and identification information of the computer device to a server;
a receiving module 220, configured to receive a service Token returned by the server based on the login information; the Token is generated according to the login information and the identification information after the server verifies the login information; the Token is used for the mobile terminal to access the server;
the encryption module 230 is configured to encrypt Token to obtain a two-dimensional code image; the two-dimension code image is used for the mobile terminal to scan the two-dimension code image and obtain the encryption information carried in the two-dimension code image, the Token is obtained after the encryption information is decrypted, and the Token is adopted to log in the client side of the server on the mobile terminal.
In an embodiment, on the basis of the above embodiment, as shown in fig. 11, the client login apparatus further includes: an update module 240, configured to send a token update instruction to the server; receiving a target Token generated by the server based on the Token updating instruction; and encrypting the target Token to obtain the updated two-dimensional code image.
In an embodiment, on the basis of the above embodiment, as shown in fig. 12, the client login apparatus further includes: an acquisition module 250, configured to acquire hardware information of a computer device; and processing the hardware information according to a preset abstract algorithm to generate identification information.
In an embodiment, on the basis of the above embodiment, as shown in fig. 13, the client login apparatus further includes: the registration module 260 is configured to obtain registration information input by a user, and send the registration information and identification information to a server; receiving a registration result returned by the server; the registration result is obtained by matching the registration information with registrable personnel information after the server obtains the registrable personnel information corresponding to the identification information in the preset corresponding relationship; the preset corresponding relation comprises registrable personnel information corresponding to a plurality of identification information respectively.
Specifically, the device for client login provided above may implement the above-mentioned embodiment of the client login method, and its implementation principle and technical effect are similar, which are not described herein again.
For specific limitations of the client login device, reference may be made to the above limitations of the client login method, which is not described herein again. The modules in the client login device may be implemented in whole or in part by software, hardware, or a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a mobile terminal is provided, the internal structure of which may be as shown in fig. 14. The mobile terminal comprises a processor, a memory, a communication interface, a display screen and an input device which are connected through a system bus. Wherein the processor of the mobile terminal is configured to provide computing and control capabilities. The memory of the mobile terminal comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The communication interface of the mobile terminal is used for carrying out wired or wireless communication with an external terminal, and the wireless communication can be realized through WIFI, an operator network, NFC (near field communication) or other technologies. The computer program is executed by a processor to implement a client login method. The display screen of the mobile terminal can be a liquid crystal display screen or an electronic ink display screen, and the input device of the mobile terminal can be a touch layer covered on the display screen, a key, a track ball or a touch pad arranged on a shell of the mobile terminal, an external keyboard, a touch pad or a mouse and the like.
Those skilled in the art will appreciate that the architecture shown in fig. 14 is a block diagram of only a portion of the architecture associated with the subject application, and does not constitute a limitation on the mobile terminal to which the subject application applies, as a particular mobile terminal may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, a mobile terminal is provided, comprising a memory and a processor, the memory having a computer program stored therein, the processor implementing the following steps when executing the computer program:
scanning a two-dimensional code image displayed on computer equipment through a mobile terminal to obtain encrypted information carried in the two-dimensional code image; the two-dimensional code image is obtained by encrypting a service Token sent by a server by computer equipment, wherein the Token is used for a mobile terminal to access the server;
decrypting the encrypted information to obtain Token;
and adopting Token to log in the client of the server on the mobile terminal.
In one embodiment, the processor, when executing the computer program, further performs the steps of: and adopting Token to log in the client of the server within the preset effective duration.
In one embodiment, the processor, when executing the computer program, further performs the steps of: receiving a Token failure instruction sent by a server; and responding to the Token failure instruction, and quitting the client on the mobile terminal.
In one embodiment, the processor, when executing the computer program, further performs the steps of: on the basis of the above embodiment, the Token invalidation instruction is sent by the server when receiving the Token update request sent by the computer device and generating the target Token based on the Token update request.
Specifically, the mobile terminal for client login provided above may execute the above embodiment of the client login method, and the implementation principle and technical effect are similar, which are not described herein again.
In one embodiment, a computer device is provided, the internal structure of which may be as shown in FIG. 15. The computer device includes a processor, a memory, a communication interface, a display screen, and an input device connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The communication interface of the computer device is used for carrying out wired or wireless communication with an external terminal, and the wireless communication can be realized through WIFI, an operator network, NFC (near field communication) or other technologies. The computer program is executed by a processor to implement a client login method. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, a key, a track ball or a touch pad arranged on the shell of the computer equipment, an external keyboard, a touch pad or a mouse and the like.
Those skilled in the art will appreciate that the architecture shown in fig. 15 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, a computer device is provided, comprising a memory and a processor, the memory having a computer program stored therein, the processor implementing the following steps when executing the computer program:
acquiring login information input by a user, and sending the login information and identification information of computer equipment to a server;
receiving a service Token returned by the server based on the login information; the Token is generated according to the login information and the identification information after the server verifies the login information; the Token is used for the mobile terminal to access the server;
encrypting Token to obtain a two-dimensional code image; the two-dimension code image is used for the mobile terminal to scan the two-dimension code image and obtain the encryption information carried in the two-dimension code image, the Token is obtained after the encryption information is decrypted, and the Token is adopted to log in the client side of the server on the mobile terminal.
In one embodiment, the processor, when executing the computer program, further performs the steps of: sending a token updating instruction to a server; receiving a target Token generated by the server based on the Token updating instruction; and encrypting the target Token to obtain the updated two-dimensional code image.
In one embodiment, the processor, when executing the computer program, further performs the steps of: collecting hardware information of computer equipment; and processing the hardware information according to a preset abstract algorithm to generate identification information.
In one embodiment, the processor, when executing the computer program, further performs the steps of: acquiring registration information input by a user, and sending the registration information and identification information to a server; receiving a registration result returned by the server; the registration result is obtained by matching the registration information with registrable personnel information after the server obtains the registrable personnel information corresponding to the identification information in the preset corresponding relationship; the preset corresponding relation comprises registrable personnel information corresponding to a plurality of identification information respectively.
Specifically, the computer device for client login provided above may execute the above-mentioned embodiment of the client login method, and its implementation principle and technical effect are similar, which are not described herein again.
In an embodiment, a computer-readable storage medium is provided, on which a computer program is stored which, when being executed by a processor, carries out the steps of the above-mentioned method embodiments.
The implementation principle and technical effect of the computer-readable storage medium provided by this embodiment are similar to those of the above-described method embodiment, and are not described herein again.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database or other medium used in the embodiments provided herein can include at least one of non-volatile and volatile memory. Non-volatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical storage, or the like. Volatile Memory can include Random Access Memory (RAM) or external cache Memory. By way of illustration and not limitation, RAM can take many forms, such as Static Random Access Memory (SRAM) or Dynamic Random Access Memory (DRAM), among others.
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.
Claims (13)
1. A client login method, the method comprising:
scanning a two-dimensional code image displayed on computer equipment through a mobile terminal to obtain encrypted information carried in the two-dimensional code image; the two-dimensional code image is obtained by encrypting a service Token transmitted by a server by computer equipment, wherein the Token is used for a mobile terminal to access the server;
decrypting the encrypted information to obtain the Token;
and adopting the Token to log in the client of the server on the mobile terminal.
2. The method of claim 1, wherein the logging the client of the server with the Token comprises:
and adopting the Token to log in the client of the server within a preset effective time length.
3. The method of claim 1, further comprising:
receiving a Token failure instruction sent by the server;
and responding to the Token failure instruction, and quitting the client on the mobile terminal.
4. The method of claim 3, wherein the Token invalidation command is sent by the server when receiving a Token update request sent by the computer device and generating a target Token based on the Token update request.
5. A client login method, the method comprising:
acquiring login information input by a user, and sending the login information and identification information of computer equipment to a server;
receiving a service Token returned by the server based on the login information; the Token is generated according to the login information and the identification information after the server verifies the login information; the Token is used for the mobile terminal to access the server;
encrypting the Token to obtain a two-dimensional code image; the two-dimension code image is used for scanning the two-dimension code image by the mobile terminal, acquiring encryption information carried in the two-dimension code image, decrypting the encryption information to obtain the Token, and logging in the client of the server on the mobile terminal by adopting the Token.
6. The method of claim 5, further comprising:
sending a token updating instruction to a server;
receiving a target Token generated by the server based on the Token updating instruction;
and encrypting the target Token to obtain an updated two-dimensional code image.
7. The method of claim 5, further comprising:
collecting hardware information of computer equipment;
and processing the hardware information according to a preset abstract algorithm to generate the identification information.
8. The method of claim 5, further comprising:
acquiring registration information input by a user, and sending the registration information and the identification information to the server;
receiving a registration result returned by the server; the registration result is obtained by matching the registration information with registrable personnel information after the server obtains the registrable personnel information corresponding to the identification information in a preset corresponding relationship; the preset corresponding relation comprises registrable personnel information corresponding to a plurality of identification information respectively.
9. A client login apparatus, the apparatus comprising:
the scanning module is used for scanning a two-dimensional code image displayed on computer equipment through a mobile terminal to acquire encrypted information carried in the two-dimensional code image; the two-dimensional code image is obtained by encrypting a service Token transmitted by a server by computer equipment, wherein the Token is used for a mobile terminal to access the server;
the decryption module is used for decrypting the encrypted information to obtain the Token;
and the login module is used for logging in the client of the server on the mobile terminal by adopting the Token.
10. A client login apparatus, the apparatus comprising:
the acquisition module is used for acquiring login information input by a user and sending the login information and identification information of the computer equipment to the server;
the receiving module is used for receiving a service Token Token returned by the server based on the login information; the Token is generated according to the login information and the identification information after the server verifies the login information; the Token is used for the mobile terminal to access the server;
the encryption module is used for encrypting the Token to obtain a two-dimensional code image; the two-dimension code image is used for scanning the two-dimension code image by the mobile terminal, acquiring encryption information carried in the two-dimension code image, decrypting the encryption information to obtain the Token, and logging in the client of the server on the mobile terminal by adopting the Token.
11. A mobile terminal comprising a memory and a processor, the memory storing a computer program, characterized in that the processor, when executing the computer program, implements the steps of the method according to any of claims 1 to 4.
12. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor realizes the steps of the method of any one of claims 5 to 8 when executing the computer program.
13. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110908187.5A CN114006700A (en) | 2021-08-09 | 2021-08-09 | Client login method and device, computer equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110908187.5A CN114006700A (en) | 2021-08-09 | 2021-08-09 | Client login method and device, computer equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114006700A true CN114006700A (en) | 2022-02-01 |
Family
ID=79921087
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110908187.5A Pending CN114006700A (en) | 2021-08-09 | 2021-08-09 | Client login method and device, computer equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114006700A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115150145A (en) * | 2022-06-28 | 2022-10-04 | 腾讯科技(深圳)有限公司 | Crowdsourcing equipment communication method, device, computer equipment and storage medium |
WO2023185593A1 (en) * | 2022-03-28 | 2023-10-05 | 华为技术有限公司 | Device login method, electronic device and system |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140173695A1 (en) * | 2012-12-18 | 2014-06-19 | Google Inc. | Token based account access |
CN103986720A (en) * | 2014-05-26 | 2014-08-13 | 网之易信息技术(北京)有限公司 | Log-in method and device |
CN106209763A (en) * | 2016-05-27 | 2016-12-07 | 北京畅游天下网络技术有限公司 | A kind of login method and system |
CN108234113A (en) * | 2016-12-15 | 2018-06-29 | 腾讯科技(深圳)有限公司 | Auth method, device and system |
CN108365958A (en) * | 2018-03-01 | 2018-08-03 | 广州南方人才资讯科技有限公司 | Verification method, device, computer equipment and the storage medium that account logs in |
CN108616359A (en) * | 2016-12-12 | 2018-10-02 | 北京握奇智能科技有限公司 | A kind of OTP authentication method and systems based on Quick Response Code |
CN112989297A (en) * | 2021-02-04 | 2021-06-18 | 金保信社保卡科技有限公司 | Electronic social security card code scanning login application method and system |
WO2021143280A1 (en) * | 2020-01-19 | 2021-07-22 | 华为技术有限公司 | Method, device, and system for login authentication |
-
2021
- 2021-08-09 CN CN202110908187.5A patent/CN114006700A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140173695A1 (en) * | 2012-12-18 | 2014-06-19 | Google Inc. | Token based account access |
CN103986720A (en) * | 2014-05-26 | 2014-08-13 | 网之易信息技术(北京)有限公司 | Log-in method and device |
CN106209763A (en) * | 2016-05-27 | 2016-12-07 | 北京畅游天下网络技术有限公司 | A kind of login method and system |
CN108616359A (en) * | 2016-12-12 | 2018-10-02 | 北京握奇智能科技有限公司 | A kind of OTP authentication method and systems based on Quick Response Code |
CN108234113A (en) * | 2016-12-15 | 2018-06-29 | 腾讯科技(深圳)有限公司 | Auth method, device and system |
CN108365958A (en) * | 2018-03-01 | 2018-08-03 | 广州南方人才资讯科技有限公司 | Verification method, device, computer equipment and the storage medium that account logs in |
WO2021143280A1 (en) * | 2020-01-19 | 2021-07-22 | 华为技术有限公司 | Method, device, and system for login authentication |
CN112989297A (en) * | 2021-02-04 | 2021-06-18 | 金保信社保卡科技有限公司 | Electronic social security card code scanning login application method and system |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2023185593A1 (en) * | 2022-03-28 | 2023-10-05 | 华为技术有限公司 | Device login method, electronic device and system |
CN115150145A (en) * | 2022-06-28 | 2022-10-04 | 腾讯科技(深圳)有限公司 | Crowdsourcing equipment communication method, device, computer equipment and storage medium |
CN115150145B (en) * | 2022-06-28 | 2023-05-23 | 腾讯科技(深圳)有限公司 | Crowd-sourced device communication method, device, computer device and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110706379B (en) | Access control method and device based on block chain | |
US20180082050A1 (en) | Method and a system for secure login to a computer, computer network, and computer website using biometrics and a mobile computing wireless electronic communication device | |
CN106612180B (en) | Method and device for realizing session identification synchronization | |
CN106537403B (en) | System for accessing data from multiple devices | |
JP5470344B2 (en) | User authentication methods and related architectures based on the use of biometric identification technology | |
KR101284481B1 (en) | Authentication method and device using OTP including biometric data | |
US9166796B2 (en) | Secure biometric cloud storage system | |
KR102514429B1 (en) | Update of biometric data template | |
CN106452770B (en) | Data encryption method, data decryption method, device and system | |
US8953805B2 (en) | Authentication information generating system, authentication information generating method, client apparatus, and authentication information generating program for implementing the method | |
CN111401901B (en) | Authentication method and device of biological payment device, computer device and storage medium | |
EP2628133B1 (en) | Authenticate a fingerprint image | |
JPWO2007094165A1 (en) | Identification system and program, and identification method | |
TW201540038A (en) | Methods and apparatus for migrating keys | |
JP6717108B2 (en) | Information processing apparatus, information processing system, program, and information processing method | |
CN109768979B (en) | Data encryption transmission method and device, computer equipment and storage medium | |
KR101809974B1 (en) | A system for security certification generating authentication key combinating multi-user element and a method thereof | |
US11496299B2 (en) | Method and chip for authenticating to a device and corresponding authentication device and system | |
CN109428725B (en) | Information processing apparatus, control method, and storage medium | |
CN114006700A (en) | Client login method and device, computer equipment and storage medium | |
JP2002297551A (en) | Identification system | |
US20140250499A1 (en) | Password based security method, systems and devices | |
CN112087417B (en) | Terminal authority control method and device, computer equipment and storage medium | |
JP5665592B2 (en) | Server apparatus, computer system, and login method thereof | |
KR102104823B1 (en) | Method and system for protecting personal information infringement using division of authentication process and biometrics authentication |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |