CN114124439B - Login authentication method, device, equipment and storage medium - Google Patents

Login authentication method, device, equipment and storage medium Download PDF

Info

Publication number
CN114124439B
CN114124439B CN202111149957.9A CN202111149957A CN114124439B CN 114124439 B CN114124439 B CN 114124439B CN 202111149957 A CN202111149957 A CN 202111149957A CN 114124439 B CN114124439 B CN 114124439B
Authority
CN
China
Prior art keywords
application program
browser
fingerprint identifier
application
browser fingerprint
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111149957.9A
Other languages
Chinese (zh)
Other versions
CN114124439A (en
Inventor
叶仁成
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Lian Intellectual Property Service Center
Yinjia Commercial Technology Shenzhen Co ltd
Original Assignee
Yinjia Commercial Technology Shenzhen Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yinjia Commercial Technology Shenzhen Co ltd filed Critical Yinjia Commercial Technology Shenzhen Co ltd
Priority to CN202111149957.9A priority Critical patent/CN114124439B/en
Publication of CN114124439A publication Critical patent/CN114124439A/en
Application granted granted Critical
Publication of CN114124439B publication Critical patent/CN114124439B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Stored Programmes (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The application relates to the technical field of login authentication, and provides a login authentication method, a device, equipment and a storage medium, wherein the login authentication method comprises the following steps: when a first login instruction triggered by a target account through a browser of first equipment is detected, determining whether the first equipment installs at least one first application program in a preset application program list; if the first device installs at least one first application program in a preset application program list, generating a first browser fingerprint identifier according to the at least one first application program; and matching the first browser fingerprint identifier with a pre-stored second browser fingerprint identifier, and loading a login page after successful login through the browser of the first device if the first browser fingerprint identifier is matched with the second browser fingerprint identifier. By implementing the method and the device, the accuracy of identifying whether the device is the same device through the browser fingerprint identifier can be improved.

Description

Login authentication method, device, equipment and storage medium
Technical Field
The present disclosure relates to the field of network security technologies, and in particular, to a login authentication method, device, equipment, and storage medium.
Background
In order to prevent economic loss of users caused by account password loss or leakage, a device identification technology is generally added to authentication of a client login system, and if the devices logged in by the users are the same each time, the users are considered to be safe. At the web client, the most common approach to device identification technology is to use Cookie files or look up the internet protocol (Internet Protocol, IP) address being used for device identification. However, these common methods are easily bypassed because Cookie files can be deleted, IP addresses can be masked, and typically IP addresses are not fixed. The current more advanced fingerprint technology based on the browser is to identify the device, acquire a series of information such as User Agent (UA), time zone, geographic location, operating system, resolution, pixel ratio, browser plug-in and the like through Javascript, and calculate to obtain the browser fingerprint identifier. However, the manufacturers of the browser are numerous, the user can replace the browser at any time to log in and access, after the user replaces the browser, the information such as the plug-in of the browser is changed, and then the calculated fingerprint identifiers of the browser are different, so that the user can be judged not to log in through the same device, and therefore whether the user logs in for the same device can not be accurately judged by adopting the fingerprint identifiers of the browser generated in the mode of the prior art.
Disclosure of Invention
Accordingly, it is necessary to provide a login authentication method, a device and a storage medium, which can determine a browser fingerprint identifier by an application installed on the device, and can improve the accuracy of determining whether an account is logged on by the same device by the browser fingerprint identifier, thereby improving login efficiency.
In a first aspect, the present application provides a login authentication method, the method including:
when a first login instruction triggered by a target account passing through a browser of first equipment is detected, determining whether the first equipment installs at least one first application program in a preset application program list, wherein the preset application program list comprises N application programs, and N is an integer larger than 1;
generating a first browser fingerprint identifier according to at least one first application program in the preset application program list if the first device installs the at least one first application program in the preset application program list, wherein the first browser fingerprint identifier comprises N bit positions corresponding to the N application programs, and at least one bit position corresponding to the at least one first application program in the N bit positions is set to be a preset value;
Matching the first browser fingerprint identifier with a pre-stored second browser fingerprint identifier, wherein the second browser fingerprint identifier is generated based on the fact that a second device installs at least one second application program in the preset application program list, and the second device is the device for historical login of the target account;
and if the first browser fingerprint identifier is matched with the second browser fingerprint identifier, determining that the first device and the second device are the same device, and loading a login page after successful login through the browser of the first device.
With reference to the first aspect, in some embodiments, when a first login instruction triggered by the target account through the browser of the first device is detected, before determining whether the first device installs at least one first application in the preset application list, the method further includes:
receiving a login request sent by the target account through a browser of second equipment, wherein the login request comprises the target account and verification information;
verifying the verification information, and if the verification information passes the verification, determining that the second device has installed at least one second application program in the preset application program list;
And generating a second browser fingerprint identifier according to the at least one second application program, and storing the second browser fingerprint identifier, wherein the second browser fingerprint identifier comprises N bits corresponding to the N application programs, and at least one bit corresponding to the at least one second application program in the N bits is set to be the preset value.
With reference to the first aspect, in some embodiments, the determining that the first device has installed at least one first application in a preset application list includes:
acquiring address heads of all application programs in the preset application program list;
calling a local application access interface of a browser of the first device, and accessing an application program corresponding to the address header through the local application access interface;
if a target dialog box corresponding to the application program is detected, determining that the application program is installed on the first device, and taking the application program as a first application program, wherein the target dialog box is used for confirming whether the application program is operated or not;
and if the target dialog box corresponding to the application program is not detected, determining that the application program is not installed by the first device.
With reference to the first aspect, in some embodiments, the method further includes:
if the first browser fingerprint identifier and the second browser fingerprint identifier are not matched, acquiring target matching degree of the first browser fingerprint identifier and the second browser fingerprint identifier;
determining a matching degree range to which the target matching degree belongs, and acquiring a target verification mode corresponding to the matching degree range, wherein different matching degree ranges correspond to different verification modes;
and verifying the target account by adopting the target verification mode, and if the target account passes the verification, loading a login page after successful login through a browser of the first equipment.
With reference to the first aspect, in some embodiments, the method further includes:
if the first browser fingerprint identifier is not matched with the second browser fingerprint identifier, acquiring application categories to which each first application program in the at least one first application program belongs;
determining a first user portrait according to the application category to which each first application program belongs;
acquiring a pre-stored second user portrait, wherein the second user portrait is determined according to application categories to which each second application program in the at least one second application program belongs;
Determining a target verification mode according to the first user portrait and the second user portrait;
and verifying the target account by adopting the target verification mode, and if the target account passes the verification, loading a login page after successful login through a browser of the first equipment.
With reference to the first aspect, in some embodiments, the first user representation includes at least one first feature tag and the second user representation includes at least one second feature tag;
the determining a target verification mode according to the first user portrait and the second user portrait comprises the following steps:
obtaining the portrait matching degree of the first user portrait and the second user portrait, wherein the portrait matching degree is the ratio of the number of the matched feature labels in the first user portrait and the second user portrait to the maximum number of the feature labels contained in the user portraits with more feature labels in the first user portrait and the second user portrait;
and acquiring a verification mode corresponding to the portrait matching degree as a target verification mode.
With reference to the first aspect, in some embodiments, the verifying the target account by using the target verification method, if the verification is passed, after loading, by a browser of the first device, a login page after login success, further includes:
Outputting a first option for indicating to update the pre-stored second fingerprint identifier and a second option for indicating not to update the pre-stored second fingerprint identifier;
when an operation acting on the first option is detected, the pre-stored second browser fingerprint identifier is updated to the first browser fingerprint identifier.
In a second aspect, the present application provides a login authentication device, the device comprising:
the first determining unit is used for determining whether the first device installs at least one first application program in a preset application program list when a first login instruction triggered by a browser of the first device through a target account is detected, wherein the preset application program list comprises N application programs, and N is an integer greater than 1;
a first generating unit, configured to generate, if the first device installs at least one first application in the preset application list, a first browser fingerprint identifier according to the at least one first application, where the first browser fingerprint identifier includes N bits corresponding to the N applications, and at least one bit corresponding to the at least one first application in the N bits is set to a preset value;
And the verification unit is used for matching the first browser fingerprint identifier with a pre-stored second browser fingerprint identifier, determining that the first device and the second device are the same device if the first browser fingerprint identifier and the second browser fingerprint identifier are matched and are consistent, and loading a login page after successful login through the browser of the first device.
With reference to the second aspect, in some embodiments, the apparatus further includes:
the receiving unit is used for receiving a login request sent by the target account through a browser of the second device, wherein the login request comprises the target account and verification information;
the second determining unit is used for verifying the verification information, and if the verification information passes the verification, the second device is determined to install at least one second application program in the preset application program list;
and the second generating unit is used for generating a second browser fingerprint identifier according to the at least one second application program and storing the second browser fingerprint identifier, wherein the second browser fingerprint identifier comprises N bits corresponding to the N application programs, and at least one bit corresponding to the at least one second application program in the N bits is set to be the preset value.
With reference to the second aspect, in some embodiments, the first determining unit is specifically configured to:
acquiring address heads of all application programs in the preset application program list;
calling a local application access interface of a browser of the first device, and accessing an application program corresponding to the address header through the local application access interface;
if a target dialog box corresponding to the application program is detected, determining that the application program is installed on the first device, and taking the application program as a first application program, wherein the target dialog box is used for confirming whether the application program is operated or not;
and if the target dialog box corresponding to the application program is not detected, determining that the application program is not installed by the first device.
With reference to the second aspect, in some embodiments, the verification unit is further configured to:
if the first browser fingerprint identifier and the second browser fingerprint identifier are not matched, acquiring target matching degree of the first browser fingerprint identifier and the second browser fingerprint identifier;
determining a matching degree range to which the target matching degree belongs, and acquiring verification modes corresponding to the matching degree range, wherein different matching degree ranges correspond to different verification modes;
And verifying the target account by adopting a verification mode corresponding to the matching degree range, and if the verification is passed, loading a login page after successful login through a browser of the first device.
With reference to the second aspect, in some embodiments, the apparatus further includes:
an output unit configured to output a first option for indicating updating of the pre-stored second fingerprint identifier and a second option for indicating not updating of the pre-stored second fingerprint identifier;
and the updating unit is used for updating the prestored second browser fingerprint identifier into the first browser fingerprint identifier when detecting the operation acting on the first option.
With reference to the second aspect, in some embodiments, the verification unit is further configured to:
if the first browser fingerprint identifier is not matched with the second browser fingerprint identifier, acquiring application categories to which each first application program in the at least one first application program belongs;
determining a first user portrait according to the application category to which each first application program belongs;
acquiring a pre-stored second user portrait, wherein the second user portrait is determined according to application categories to which each second application program in the at least one second application program belongs;
Determining a target verification mode according to the first user portrait and the second user portrait;
and verifying the target account by adopting the target verification mode, and if the target account passes the verification, loading a login page after successful login through a browser of the first equipment.
With reference to the second aspect, in some embodiments, the first user representation includes at least one first feature tag and the second user representation includes at least one second feature tag;
the verification unit is specifically configured to: obtaining the portrait matching degree of the first user portrait and the second user portrait, wherein the portrait matching degree is the ratio of the number of the matched feature labels in the first user portrait and the second user portrait to the maximum number of the feature labels contained in the user portraits with more feature labels in the first user portrait and the second user portrait;
and acquiring a verification mode corresponding to the portrait matching degree as a target verification mode.
In a third aspect, the present application provides a login authentication device comprising a processor, a memory and a communication interface, the processor, the memory and the communication interface being interconnected, wherein the communication interface is for receiving and transmitting data, the memory is for storing program code, and the processor is for invoking the program code to perform a method as described in the first aspect and any possible implementation of the first aspect.
In a fourth aspect, the present application provides a computer-readable storage medium having a computer program stored therein; the computer program, when run on one or more processors, causes the terminal device to perform the method as described in the first aspect and any possible implementation of the first aspect.
In the embodiment of the application, when a login instruction triggered by a target account passing through a browser of a first device is detected, it is determined that the first device has installed at least one first application program in a preset application program list, the preset application program list includes N application programs, a first browser fingerprint identifier is further generated, the first browser fingerprint identifier includes N bits corresponding to the N application programs, at least one bit corresponding to the at least one first application program in the N bits is set to a preset value, the first browser fingerprint identifier is matched with a pre-stored second browser, if the login instruction is consistent, the login device of the target account is considered to be the same, a login page after successful login is loaded, the application generates a browser fingerprint identifier through the application program in which the device has installed the preset application program list, that is, the browser fingerprint identifier includes N bits corresponding to the N application programs in the preset application program list, if the device for installing the N bits corresponding to one or some application programs in the N application programs is set to be a preset value, if the preset bit corresponding to the N bits is set to be a preset value in the browser, the same as the browser, the login device can be prevented from being changed from affecting the current device, if the login device is not consistent with the current device, the login device can be generated by switching the device, and if the login device is not consistent with the current device is the login device, thereby improving login efficiency.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings that are required to be used in the embodiments will be briefly described below.
Fig. 1 is a flow chart of a login authentication method provided in an embodiment of the present application;
fig. 2 is a flow chart of another login authentication method according to an embodiment of the present application;
fig. 3 is a flowchart of another login authentication method according to an embodiment of the present application;
fig. 4 is a schematic diagram of a login authentication device according to an embodiment of the present application;
fig. 5 is a schematic diagram of a login authentication device according to an embodiment of the present application.
Detailed Description
The invention is described in further detail below with reference to the accompanying drawings.
The terminology used in the following embodiments of the application is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in the specification and the appended claims, the singular forms "a," "an," "the," and "the" are intended to include the plural forms as well, unless the context clearly indicates to the contrary.
In the present application, "at least one (item)" means one or more, "a plurality" means two or more, and "at least two (items)" means two or three or more, and/or "for describing an association relationship of an association object, three kinds of relationships may exist, for example," a and/or B "may represent: only a, only B and both a and B are present, wherein a, B may be singular or plural. The character "/" generally indicates that the context-dependent object is an "or" relationship. "at least one of (a) or a similar expression thereof means any combination of these items. For example, at least one (one) of a, b or c may represent: a, b, c, "a and b", "a and c", "b and c", or "a and b and c".
The embodiment of the application provides a login authentication method, and in order to more clearly describe the scheme of the application, some drawings related to the application are further described below.
Referring to fig. 1, fig. 1 is a flowchart of a login authentication method according to an embodiment of the present application. As shown in fig. 1, the method comprises the steps of:
s101, when a first login instruction triggered by a browser of a first device through a target account is detected, determining whether the first device installs at least one first application program in a preset application program list, wherein the preset application program list comprises N application programs, and N is an integer greater than 1;
in this embodiment of the present invention, a user may log in a target account through a browser of a first device, for example, the user inputs a target account and a password in a login interface of the browser of the first device to log in, or, the user temporarily switches a browser to log in the target account on the same device. In order to ensure the security of user account login, the device used by the account login is generally identified, and if the target account login is performed by using the same device each time, the target account login is considered to be a secure login.
Specifically, optionally, when a first login instruction triggered by the target account passing through the browser of the first device is detected, a preset application program list is obtained, where the preset application program list includes N application programs to be tested, optionally, all the N application programs may be the same test application program, and then the N application programs may be some commonly used application programs. Alternatively, the N applications may be applications determined for certain characteristics of the user of the target account, e.g., the N applications may be applications determined for industries and/or hobbies engaged in by the user of the target account. Illustratively, the N applications include applications for a particular industry, and/or the N applications include applications specific to certain interests, and the like. The value of N may be the number of bits of the fingerprint identifier of the browser, for example, the preset application program list may include 32 application programs.
And sequentially detecting whether the first device has installed the application programs in the preset application program list, and if the first device installs a certain application program, determining the first device as the first application program.
The method for detecting whether the first device installs the application program may be to acquire an address header of the application program, call a local application access interface of the browser, and access an application program corresponding to the address header installed locally on the first device through the local application access interface. If the application is installed locally at the terminal device, the browser will output a confirmation dialog for asking if the application is to be run. If the application is not installed locally at the terminal device, the browser will not output the confirmation dialog. It is possible to determine whether the application is installed locally by detecting whether the browser outputs the confirmation dialog.
S102, if the first device installs at least one first application program in the preset application program list, generating a first browser fingerprint identifier according to the at least one first application program, wherein the first browser fingerprint identifier comprises N bit positions corresponding to the N application programs, and at least one bit position corresponding to the at least one first application program in the N bit positions is set to be a preset value;
In one embodiment, the first browser fingerprint identifier is generated further in accordance with the first device installing at least one first application in the list of preset applications. For example, N applications in the preset application list may be arranged in a specific order, the N applications corresponding to N bits, and if the first device installs the application, the corresponding bits are set to a preset value, which may be 1 or 0. If the preset value is 1, among the N bits, if the first device does not install a certain application in the preset application list, the corresponding bit is 0. If the preset value is 0, among the N bits, if the first device does not install a certain application in the preset application list, the corresponding bit is 1.
Specifically, alternatively, whether the first device installs the application program in the preset application program list is sequentially detected, if the terminal device installs the application program, the bit value of the corresponding bit may be set to 1, and if the terminal device does not install the application program, the bit value of the corresponding bit may be set to 0, thereby obtaining the N-bit first browser fingerprint identifier. For example, the application programs included in the preset application program list are an application program a, an application program B, and an application program C in this order. If the terminal device installs application a and application C, and does not install application B, the corresponding first browser fingerprint identifier is 101.
In particular, a script may be added to the website, which will test each application in the application list, and which will return an ordered array of boolean values whose values are used to indicate whether the terminal device has installed an application in the application list. If the terminal equipment installs the application program, each Boolean value is true; otherwise, false. This array is referred to as a permanent first browser fingerprint identifier, which may also be referred to as a cross-browser identifier.
According to the method and the device, whether the first device used for logging in the target account installs the application program in the preset application program list is detected, so that the browser fingerprint identifier is determined, instead of being generated through information of the browser, and therefore mismatching of the browser fingerprint identifier obtained during logging in across the browser is avoided, and device identification errors are caused.
S103, matching the first browser fingerprint identifier with a pre-stored second browser fingerprint identifier, wherein the second browser fingerprint identifier is generated based on the fact that a second device installs at least one second application program in the preset application program list, and the second device is the device for historical login of the target account;
S104, if the first browser fingerprint identifier is matched with the second browser fingerprint identifier, determining that the first device and the second device are the same device, and loading a login page after successful login through a browser of the first device.
In this embodiment of the present application, the pre-stored second browser fingerprint identifier also includes N bits, where the second browser fingerprint identifier is used to represent an application installed on the device that is logged in by the target account. Alternatively, the second browser fingerprint identifier may be obtained through the following step one-step three, which is specifically described below:
step one, receiving a login request sent by a browser of second equipment, wherein the login request comprises the target account number and verification information;
the second device may be the same as or different from the first device, and the user may input the target account number and verification information on a login interface of a browser of the second device for login, where the verification information may be a password or biometric information, such as a face or a fingerprint, and the like.
Step two, verifying the verification information, and if the verification information passes the verification, determining that the second device has installed at least one second application program in the preset application program list;
Specifically, if the verification information passes verification, for example, the verification information in the login request is matched and consistent with the pre-stored verification information, loading a login page after successful login through a browser of the second device. Further, in order to facilitate the subsequent user to log in quickly when logging in the same device, it is further determined that the second device has installed at least one second application in the preset application list, where a detection manner for detecting that the second device has installed an application may refer to a detection manner for detecting that the first device has installed an application in the foregoing embodiment, which is not described herein again.
And thirdly, generating a second browser fingerprint identifier according to the at least one second application program, and storing the second browser fingerprint identifier, wherein the second browser fingerprint identifier comprises N bits corresponding to the N application programs, and at least one bit corresponding to the at least one second application program in the N bits is set to be the preset value.
And generating a second browser fingerprint identifier according to at least one second application program in the preset application program list already installed by the second device. For example, N applications in the preset application list may be arranged in a specific order, the N applications corresponding to N bits, and if the second device installs the application, the corresponding bits are set to a preset value, which may be 1 or 0. If the preset value is 1, among the N bits, if the second device does not install a certain application in the preset application list, the corresponding bit is 0. If the preset value is 0, among the N bits, if the second device does not install a certain application in the preset application list, the corresponding bit is 1.
Through the first step to the third step, a pre-stored second browser fingerprint identifier can be obtained, after the user logs in through the first step to the third step in one browser of the second device by using the target account, the user can also switch the browser to log in, or after a certain period of time after the user logs in through the first step to the third step, the user can also log in again by using the browser of the other first device, and the target account and the verification information are input in the browser of the other first device.
When the target account number is detected to be logged in through the browser of the first device, whether the first device installs an application program in a preset application program list or not is determined, and therefore an N-bit first browser fingerprint identifier is generated. Reference may be made specifically to the descriptions of the foregoing steps S101 to S102, and the descriptions are omitted here.
If the first browser fingerprint identifier is the same as the pre-stored second browser fingerprint identifier, the application installed by the first device currently logged in and the application installed by the second device used for historical login of the target account are the same, and the application installed in the device usually keeps stable for a period of time, so when the first browser fingerprint identifier is detected to be the same as the pre-stored second browser fingerprint identifier, the target account is determined to be logged in by using the same device.
Further, when the target account is determined to be logged in by using the same terminal equipment, further verification of the login of the target account is not required, so that the user can use the target account conveniently. For example, the user may log in the target account by switching the browser within a preset time (for example, within 2 minutes) of the same device, and directly load the log-in page after successful log-in without inputting the verification information again, or the user may log in the target account and the verification information, and further verification of the identity of the user is not required, for example, face recognition verification is not required any more, because it is determined that the target account is logged in by using the same device.
In this embodiment of the present application, when a login instruction triggered by a target account passing through a browser of a first device is detected, it is determined that the first device has installed at least one first application program in a preset application program list, where the preset application program list includes N application programs, and a first browser fingerprint identifier is further generated, where the first browser fingerprint identifier includes N bits corresponding to the N application programs, at least one bit corresponding to the at least one first application program in the N bits is set to a preset value, the first browser fingerprint identifier and a pre-stored second browser are matched, if they are identical, the login device of the target account is considered to be identical, and a login page after successful login is loaded.
Referring to fig. 2, fig. 2 is a flowchart of another login authentication method according to an embodiment of the present application. As shown in fig. 2, the method comprises the steps of:
s201, when a first login instruction triggered by a browser of a first device through a target account is detected, determining whether the first device installs at least one first application program in a preset application program list, wherein the preset application program list comprises N application programs, and N is an integer greater than 1;
s202, if a first device installs at least one first application program in a preset application program list, generating a first browser fingerprint identifier according to the at least one first application program, wherein the first browser fingerprint identifier comprises N bits corresponding to the N application programs, and at least one bit corresponding to the at least one first application program in the N bits is set to a preset value;
s203, matching the first browser fingerprint identifier with a pre-stored second browser fingerprint identifier;
s204, if the first browser fingerprint identifier is matched with the second browser fingerprint identifier, determining that the first equipment is identical with the second equipment, and loading a login page after successful login through a browser of the first equipment.
Please refer to step S101 to step S104 in the embodiment of fig. 1 in step S201 to step S204 in the embodiment of the present application, and the description is omitted here.
S205, if the first browser fingerprint identifier and the second browser fingerprint identifier are not matched, acquiring target matching degree of the first browser fingerprint identifier and the second browser fingerprint identifier;
in this embodiment of the present application, if the first browser fingerprint identifier and the second browser fingerprint identifier are not matched, it is indicated that the application installed by the first device currently logged in of the target account and the application installed by the second device used for historical login are different, and generally, the application installed in the device will remain stable within a period of time, so when detecting that the first browser fingerprint identifier and the pre-stored second browser fingerprint identifier are different, it is determined that the target account is logged in using different devices.
S206, determining a matching degree range to which the target matching degree belongs, and acquiring verification modes corresponding to the matching degree range, wherein different matching degree ranges correspond to different verification modes;
s207, verifying the target account by adopting a verification mode corresponding to the matching degree range, and if the verification is passed, loading a login page after successful login through a browser of the first device.
Specifically, when it is determined that the target account number is logged in by using different devices, in order to ensure the login security of the account number, further verification may be performed on the user, for example, fingerprint identification, face recognition, and the like are required for the user, if the verification is passed, the logged-in interface is loaded, or the user is required to reenter verification information for verification, and when the verification information passes the verification, the logged-in interface is loaded.
Optionally, when the first browser fingerprint identifier and the second browser fingerprint identifier are determined to be not matched, the matching degree between the first browser fingerprint identifier and the second browser fingerprint identifier can be further obtained to determine a verification mode of further verification, if the matching degree is higher, a looser first verification mode can be used for verification, and if the matching degree is lower, a stricter second verification mode can be used for verification, namely, the strength of the second verification mode is higher than that of the first verification mode. The degree of matching may refer to the ratio of the number of bits of the matching bits to N in the browser identifier.
For example, different verification modes corresponding to different matching degree ranges can be preset, after the target matching degree between the first browser fingerprint identifier and the second browser fingerprint identifier is obtained, the matching degree range to which the target matching degree belongs can be further determined, verification access corresponding to the matching degree range is obtained as a target verification mode to verify the target account, and if verification is passed, a login page after successful login is loaded through the browser of the first device.
Optionally, in a scene with a lower matching degree, the category of the application program which is already installed by the second device and registered by the target account history can be determined according to the second browser identifier, and the category of the application program which is already installed by the first device and registered by the target account currently can be determined according to the first browser identifier, if the two categories are completely different, the operation of the user is determined, the user is refused to register, and the security of the system is increased.
Referring to fig. 3, fig. 3 is a flowchart of another login authentication method according to an embodiment of the present application. As shown in fig. 3, the method comprises the steps of:
s301, when a first login instruction triggered by a browser of a first device through a target account is detected, determining whether the first device installs at least one first application program in a preset application program list, wherein the preset application program list comprises N application programs, and N is an integer greater than 1;
s302, if a first device installs at least one first application program in a preset application program list, generating a first browser fingerprint identifier according to the at least one first application program, wherein the first browser fingerprint identifier comprises N bits corresponding to the N application programs, and at least one bit corresponding to the at least one first application program in the N bits is set to a preset value;
S303, matching the first browser fingerprint identifier with a pre-stored second browser fingerprint identifier;
s304, if the first browser fingerprint identifier is matched with the second browser fingerprint identifier, loading a login page after successful login through the browser of the first device.
Please refer to step S101 to step S104 in the embodiment of fig. 1 in step S301 to step S304 in the embodiment of the present application, and the description is omitted here.
S305, if the first browser fingerprint identifier and the second browser fingerprint identifier are not matched, acquiring application categories to which each first application program in the at least one first application program belongs;
s306, determining a first user portrait according to the application category to which each first application program belongs;
in this embodiment of the present application, if the first browser fingerprint identifier and the second browser fingerprint identifier are not matched, it is indicated that the application installed by the first device currently logged in of the target account and the application installed by the second device used for historical login are different, and generally, the application installed in the device will remain stable within a period of time, so when detecting that the first browser fingerprint identifier and the pre-stored second browser fingerprint identifier are different, it is determined that the target account is logged in using different devices.
Further, at least one first application program in the N application programs installed on the first equipment is obtained, and the first user portrait is determined according to the application category of each first application program in the at least one first application program. The first user portrait may include a professional tag, an interest tag, an age tag, and the like of the user.
For example, among the N applications, at least one first application that the first device has installed includes: the fund stock class application and the sports class recording application, determining the tag of the first user representation may include: finance, sports. For another example, among the N applications, at least one first application that the first device has installed includes: applications for listening to songs and singing, shopping, and the like, determining the tag for the first user representation may include: shopping online, singing, young women.
By way of example, the determination of the corresponding user representation by application class may be determined by a trained classification model, such as, for example, inputting the determined application class into a trained classification model to determine feature labels, which may include, but is not limited to, support vector machines (Support Vector Machine, SVM), gradient boost decision trees (Gradient Boosting Decision Tree, GBDT), and the like. The classification model can be obtained by training data in a training set in advance, the data in the training set comprises application category sets, each application category set comprises application categories, each application category set is marked with a characteristic label, and the classification model is trained through the data in the training set until the model converges, so that a trained classification model is obtained.
S307, acquiring a pre-stored second user portrait, wherein the second user portrait is determined according to application categories of all second application programs in the at least one second application program;
in this embodiment of the present application, the pre-stored second user portrait is determined according to an application category to which each second application program in at least one second application program installed in the second device that is logged in by the target account history. The second user portrait obtaining method may refer to the first user portrait obtaining method, which is not described herein.
S308, determining a target verification mode according to the first user portrait and the second user portrait;
s309, verifying the target account by adopting the target verification mode, and if the target account passes the verification, loading a login page after successful login through a browser of the first device.
The first user portrait may include at least one first feature tag, the second user portrait may include at least one second feature tag, and further obtain a portrait matching degree of the first user portrait and the second user portrait, where the portrait matching degree is a ratio between a number of feature tags matched in the first user portrait and the second user portrait and a maximum number of feature tags included in user images including a larger number of feature tags in the first user portrait and the second user portrait. For example, the first user portrait includes 5 feature tags, the second user portrait includes 10 feature tags, and the number of feature tags matched in the first user portrait and the second user portrait is 3, so that the portrait matching degree is 3/10=0.3. Further, the target verification method corresponding to the image matching degree is obtained to verify the target account number, and for example, a matching degree range to which the image matching degree belongs can be obtained, the verification method corresponding to the matching degree range is used as the target verification method, and different matching degree ranges correspond to different verification methods.
For example, if the portrait matching degree between the second user portrait and the first user portrait is greater than a first threshold, the user is authenticated by a first authentication method, if the portrait matching degree between the second user portrait and the first user portrait is less than or equal to the first threshold and greater than a second threshold, the user is authenticated by a second authentication method, the intensity of the second authentication method is greater than the intensity of the first authentication method, and if the matching degree between the second user portrait and the first user portrait is less than or equal to the second threshold, the user is denied login.
Further optionally, if the user is authenticated by the target authentication method, the user may update the second user portrait to the first user portrait, and the first user portrait may be used as a matching criterion subsequently.
Further, after the user passes the verification in the target verification manner, the prestored second browser fingerprint identifier may be updated, that is, the second browser fingerprint identifier is updated to be the first browser fingerprint identifier, optionally, before the browser fingerprint identifier is updated, a first option for indicating that the prestored browser fingerprint identifier is allowed to be updated and a second option for indicating that the prestored browser fingerprint identifier is not allowed to be updated may be output, and when an operation acting on the first option is detected, the prestored second browser fingerprint identifier is updated to be the first browser fingerprint identifier. For example, after the user changes the mobile phone, the browser fingerprint identifier is updated and stored, and if the user temporarily changes the device to log in, the browser fingerprint identifier can be not updated.
Referring to fig. 4, a schematic structural diagram of a login authentication device is provided in an embodiment of the present application. As shown in fig. 4, the login authentication device may include:
a first determining unit 10, configured to determine, when a first login instruction triggered by a target account passing through a browser of a first device is detected, whether the first device installs at least one first application in a preset application list, where the preset application list includes N applications, and N is an integer greater than 1;
a first generating unit 11, configured to generate, if the first device installs at least one first application in the preset application list, a first browser fingerprint identifier according to the at least one first application, where the first browser fingerprint identifier includes N bits corresponding to the N applications, and at least one bit corresponding to the at least one first application in the N bits is set to a preset value;
and the verification unit 12 is configured to match the first browser fingerprint identifier with a pre-stored second browser fingerprint identifier, determine that the first device and the second device are the same device if the first browser fingerprint identifier and the second browser fingerprint identifier match and match, and load a login page after successful login through a browser of the first device.
In one possible design, the apparatus further comprises:
a receiving unit 13, configured to receive a login request sent by the target account through a browser of the second device, where the login request includes the target account and verification information;
a second determining unit 14, configured to verify the verification information, and determine that the second device has installed at least one second application in the preset application list if the verification information passes the verification;
and a second generating unit 15, configured to generate a second browser fingerprint identifier according to the at least one second application program, and store the second browser fingerprint identifier, where the second browser fingerprint identifier includes N bits corresponding to the N application programs, and at least one bit corresponding to the at least one second application program in the N bits is set to the preset value.
In one possible design, the first determining unit 10 is specifically configured to:
acquiring address heads of all application programs in the preset application program list;
calling a local application access interface of a browser of the first device, and accessing an application program corresponding to the address header through the local application access interface;
If a target dialog box corresponding to the application program is detected, determining that the application program is installed on the first device, and taking the application program as a first application program, wherein the target dialog box is used for confirming whether the application program is operated or not;
and if the target dialog box corresponding to the application program is not detected, determining that the application program is not installed by the first device.
In one possible design, the verification unit 12 is further configured to:
if the first browser fingerprint identifier and the second browser fingerprint identifier are not matched, acquiring target matching degree of the first browser fingerprint identifier and the second browser fingerprint identifier;
determining a matching degree range to which the target matching degree belongs, and acquiring verification modes corresponding to the matching degree range, wherein different matching degree ranges correspond to different verification modes;
and verifying the target account by adopting a verification mode corresponding to the matching degree range, and if the verification is passed, loading a login page after successful login through a browser of the first device.
In one possible design, the apparatus further comprises:
an output unit configured to output a first option for indicating updating of the pre-stored second fingerprint identifier and a second option for indicating not updating of the pre-stored second fingerprint identifier;
And the updating unit is used for updating the prestored second browser fingerprint identifier into the first browser fingerprint identifier when detecting the operation acting on the first option.
In one possible design, the verification unit 12 is further configured to:
if the first browser fingerprint identifier is not matched with the second browser fingerprint identifier, acquiring application categories to which each first application program in the at least one first application program belongs;
determining a first user portrait according to the application category to which each first application program belongs;
acquiring a pre-stored second user portrait, wherein the second user portrait is determined according to application categories to which each second application program in the at least one second application program belongs;
determining a target verification mode according to the first user portrait and the second user portrait;
and verifying the target account by adopting the target verification mode, and if the target account passes the verification, loading a login page after successful login through a browser of the first equipment.
In one possible design, the first user representation includes at least one first feature tag and the second user representation includes at least one second feature tag;
The verification unit 12 is specifically configured to: obtaining the portrait matching degree of the first user portrait and the second user portrait, wherein the portrait matching degree is the ratio of the number of the matched feature labels in the first user portrait and the second user portrait to the maximum number of the feature labels contained in the user portraits with more feature labels in the first user portrait and the second user portrait;
and acquiring a verification mode corresponding to the portrait matching degree as a target verification mode.
The specific description of the embodiment of the apparatus shown in fig. 4 may refer to the specific description of the embodiment of the method shown in fig. 1, fig. 2 or fig. 3, which is not repeated herein.
Referring to fig. 5, a schematic structural diagram of a login authentication device according to an embodiment of the present application is shown in fig. 5, where the login authentication device 1000 may include: at least one processor 1001, such as a CPU, at least one communication interface 1003, memory 1004, at least one communication bus 1002. Wherein the communication bus 1002 is used to enable connected communication between these components. Communication interface 1003 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface). The memory 1004 may be a high-speed RAM memory or a non-volatile memory (non-volatile memory), such as at least one disk memory. The memory 1004 may also optionally be at least one storage device located remotely from the processor 1001. As shown in fig. 5, an operating system, network communication units, and program instructions may be included in memory 1004, which is a type of computer storage medium.
In the login authentication device 1000 shown in fig. 5, the processor 1001 may be configured to load program instructions stored in the memory 1004, and specifically perform the following operations:
when a first login instruction triggered by a target account passing through a browser of first equipment is detected, determining whether the first equipment installs at least one first application program in a preset application program list, wherein the preset application program list comprises N application programs, and N is an integer larger than 1;
generating a first browser fingerprint identifier according to at least one first application program in the preset application program list if the first device installs the at least one first application program in the preset application program list, wherein the first browser fingerprint identifier comprises N bit positions corresponding to the N application programs, and at least one bit position corresponding to the at least one first application program in the N bit positions is set to be a preset value;
matching the first browser fingerprint identifier with a pre-stored second browser fingerprint identifier, wherein the second browser fingerprint identifier is generated based on the fact that a second device installs at least one second application program in the preset application program list, and the second device is the device for historical login of the target account;
And if the first browser fingerprint identifier is matched with the second browser fingerprint identifier, determining that the first device and the second device are the same device, and loading a login page after successful login through the browser of the first device.
It should be noted that, the specific implementation process may refer to the specific description of the method embodiment shown in fig. 1, fig. 2 or fig. 3, and will not be described herein.
The embodiments of the present application further provide a computer storage medium, where a plurality of instructions may be stored, where the instructions are adapted to be loaded by a processor and execute the method steps of the embodiments shown in fig. 1, fig. 2, or fig. 3, and the specific execution process may refer to the specific description of the embodiments shown in fig. 1, fig. 2, or fig. 3, which is not repeated herein.
In the above embodiments, it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, produces, in whole or in part, a flow or function consistent with embodiments of the present application. The computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable apparatus. The computer instructions may be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center by a wired (e.g., coaxial cable, fiber optic, digital subscriber line), or wireless (e.g., infrared, wireless, microwave, etc.). The computer readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that contains an integration of one or more available media. The usable medium may be a magnetic medium (e.g., floppy disk, hard disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., solid state disk), etc.
Those of ordinary skill in the art will appreciate that implementing all or part of the above-described method embodiments may be accomplished by a computer program to instruct related hardware, the program may be stored in a computer readable storage medium, and the program may include the above-described method embodiments when executed. And the aforementioned storage medium includes: ROM or random access memory RAM, magnetic or optical disk, etc.

Claims (8)

1. A login authentication method, comprising:
when a first login instruction triggered by a target account passing through a browser of first equipment is detected, determining whether the first equipment installs at least one first application program in a preset application program list, wherein the preset application program list comprises N application programs, and N is an integer larger than 1;
generating a first browser fingerprint identifier according to at least one first application program in the preset application program list if the first device installs the at least one first application program in the preset application program list, wherein the first browser fingerprint identifier comprises N bit positions corresponding to the N application programs, and at least one bit position corresponding to the at least one first application program in the N bit positions is set to be a preset value;
Matching the first browser fingerprint identifier with a pre-stored second browser fingerprint identifier, wherein the second browser fingerprint identifier is generated based on the fact that a second device installs at least one second application program in the preset application program list, and the second device is the device for historical login of the target account;
if the first browser fingerprint identifier is matched with the second browser fingerprint identifier, determining that the first device and the second device are the same device, and loading a login page after successful login through a browser of the first device;
if the first browser fingerprint identifier is not matched with the second browser fingerprint identifier, acquiring application categories to which each first application program in the at least one first application program belongs;
determining a first user portrait according to the application category to which each first application program belongs;
acquiring a pre-stored second user portrait, wherein the second user portrait is determined according to application categories of all second application programs in the at least one second application program, the first user portrait comprises at least one first feature tag, and the second user portrait comprises at least one second feature tag;
Obtaining the portrait matching degree of the first user portrait and the second user portrait, wherein the portrait matching degree is the ratio of the number of the matched feature labels in the first user portrait and the second user portrait to the maximum number of the feature labels contained in the user portraits with more feature labels in the first user portrait and the second user portrait;
acquiring a verification mode corresponding to the portrait matching degree as a target verification mode;
and verifying the target account by adopting the target verification mode, and if the target account passes the verification, loading a login page after successful login through a browser of the first equipment.
2. The method of claim 1, wherein when a first login instruction triggered by the target account through the browser of the first device is detected, determining that the first device has installed at least one first application in a preset application list further comprises:
receiving a login request sent by the target account through a browser of the second device, wherein the login request comprises the target account and verification information;
Verifying the verification information, and if the verification information passes the verification, determining that the second device installs at least one second application program in the preset application program list;
and generating a second browser fingerprint identifier according to the at least one second application program, and storing the second browser fingerprint identifier, wherein the second browser fingerprint identifier comprises N bits corresponding to the N application programs, and at least one bit corresponding to the at least one second application program in the N bits is set to be the preset value.
3. The method of claim 1, wherein after said matching the first browser fingerprint identifier with a pre-stored second browser fingerprint identifier, further comprising:
if the first browser fingerprint identifier and the second browser fingerprint identifier are not matched, acquiring target matching degree of the first browser fingerprint identifier and the second browser fingerprint identifier;
determining a matching degree range to which the target matching degree belongs, and acquiring a target verification mode corresponding to the matching degree range;
and verifying the target account by adopting the target verification mode, and if the target account passes the verification, loading a login page after successful login through a browser of the first equipment.
4. The method as claimed in claim 1, wherein the step of verifying the target account by using the target verification method, if the verification is passed, further comprises, after loading a login page after successful login by a browser of the first device:
outputting a target option, wherein the target option is used for indicating to update the prestored second browser fingerprint identifier;
when an operation acting on the target option is detected, the second browser fingerprint identifier stored in advance is updated to the first browser fingerprint identifier.
5. The method of claim 1, wherein the determining whether the first device installs at least one first application in a preset application list comprises:
acquiring address heads of all application programs in the preset application program list;
calling a local application access interface of a browser of the first device, and accessing an application program corresponding to the address header through the local application access interface;
if a target dialog box corresponding to the application program is detected, determining that the application program is installed on the first device, and taking the application program as a first application program, wherein the target dialog box is used for confirming whether the application program is operated or not;
And if the target dialog box corresponding to the application program is not detected, determining that the application program is not installed by the first device.
6. A login authentication device, comprising:
the first determining unit is used for determining whether the first device installs at least one first application program in a preset application program list when a first login instruction triggered by a browser of the first device through a target account is detected, wherein the preset application program list comprises N application programs, and N is an integer greater than 1;
a first generating unit, configured to generate, if the first device installs at least one first application in the preset application list, a first browser fingerprint identifier according to the at least one first application, where the first browser fingerprint identifier includes N bits corresponding to the N applications, and at least one bit corresponding to the at least one first application in the N bits is set to a preset value;
the verification unit is used for matching the first browser fingerprint identifier with a pre-stored second browser fingerprint identifier, the second browser fingerprint identifier is generated based on the fact that a second device installs at least one second application program in the preset application program list, and the second device is the device for the historical login of the target account; if the first browser fingerprint identifier is matched with the second browser fingerprint identifier, determining that the first device and the second device are the same device, and loading a login page after successful login through a browser of the first device; if the first browser fingerprint identifier is not matched with the second browser fingerprint identifier, acquiring application categories to which each first application program in the at least one first application program belongs; determining a first user portrait according to the application category to which each first application program belongs; acquiring a pre-stored second user portrait, wherein the second user portrait is determined according to application categories of all second application programs in the at least one second application program, the first user portrait comprises at least one first feature tag, and the second user portrait comprises at least one second feature tag; obtaining the portrait matching degree of the first user portrait and the second user portrait, wherein the portrait matching degree is the ratio of the number of the matched feature labels in the first user portrait and the second user portrait to the maximum number of the feature labels contained in the user portraits with more feature labels in the first user portrait and the second user portrait; acquiring a verification mode corresponding to the portrait matching degree as a target verification mode; and verifying the target account by adopting the target verification mode, and if the target account passes the verification, loading a login page after successful login through a browser of the first equipment.
7. A login authentication device comprising a processor, a memory and a communication interface, the processor, memory and communication interface being interconnected, wherein the communication interface is adapted to receive and transmit data, the memory is adapted to store program code, and the processor is adapted to invoke the program code to perform the method according to any of claims 1-5.
8. A computer-readable storage medium, wherein the computer-readable storage medium has a computer program stored therein; the method of any one of claims 1 to 5 is performed when the computer program is run on one or more processors.
CN202111149957.9A 2021-09-29 2021-09-29 Login authentication method, device, equipment and storage medium Active CN114124439B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111149957.9A CN114124439B (en) 2021-09-29 2021-09-29 Login authentication method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111149957.9A CN114124439B (en) 2021-09-29 2021-09-29 Login authentication method, device, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN114124439A CN114124439A (en) 2022-03-01
CN114124439B true CN114124439B (en) 2024-01-05

Family

ID=80441702

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111149957.9A Active CN114124439B (en) 2021-09-29 2021-09-29 Login authentication method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN114124439B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106446202A (en) * 2016-09-30 2017-02-22 福建北卡科技有限公司 Anti-interference browser fingerprint generation method based on implicit characteristic acquisition
CN111404946A (en) * 2020-03-19 2020-07-10 北京比特安索信息技术有限公司 Browser-based account authentication method and server
CN112765578A (en) * 2021-01-26 2021-05-07 上海黔易数据科技有限公司 Method for realizing safety privacy calculation based on browser client

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106446202A (en) * 2016-09-30 2017-02-22 福建北卡科技有限公司 Anti-interference browser fingerprint generation method based on implicit characteristic acquisition
CN111404946A (en) * 2020-03-19 2020-07-10 北京比特安索信息技术有限公司 Browser-based account authentication method and server
CN112765578A (en) * 2021-01-26 2021-05-07 上海黔易数据科技有限公司 Method for realizing safety privacy calculation based on browser client

Also Published As

Publication number Publication date
CN114124439A (en) 2022-03-01

Similar Documents

Publication Publication Date Title
EP3178011B1 (en) Method and system for facilitating terminal identifiers
CN109376078B (en) Mobile application testing method, terminal equipment and medium
KR101948721B1 (en) Method and apparatus for examining forgery of file by using file hash value
US10523699B1 (en) Privilege escalation vulnerability detection using message digest differentiation
US20190373002A1 (en) Method and system for detecting credential stealing attacks
WO2019144549A1 (en) Vulnerability testing method and device, computer equipment, and storage medium
CN111416811A (en) Unauthorized vulnerability detection method, system, equipment and storage medium
CN112199652B (en) Login method, terminal, server, system, medium and equipment of application program
KR20120135041A (en) Access monitoring method, information processing apparatus, and computer-readable medium storing access monitoring program
US11985145B1 (en) Method and system for detecting credential stealing attacks
CN112528262A (en) Application program access method, device, medium and electronic equipment based on token
US20230336589A1 (en) Detection of User Interface Imitation
CN110636038A (en) Account number analysis method, account number analysis device, security gateway and system
CN110581835B (en) Vulnerability detection method and device and terminal equipment
US11290481B2 (en) Security threat detection by converting scripts using validation graphs
CN111489175B (en) Online identity authentication method, device, system and storage medium
CN115695012A (en) Login request processing method and device, electronic equipment and storage medium
CN108600259B (en) Authentication and binding method of equipment, computer storage medium and server
CN110677506A (en) Network access method, device, computer equipment and storage medium
CN114499974A (en) Device detection method, device, computer device and storage medium
CN113014576A (en) Service authority control method, device, server and storage medium
CN114124439B (en) Login authentication method, device, equipment and storage medium
CN110049106B (en) Service request processing system and method
CN115408298A (en) Test method, device and system
CN114297735A (en) Data processing method and related device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20231205

Address after: Room 1122, Building T2-11-01A2, 11th Floor, Shenzhen Guotou Plaza, No. 69 Nonglin Road, Zhuyuan Community, Xiangmihu Street, Futian District, Shenzhen City, Guangdong Province, 518000

Applicant after: Yinjia Commercial Technology (Shenzhen) Co.,Ltd.

Address before: 518000 Room 202, block B, aerospace micromotor building, No.7, Langshan No.2 Road, Xili street, Nanshan District, Shenzhen City, Guangdong Province

Applicant before: Shenzhen LIAN intellectual property service center

Effective date of registration: 20231205

Address after: 518000 Room 202, block B, aerospace micromotor building, No.7, Langshan No.2 Road, Xili street, Nanshan District, Shenzhen City, Guangdong Province

Applicant after: Shenzhen LIAN intellectual property service center

Address before: 518000 Room 201, building A, 1 front Bay Road, Shenzhen Qianhai cooperation zone, Shenzhen, Guangdong

Applicant before: PING AN PUHUI ENTERPRISE MANAGEMENT Co.,Ltd.

GR01 Patent grant
GR01 Patent grant