CN116633599A - Method, system and medium for verifying secure login of hand-tour client - Google Patents
Method, system and medium for verifying secure login of hand-tour client Download PDFInfo
- Publication number
- CN116633599A CN116633599A CN202310488014.1A CN202310488014A CN116633599A CN 116633599 A CN116633599 A CN 116633599A CN 202310488014 A CN202310488014 A CN 202310488014A CN 116633599 A CN116633599 A CN 116633599A
- Authority
- CN
- China
- Prior art keywords
- tour
- verification
- hand
- terminal equipment
- client
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 35
- 238000012795 verification Methods 0.000 claims abstract description 104
- 238000012545 processing Methods 0.000 claims abstract description 13
- 238000004590 computer program Methods 0.000 claims description 10
- 230000036316 preload Effects 0.000 claims description 10
- 238000004422 calculation algorithm Methods 0.000 description 12
- 241000287127 Passeridae Species 0.000 description 9
- 238000010586 diagram Methods 0.000 description 5
- 230000000739 chaotic effect Effects 0.000 description 4
- 230000006870 function Effects 0.000 description 4
- 238000013507 mapping Methods 0.000 description 3
- 238000005457 optimization Methods 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 238000010438 heat treatment Methods 0.000 description 2
- ORILYTVJVMAKLC-UHFFFAOYSA-N Adamantane Natural products C1C(C2)CC3CC1CC2C3 ORILYTVJVMAKLC-UHFFFAOYSA-N 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000012937 correction Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 239000002245 particle Substances 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- 238000012549 training Methods 0.000 description 1
- 238000011144 upstream manufacturing Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/445—Program loading or initiating
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/131—Protocols for games, networked simulations or virtual reality
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/72427—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality for supporting games or graphical animations
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D10/00—Energy efficient computing, e.g. low power processors, power management or thermal management
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Biomedical Technology (AREA)
- Human Computer Interaction (AREA)
- General Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The application provides a method, a system and a medium for secure login verification of a hand-tour client, which belong to the technical field of identity verification and specifically comprise the following steps: the authentication result is obtained by authenticating the identity of the login user through the hand-tour client, when the authentication result is true, the terminal equipment which operates the hand-tour client is identified based on the authentication mode of the login user, and when the secondary authentication is not completed, the pre-loading speed of the hand-tour client is determined based on the residual electric quantity, the memory occupancy rate and the CPU operating frequency of the terminal equipment when the mobile phone equipment is judged to be the appointed terminal equipment, and the pre-loading speed is performed based on the pre-loading speed until the secondary authentication is completed, the loading speed is determined based on at least the operating temperature of the terminal equipment, the CPU use rate and the screen refreshing frequency, and the loading processing is performed based on the loading speed, so that the reliability of the authentication and the game loading speed are further improved.
Description
Technical Field
The application belongs to the technical field of identity verification, and particularly relates to a method, a system and a medium for secure login verification of a hand-tour client.
Background
In order to realize safe login and quick verification of an upstream client, in the application patent CN104243458B, a first step of identity verification step of a server side verification account number and a static password is set, and the server side judges an account number locking state and locks a user account number locking step of the account number and a dynamic password verification step of a server side verification dynamic password, so that the following technical problems are realized, however:
1. the pre-reading operation of the game data according to the identification condition of the mobile phone equipment and the identification condition of the account number is not considered, and for mobile games, particularly large mobile games, the time of the pre-reading operation is often longer, so if the pre-reading operation cannot be performed according to the identification condition of the initial identity verification, the time of the hand-tour login verification is possibly increased, and the experience of the user is also reduced.
2. The determination of the pre-reading operation by combining the operation data of the mobile phone device is not considered, for example, when the electric quantity of the mobile phone device is insufficient or the occupancy rate of an operation memory or a CPU is too high, if the pre-reading operation is performed, the electric quantity consumption of the mobile phone is possibly excessive or the mobile phone device is possibly blocked, so that the efficiency of secondary verification of the mobile phone device is possibly affected.
Based on the technical problems, a method, a system and a medium for verifying the secure login of a hand-tour client are needed to be designed.
Disclosure of Invention
In order to achieve the purpose of the application, the application adopts the following technical scheme:
the application aims to provide a secure login verification method for a hand-tour client.
In order to solve the technical problem, the first aspect of the present application provides a secure login verification method for a hand-tour client, which specifically includes:
s11, verifying the identity of a login user through a hand-tour client to obtain a verification result, and determining whether secondary verification is needed or not based on an identity verification mode of the login user when the verification result is true, if so, entering a step S12, and if not, entering a step S14;
s12, carrying out secondary verification on the identity of the login user, judging whether the secondary verification is completed or not, if yes, entering a step S14, and if not, entering a step S13;
s13, identifying terminal equipment for operating the hand-tour client, judging whether the mobile phone equipment is a designated terminal equipment, if not, entering a step S14 until the secondary verification is completed, if so, determining the preloading speed of the hand-tour client based on the residual electric quantity of the terminal equipment, the memory occupancy rate and the CPU operating frequency, and carrying out preloading processing based on the preloading speed until the secondary verification is completed, entering the step S14;
s14, determining a loading speed at least based on the running temperature of the terminal equipment, the CPU utilization rate and the screen refreshing frequency, and carrying out loading processing based on the loading speed.
By determining whether secondary verification is needed or not based on the identity verification mode of the login user, unnecessary secondary verification is reduced on the basis of guaranteeing the reliability of the verification identity of the user, and the efficiency of the identity verification is improved.
By determining whether the mobile phone equipment is the designated terminal equipment or not and determining the preloading according to the record, the unnecessary consumption of the preloading operation on electric energy caused by the misoperation of the identity of the user is avoided, and the pertinence and the accuracy of the preloading operation are further improved on the basis of ensuring the efficiency of secondary verification.
The pre-loading speed of the hand-tour client is determined based on the residual electric quantity of the terminal equipment, the memory occupancy rate and the CPU running frequency, so that the pre-loading speed is effectively controlled under the condition of low electric quantity by considering the control of the pre-loading speed under different residual electric quantities, and meanwhile, the memory occupancy rate and the CPU running frequency are further combined, the influence of pre-loading on the performance of the mobile phone is avoided, and further the secondary verification efficiency is influenced.
The loading speed is determined at least based on the running temperature of the terminal equipment, the CPU utilization rate and the screen refreshing frequency, and loading processing is carried out based on the loading speed, so that the loading speed of the game can meet the temperature control requirement of the terminal equipment, the influence on the running temperature of the mobile phone caused by too fast loading is prevented, meanwhile, the control on the loading speed is realized by combining the CPU utilization rate and the screen refreshing frequency and starting from the self heating value of the terminal equipment, and the influence degree on the terminal equipment is reduced on the basis of ensuring the reliable and stable loading speed.
In another aspect, an embodiment of the present application provides a computer system, including: a communicatively coupled memory and processor, and a computer program stored on the memory and capable of running on the processor, characterized by: and executing the hand-tour client secure login verification method when the processor runs the computer program.
In another aspect, the present application provides a computer storage medium having a computer program stored thereon, which when executed in a computer causes the computer to perform a method of secure login authentication for a hand-tour client as described above.
Additional features and advantages will be set forth in the description which follows, and in part will be apparent from the description, or may be learned by practice of the application. The objectives and other advantages of the application will be realized and attained by the structure particularly pointed out in the written description and drawings.
In order to make the above objects, features and advantages of the present application more comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
The above and other features and advantages of the present application will become more apparent by describing in detail exemplary embodiments thereof with reference to the attached drawings.
FIG. 1 is a flow chart of a method of secure login verification for a hand-tour client according to embodiment 1;
FIG. 2 is a flowchart of specific steps for determining whether secondary verification is required according to embodiment 1;
FIG. 3 is a flowchart of specific steps for preload speed determination in accordance with example 1;
FIG. 4 is a flowchart of specific steps of load speed determination according to example 1;
fig. 5 is a frame diagram of a computer storage medium according to embodiment 3.
Detailed Description
Example embodiments will now be described more fully with reference to the accompanying drawings. However, the exemplary embodiments can be embodied in many forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of the example embodiments to those skilled in the art. The same reference numerals in the drawings denote the same or similar structures, and thus detailed descriptions thereof will be omitted.
The terms "a," "an," "the," and "said" are used to indicate the presence of one or more elements/components/etc.; the terms "comprising" and "having" are intended to be inclusive and mean that there may be additional elements/components/etc. in addition to the listed elements/components/etc.
Example 1
To solve the above-mentioned problems, according to an aspect of the present application, as shown in fig. 1, there is provided a method for secure login verification of a hand-tour client according to an aspect of the present application.
In order to solve the technical problem, the first aspect of the present application provides a secure login verification method for a hand-tour client, which specifically includes:
s11, verifying the identity of a login user through a hand-tour client to obtain a verification result, and determining whether secondary verification is needed or not based on an identity verification mode of the login user when the verification result is true, if so, entering a step S12, and if not, entering a step S14;
specific examples of the authentication method include: account password verification, dynamic code verification, fingerprint verification and face recognition verification.
Specifically, as shown in fig. 2, the specific steps for determining whether the secondary verification is required are as follows:
s21, determining whether the identification verification belongs to the identification verification based on the identification verification mode of the hand-tour client, if so, entering a step S22, and if not, entering a step S23;
s22, determining whether secondary verification is needed or not based on the similarity of the faces of the login users, if yes, entering a step S23, and if not, not needing to carry out the secondary verification;
it should be noted that, the similarity of the faces of the login user may be dynamically compared with the faces in the database according to the recognition result of the faces of the user, and the similarity of the faces of the login user may be determined according to the comparison result.
S23, obtaining basic credibility of the login user based on an identity verification mode of the hand-tour client, determining whether secondary verification is needed or not based on the basic credibility, if so, carrying out secondary verification, and if not, entering step S24;
it can be understood that the basic credibility of the login user is determined according to the identity verification mode of the hand-tour client or the similarity of the faces, wherein the basic credibility of the login user is determined by adopting an expert scoring mode based on the identity verification mode of the hand-tour client.
Specifically, for example, the basic credibility of account password verification is 0.6, and the credibility of dynamic code verification is 0.5.
S24, determining an access area based on the IP address of the login user accessing the hand-tour client, and determining that secondary verification is not needed when the access area is a frequent login area.
In this embodiment, whether the second authentication is needed is determined based on the authentication mode of the login user, so that unnecessary second authentication is reduced on the basis of ensuring the reliability of authentication identity of the user, and the efficiency of authentication is improved.
S12, carrying out secondary verification on the identity of the login user, judging whether the secondary verification is completed or not, if yes, entering a step S14, and if not, entering a step S13;
s13, identifying terminal equipment for operating the hand-tour client, judging whether the mobile phone equipment is a designated terminal equipment, if not, entering a step S14 until the secondary verification is completed, if so, determining the preloading speed of the hand-tour client based on the residual electric quantity of the terminal equipment, the memory occupancy rate and the CPU operating frequency, and carrying out preloading processing based on the preloading speed until the secondary verification is completed, entering the step S14;
it can be understood that the unique device identifier of the mobile phone device is obtained, and the judgment of the designated device terminal is performed based on the unique device identifier.
Specifically, as shown in fig. 3, the specific steps of the preloading speed determination are as follows:
s31, determining whether the residual electric quantity of the terminal equipment is smaller than the estimated electric quantity or not based on the residual electric quantity of the terminal equipment, if yes, entering a step S32, and if not, determining the pre-loading speed based on the pre-loading speed;
specific examples of the method include that the estimated electric quantity is determined according to the model of the terminal equipment, for example, the model of different terminal equipment is different, the electric power consumption of the same mobile game is different, and if the residual electric quantity of the terminal equipment is 1000mAh and the estimated electric quantity is 600mAh, the pre-loading speed is determined based on the pre-loading speed, and the specific pre-loading speed is determined in advance.
S32, determining whether the preloading speed needs to be controlled based on the residual electric quantity of the terminal equipment, if so, determining the preloading speed based on the residual electric quantity percentage of the terminal equipment and the preset preloading speed, and if not, entering step S33;
it should be noted that, when the remaining power of the terminal device is 500mAh, the remaining power is smaller than the estimated power but larger than 400mAh, the control of the pre-loading speed is not needed at this time, and when and only when the remaining power is 300mAh, the percentage of the remaining power of the terminal device is 30%, the 30% of the pre-loading speed is used as the pre-loading speed.
S33, determining whether the preloading speed needs to be controlled based on the memory occupancy rate of the terminal equipment, if so, constructing a preloading control rate based on the residual electric quantity percentage of the terminal equipment and the memory occupancy rate, determining the preloading speed based on the preloading control rate and the preset preloading speed, and if not, entering step S34;
it can be understood that constructing the preload control rate based on the remaining power percentage of the terminal device and the memory occupancy rate specifically includes:
taking the difference value between the 1 and the memory occupancy as a preloading basic control rate;
and correcting the pre-load basic control rate based on the residual electric quantity percentage of the terminal equipment to obtain the pre-load control rate.
It should be noted that, when the remaining capacity percentage is greater than 50%, no correction is required at this time, and when the remaining capacity percentage is less than 50%, the product of the remaining capacity percentage of the terminal device and the pre-load basic control rate is used as the pre-load control rate.
S34, determining whether the preloading speed needs to be controlled or not based on the CPU running frequency of the terminal equipment, if so, entering a step S35, and if not, determining the preloading speed based on the preset preloading speed;
s35, constructing a frequency control ratio based on the CPU running frequency and the highest running frequency of the CPU, and determining the preloading speed based on the frequency control ratio, the residual electric quantity percentage of the terminal equipment, the memory occupancy rate and the preset preloading speed.
It should be noted that, the preload speed is determined by adopting a prediction model based on SSA-LSTM algorithm, where the specific steps of determining the prediction model are as follows:
(1) The data set is preprocessed and divided into a training set and a testing set according to the proportion of 9:1.
(2) Constructing a double-layer LSTM network model, selecting Adam as an optimization algorithm of a learning process, and adopting L2 regularization to prevent the model from being over fitted.
(3) Setting the maximum iteration number T, the space dimension d, the population scale N and 5 super parameters of the LSTM network model of the optimization algorithm, wherein the 5 super parameters comprise the unit number of 2 LSTM layers, the iteration number, the initial learning rate and the L2 regularization factor.
(4) Initializing a population, mapping sparrow positions to super-parameter values, and taking root mean square errors as the fitness of individuals.
(5) And searching an optimal value by adopting an SSA algorithm, and recording the found position and adaptability.
(6) Judging whether the optimization algorithm reaches the maximum iteration number T, if so, outputting the optimal super-parameters, giving the optimal super-parameters to the LSTM network, and otherwise, returning to the step (5).
(7) And constructing a prediction model by adopting the output super-parameters, and obtaining the preloading speed according to the input.
Specific illustration, to enhance the global searching capability of SSA, avoid sinking into local optimum, accelerate convergence speed, the following strategies are adopted for improvement: the characteristics of Tent and t distribution are synthesized, SSA is optimized at the same time, t distribution is utilized in the early stage, global searching capacity is improved, and population positions are initialized by means of chaotic mapping, so that initializing information has diversity and randomness; in the later stage, t distribution is utilized to improve the local searching capability of the algorithm, but the phenomenon that the SSA algorithm has poor fitness and stops searching can be caused, at the moment, random variables of chaotic mapping are needed to be utilized to disturb the local optimum dilemma of the sparrow population, the local optimum is jumped out, and the searching is continued;
wherein x is i To indicate the original i-th sparrow position,for the mutated i-th sparrow new position, t is the set iteration number, and N represents TentThe number of chaotic sequence particles, rand (0, 1) is a random number with a value between 0 and 1.
Sparrow algorithm based on t distribution, at original x i On the basis of adding x i Interference term of i/N, and the internal information of sparrow population can be obtained in the searching process by utilizing the degree of freedom parameter. If the iteration number is larger, the t distribution is converted into Gaussian distribution, so that the local searching capability can be improved; if the iteration times are smaller, the t distribution is converted into the Cauchy distribution, and the global searching capability is improved. Therefore, the early stage can set a smaller iteration number, and the later stage can set a larger iteration number.
Because the initial value information of the original sparrow algorithm is single in the searching process, the sparrow algorithm is low in calculating speed and accuracy, and meanwhile, the global optimal solution is difficult to find. The random variable of the Tent chaotic algorithm is utilized, so that the initial position information has unknowns, uniqueness and diversity, the initial information content is enriched, the sparrow algorithm is optimized, the global optimal solution is found, and the calculation speed and accuracy are improved.
By determining whether the mobile phone equipment is the designated terminal equipment or not and determining the preloading according to the record, the unnecessary consumption of the preloading operation on electric energy caused by the misoperation of the identity of the user is avoided, and the pertinence and the accuracy of the preloading operation are further improved on the basis of ensuring the efficiency of secondary verification.
In this embodiment, the pre-loading speed of the hand-tour client is determined based on the residual electric quantity, the memory occupancy rate and the CPU operating frequency of the terminal device, so that the pre-loading speed is effectively controlled under the condition of low electric quantity by considering the control of the pre-loading speed under different residual electric quantities, and meanwhile, the memory occupancy rate and the CPU operating frequency are further combined, so that the influence of the pre-loading on the performance of the mobile phone is avoided, and further the secondary verification efficiency is influenced.
S14, determining a loading speed at least based on the running temperature of the terminal equipment, the CPU utilization rate and the screen refreshing frequency, and carrying out loading processing based on the loading speed.
As shown in fig. 4, the specific steps of determining the loading speed are as follows:
s41, determining whether the loading speed needs to be controlled or not based on the running temperature of the terminal equipment and the temperature limit value of the terminal equipment, if so, entering a step S42, and if not, taking a preset loading speed as the loading speed;
s42, determining whether the loading speed needs to be controlled based on the CPU utilization rate of the terminal equipment, if so, determining the loading speed based on the CPU utilization rate of the terminal equipment and a preset loading speed, and if not, entering step S43;
s43, determining a temperature variation value of the terminal equipment based on the CPU utilization rate, the memory utilization rate, the real-time power consumption and the screen refresh rate of the terminal equipment, constructing a predicted operation temperature based on the temperature variation value and the operation temperature, and determining the loading speed based on the predicted operation temperature and the preset loading speed.
In this embodiment, the loading speed is determined at least based on the running temperature of the terminal device, the CPU usage rate and the screen refreshing frequency, and the loading processing is performed based on the loading speed, so that the loading speed of the game can meet the temperature control requirement of the terminal device, the influence on the running temperature of the mobile phone caused by too fast loading is prevented, meanwhile, the control on the loading speed is realized from the self heating value of the terminal device by combining the CPU usage rate and the screen refreshing frequency, and the influence degree on the terminal device is reduced on the basis of ensuring the reliable and stable loading speed.
Example 2
In another aspect, an embodiment of the present application provides a computer system, including: a communicatively coupled memory and processor, and a computer program stored on the memory and capable of running on the processor, characterized by: and executing the hand-tour client secure login verification method when the processor runs the computer program.
It should be noted that, the method for verifying the secure login of the hand-tour client specifically includes:
s11, verifying the identity of a login user through a hand-tour client to obtain a verification result, and determining whether secondary verification is needed or not based on an identity verification mode of the login user when the verification result is true, if so, entering a step S12, and if not, entering a step S14;
s12, carrying out secondary verification on the identity of the login user, judging whether the secondary verification is completed or not, if yes, entering a step S14, and if not, entering a step S13;
s13, identifying terminal equipment for operating the hand-tour client, judging whether the mobile phone equipment is a designated terminal equipment, if not, entering a step S14 until the secondary verification is completed, if so, determining the preloading speed of the hand-tour client based on the residual electric quantity of the terminal equipment, the memory occupancy rate and the CPU operating frequency, and carrying out preloading processing based on the preloading speed until the secondary verification is completed, entering the step S14;
s14, determining a loading speed at least based on the running temperature of the terminal equipment, the CPU utilization rate and the screen refreshing frequency, and carrying out loading processing based on the loading speed.
Example 3
In another aspect, as shown in fig. 5, the present application provides a computer storage medium having a computer program stored thereon, which when executed in a computer, causes the computer to perform a method for secure login verification of a hand-tour client as described above.
It should be noted that, the method for verifying the secure login of the hand-tour client specifically includes:
s11, verifying the identity of a login user through a hand-tour client to obtain a verification result, and determining whether secondary verification is needed or not based on an identity verification mode of the login user when the verification result is true, if so, entering a step S12, and if not, entering a step S14;
s12, carrying out secondary verification on the identity of the login user, judging whether the secondary verification is completed or not, if yes, entering a step S14, and if not, entering a step S13;
s13, identifying terminal equipment for operating the hand-tour client, judging whether the mobile phone equipment is a designated terminal equipment, if not, entering a step S14 until the secondary verification is completed, if so, determining the preloading speed of the hand-tour client based on the residual electric quantity of the terminal equipment, the memory occupancy rate and the CPU operating frequency, and carrying out preloading processing based on the preloading speed until the secondary verification is completed, entering the step S14;
s14, determining a loading speed at least based on the running temperature of the terminal equipment, the CPU utilization rate and the screen refreshing frequency, and carrying out loading processing based on the loading speed.
In the several embodiments provided in the present application, it should be understood that the disclosed system and method may be implemented in other manners as well. The system embodiments described above are merely illustrative, for example, of the flowcharts and block diagrams in the figures that illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In addition, functional modules in the embodiments of the present application may be integrated together to form a single part, or each module may exist alone, or two or more modules may be integrated to form a single part.
The functions, if implemented in the form of software functional modules and sold or used as a stand-alone product, may be stored on a computer readable storage medium. Based on this understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art or in a part of the technical solution in the form of a software product stored in a storage medium, comprising several instructions for causing a computer device (which may be a personal computer, a server, a network device, etc.) to perform all or part of the steps of the method of the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
With the above-described preferred embodiments according to the present application as an illustration, the above-described descriptions can be used by persons skilled in the relevant art to make various changes and modifications without departing from the scope of the technical idea of the present application. The technical scope of the present application is not limited to the description, but must be determined according to the scope of claims.
Claims (10)
1. A hand-tour client secure login verification method specifically comprises the following steps:
s11, verifying the identity of a login user through a hand-tour client to obtain a verification result, and determining whether secondary verification is needed or not based on an identity verification mode of the login user when the verification result is true, if so, entering a step S12, and if not, entering a step S14;
s12, carrying out secondary verification on the identity of the login user, judging whether the secondary verification is completed or not, if yes, entering a step S14, and if not, entering a step S13;
s13, identifying terminal equipment for operating the hand-tour client, judging whether the mobile phone equipment is a designated terminal equipment, if not, entering a step S14 until the secondary verification is completed, if so, determining the preloading speed of the hand-tour client based on the residual electric quantity of the terminal equipment, the memory occupancy rate and the CPU operating frequency, and carrying out preloading processing based on the preloading speed until the secondary verification is completed, entering the step S14;
s14, determining a loading speed at least based on the running temperature of the terminal equipment, the CPU utilization rate and the screen refreshing frequency, and carrying out loading processing based on the loading speed.
2. The method for authenticating a secure login of a hand-tour client according to claim 1, wherein the authentication method comprises: account password verification, dynamic code verification, fingerprint verification and face recognition verification.
3. The method for authenticating a secure login of a hand-tour client according to claim 2, wherein the specific step of determining whether the secondary authentication is required is:
s21, determining whether the identification verification belongs to the identification verification based on the identification verification mode of the hand-tour client, if so, entering a step S22, and if not, entering a step S23;
s22, determining whether secondary verification is needed or not based on the similarity of the faces of the login users, if yes, entering a step S23, and if not, not needing to carry out the secondary verification;
s23, obtaining basic credibility of the login user based on an identity verification mode of the hand-tour client, determining whether secondary verification is needed or not based on the basic credibility, if so, carrying out secondary verification, and if not, entering step S24;
s24, determining an access area based on the IP address of the login user accessing the hand-tour client, and determining that secondary verification is not needed when the access area is a frequent login area.
4. The method for authenticating a secure login of a hand-tour client according to claim 3, wherein the basic credibility of the login user is determined according to the identity authentication mode or the similarity of faces of the hand-tour client, and wherein the basic credibility of the login user is determined by expert scoring based on the identity authentication mode of the hand-tour client.
5. The method for authenticating a secure login of a hand-tour client according to claim 1, wherein a unique device identifier of the mobile phone device is obtained, and a determination of a designated device terminal is made based on the unique device identifier.
6. The method for verifying the secure login of the hand-tour client according to claim 1, wherein the specific step of determining the preloading speed is:
determining whether the residual electric quantity of the terminal equipment is smaller than the estimated electric quantity or not, if yes, entering the next step, and if not, determining the pre-loading speed based on the pre-loading speed;
determining whether the preloading speed needs to be controlled based on the residual electric quantity of the terminal equipment, if so, determining the preloading speed based on the residual electric quantity percentage of the terminal equipment and the preset preloading speed, and if not, entering the next step;
determining whether the preloading speed needs to be controlled based on the memory occupancy rate of the terminal equipment, if so, constructing a preloading control rate based on the residual electric quantity percentage of the terminal equipment and the memory occupancy rate, determining the preloading speed based on the preloading control rate and the preset preloading speed, and if not, entering the next step;
determining whether the preloading speed needs to be controlled or not based on the CPU running frequency of the terminal equipment, if so, entering the next step, and if not, determining the preloading speed based on the preset preloading speed;
and constructing a frequency control ratio based on the CPU operating frequency and the highest operating frequency of the CPU, and determining the preloading speed based on the frequency control ratio, the residual electric quantity percentage of the terminal equipment, the memory occupancy rate and the preset preloading speed.
7. The method for verifying the secure login of the hand-tour client according to claim 6, wherein the constructing the preload control ratio based on the remaining power percentage of the terminal device and the memory occupancy rate specifically comprises:
taking the difference value between the 1 and the memory occupancy as a preloading basic control rate;
and correcting the pre-load basic control rate based on the residual electric quantity percentage of the terminal equipment to obtain the pre-load control rate.
8. The method for verifying the secure login of the hand-tour client according to claim 1, wherein the specific step of determining the loading speed is:
determining whether the loading speed needs to be controlled based on the running temperature of the terminal equipment and the temperature limit value of the terminal equipment, if so, entering the next step, and if not, taking the preset loading speed as the loading speed;
determining whether the loading speed needs to be controlled based on the CPU utilization rate of the terminal equipment, if so, determining the loading speed based on the CPU utilization rate of the terminal equipment and a preset loading speed, and if not, entering the next step;
and determining a temperature variation value of the terminal equipment based on the CPU utilization rate, the memory utilization rate, the real-time power consumption and the screen refresh rate of the terminal equipment, constructing a predicted operating temperature based on the temperature variation value and the operating temperature, and determining the loading speed based on the predicted operating temperature and the preset loading speed.
9. A computer system, comprising: a communicatively coupled memory and processor, and a computer program stored on the memory and capable of running on the processor, characterized by: the processor, when running the computer program, performs a method of secure login verification for a hand-tour client as claimed in any one of claims 1-8.
10. A computer storage medium having stored thereon a computer program which, when executed in a computer, causes the computer to perform a method of secure login verification for a hand-game client according to any of claims 1-8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310488014.1A CN116633599B (en) | 2023-05-04 | 2023-05-04 | Method, system and medium for verifying secure login of hand-tour client |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310488014.1A CN116633599B (en) | 2023-05-04 | 2023-05-04 | Method, system and medium for verifying secure login of hand-tour client |
Publications (2)
Publication Number | Publication Date |
---|---|
CN116633599A true CN116633599A (en) | 2023-08-22 |
CN116633599B CN116633599B (en) | 2024-01-30 |
Family
ID=87590401
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310488014.1A Active CN116633599B (en) | 2023-05-04 | 2023-05-04 | Method, system and medium for verifying secure login of hand-tour client |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116633599B (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170063863A1 (en) * | 2015-09-02 | 2017-03-02 | Huawei Technologies Co., Ltd. | Access Control Device and Authentication Control Method |
CN114011079A (en) * | 2021-10-29 | 2022-02-08 | 上海米哈游天命科技有限公司 | Cloud game login method and device, electronic equipment and storage medium |
CN115221442A (en) * | 2022-07-29 | 2022-10-21 | 平安科技(深圳)有限公司 | Webpage loading method and device, computer equipment and computer readable storage medium |
CN115562744A (en) * | 2022-03-31 | 2023-01-03 | 荣耀终端有限公司 | Application program loading method and electronic equipment |
CN115643054A (en) * | 2022-09-30 | 2023-01-24 | 中国农业银行股份有限公司 | Identity information verification method, device, server, medium and product |
-
2023
- 2023-05-04 CN CN202310488014.1A patent/CN116633599B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170063863A1 (en) * | 2015-09-02 | 2017-03-02 | Huawei Technologies Co., Ltd. | Access Control Device and Authentication Control Method |
CN114011079A (en) * | 2021-10-29 | 2022-02-08 | 上海米哈游天命科技有限公司 | Cloud game login method and device, electronic equipment and storage medium |
CN115562744A (en) * | 2022-03-31 | 2023-01-03 | 荣耀终端有限公司 | Application program loading method and electronic equipment |
CN115221442A (en) * | 2022-07-29 | 2022-10-21 | 平安科技(深圳)有限公司 | Webpage loading method and device, computer equipment and computer readable storage medium |
CN115643054A (en) * | 2022-09-30 | 2023-01-24 | 中国农业银行股份有限公司 | Identity information verification method, device, server, medium and product |
Also Published As
Publication number | Publication date |
---|---|
CN116633599B (en) | 2024-01-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10552590B2 (en) | System and method for providing an authentication agent in a persistent authentication framework | |
US8942431B2 (en) | Biometrics based methods and systems for user authentication | |
US20070283416A1 (en) | System and method of enhancing user authentication using response parameters | |
CN109933973A (en) | Cryptographic check method, apparatus, computer equipment and storage medium | |
CN116308762B (en) | Credibility evaluation and trust processing method based on artificial intelligence | |
CN113449783A (en) | Countermeasure sample generation method, system, computer device and storage medium | |
US11233788B1 (en) | Determining authentication assurance from historical and runtime-provided inputs | |
CN112163335A (en) | Training method, prediction method and device of NOx concentration prediction model | |
CN116029876A (en) | Intelligent campus integrated management device and method | |
CN116436683A (en) | Zero-trust power network equipment access security trust evaluation method and device | |
CN113807452B (en) | Business process abnormality detection method based on attention mechanism | |
CN116633599B (en) | Method, system and medium for verifying secure login of hand-tour client | |
CN117577157A (en) | Method, device, equipment and medium for processing solid state disk read request | |
US20220383319A1 (en) | Multi-factor authentication security system and method for verifying identification using evolving personal data combined with biometrics | |
CN112272195B (en) | Dynamic detection authentication system and method thereof | |
CN115759226A (en) | Training method, device, equipment and storage medium of visual network model | |
CN116047223A (en) | Electricity larceny distinguishing method based on real-time electricity consumption and big data analysis | |
Shankar et al. | An improved user authentication scheme on smartphone using dominating attribute of touch data | |
CN113344792A (en) | Image generation method and device and electronic equipment | |
Fu et al. | Continuous user authentication based on context-emphasized behavior profiling | |
KR20210024748A (en) | Malware documents detection device and method using generative adversarial networks | |
CN116232720B (en) | API (application program interface) encryption authentication method and storage device | |
Fu et al. | A novel software system protection scheme based on behavior and context monitoring | |
CN118536141B (en) | Encryption control method and system for memory data recovery | |
CN113409051B (en) | Risk identification method and device for target service |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |