CN116248343A - Registration and login method and system for client - Google Patents

Registration and login method and system for client Download PDF

Info

Publication number
CN116248343A
CN116248343A CN202211688440.1A CN202211688440A CN116248343A CN 116248343 A CN116248343 A CN 116248343A CN 202211688440 A CN202211688440 A CN 202211688440A CN 116248343 A CN116248343 A CN 116248343A
Authority
CN
China
Prior art keywords
login
data
registration
client
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211688440.1A
Other languages
Chinese (zh)
Inventor
刘博远
周晚晴
付丽丽
单国军
魏贺生
谢宇
彭夕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Aisino Corp
Original Assignee
Aisino Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Aisino Corp filed Critical Aisino Corp
Priority to CN202211688440.1A priority Critical patent/CN116248343A/en
Publication of CN116248343A publication Critical patent/CN116248343A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/30Managing network names, e.g. use of aliases or nicknames
    • H04L61/3015Name registration, generation or assignment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/141Setup of application sessions

Abstract

The invention discloses a registration and login method and system for a client, and belongs to the technical field of data encryption. The method of the invention comprises the following steps: receiving a registration request or a login request from a client; decompressing the compressed data to obtain registration data or login data of a preset coding format of the client and ciphertext strings for decoding the registration data or login data of the preset coding format; generating ciphertext; checking the registration data or the login data, and if the registration data or the login data meets the check requirement, allowing the registration or the login of the client. The invention does not need to occupy a lot of memory of the server to store data, thereby realizing the simultaneous login and registration of users with large volumes.

Description

Registration and login method and system for client
Technical Field
The present invention relates to the field of data encryption technologies, and in particular, to a method and system for registration and login of a client.
Background
In general, data is obtained from a calling program by encrypting data with a public key and storing the data. Encryption using a public key to generate ciphertext including the data allows only one or more target programs to obtain the data from the ciphertext. In another aspect, a bit string is obtained from a caller, and an identifier of the caller is checked to determine whether the caller is permitted to access encrypted data in the bit string ciphertext. By using a public key to decrypt the data and only returning the data to the calling program when the call is allowed to access the data, it is known that with the above scheme, the ciphertext needs to be generated using the public key, which increases the risk of leakage of the encryption key, and the manner of adding rights to identify whether the program can feed the data back to the calling program is not easy to make an application program with a large user body size;
the encryption mode of the method is suitable for application programs with very light user body, in programs with very large user body, the encryption scheme easily causes exposure of public keys so as to expose encrypted ciphertexts, and meanwhile, a permission management method is used for judging whether the programs can be accessed or not, so that a management system is easy to be confused, and newly registered users are inconvenient to manage.
Disclosure of Invention
In view of the above problems, the present invention provides a registration and login method for a client, including:
receiving a registration request or a login request from a client, generating an asymmetric encryption public key based on the registration request or the login request, receiving a random number from the client, and encrypting the random number by using the asymmetric encryption public key to obtain an asymmetric encryption key;
after receiving a registration request or a login request of the client, the method is used for receiving compressed data compressed with registration data or login data in a preset coding format from the client, decompressing the compressed data to obtain the registration data or login data in the preset coding format of the client, and decoding ciphertext strings used for decoding the registration data or login data in the preset coding format;
receiving the obtained registration data or login data in a preset coding format, and a ciphertext string, decoding the registration data or login data in the preset coding format through the ciphertext string to obtain the registration data or login data, and encrypting the registration data or login data based on the asymmetric key to generate ciphertext;
decrypting the ciphertext based on the asymmetric encryption key to obtain decrypted registration data or login data, checking the registration data or login data, and allowing the registration or login of the client if the registration data or login data meets the checking requirement.
Optionally, the method further comprises: after receiving a registration request or a login request from a client, sending a string of ciphertext for corresponding to the registration request or the login request to the client, wherein the string of ciphertext for corresponding to the registration request or the login request is used for verifying whether the registration or the login of the client corresponds to the registration request or the login request.
Optionally, the method further comprises: after receiving the registration data of the client, storing the registration data as login data, after receiving the ciphertext and decrypting the ciphertext, comparing and checking the obtained login data with the stored login data, and if the comparison and check result is constant, allowing the client to login.
Optionally, the method further comprises: after receiving a registration request or a login request from a client, performing validity check on the registration request or the login request from the client, and performing validity check on the registration request, wherein the validity check comprises the following steps: checking whether the registration request meets the preset requirement, judging whether the registration request is legal, and checking the validity of the login request, wherein the checking comprises the following steps: and checking whether the login data corresponding to the login request is registered.
In still another aspect, the present invention further provides a registration and login system for a client, including:
the server module is used for establishing connection with the client, receiving a registration request or a login request from the client, generating an asymmetric encryption public key based on the registration request or the login request, receiving a random number from the client, encrypting the random number by using the asymmetric encryption public key to obtain an asymmetric encryption key, decrypting the ciphertext based on the asymmetric encryption key after receiving the ciphertext sent by the sending module to obtain decrypted registration data or login data, checking the registration data or the login data, and allowing the registration or the login of the client if the registration data or the login data meets the check requirement;
the receiving module is used for receiving compressed data compressed with registration data or login data in a preset coding format from the client after the server module receives the registration request or login request of the client, decompressing the compressed data to obtain the registration data or login data in the preset coding format of the client, and decoding ciphertext strings for decoding the registration data or login data in the preset coding format;
the decryption module is used for receiving the registration data or the login data in the preset coding format obtained by the receiving module and the ciphertext string, and decoding the registration data or the login data in the preset coding format through the ciphertext string to obtain the registration data or the login data;
the encryption module encrypts the registration data or the login data obtained by the decryption module based on the asymmetric key obtained by the server module to generate ciphertext;
and the sending module is used for sending the ciphertext generated by the encryption module to the server module.
Optionally, the server module is further configured to send, after receiving a registration request or a login request from the client, a string of ciphertext corresponding to the registration request or the login request to the client, where the string of ciphertext corresponding to the registration request or the login request is used to verify whether the registration or the login of the client corresponds to the registration request or the login request.
Optionally, the server module is further configured to store the registration data as login data after receiving the registration data of the client, compare and check the obtained login data with the stored login data after receiving the ciphertext and decrypting the ciphertext, and allow the client to login if the comparison and check result is constant.
Optionally, after receiving a registration request or a login request from a client, the server module performs validity check on the registration request or the login request from the client, and performs validity check on the registration request, where the validity check includes: checking whether the registration request meets the preset requirement, judging whether the registration request is legal, and checking the validity of the login request, wherein the checking comprises the following steps: and checking whether the login data corresponding to the login request is registered.
In yet another aspect, the present invention also provides a computing device comprising: one or more processors;
a processor for executing one or more programs;
the method as described above is implemented when the one or more programs are executed by the one or more processors.
In yet another aspect, the present invention also provides a computer readable storage medium having stored thereon a computer program which, when executed, implements a method as described above.
Compared with the prior art, the invention has the beneficial effects that:
the invention provides a registration and login method for a client, which comprises the following steps: receiving a registration request or a login request from a client, generating an asymmetric encryption public key based on the registration request or the login request, receiving a random number from the client, and encrypting the random number by using the asymmetric encryption public key to obtain an asymmetric encryption key; after receiving a registration request or a login request of the client, the method is used for receiving compressed data compressed with registration data or login data in a preset coding format from the client, decompressing the compressed data to obtain the registration data or login data in the preset coding format of the client, and decoding ciphertext strings used for decoding the registration data or login data in the preset coding format; receiving the obtained registration data or login data in a preset coding format, and a ciphertext string, decoding the registration data or login data in the preset coding format through the ciphertext string to obtain the registration data or login data, and encrypting the registration data or login data based on the asymmetric key to generate ciphertext; decrypting the ciphertext based on the asymmetric encryption key to obtain decrypted registration data or login data, checking the registration data or login data, and allowing the registration or login of the client if the registration data or login data meets the checking requirement. The invention encrypts the key required by symmetric encryption in an asymmetric encryption mode, greatly reduces the possibility of key leakage, and simultaneously greatly reduces the possibility of key leakage of personnel inside because the random number is generated by the system instead of a fixed value. The invention does not need to occupy a lot of memory of the server to store data, thereby realizing the simultaneous login and registration of users with large volumes.
Drawings
FIG. 1 is a flow chart of a registration and login method for a client according to the present invention;
fig. 2 is a block diagram of a registration and login system for a client according to the present invention.
Detailed Description
The exemplary embodiments of the present invention will now be described with reference to the accompanying drawings, however, the present invention may be embodied in many different forms and is not limited to the examples described herein, which are provided to fully and completely disclose the present invention and fully convey the scope of the invention to those skilled in the art. The terminology used in the exemplary embodiments illustrated in the accompanying drawings is not intended to be limiting of the invention. In the drawings, like elements/components are referred to by like reference numerals.
Unless otherwise indicated, terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art. In addition, it will be understood that terms defined in commonly used dictionaries should be interpreted as having a meaning that is consistent with their meaning in the context of the relevant art and will not be interpreted in an idealized or overly formal sense.
Example 1:
the invention provides a registration and login method for a client, as shown in fig. 1, comprising the following steps:
step 1, receiving a registration request or a login request from a client, generating an asymmetric encryption public key based on the registration request or the login request, receiving a random number from the client, and encrypting the random number by using the asymmetric encryption public key to obtain an asymmetric encryption key;
step 2, after receiving a registration request or a login request of the client, the method is used for receiving compressed data compressed with registration data or login data with a preset coding format from the client, decompressing the compressed data to obtain the registration data or login data with the preset coding format of the client, and a ciphertext string used for decoding the registration data or login data with the preset coding format;
step 3, receiving the obtained registration data or login data in a preset coding format and a ciphertext string, decoding the registration data or login data in the preset coding format through the ciphertext string to obtain the registration data or login data, and encrypting the registration data or login data based on the asymmetric key to generate ciphertext;
and 4, decrypting the ciphertext based on the asymmetric encryption key to obtain decrypted registration data or login data, checking the registration data or the login data, and allowing the registration or the login of the client if the registration data or the login data meets the checking requirement.
Wherein the method further comprises: after receiving a registration request or a login request from a client, sending a string of ciphertext for corresponding to the registration request or the login request to the client, wherein the string of ciphertext for corresponding to the registration request or the login request is used for verifying whether the registration or the login of the client corresponds to the registration request or the login request.
Wherein, still include: after receiving the registration data of the client, storing the registration data as login data, after receiving the ciphertext and decrypting the ciphertext, comparing and checking the obtained login data with the stored login data, and if the comparison and check result is constant, allowing the client to login.
Wherein the method further comprises: after receiving a registration request or a login request from a client, performing validity check on the registration request or the login request from the client, and performing validity check on the registration request, wherein the validity check comprises the following steps: checking whether the registration request meets the preset requirement, judging whether the registration request is legal, and checking the validity of the login request, wherein the checking comprises the following steps: and checking whether the login data corresponding to the login request is registered.
The invention encrypts the key required by symmetric encryption in an asymmetric encryption mode, greatly reduces the possibility of key leakage, and simultaneously greatly reduces the possibility of key leakage of personnel inside because the random number is generated by the system instead of a fixed value.
The invention does not need to occupy a lot of memory of the server to store data, thereby realizing the simultaneous login and registration of users with large volumes.
Example 2:
the invention also provides a registration and login system 200 for the client, as shown in fig. 2, comprising:
the server module 201 is configured to establish a connection with a client, receive a registration request or a login request from the client, generate an asymmetric encryption public key based on the registration request or the login request, receive a random number from the client, encrypt the random number with the asymmetric encryption public key to obtain an asymmetric encryption key, decrypt the ciphertext based on the asymmetric encryption key after receiving the ciphertext sent by the sending module to obtain decrypted registration data or login data, check the registration data or login data, and allow the registration or login of the client if the registration data or login data meets the check requirement;
the receiving module 202 is configured to receive compressed data compressed with registration data or login data in a preset encoding format from a client after the server module receives the registration request or login request of the client, decompress the compressed data to obtain registration data or login data in the preset encoding format of the client, and decode a ciphertext string used for decoding the registration data or login data in the preset encoding format;
the decryption module 203 is configured to receive the registration data or the login data in the preset encoding format obtained by the receiving module, and a ciphertext string, and decode the registration data or the login data in the preset encoding format through the ciphertext string, so as to obtain the registration data or the login data;
an encryption module 204, configured to encrypt the registration data or the login data obtained by the decryption module based on the asymmetric key obtained by the server module, so as to generate a ciphertext;
and the sending module 205 is configured to send the ciphertext generated by the encryption module to a server module.
The server module is further configured to send a string of ciphertext corresponding to the registration request or the login request to the client after receiving the registration request or the login request from the client, where the string of ciphertext corresponding to the registration request or the login request is used to verify whether the registration or the login of the client corresponds to the registration request or the login request.
The server module is further configured to store the registration data as login data after receiving the registration data of the client, compare and check the obtained login data with the stored login data after receiving the ciphertext and decrypting the ciphertext, and allow the client to login if the comparison and check result is constant.
After receiving a registration request or a login request from a client, the server module performs validity check on the registration request or the login request from the client, and performs validity check on the registration request, including: checking whether the registration request meets the preset requirement, judging whether the registration request is legal, and checking the validity of the login request, wherein the checking comprises the following steps: and checking whether the login data corresponding to the login request is registered.
The invention is divided into a receiving module, an encrypting module, a decrypting module, a transmitting module and a server module.
The receiving module is responsible for decoding or decompressing the received data, so that in order to facilitate the rapid transmission of the data, it is specified that all the data must be compressed in the encoding format, and the receiving module is responsible for decompressing the data.
The decryption module is responsible for decrypting the ciphertext string decoded by the receiving end and decrypting the content of the ciphertext.
The encryption module is responsible for carrying out asymmetric encryption on the secret key, and then generating a ciphertext after symmetric encryption by using the generated secret key.
The sending module is responsible for transferring the generated ciphertext to the corresponding program.
The server module is responsible for asymmetric encryption and decryption, symmetric encryption and decryption and recording of registered users.
In the invention, when the client performs registration and login each time, a series of ciphertext needs to be applied to the server to ensure that each service corresponds to each other, and an asymmetric encrypted public key is applied to be acquired. The server sends the asymmetric encrypted public key to the client after receiving the request of the client each time, and simultaneously sends ciphertext to ensure that the services each time correspond to each other. After connection is established, a random number is generated by the client, the obtained public key is used for asymmetrically encrypting the random number, and the generated random number is used as a symmetric encryption key of the inner layer message data. After the client encrypts the data, the asymmetrically encrypted random number, the symmetrically encrypted data and the corresponding ciphertext are transmitted to the server. After receiving the data, the server checks the consistency, then decrypts the asymmetric encrypted random number by using the private key, thereby obtaining the symmetric encrypted key, and then analyzes the data by using the key, thereby completing the whole registration and login.
The invention encrypts the key required by symmetric encryption in an asymmetric encryption mode, greatly reduces the possibility of key leakage, and simultaneously greatly reduces the possibility of key leakage of personnel inside because the random number is generated by the system instead of a fixed value.
The invention does not need to occupy a lot of memory of the server to store data, thereby realizing the simultaneous login and registration of users with large volumes.
Example 3:
based on the same inventive concept, the invention also provides a computer device comprising a processor and a memory for storing a computer program comprising program instructions, the processor for executing the program instructions stored by the computer storage medium. The processor may be a central processing unit (Central Processing Unit, CPU), but may also be other general purpose processors, digital signal processors (Digital Signal Processor, DSP), application specific integrated circuits (Application SpecificIntegrated Circuit, ASIC), off-the-shelf Programmable gate arrays (FPGAs) or other Programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc., which are the computational core and control core of the terminal adapted to implement one or more instructions, in particular adapted to load and execute one or more instructions within a computer storage medium to implement the corresponding method flow or corresponding functions to implement the steps of the method in the embodiments described above.
Example 4:
based on the same inventive concept, the present invention also provides a storage medium, in particular, a computer readable storage medium (Memory), which is a Memory device in a computer device, for storing programs and data. It is understood that the computer readable storage medium herein may include both built-in storage media in a computer device and extended storage media supported by the computer device. The computer-readable storage medium provides a storage space storing an operating system of the terminal. Also stored in the memory space are one or more instructions, which may be one or more computer programs (including program code), adapted to be loaded and executed by the processor. The computer readable storage medium herein may be a high-speed RAM memory or a non-volatile memory (non-volatile memory), such as at least one magnetic disk memory. One or more instructions stored in a computer-readable storage medium may be loaded and executed by a processor to implement the steps of the methods in the above-described embodiments.
It will be appreciated by those skilled in the art that embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein. The scheme in the embodiment of the invention can be realized by adopting various computer languages, such as object-oriented programming language Java, an transliteration script language JavaScript and the like.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. It is therefore intended that the following claims be interpreted as including the preferred embodiments and all such alterations and modifications as fall within the scope of the invention.
It will be apparent to those skilled in the art that various modifications and variations can be made to the present invention without departing from the spirit or scope of the invention. Thus, it is intended that the present invention also include such modifications and alterations insofar as they come within the scope of the appended claims or the equivalents thereof.

Claims (10)

1. A registration and login method for a client, the method comprising:
receiving a registration request or a login request from a client, generating an asymmetric encryption public key based on the registration request or the login request, receiving a random number from the client, and encrypting the random number by using the asymmetric encryption public key to obtain an asymmetric encryption key;
after receiving a registration request or a login request of the client, the method is used for receiving compressed data compressed with registration data or login data in a preset coding format from the client, decompressing the compressed data to obtain the registration data or login data in the preset coding format of the client, and decoding ciphertext strings used for decoding the registration data or login data in the preset coding format;
receiving the obtained registration data or login data in a preset coding format, and a ciphertext string, decoding the registration data or login data in the preset coding format through the ciphertext string to obtain the registration data or login data, and encrypting the registration data or login data based on the asymmetric key to generate ciphertext;
decrypting the ciphertext based on the asymmetric encryption key to obtain decrypted registration data or login data, checking the registration data or login data, and allowing the registration or login of the client if the registration data or login data meets the checking requirement.
2. The method according to claim 1, wherein the method further comprises: after receiving a registration request or a login request from a client, sending a string of ciphertext for corresponding to the registration request or the login request to the client, wherein the string of ciphertext for corresponding to the registration request or the login request is used for verifying whether the registration or the login of the client corresponds to the registration request or the login request.
3. The method according to claim 1, wherein the method further comprises: after receiving the registration data of the client, storing the registration data as login data, after receiving the ciphertext and decrypting the ciphertext, comparing and checking the obtained login data with the stored login data, and if the comparison and check result is constant, allowing the client to login.
4. The system of claim 1, wherein the method further comprises: after receiving a registration request or a login request from a client, performing validity check on the registration request or the login request from the client, and performing validity check on the registration request, wherein the validity check comprises the following steps: checking whether the registration request meets the preset requirement, judging whether the registration request is legal, and checking the validity of the login request, wherein the checking comprises the following steps: and checking whether the login data corresponding to the login request is registered.
5. A registration and login system for a client, the system comprising:
the server module is used for establishing connection with the client, receiving a registration request or a login request from the client, generating an asymmetric encryption public key based on the registration request or the login request, receiving a random number from the client, encrypting the random number by using the asymmetric encryption public key to obtain an asymmetric encryption key, decrypting the ciphertext based on the asymmetric encryption key after receiving the ciphertext sent by the sending module to obtain decrypted registration data or login data, checking the registration data or the login data, and allowing the registration or the login of the client if the registration data or the login data meets the check requirement;
the receiving module is used for receiving compressed data compressed with registration data or login data in a preset coding format from the client after the server module receives the registration request or login request of the client, decompressing the compressed data to obtain the registration data or login data in the preset coding format of the client, and decoding ciphertext strings for decoding the registration data or login data in the preset coding format;
the decryption module is used for receiving the registration data or the login data in the preset coding format obtained by the receiving module and the ciphertext string, and decoding the registration data or the login data in the preset coding format through the ciphertext string to obtain the registration data or the login data;
the encryption module encrypts the registration data or the login data obtained by the decryption module based on the asymmetric key obtained by the server module to generate ciphertext;
and the sending module is used for sending the ciphertext generated by the encryption module to the server module.
6. The system of claim 5, wherein the server module is further configured to, after receiving a registration request or a login request from a client, send a string of ciphertext corresponding to the registration request or the login request to the client, and the string of ciphertext corresponding to the registration request or the login request is used to verify whether registration or login of the client corresponds to the registration request or the login request.
7. The system of claim 5, wherein the server module is further configured to store the registration data as login data after receiving the registration data of the client, compare the obtained login data with the stored login data after receiving the ciphertext and decrypting the ciphertext, and allow the client to login if the comparison result is the same.
8. The system of claim 5, wherein the server module, upon receiving a registration request or a login request from a client, performs a validity check on the registration request or the login request from the client, and performs a validity check on the registration request, comprising: checking whether the registration request meets the preset requirement, judging whether the registration request is legal, and checking the validity of the login request, wherein the checking comprises the following steps: and checking whether the login data corresponding to the login request is registered.
9. A computer device, comprising:
one or more processors;
a processor for executing one or more programs;
the method of any of claims 1-4 is implemented when the one or more programs are executed by the one or more processors.
10. A computer readable storage medium, characterized in that a computer program is stored thereon, which computer program, when executed, implements the method according to any of claims 1-4.
CN202211688440.1A 2022-12-27 2022-12-27 Registration and login method and system for client Pending CN116248343A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211688440.1A CN116248343A (en) 2022-12-27 2022-12-27 Registration and login method and system for client

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211688440.1A CN116248343A (en) 2022-12-27 2022-12-27 Registration and login method and system for client

Publications (1)

Publication Number Publication Date
CN116248343A true CN116248343A (en) 2023-06-09

Family

ID=86626825

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211688440.1A Pending CN116248343A (en) 2022-12-27 2022-12-27 Registration and login method and system for client

Country Status (1)

Country Link
CN (1) CN116248343A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117708864A (en) * 2024-02-06 2024-03-15 深圳和润达科技有限公司 Intelligent management method and device for medium bit machine applied to cell formation component equipment

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117708864A (en) * 2024-02-06 2024-03-15 深圳和润达科技有限公司 Intelligent management method and device for medium bit machine applied to cell formation component equipment

Similar Documents

Publication Publication Date Title
US11394561B2 (en) Digital transaction signing for multiple client devices using secured encrypted private keys
KR101194477B1 (en) System and method for digital rights management of electronic content
KR100957121B1 (en) Key distribution method and authentication server
WO2006080754A1 (en) Contents encryption method, system and method for providing contents through network using the encryption method
US11411731B2 (en) Secure API flow
TWI492602B (en) Mac code verification without disclosure
CN108923925B (en) Data storage method and device applied to block chain
US8166132B1 (en) Systems and methods for client-side encoding of user-generated content
CN104704500A (en) An improved implementation of robust and secure content protection in a system-on-a-chip apparatus
US11489822B2 (en) Cloud key management for AFU security
CN111181944B (en) Communication system, information distribution method, device, medium, and apparatus
CN110602085B (en) Method and device for sharing and processing data on block chain, storage medium and electronic equipment
WO2018157724A1 (en) Method for protecting encrypted control word, hardware security module, main chip and terminal
CN116248343A (en) Registration and login method and system for client
CN112637109B (en) Data transmission method, system, electronic device and computer readable medium
CN113312655A (en) File transmission method based on redirection, electronic equipment and readable storage medium
WO2024032289A1 (en) Video playback method and system, video security platform, and communication device
CN111865869B (en) Registration and authentication method and device based on random mapping, medium and electronic equipment
CN115529130B (en) Data processing method, terminal, server, system, device, medium and product
KR101790948B1 (en) Apparatus and method for providing drm service, apparatus and method for playing contents using drm service
CN110008654B (en) Electronic file processing method and device
CN107919958B (en) Data encryption processing method, device and equipment
JP2017021144A (en) Translation system and translation method
KR101701625B1 (en) Method and system for reproducing contents by secure acquiring decryption key for encrypted contents
CN110875820A (en) Management method and system for multimedia content protection key and key agent device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination