CN116861402A - Login certificate management method and device, terminal equipment and storage medium - Google Patents

Login certificate management method and device, terminal equipment and storage medium Download PDF

Info

Publication number
CN116861402A
CN116861402A CN202310764842.3A CN202310764842A CN116861402A CN 116861402 A CN116861402 A CN 116861402A CN 202310764842 A CN202310764842 A CN 202310764842A CN 116861402 A CN116861402 A CN 116861402A
Authority
CN
China
Prior art keywords
login
information
credential
credentials
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310764842.3A
Other languages
Chinese (zh)
Inventor
伍政宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Property and Casualty Insurance Company of China Ltd
Original Assignee
Ping An Property and Casualty Insurance Company of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Property and Casualty Insurance Company of China Ltd filed Critical Ping An Property and Casualty Insurance Company of China Ltd
Priority to CN202310764842.3A priority Critical patent/CN116861402A/en
Publication of CN116861402A publication Critical patent/CN116861402A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The embodiment of the application relates to the technical field of financial science and technology, and particularly provides a login credential management method, a login credential management device, terminal equipment and a storage medium. The method comprises the steps of obtaining login information and login type of a user, and obtaining corresponding initial login credentials according to the login information and the login type, wherein the initial login credentials comprise basic login credentials and random login credentials, the basic login credentials are used for representing login credentials related to the basic information of the user, and the random login credentials are used for representing ageing information of the initial login credentials; receiving request information of a user, and determining a target login credential corresponding to the request information according to the request information and the initial login credential; the query condition of the user is determined according to the request information, and the request processing result of the request information is obtained according to the target login credential and the query condition, so that the user can use the corresponding target login credential when accessing different information, and the information security is ensured under the condition of realizing the timely query of the user.

Description

Login certificate management method and device, terminal equipment and storage medium
Technical Field
The present application relates to the technical field of financial science and technology, and in particular, to a login credential management method, device, terminal equipment, and storage medium.
Background
At present, in the financial field, information query or transaction is required to be performed on interface information such as a webpage, an app and the like, when an application program or a webpage is logged in, a user is required to input an account number and a password and send the account number and the password to a back-end server of the application program for verification, the server returns a specific login state token (login certificate) to the user after verification is successful, and a subsequent user is required to take the token to identify the identity of the user when sending a network request. The existing authority center design controls the flow in and out of the system through a token single attribute, is easy to control confusion, and is easy to have potential safety hazards in the information query process.
Disclosure of Invention
The embodiment of the application mainly aims to provide a login credential management method, a login credential management device, terminal equipment and a storage medium, and aims to ensure smooth inquiry and information inquiry safety when users log on different platforms to inquire information.
In a first aspect, an embodiment of the present application provides a method for managing login credentials, including:
obtaining login information and login type of a user, and obtaining a corresponding initial login credential according to the login information and the login type, wherein the initial login credential comprises a basic login credential and a random login credential, the basic login credential is used for representing the login credential related to the basic information of the user, and the random login credential is used for representing ageing information of the initial login credential;
receiving request information of a user, and determining a target login credential corresponding to the request information according to the request information and the initial login credential;
and determining the query condition of the user according to the request information, and obtaining a request processing result of the request information according to the target login credential and the query condition.
In a second aspect, an embodiment of the present application further provides a task planning apparatus, including:
the system comprises a data acquisition module, a data processing module and a data processing module, wherein the data acquisition module is used for acquiring login information and login type of a user and acquiring a corresponding initial login credential according to the login information and the login type, the initial login credential comprises a basic login credential and a random login credential, the basic login credential is used for representing the login credential related to the basic information of the user, and the random login credential is used for representing ageing information of the initial login credential;
the data generation module is used for receiving request information of a user, and determining a target login credential corresponding to the request information according to the request information and the initial login credential;
and the data processing module is used for determining the query condition of the user according to the request information and obtaining a request processing result of the request information according to the target login credential and the query condition.
In a third aspect, an embodiment of the present application further provides a terminal device, where the terminal device includes a processor, a memory, a computer program stored on the memory and executable by the processor, and a data bus for implementing a connection communication between the processor and the memory, where the computer program, when executed by the processor, implements the steps of a method for managing login credentials according to any one of the embodiments provided in the present specification.
In a fourth aspect, an embodiment of the present application further provides a computer storage medium, for storing a computer readable storage medium, where the storage medium stores one or more programs, and the one or more programs are executable by one or more processors to implement the steps of a method for managing login credentials according to any one of the embodiments of the present application.
The embodiment of the application provides a method, a device, a terminal device and a storage medium for managing login credentials, wherein the method comprises the steps of obtaining login information and login type of a user, and obtaining corresponding initial login credentials according to the login information and the login type, wherein the initial login credentials comprise basic login credentials and random login credentials, the basic login credentials are used for representing login credentials related to the basic information of the user, and the random login credentials are used for representing ageing information of the initial login credentials; receiving request information of a user, and determining a target login credential corresponding to the request information according to the request information and the initial login credential; the query condition of the user is determined according to the request information, and the request processing result of the request information is obtained according to the target login credentials and the query condition, so that when the user accesses different information under different platforms, the corresponding target login credentials are utilized, and the information security is ensured under the condition of timely query of the user.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings required for the description of the embodiments will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present application, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flowchart illustrating a method for managing login credentials according to an embodiment of the present application;
FIG. 2 is a flow chart of steps corresponding to one embodiment of step S1 in FIG. 1;
FIG. 3 is a flowchart of steps corresponding to one embodiment of step S2 in FIG. 1;
fig. 4 is a schematic block diagram of a login credential management device according to an embodiment of the present application;
fig. 5 is a schematic block diagram of a structure of a terminal device according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are some, but not all embodiments of the application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
The flow diagrams depicted in the figures are merely illustrative and not necessarily all of the elements and operations/steps are included or performed in the order described. For example, some operations/steps may be further divided, combined, or partially combined, so that the order of actual execution may be changed according to actual situations.
It is to be understood that the terminology used in the description of the application herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in this specification and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
The embodiment of the application provides a login credential management method, a login credential management device, terminal equipment and a storage medium. The login credential management method can be applied to terminal equipment. The terminal device may be a tablet computer, a notebook computer, a desktop computer, a personal digital assistant, a wearable device, or a server, where the server may be an independent server or a server cluster.
The method comprises the steps of obtaining login information and login type of a user, and obtaining corresponding initial login credentials according to the login information and the login type, wherein the initial login credentials comprise basic login credentials and random login credentials, the basic login credentials are used for representing login credentials related to the basic information of the user, and the random login credentials are used for representing ageing information of the initial login credentials; receiving request information of a user, and determining a target login credential corresponding to the request information according to the request information and the initial login credential; the query condition of the user is determined according to the request information, and the request processing result of the request information is obtained according to the target login credentials and the query condition, so that when the user accesses different information under different platforms, the corresponding target login credentials are utilized, and the information security is ensured under the condition of timely query of the user.
Some embodiments of the application are described in detail below with reference to the accompanying drawings. The following embodiments and features of the embodiments may be combined with each other without conflict.
Referring to fig. 1, fig. 1 is a flowchart of a login credential management method according to an embodiment of the present application.
As shown in fig. 1, the login credential management method includes steps S1 to S3.
Step S1: obtaining login information and login type of a user, and obtaining a corresponding initial login credential according to the login information and the login type, wherein the initial login credential comprises a basic login credential and a random login credential, the basic login credential is used for representing the login credential related to the basic information of the user, and the random login credential is used for representing ageing information of the initial login credential.
For example, in the field of financial insurance, with the development of network technology, more and more client types, such as a browser, a mobile terminal and some internal and external micro services, are appeared, when a user operates at different clients, the user needs to query and trade his own information and money, and the existing mainstream technology generally adopts a single login credential to operate, which increases the risk of information leakage and money loss of the user.
For example, users correspond to different usage scenarios at different clients, and the risk of information leakage faced is different for different scenarios. For example, the browser end is easy to intercept in public network transmission, and the exposure rate is high, so that if the failure time of login credentials is set longer when the browser end logs in, the risks of information leakage and money loss are greatly increased; however, when the user logs in at the mobile terminal, privacy is generally kept, and if the expiration time of the login credentials is short, the experience of the user is reduced. Therefore, the login credentials of the user need to be set according to different usage scenarios.
The login information and the login type of the user are obtained, wherein the login type can be a mobile terminal, a browser terminal or an applet terminal, and the login information of the user can be a user name and a password, or can be an app id and a secret corresponding to the user under the login type. And finally, determining the initial login credentials of the user by utilizing the basic login credentials and the random login credentials.
For example, the user name, user id and login client type may be used as basic information in the process of generating the initial login credential, the timestamp and the token expiration time may be used as random information, and the process of generating the initial login credential may be generated by combining the basic information and the random information.
As shown in fig. 2, in some embodiments, the method obtains a corresponding initial login credential according to the login information and the login type, where the initial login credential includes a basic login credential and a random login credential, and step S1 includes steps S11 to S14.
Step S11: and determining the validity period of the initial login credential according to the login type.
For example, because the risks of information leakage and money loss of the user on different login platforms are different, when the user logs in the system on different login platforms, the validity period of the set initial login credentials is different, so that the information security of the user is reduced, and the risks of information leakage and money loss of the user are reduced.
For example, if the system of the related insurance service supports 3 platforms, including a browser platform, a mobile phone platform, and a applet platform, the validity period of the initial login credentials corresponding to the three platforms is 3 hours, 7 days, and 1 hour, then when the login type of the user is obtained as the mobile phone platform, the validity period can be obtained as 7 days, and so on.
Step S12: and generating the basic login credentials according to the basic information in the login information.
Illustratively, the base login credentials are generated based on basic information in the login information, such as the user name and user password, and further based on the user name and user password.
Step S13: and generating the random login credential according to the time information of the current operation and the validity period.
Illustratively, when login information of the user is acquired, the login information includes not only a user name and a user password but also time information of a current operation, and a valid time range is determined according to the validity period in step S11, thereby determining a random login credential. Alternatively, the time information of the current operation may be the current time that the system displays when the random login credentials are generated.
For example, the current operation time is 2022, 1 month, 1 day, 10:00:00, and the effective period is 7 days, and the effective time ranges from 2022, 1 month, 1 day, 10:00:00 to 2022, 1 month, 8 day, 10:00:00. And further generating a login certificate at any time by using the effective time range.
Step S14: and obtaining the initial login credentials according to the basic login credentials and the random login credentials.
Illustratively, the base login credentials and the random login credentials are spliced to obtain initial login credentials.
In some embodiments, the obtaining the initial login credentials from the base login credentials and the random login credentials comprises: splicing the basic login credentials and the random login credentials to obtain spliced login credentials; and encrypting the spliced login credentials by using a public key to obtain the initial login credentials.
The basic login credentials and the random login credentials are spliced to obtain spliced login credentials, then the spliced login credentials are encrypted by using a public key to obtain initial login credentials, further when event processing such as information inquiry is carried out by using the initial login credentials, decryption is needed by using a private key corresponding to the public key, and when the private key cannot be unlocked, the fact that the initial login credentials are wrong or forged is indicated, further event processing cannot be carried out, and the safety of user information is more effectively guaranteed.
In some embodiments, before the obtaining the corresponding initial login credential according to the login information and the login type, the method further includes: the login information is sent to a server, the server queries the login information in a database according to the login information to obtain a query result, the server judges the validity of the login information according to the query result to obtain a judgment result, and the judgment result is sent to the terminal equipment; and determining whether the user logs in successfully or not according to the judging result, sending abnormal feedback when the user does not log in successfully, and continuously executing to obtain corresponding initial login credentials according to the login information when the user logs in successfully.
For example, validity verification needs to be performed on login information before login information of a user is acquired, so that the user is guaranteed to be a target user. The login information of the user is sent to the server, the server inquires in a corresponding database after receiving the login information, whether the user exists or not, and whether the user password corresponding to the user is correct or not, further validity verification is completed, a judgment result is obtained, the judgment result is sent to the terminal device, the terminal device determines whether the user is successful in login or not according to the judgment result, namely whether the login information is legal or not, and abnormal feedback is displayed in the terminal device when the user is unsuccessful in login.
Step S2: and receiving request information of a user, and determining a target login credential corresponding to the request information according to the request information and the initial login credential.
The method includes the steps that after request information of a user is received, an initial login credential is converted into a corresponding target login credential according to the request information of the user, and then the request information of the user is continuously executed by using the target login credential.
As shown in fig. 3, in some embodiments, the step S2 includes steps S21 to S22, where the target login credential corresponding to the request information is determined according to the request information and the initial login credential.
Step S21: determining a request type corresponding to the request information according to the request information;
step S22: and determining the target login credentials according to the request type and the initial login credentials.
The request types may be divided into a password layer, a call layer, an application layer, a session layer, for example, the application layer is used for realizing the order of insurance or applying for premium in the insurance system, so that the transaction involving money is required in the application layer, and the session layer is used for realizing the inquiry of insurance, and the transaction involving no money is more involved, and private information is more involved. Therefore, the request type corresponding to the request information is different, so that the target login credential is further obtained according to the request type and the initial login credential.
For example, the time validity period of the login credentials is further limited according to the request type on the basis of the initial login credentials, and the corresponding target login credentials are further obtained. The target login credentials can be used as a standard for calling each other between services, and based on the standard, the complex single service can be split into independent micro-services, and the security calling between the services is ensured. Finally, based on the target login credentials of the calling layer, short-time application layer login credentials can be generated, such as functions or marketing mail clicking and jumping to a system login-free two-dimensional code, such as a WeChat mobile phone code scanning authorization computer login, and then, such as a system certain sharing page invitation code link generation and other functional scenes.
Step S3: and determining the query condition of the user according to the request information, and obtaining a request processing result of the request information according to the target login credential and the query condition.
The method includes the steps of extracting query conditions when a user queries information according to request information, and further querying information in a corresponding database according to a target login credential and the query conditions to obtain a request processing result.
In some embodiments, the obtaining the request processing result of the request information according to the target login credential and the query condition includes: according to the target login credentials, carrying out validity query to obtain whether the target login credentials meet preset time; and when the target login credential meets the preset time, obtaining a request processing result according to the information processing of the target login credential on the request information.
The validity inquiry is firstly carried out on the validity period in the target login certificate, and when the target login certificate meets the preset time, the user basic information contained in the target login certificate is utilized to carry out information processing on the request content in the request information, so that a request processing result is obtained. When the target login credentials do not meet the preset time, a feedback message is sent to the terminal equipment to remind the user that the target login credentials are invalid and login needs to be carried out again.
In some embodiments, after the obtaining the request processing result of the request information according to the target login credential and the query condition, the method further includes: obtaining operation time interval information of the user, and performing invalidation operation on the target login credential when the operation time interval information meets preset interval time.
For example, when the user does not operate the system interface for a long time and the system interface is not in a hidden state, the user operation time interval information can be detected to ensure the safety of the user information, and when the user operation time interval information is detected to meet the preset interval time, the target login credential is directly subjected to invalidation operation even if the target login credential is in the validity period.
For example, after the user a performs an operation at the application layer, the user a leaves the seat and does other things, and at this time, it may be detected that the user a does not perform an operation at the current interface for a period of time, and when the time interval of the non-operating system interface is a preset time interval, the last time in the validity period set in the target login credential is set as the current time.
Referring to fig. 4, fig. 4 is a login credential management device 200 according to an embodiment of the present application, where the login credential management device 200 includes: a data acquisition module 201, a data generation module 202 and a data processing module 203. The data acquisition module 201 is configured to acquire login information and login type of a user, and obtain a corresponding initial login credential according to the login information and the login type, where the initial login credential includes a basic login credential and a random login credential, the basic login credential is used to represent a login credential related to the basic information of the user, and the random login credential is used to represent aging information of the initial login credential; the data generating module 202 is configured to receive request information of a user, and determine a target login credential corresponding to the request information according to the request information and the initial login credential; and the data processing module 203 is configured to determine a query condition of the user according to the request information, and obtain a request processing result of the request information according to the target login credential and the query condition.
In some embodiments, the data obtaining module 201 further performs, in a process before obtaining the corresponding initial login credentials according to the login information and the login type:
the login information is sent to a server, the server queries the login information in a database according to the login information to obtain a query result, the server judges the validity of the login information according to the query result to obtain a judgment result, and the judgment result is sent to the terminal equipment;
and determining whether the user logs in successfully or not according to the judging result, sending abnormal feedback when the user does not log in successfully, and continuously executing to obtain corresponding initial login credentials according to the login information when the user logs in successfully.
In some embodiments, in the process of obtaining the corresponding initial login credentials according to the login information and the login type, the data obtaining module 201 performs:
determining the validity period of the initial login credential according to the login type;
generating the basic login credentials according to basic information in the login information;
generating the random login credentials according to the time information of the current operation and the validity period;
and obtaining the initial login credentials according to the basic login credentials and the random login credentials.
In some embodiments, the data acquisition module 201 performs, in the obtaining the initial login credentials from the base login credentials and the random login credentials:
splicing the basic login credentials and the random login credentials to obtain spliced login credentials;
and encrypting the spliced login credentials by using a public key to obtain the initial login credentials.
In some embodiments, the data generating module 202 performs, in the process of determining, according to the request information and the initial login credential, a target login credential corresponding to the request information:
determining a request type corresponding to the request information according to the request information;
and determining the target login credentials according to the request type and the initial login credentials.
In some embodiments, the data processing module 203 performs, in the process of obtaining the request processing result of the request information according to the target login credential and the query condition:
according to the target login credentials, carrying out validity query to obtain whether the target login credentials meet preset time;
and when the target login credential meets the preset time, obtaining a request processing result according to the information processing of the target login credential on the request information.
In some embodiments, the data processing module 203 further performs, in the process after the obtaining the request processing result of the request information according to the target login credential and the query condition:
obtaining operation time interval information of the user, and performing invalidation operation on the target login credential when the operation time interval information meets preset interval time.
Optionally, the login credential management device 200 is applied to the terminal device.
Referring to fig. 5, fig. 5 is a schematic block diagram of a structure of a terminal device according to an embodiment of the present application.
As shown in fig. 5, the terminal device 300 includes a processor 301 and a memory 302, the processor 301 and the memory 302 being connected by a bus 303, such as an I2C (Inter-integrated Circuit) bus.
In particular, the processor 301 is used to provide computing and control capabilities, supporting the operation of the entire server. The processor 301 may be a central processing unit (Central Processing Unit, CPU), the processor 301 may also be other general purpose processors, digital signal processors (Digital Signal Processor, DSP), application specific integrated circuits (Application Specific Integrated Circuit, ASIC), field-programmable gate arrays (Field-Programmable Gate Array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, or the like. Wherein the general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
Specifically, the Memory 302 may be a Flash chip, a Read-Only Memory (ROM) disk, an optical disk, a U-disk, a removable hard disk, or the like.
It will be appreciated by those skilled in the art that the structure shown in fig. 5 is merely a block diagram of a portion of the structure associated with an embodiment of the present application and is not intended to limit the terminal device to which an embodiment of the present application is applied, and that a particular terminal device may include more or fewer components than shown, or may combine certain components, or may have a different arrangement of components.
The processor 301 is configured to run a computer program stored in the memory, and implement any one of the login credentials management methods provided in the embodiments of the present application when the computer program is executed.
In some embodiments, the processor 301 is configured to run a computer program stored in a memory and when executing the computer program implement the steps of:
obtaining login information and login type of a user, and obtaining a corresponding initial login credential according to the login information and the login type, wherein the initial login credential comprises a basic login credential and a random login credential, the basic login credential is used for representing the login credential related to the basic information of the user, and the random login credential is used for representing ageing information of the initial login credential;
receiving request information of a user, and determining a target login credential corresponding to the request information according to the request information and the initial login credential;
and determining the query condition of the user according to the request information, and obtaining a request processing result of the request information according to the target login credential and the query condition.
In some embodiments, the processor 301 further performs, in the process before the obtaining of the corresponding initial login credentials according to the login information and the login type:
the login information is sent to a server, the server queries the login information in a database according to the login information to obtain a query result, the server judges the validity of the login information according to the query result to obtain a judgment result, and the judgment result is sent to the terminal equipment;
and determining whether the user logs in successfully or not according to the judging result, sending abnormal feedback when the user does not log in successfully, and continuously executing to obtain corresponding initial login credentials according to the login information when the user logs in successfully.
In some embodiments, in the process of obtaining the corresponding initial login credentials according to the login information and the login type, the processor 301 performs:
determining the validity period of the initial login credential according to the login type;
generating the basic login credentials according to basic information in the login information;
generating the random login credentials according to the time information of the current operation and the validity period;
and obtaining the initial login credentials according to the basic login credentials and the random login credentials.
In some embodiments, the processor 301 performs, in the obtaining the initial login credentials from the base login credentials and the random login credentials:
splicing the basic login credentials and the random login credentials to obtain spliced login credentials;
and encrypting the spliced login credentials by using a public key to obtain the initial login credentials.
In some embodiments, the processor 301 performs, in the determining, according to the request information and the initial login credential, a target login credential corresponding to the request information:
determining a request type corresponding to the request information according to the request information;
and determining the target login credentials according to the request type and the initial login credentials.
In some embodiments, the processor 301 performs, in the process of obtaining the request processing result of the request information according to the target login credential and the query condition:
according to the target login credentials, carrying out validity query to obtain whether the target login credentials meet preset time;
and when the target login credential meets the preset time, obtaining a request processing result according to the information processing of the target login credential on the request information.
In some embodiments, the processor 301 further performs, in the process after the obtaining the request processing result of the request information according to the target login credential and the query condition:
obtaining operation time interval information of the user, and performing invalidation operation on the target login credential when the operation time interval information meets preset interval time.
It should be noted that, for convenience and brevity of description, a specific working process of the above-described terminal device may refer to a corresponding process in the foregoing login credential management method embodiment, which is not described herein again.
The embodiment of the application also provides a storage medium for computer readable storage, the storage medium storing one or more programs, the one or more programs being executable by one or more processors to implement the steps of the login credentials management method according to any embodiment of the present application.
The storage medium may be an internal storage unit of the terminal device of the foregoing embodiment, for example, a hard disk or a memory of the terminal device. The storage medium may also be an external storage device of the terminal device, such as a plug-in hard disk provided on the terminal device, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), or the like.
Those of ordinary skill in the art will appreciate that all or some of the steps, systems, functional modules/units in the apparatus, and methods disclosed above may be implemented as software, firmware, hardware, and suitable combinations thereof. In a hardware embodiment, the division between the functional modules/units mentioned in the above description does not necessarily correspond to the division of physical components; for example, one physical component may have multiple functions, or one function or step may be performed cooperatively by several physical components. Some or all of the physical components may be implemented as software executed by a processor, such as a central processing unit, digital signal processor, or microprocessor, or as hardware, or as an integrated circuit, such as an application specific integrated circuit. Such software may be distributed on computer readable media, which may include computer storage media (or non-transitory media) and communication media (or transitory media). The term computer storage media includes both volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data, as known to those skilled in the art. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital Versatile Disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by a computer. Furthermore, as is well known to those of ordinary skill in the art, communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media.
It should be understood that the term "and/or" as used in the present specification and the appended claims refers to any and all possible combinations of one or more of the associated listed items, and includes such combinations. It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or system that comprises the element.
The foregoing embodiment numbers of the present application are merely for the purpose of description, and do not represent the advantages or disadvantages of the embodiments. The present application is not limited to the above embodiments, and various equivalent modifications and substitutions can be easily made by those skilled in the art within the scope of the present application, and these modifications and substitutions are intended to be included in the scope of the present application. Therefore, the protection scope of the application is subject to the protection scope of the claims.

Claims (10)

1. A method for managing login credentials, applied to a terminal device, the method comprising:
obtaining login information and login type of a user, and obtaining a corresponding initial login credential according to the login information and the login type, wherein the initial login credential comprises a basic login credential and a random login credential, the basic login credential is used for representing the login credential related to the basic information of the user, and the random login credential is used for representing ageing information of the initial login credential;
receiving request information of a user, and determining a target login credential corresponding to the request information according to the request information and the initial login credential;
and determining the query condition of the user according to the request information, and obtaining a request processing result of the request information according to the target login credential and the query condition.
2. The method of claim 1, wherein prior to obtaining the corresponding initial login credentials based on the login information and the login type, further comprising:
the login information is sent to a server, the server queries the login information in a database according to the login information to obtain a query result, the server judges the validity of the login information according to the query result to obtain a judgment result, and the judgment result is sent to the terminal equipment;
and determining whether the user logs in successfully or not according to the judging result, sending abnormal feedback when the user does not log in successfully, and continuously executing to obtain corresponding initial login credentials according to the login information when the user logs in successfully.
3. The method of claim 1, wherein the obtaining the corresponding initial login credentials based on the login information and the login type, the initial login credentials including a base login credentials and a random login credentials, comprises:
determining the validity period of the initial login credential according to the login type;
generating the basic login credentials according to basic information in the login information;
generating the random login credentials according to the time information of the current operation and the validity period;
and obtaining the initial login credentials according to the basic login credentials and the random login credentials.
4. A method according to claim 3, wherein said obtaining said initial login credentials from said base login credentials and said random login credentials comprises:
splicing the basic login credentials and the random login credentials to obtain spliced login credentials;
and encrypting the spliced login credentials by using a public key to obtain the initial login credentials.
5. The method of claim 1, wherein the determining the target login credentials corresponding to the request information based on the request information and the initial login credentials comprises:
determining a request type corresponding to the request information according to the request information;
and determining the target login credentials according to the request type and the initial login credentials.
6. The method according to claim 1, wherein the obtaining the request processing result of the request information according to the target login credentials and the query condition includes:
according to the target login credentials, carrying out validity query to obtain whether the target login credentials meet preset time;
and when the target login credential meets the preset time, obtaining a request processing result according to the information processing of the target login credential on the request information.
7. The method of claim 1, wherein after the obtaining the request processing result of the request information according to the target login credential and the query condition, the method further comprises:
obtaining operation time interval information of the user, and performing invalidation operation on the target login credential when the operation time interval information meets preset interval time.
8. A login credential management device, comprising:
the system comprises a data acquisition module, a data processing module and a data processing module, wherein the data acquisition module is used for acquiring login information and login type of a user and acquiring a corresponding initial login credential according to the login information and the login type, the initial login credential comprises a basic login credential and a random login credential, the basic login credential is used for representing the login credential related to the basic information of the user, and the random login credential is used for representing ageing information of the initial login credential;
the data generation module is used for receiving request information of a user, and determining a target login credential corresponding to the request information according to the request information and the initial login credential;
and the data processing module is used for determining the query condition of the user according to the request information and obtaining a request processing result of the request information according to the target login credential and the query condition.
9. A terminal device, characterized in that the terminal device comprises a processor and a memory;
the memory is used for storing a computer program;
the processor is configured to execute the computer program and to implement the method of managing login credentials according to any of claims 1 to 7 when the computer program is executed.
10. A computer-readable storage medium, which when executed by one or more processors, causes the one or more processors to perform the steps of the method of managing login credentials as claimed in any of claims 1 to 7.
CN202310764842.3A 2023-06-26 2023-06-26 Login certificate management method and device, terminal equipment and storage medium Pending CN116861402A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310764842.3A CN116861402A (en) 2023-06-26 2023-06-26 Login certificate management method and device, terminal equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310764842.3A CN116861402A (en) 2023-06-26 2023-06-26 Login certificate management method and device, terminal equipment and storage medium

Publications (1)

Publication Number Publication Date
CN116861402A true CN116861402A (en) 2023-10-10

Family

ID=88231435

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310764842.3A Pending CN116861402A (en) 2023-06-26 2023-06-26 Login certificate management method and device, terminal equipment and storage medium

Country Status (1)

Country Link
CN (1) CN116861402A (en)

Similar Documents

Publication Publication Date Title
US20200236147A1 (en) Brokered authentication with risk sharing
US11138300B2 (en) Multi-factor profile and security fingerprint analysis
US10454918B1 (en) Method for SSO service using PKI based on blockchain networks, and device and server using the same
EP2748781B1 (en) Multi-factor identity fingerprinting with user behavior
CN110768967B (en) Service authorization method, device, equipment, system and storage medium
US8880895B2 (en) Methods, systems, and computer program products for recovering a password using user-selected third party authorization
US20150154389A1 (en) System and method for managing application program access to a protected resource residing on a mobile device
US9923990B2 (en) User information widgets and methods for updating and retrieving user information
US8261336B2 (en) System and method for making accessible a set of services to users
US10742651B2 (en) Digital identity network interface system
CN111030812A (en) Token verification method, device, storage medium and server
US10616209B2 (en) Preventing inter-application message hijacking
EP3552135B1 (en) Integrated consent system
CN111314340A (en) Authentication method and authentication platform
US9911158B1 (en) Systems and methods for providing a persistent state
CN111292174A (en) Tax payment information processing method and device and computer readable storage medium
CN113542201B (en) Access control method and equipment for Internet service
US20140173693A1 (en) Cookie Optimization
CN106878244B (en) Authenticity certification information providing method and device
US20240039726A1 (en) System and method for secure access to legacy data via a single sign-on infrastructure
CN112905990A (en) Access method, client, server and access system
US10200355B2 (en) Methods and systems for generating a user profile
CN116861402A (en) Login certificate management method and device, terminal equipment and storage medium
CN110401674B (en) Data access method, device, system, electronic equipment and computer readable medium
CN113918989A (en) Method, apparatus, electronic device and medium for protecting personal privacy information of user

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination