CN118051901A - System security login method and device, electronic equipment and storage medium - Google Patents

System security login method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN118051901A
CN118051901A CN202311865387.2A CN202311865387A CN118051901A CN 118051901 A CN118051901 A CN 118051901A CN 202311865387 A CN202311865387 A CN 202311865387A CN 118051901 A CN118051901 A CN 118051901A
Authority
CN
China
Prior art keywords
login
password
information
user
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311865387.2A
Other languages
Chinese (zh)
Inventor
赵丽月
于鑫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing SoundAI Technology Co Ltd
Original Assignee
Beijing SoundAI Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing SoundAI Technology Co Ltd filed Critical Beijing SoundAI Technology Co Ltd
Priority to CN202311865387.2A priority Critical patent/CN118051901A/en
Publication of CN118051901A publication Critical patent/CN118051901A/en
Pending legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention provides a system security login method, a device, electronic equipment and a storage medium, wherein the system security login method comprises the following steps: responding to a system login request sent by a front-end measuring and calculating system, and checking user login information carried by the system login request based on target information checking rules configured in advance; determining a system login result corresponding to the user login information based on the verification result; and feeding back a system login result to the target user corresponding to the user login information. The invention can ensure that the information verification rule of each visual configuration can take effect in real time, and any information verification rule is modified without secondary development and redeployment, thereby improving the flexibility of configuring each information verification rule, saving the marginal cost of developing and measuring and calculating systems, and improving the stability and safety of logging in and measuring and calculating systems.

Description

System security login method and device, electronic equipment and storage medium
Technical Field
The present invention relates to the field of computer technologies, and in particular, to a system security login method, device, electronic device, and storage medium.
Background
With the continuous development and progress of technology, the variety of measuring and calculating systems for online operation is also more and more diversified, such as a real estate investment measuring and calculating system, a risk measuring and calculating system, a software price measuring and calculating system and the like; the user can register the corresponding measuring and calculating system according to the actual demand, and the user login information set according to the registration demand is logged in the corresponding measuring and calculating system, so that the user login information can be safely logged in the corresponding measuring and calculating system successfully when verification is passed. Therefore, how to ensure the security of logging in the measuring and calculating system by setting the user login information is important.
In the related art, in order to log in the security of the measuring and calculating system, other check rules such as a password setting rule (for example, at least 8 bits in length and/or at least containing case letters, numbers, etc.), a password validity period (for example, a time for longest modification of the password, etc.), a user name setting rule (for example, at least one of a case letter, unrepeatability, etc. can be contained in length between 4 to 30 characters), etc. are generally specified; when a user modifies the password according to the password setting rule or inputs the set password according to the user name setting rule and logs in the measuring and calculating system according to the password input by the password setting rule, verification is needed, so that the safety of the measuring and calculating system is ensured.
However, since each existing calibration rule is fixed once defined, and the calibration logic code of each calibration rule is written in the back-end code, if one of the calibration rules needs to be modified, secondary development and redeployment of the information calibration rule are required, so that marginal cost of developing and measuring and calculating systems is increased, stability and safety of logging and measuring and calculating systems cannot be effectively ensured, and meanwhile, the mode of setting the calibration rule is not flexible.
Disclosure of Invention
The invention provides a system security login method, a device, electronic equipment and a storage medium, which are used for solving the defects that the marginal cost of developing a measurement and calculation system is high, the stability and the safety of the login measurement and calculation system cannot be effectively ensured, and the mode of setting the verification rule has no flexibility, realizing the purpose of modifying any information verification rule without secondary development and redeployment of the information verification rule, improving the flexibility of configuring each information verification rule, saving the marginal cost of developing the measurement and calculation system, and further improving the stability and the safety of the login measurement and calculation system.
The invention provides a system security login method, which comprises the following steps:
responding to a system login request sent by a front-end measuring and calculating system, and checking user login information carried by the system login request based on target information checking rules configured in advance;
determining a system login result corresponding to the user login information based on the verification result;
And feeding back the system login result to the target user corresponding to the user login information.
According to the system security login method provided by the invention, the verification of the user login information carried by the system login request based on the target information verification rule of the pre-visualization configuration comprises the following steps:
Verifying the modified password carried by the system login request based on a target password verification rule configured in advance in a visualized manner; the target password verification rule belongs to the target information verification rule, and the modified password belongs to the user login information.
The invention provides a system security login method, which further comprises the following steps:
Under the condition that the modified password does not pass the verification, feeding back a verification failure result that the modified password does not accord with the target password verification rule to the front-end measuring and calculating system, and prompting the target user to modify the password again;
Under the condition that the modified password is re-acquired, re-checking the re-acquired modified password based on the target password checking rule;
And repeatedly executing the process until the accumulated modification times reach a preset time threshold, determining a verification passing result or locking the preset time of the system account of the target user, and storing the modified password passing the verification in a database in a form of a table.
According to the system security login method provided by the invention, the verification of the user login information carried by the system login request based on the target information verification rule of the pre-visualization configuration comprises the following steps:
Checking whether a login password carried by the system login request is out of date or not based on a target password validity period configured in advance in a visualization mode; the target password validity period belongs to the target information verification rule, and the login password belongs to the user login information.
According to the system security login method provided by the invention, the system login result corresponding to the user login information is determined based on the verification result, and the system security login method comprises the following steps:
Under the condition that the verification result represents that the login password is expired, determining that the system login result is that the user login information fails in login and outputting indication information for modifying the password;
And under the condition that the verification result represents that the login password is not expired, determining that the system login result is the login success of the user login information.
According to the system security login method provided by the invention, the system login request sent by the front-end measuring and calculating system is responded, and user login information carried by the system login request is verified based on target information verification rules configured in advance, and the system security login method comprises the following steps:
And responding to the system login request, inquiring the target information verification rule for verifying the user login information from a plurality of information verification rules stored in a database in advance, and verifying the user login information based on the target information verification rule.
The invention provides a system security login method, which further comprises the following steps:
Responding to a verification rule storage request, storing a plurality of information verification rules carried in the verification rule storage request, wherein each information verification rule in the plurality of information verification rules is determined based on a detected editing input result by the front-end measuring and calculating system for editing input monitoring of a corresponding verification rule visual configuration item in a verification rule configuration page.
The invention also provides a system security login device, which comprises:
the login information verification unit is used for responding to a system login request sent by the front-end measuring and calculating system and verifying user login information carried by the system login request based on target information verification rules configured in advance;
The login result determining unit is used for determining a system login result corresponding to the user login information based on the verification result;
and the login result feedback unit is used for feeding back the system login result to the target user corresponding to the user login information.
The invention also provides an electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the system security login method according to any one of the above when executing the program.
The present invention also provides a non-transitory computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements a system security login method as described in any of the above.
According to the system security login method, the device, the electronic equipment and the storage medium, when the system security login method responds to the system login request sent by the front-end measuring and calculating system, the back-end server checks the user login information carried by the system login request based on the target information checking rule configured in advance, so that the system login result is fed back to the target user corresponding to the user login information after the system login result corresponding to the user login information is determined based on the checking result. In this way, by setting the information verification rule for verifying the login information of the user as a configurable item and performing visual configuration on the configurable item in advance, the information verification rule of each visual configuration can be ensured to be effective in real time, and no secondary development and redeployment of the information verification rule are required for modifying any information verification rule, so that the flexibility of configuring each information verification rule is improved, the marginal cost of developing a measuring and calculating system is saved, and the stability and the safety of the login measuring and calculating system are improved.
Drawings
In order to more clearly illustrate the invention or the technical solutions of the prior art, the following description will briefly explain the drawings used in the embodiments or the description of the prior art, and it is obvious that the drawings in the following description are some embodiments of the invention, and other drawings can be obtained according to the drawings without inventive effort for a person skilled in the art.
FIG. 1 is a schematic flow chart of a system security login method provided by the invention;
FIG. 2 is a schematic diagram of a verification rule configuration page provided by the present invention;
FIG. 3 is a second flowchart of a system security login method according to the present invention;
FIG. 4 is a schematic diagram of a system security login device according to the present invention;
fig. 5 is a schematic structural diagram of an electronic device provided by the present invention.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the present invention more apparent, the technical solutions of the present invention will be clearly and completely described below with reference to the accompanying drawings, and it is apparent that the described embodiments are some embodiments of the present invention, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
In embodiments of the present invention, "at least one" means one or more, and "a plurality" means two or more. "and/or", describes an association relationship of an association object, and indicates that there may be three relationships, for example, a and/or B, and may indicate: there are three cases, a alone, a and B together, and B alone, wherein a, B may be singular or plural. In the text description of the present invention, the character "/" generally indicates that the front-rear associated object is an or relationship. In addition, it should be noted that, the numbers of the objects described in the present invention, such as "first", "second", etc., are merely used to distinguish the described objects, and do not have any sequence or technical meaning.
With the continuous development and progress of technology, the variety of measuring and calculating systems for online operation is also more and more diversified, such as a real estate investment measuring and calculating system, a risk measuring and calculating system, a software price measuring and calculating system and the like; the user can register the corresponding measuring and calculating system according to the actual demand, and the user login information set according to the registration demand is logged in the corresponding measuring and calculating system, so that the user login information can be safely logged in the corresponding measuring and calculating system successfully when verification is passed. Therefore, how to ensure the security of logging in the measuring and calculating system by setting the user login information is important.
In the related art, in order to log in the security of the measuring and calculating system, other check rules such as a password setting rule (for example, at least 8 bits in length and/or at least containing case letters, numbers, etc.), a password validity period (for example, a time for longest modification of the password, etc.), a user name setting rule (for example, at least one of a case letter, unrepeatability, etc. can be contained in length between 4 to 30 characters), etc. are generally specified; when a user modifies the password according to the password setting rule or inputs the set password according to the user name setting rule and logs in the measuring and calculating system according to the password input by the password setting rule, verification is needed, so that the safety of the measuring and calculating system is ensured.
However, since each existing calibration rule is fixed once defined, and the calibration logic code of each calibration rule is written in the back-end code, if one of the calibration rules needs to be modified, secondary development and redeployment of the information calibration rule are required, so that marginal cost of developing and measuring and calculating systems is increased, stability and safety of logging and measuring and calculating systems cannot be effectively ensured, and meanwhile, the mode of setting the calibration rule is not flexible.
In order to solve the technical problems, the invention provides a system security login method, a device, electronic equipment and a storage medium, which are used for achieving the purpose of modifying any information verification rule without secondary development and redeployment of the information verification rule, improving the flexibility of configuring each information verification rule, saving the marginal cost of developing and measuring and calculating systems, and improving the stability and security of the login and measuring and calculating system.
The system security login method, the device, the electronic equipment and the storage medium of the present invention are described below with reference to fig. 1 to 5, wherein an execution body of the system security login method is a back-end server, and the back-end server may refer to one server, or may be a server cluster formed by a plurality of servers, a cloud computing center, or the like. The specific form of the backend server is not particularly limited by the present invention. Further, the system security login method can be applied to a system security login device arranged in a back-end server, and the system security login device can be realized by software, hardware or a combination of the two. The following describes the system security login method by taking an execution body of the system security login method as a back-end server as an example.
In order to facilitate understanding of the system security login method provided by the embodiment of the present invention, the system security login method provided by the present invention will be described in detail by the following several exemplary embodiments. It is to be understood that the following several exemplary embodiments may be combined with each other and that some embodiments may not be repeated for the same or similar concepts or processes.
Referring to fig. 1, a flow chart of a system security login method provided by the present invention, as shown in fig. 1, includes the following steps 110 to 130.
Step 110, responding to a system login request sent by the front-end measuring and calculating system, and checking user login information carried by the system login request based on target information checking rules configured in advance.
The system login request is a request automatically generated when user login information is detected on a login page of the front-end measuring and calculating system; the target information verification rule is one of a plurality of information verification rules configured in advance in a visualized manner, each information verification rule corresponds to a setting requirement of user login information, and the user login information can include, but is not limited to, a user name and a password of a target user triggering generation of a system login request.
When the setting requirements of the user login information are different, the information verification rules corresponding to the visual configuration are naturally different; for example, the length of the password is not less than 8 bits, the password comprises at least two combinations of uppercase English letters, lowercase English letters, special characters and numbers, the password needs to be replaced periodically, the replacement period is not longer than 30 days, and the user name only comprises uppercase English letters and/or lowercase English letters and is not repeatable; the information verification rule corresponding to the visual configuration is used for verifying whether the password meets the requirements.
Specifically, in step 110, when the back-end server responds to the system login request, the back-end server first analyzes the user login information carried by the system login request, so as to select, based on the analysis result, a target information verification rule for verifying the user login information from a plurality of information verification rules configured in advance in a visualized manner, where the analysis result may set a setting rule of the user login information for the target user, and the target information verification rule may be an information verification rule with the highest matching degree or the highest similarity degree with the analyzed setting rule in the plurality of information verification rules. Based on the above, when the backend server determines the target information verification rule, the user login information can be verified based on the target information verification rule.
And 120, determining a system login result corresponding to the user login information based on the verification result.
Specifically, in step 120, if the backend server verifies the user login information based on the target information verification rule, and determines that the user login information meets the target information verification rule, the verification result is determined to indicate that the user login information passes the verification, and at this time, it can be determined that the system login result corresponding to the user login information is successful login; otherwise, if the back-end server checks the user login information based on the target information checking rule, determining that the user login information does not conform to the target information checking rule, determining that the checking result indicates that the user login information fails to check, at this time, determining that the system login result corresponding to the user login information fails to check and prompting the target user to modify the password, checking whether the user name inputs the correct password and whether the input password is expired, so that the target user can re-input the valid password and the correct user name when the password is expired and the user name inputs the correct, or re-input the unexpired password and the correct user name when the password is unexpired and the user name inputs the incorrect, and re-checking by the measuring and calculating system.
And 130, feeding back a system login result to a target user corresponding to the user login information.
Specifically, when the back-end server determines the system login result of the target user, the back-end server can feed back the system login result of the target user corresponding to the user login information to the front-end measuring and calculating system, so that the target user can clearly and timely acquire the success or failure of the system login; the feedback mode of the system login result can feed back a text popup window containing the system login result to the login page of the front-end measuring and calculating system, can feed back the system login result to the front-end measuring and calculating system through a voice signal mode, and can feed back the system login result to the front-end measuring and calculating system in a mode of intuitively displaying the system login result in a graphic mode. The method for feeding back the login result of the system is not particularly limited.
According to the system security login method provided by the embodiment of the invention, when the back-end server responds to the system login request sent by the front-end measuring and calculating system, the user login information carried by the system login request is checked based on the target information check rule configured in advance, so that the system login result is fed back to the target user corresponding to the user login information after the system login result corresponding to the user login information is determined based on the check result. In this way, by setting the information verification rule for verifying the login information of the user as a configurable item and performing visual configuration on the configurable item in advance, the information verification rule of each visual configuration can be ensured to be effective in real time, and no secondary development and redeployment of the information verification rule are required for modifying any information verification rule, so that the flexibility of configuring each information verification rule is improved, the marginal cost of developing a measuring and calculating system is saved, and the stability and the safety of the login measuring and calculating system are improved.
Based on the system secure login method shown in fig. 1, in an exemplary embodiment, the user may modify the password that is about to be or has been disabled at the front-end computing system and verify the modified password by the back-end server, considering that the user may modify the password periodically. Based on this, in step 110, user login information carried by the system login request is verified based on a target information verification rule configured in advance in a visualized manner, and the specific implementation process may include:
verifying the modified password carried by the system login request based on a target password verification rule configured in advance in a visualized manner; the target password verification rule belongs to the target information verification rule, and the modified password belongs to the user login information.
The target password verification rule can specifically set standard requirements of corresponding password for a target user, and can be used for verifying whether the setting rule of the password set by the target user is accurate.
Specifically, when the backend server analyzes the password from the received system login request, it may first determine whether the analyzed password is consistent with the password used when the target user logs in the system last time, and if so, consider that the analyzed password is not the modified password, and may use the target password verification rule in the target information verification rule to verify the analyzed password; otherwise, if the password is inconsistent, the analyzed password is considered to be the modified password, and at the moment, the modified password can be checked by using the password setting rule in the target information checking rule; thereby ensuring that the modified password also meets the corresponding password verification rule.
According to the system security login method provided by the embodiment of the invention, the back-end server ensures that the modified password meets the corresponding password setting requirement by verifying the password modified by the target user, does not need to develop codes for the second time and redeploy password verification logic, and improves the convenience and rapidness of modifying the password and the realizability.
Based on the system security login method shown in fig. 1, in an example embodiment, if the user modified password does not meet the corresponding password verification rule, the user may be instructed to modify the password again and verify again when the user system account does not reach the account locking condition. Based on this, the system security login method provided by the invention can further include:
Under the condition that the modified password does not pass the verification, feeding back a verification failure result that the modified password does not accord with the verification rule of the target password to the front-end measuring and calculating system, and prompting the target user to modify the password again; under the condition that the modified password is re-acquired, re-checking the re-acquired modified password based on the target password checking rule; and repeatedly executing the process until the accumulated modification times reach a preset time threshold, determining a verification passing result or a preset time length of a system account of the target user, and storing the modified password passing the verification in a database in a form of a table.
Specifically, when the back-end server determines that the modified password of the target user does not meet the password setting requirement of the corresponding target password verification rule, the back-end server can feed back to the front-end measuring and calculating system that the modified password does not meet the target password verification rule, and can prompt the target user to revise the password again and reenter the password, so that whether the modified password meets the target password verification rule can be checked again when the modified password is reacquired; and storing the corrected password passing verification into a database in a form if verification is passed until the accumulated number of times of accumulated correction of the password by the target user reaches a preset number of times threshold, and locking the system account of the target user for a preset time, for example, for 3-5 min if continuous verification is not passed in the whole verification process of the accumulated number of times of correction reaching the preset number of times threshold.
It should be noted that, the database of the back-end server is preset with a user password table sys_ UESR, and the user password table sys_ UESR is used for storing each password passing the corresponding password verification rule.
According to the system security login method provided by the embodiment of the invention, the back-end server determines whether the modified password passes or locks the user system account by prompting the user to modify the password again and checking whether the accumulated modification times meeting the setting requirements reach the time threshold again under the condition that the password modified by the user does not meet the setting requirements of the corresponding password. Therefore, the password can be ensured to be modified more flexibly and effectively in real time, and meanwhile, the convenience, the rapidness and the easy realization of the password modification can be improved.
Based on the system security login method shown in fig. 1, in an exemplary embodiment, when a user does not log on to the measurement system for the first time, the measurement system automatically verifies whether the password input by the user is expired to determine whether the user can log on successfully. Based on this, in step 110, user login information carried by the system login request is verified based on a target information verification rule configured in advance in a visualized manner, and the specific implementation process may include:
Checking whether a login password carried by a system login request is out of date or not based on a target password validity period configured in advance in a visualization mode; the validity period of the target password belongs to the target information verification rule, and the login password belongs to the user login information.
The user login information comprises a user name of the target user and a login password, wherein the login password is a password required by the target user to log in the front-end measuring and calculating system.
Specifically, when the back-end server receives a system login request sent by the front-end measuring and calculating system, whether a target user corresponding to user login information carried by the system login request is first logged in or not can be judged first, if so, it is determined that a login password in the user login information is not expired, and whether the login password is expired is not required to be judged; if the login is not the first login, the login password can be checked based on the validity period of the target password so as to check whether the login password is expired.
According to the system security login method provided by the embodiment of the invention, the backend server ensures the comprehensiveness and diversity of the verification rule of the visual configuration password by checking whether the login password is overdue or not in advance through the validity period of the target password in visual configuration, so that the instantaneity and flexibility of the subsequent verification password are improved.
Based on the system security login method shown in fig. 1, in an example embodiment, in a case that the backend server determines whether the password in the user login information is expired, it may be determined that the system login result is login success or login failure. Based on this, the specific implementation procedure of step 120 may include:
Under the condition that the verification result represents that the login password is expired, determining that the system login result is that the login of the user login information fails and outputting indication information for modifying the password; and under the condition that the verification result represents that the login password is not expired, determining that the system login result is that the user login information is successful in login.
Specifically, the backend server uses the target password validity period to check the login password, and if the check result indicates that the login password is not expired, the login success of the target user corresponding to the user login information is determined; and if the verification result indicates that the login password is expired, determining that the user login information corresponds to the target user login failure.
It should be noted that, if the user name set when the user logs in the measuring and calculating system for the first time meets the corresponding user name setting requirement, the user name will not be checked by using the corresponding user name checking rule during the subsequent login; however, when the user needs to modify the user name, the modified user name can be checked by using the corresponding user name checking rule, so as to ensure that the modified user name also meets the corresponding user name setting requirement; the principle of the process of verifying the modified user name by the back-end server can refer to the process of verifying the modified password. And will not be described in detail herein.
According to the system security login method provided by the embodiment of the invention, the back-end server judges whether the user successfully logs in the front-end measuring and calculating system by checking whether the login password is overdue, so that the timeliness and accuracy of the login result obtained by the front-end user are improved.
Based on the system security login method shown in fig. 1, in an example embodiment, in order to improve the rapidity and accuracy of the subsequent verification login information, each information verification rule may be configured in advance in a visualized manner and stored in a database of the back-end server, so that when the subsequent system login request is received, the target information verification rule required by the current verification may be obtained in real time through a query manner, and the user login information of the target user may be verified. Based on this, the specific implementation procedure of step 110 may further include:
And responding to the system login request, inquiring a target information verification rule for verifying the user login information from a plurality of information verification rules stored in the database in advance, and verifying the user login information based on the target information verification rule.
Specifically, a plurality of information verification rules are pre-stored in a database of the back-end server, and each of the plurality of information verification rules includes a corresponding password verification rule and password validity period verification rule, and all the password verification rules and password validity period verification rules can be written into the password configuration table sys_pwd_config in a table form. In this way, when the back-end server receives the system login request sent by the front-end measuring and calculating system, the target information verification rule for verifying the user login information can be determined by inquiring the password configuration table SYS_PWD_CONFIG in the database in real time, so that the inquired target information verification rule can be used for verifying the user login information.
By way of example only, and not by way of limitation,
"SYS_PWD_CONFIG" IS 'password configuration Table':
Fields:
"SYS_PWD_CONFIG", "RULE_ID" IS 'RULE ID';
"SYS_PWD_CONFIG", "DEFAULT_PWD" IS 'DEFAULT password';
"SYS_PWD_CONFIG", "MIN_PWD_LEN" IS 'password at least length';
"SYS_PWD_CONFIG", "EXPIRE_DATE" IS 'password expiration DATE, unit day';
"SYS_PWD_CONFIG", "PWD_RULE" IS 'password verification RULEs (whether or not upper case English, lower case English, numbers, special symbols are included)', for example: ' configuration ' 1, ' lowercaseLetter ' 1, ' specialSymbol ' 1, ' uppercaseLetter ' 1', 1 inclusive and 0 exclusive.
According to the system security login method provided by the embodiment of the invention, the back-end server determines the target information verification rule for verifying the user login information by inquiring the database in real time, so that the instantaneity and accuracy of determining the target information verification rule are improved, and the follow-up verification process is more efficient and safer.
Based on the system security login method shown in fig. 1, in an example embodiment, when a check rule configuration module is set in the front-end measurement system, the visual configuration may be performed on a check rule configuration page corresponding to the check rule configuration module, and the visual configuration result may be stored in a database of the back-end server. Based on this, the system security login method provided by the invention can further include:
Responding to the check rule storage request, storing a plurality of information check rules carried in the check rule storage request, wherein each information check rule in the plurality of information check rules is determined based on the detected edit input result by the front-end measuring and calculating system for the corresponding check rule visual configuration item in the check rule configuration page.
Specifically, a calibration rule configuration module is arranged in the front-end measuring and calculating system, the calibration rule configuration module can be displayed on the front-end measuring and calculating system in a calibration rule configuration page, the calibration rule configuration page contains at least one calibration rule visual configuration item, each calibration rule visual configuration item corresponds to one field, each calibration rule visual configuration item is provided with an editing button and an editing input instruction, and each editing button can receive the editing input of a system security manager; the front-end system detects the edit input result of each visual configuration item of the check rule by respectively performing edit input monitoring on each visual configuration item of the check rule, and determines the corresponding information check rule based on each edit input result.
For example, while the verification rule visualization configuration items may include, but are not limited to, a password length, a password verification rule, and a password validity period, the page schematic may be configured with reference to the verification rule as shown in fig. 2, where the password length is specifically the password length, the password rule is specifically the password verification rule, and the password validity period is specifically the password validity period.
According to the system security login method provided by the embodiment of the invention, the visual configuration is carried out on the verification rule configuration page corresponding to the verification rule configuration module of the front-end measuring and calculating system, and the information verification rules obtained by the visual configuration are sent to the back-end server for storage, so that the interaction flexibility between the back-end server and the front-end measuring and calculating system is improved, and meanwhile, the quick accuracy and the security stability of the subsequent verification user login information can be improved.
For example, referring to the flow chart of the system security login method shown in fig. 3, as shown in fig. 3, by a system security manager editing the verification rule visualization configuration item in the verification rule configuration page of the front-end measurement and calculation system, a plurality of information verification rules are obtained and stored in the password configuration table sys_pwd_config in the database of the back-end server.
Based on the above, when the target user modifies the password on the login page of the front-end measuring and calculating system, the back-end server can determine the target password verification rule by inquiring the information verification rules in the database, and judge whether the modified password meets the target password verification rule, if yes, the modified password is stored in the user password table SYS_ UESR of the database, if not, the target user is prompted to modify the password again and verify the re-input modified password.
When a target user inputs a user name and a login password on a login page of a front-end measuring and calculating system, the back-end server can check whether the login password is overdue, feed back prompt information that the login password is overdue when the login password is overdue, and feed back success of the login when the login password is not overdue. Reference is made to the foregoing embodiments for specific procedures involved therein. And will not be described in detail herein.
According to the system security login method provided by the embodiment of the invention, the verification rule configuration module is additionally arranged on the front-end measuring and calculating system, so that the verification rules such as the password and the like are set as the visual configuration items, and the information verification rules of each visual configuration can be validated in real time, so that the flexibility of the password rules is improved, secondary development and redeployment of the information verification rules are not needed, the marginal cost of developing and calculating systems is saved, and the stability and the safety of each information verification rule are ensured.
The system security login device provided by the invention is described below, and the system security login device described below and the system security login method described above can be referred to correspondingly.
Referring to fig. 4, a schematic structural diagram of a system security login device according to the present invention, as shown in fig. 4, the system security login device 400 includes: a login information verification unit 410, a login result determination unit 420, and a login result feedback unit 430.
The login information verification unit 410 is configured to respond to a system login request sent by the front-end measurement system, and verify user login information carried by the system login request based on a target information verification rule configured in advance.
The login result determining unit 420 is configured to determine a system login result corresponding to the user login information based on the verification result.
And the login result feedback unit 430 is configured to feed back a system login result to the target user corresponding to the user login information.
Optionally, the login information verification unit 410 is specifically configured to verify the modified password carried by the system login request based on a target password verification rule configured in advance in a visualized manner; the target password verification rule belongs to the target information verification rule, and the modified password belongs to the user login information.
Optionally, the login information verification unit 410 is specifically configured to, when the modified password fails to pass the verification, feed back to the front-end measurement and calculation system that the modified password does not conform to the verification failure result of the target password verification rule, and prompt the target user to modify the password again; under the condition that the modified password is re-acquired, re-checking the re-acquired modified password based on the target password checking rule; and repeatedly executing the process until the accumulated modification times reach a preset time threshold, determining a verification passing result or a preset time length of a system account of the target user, and storing the modified password passing the verification in a database in a form of a table.
Optionally, the login information checking unit 410 is specifically configured to check whether a login password carried by a system login request is expired based on a target password validity period configured in advance; the validity period of the target password belongs to the target information verification rule, and the login password belongs to the user login information.
Optionally, the login result determining unit 420 is specifically configured to determine that the system login result is that the login of the user login information fails and output indication information for modifying the password when the verification result indicates that the login password has expired; and under the condition that the verification result represents that the login password is not expired, determining that the system login result is that the user login information is successful in login.
Optionally, the login information verification unit 410 is specifically configured to query a target information verification rule for verifying the user login information from a plurality of information verification rules stored in advance in the database in response to the system login request, and verify the user login information based on the target information verification rule.
Optionally, the login information verification unit 410 is specifically configured to store, in response to a verification rule storage request, a plurality of information verification rules carried in the verification rule storage request, where each of the plurality of information verification rules is determined based on a detected edit input result by the front-end computing system on a corresponding visual configuration item of the verification rule in the verification rule configuration page.
The system security login device 400 provided in the embodiment of the present invention may execute the technical scheme in any embodiment of the system security login method, and the implementation principle and beneficial effects of the system security login method are similar to those of the system security login method, and may refer to the implementation principle and beneficial effects of the system security login method, which are not described herein.
Fig. 5 illustrates a physical schematic diagram of an electronic device, as shown in fig. 5, which may include: processor 510, communication interface (CommunicationsInterface) 520, memory 530, and communication bus 540, wherein processor 510, communication interface 520, memory 530 complete communication with each other through communication bus 540. Processor 510 may invoke logic instructions in memory 530 to perform a system secure login method comprising:
Responding to a system login request sent by a front-end measuring and calculating system, and checking user login information carried by the system login request based on target information checking rules configured in advance; determining a system login result corresponding to the user login information based on the verification result; and feeding back a system login result to the target user corresponding to the user login information.
Further, the logic instructions in the memory 530 described above may be implemented in the form of software functional units and may be stored in a computer-readable storage medium when sold or used as a stand-alone product. Based on this understanding, the technical solution of the present invention may be embodied essentially or in a part contributing to the prior art or in a part of the technical solution, in the form of a software product stored in a storage medium, comprising several instructions for causing a computer device (which may be a personal computer, a server, a network device, etc.) to perform all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a usb disk, a removable hard disk, a Read-only memory (ROM), a random access memory (RAM, randomAccessMemory), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
In another aspect, the present invention also provides a computer program product, the computer program product including a computer program, the computer program being storable on a non-transitory computer readable storage medium, the computer program, when executed by a processor, being capable of executing the system security login method provided by the above methods, the method comprising:
Responding to a system login request sent by a front-end measuring and calculating system, and checking user login information carried by the system login request based on target information checking rules configured in advance; determining a system login result corresponding to the user login information based on the verification result; and feeding back a system login result to the target user corresponding to the user login information.
In yet another aspect, the present invention also provides a non-transitory computer readable storage medium having stored thereon a computer program which, when executed by a processor, is implemented to perform a system security login method provided by the above methods, the method comprising:
Responding to a system login request sent by a front-end measuring and calculating system, and checking user login information carried by the system login request based on target information checking rules configured in advance; determining a system login result corresponding to the user login information based on the verification result; and feeding back a system login result to the target user corresponding to the user login information.
The apparatus embodiments described above are merely illustrative, wherein the elements illustrated as separate elements may or may not be physically separate, and the elements shown as elements may or may not be physical elements, may be located in one place, or may be distributed over a plurality of network elements. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of this embodiment. Those of ordinary skill in the art will understand and implement the present invention without undue burden.
From the above description of the embodiments, it will be apparent to those skilled in the art that the embodiments may be implemented by means of software plus necessary general hardware platforms, or of course may be implemented by means of hardware. Based on this understanding, the foregoing technical solution may be embodied essentially or in a part contributing to the prior art in the form of a software product, which may be stored in a computer readable storage medium, such as ROM/RAM, a magnetic disk, an optical disk, etc., including several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the method described in the respective embodiments or some parts of the embodiments.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solution of the present invention, and are not limiting; although the invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present invention.

Claims (10)

1. A system security login method, comprising:
responding to a system login request sent by a front-end measuring and calculating system, and checking user login information carried by the system login request based on target information checking rules configured in advance;
determining a system login result corresponding to the user login information based on the verification result;
And feeding back the system login result to the target user corresponding to the user login information.
2. The system security login method according to claim 1, wherein the verifying the user login information carried by the system login request based on the target information verification rule configured in advance includes:
Verifying the modified password carried by the system login request based on a target password verification rule configured in advance in a visualized manner; the target password verification rule belongs to the target information verification rule, and the modified password belongs to the user login information.
3. The system secure login method of claim 2, wherein the method further comprises:
Under the condition that the modified password does not pass the verification, feeding back a verification failure result that the modified password does not accord with the target password verification rule to the front-end measuring and calculating system, and prompting the target user to modify the password again;
Under the condition that the modified password is re-acquired, re-checking the re-acquired modified password based on the target password checking rule;
And repeatedly executing the process until the accumulated modification times reach a preset time threshold, determining a verification passing result or locking the preset time of the system account of the target user, and storing the modified password passing the verification in a database in a form of a table.
4. The system security login method according to claim 1, wherein the verifying the user login information carried by the system login request based on the target information verification rule configured in advance includes:
Checking whether a login password carried by the system login request is out of date or not based on a target password validity period configured in advance in a visualization mode; the target password validity period belongs to the target information verification rule, and the login password belongs to the user login information.
5. The system security login method according to claim 4, wherein determining a system login result corresponding to the user login information based on the verification result comprises:
Under the condition that the verification result represents that the login password is expired, determining that the system login result is that the user login information fails in login and outputting indication information for modifying the password;
And under the condition that the verification result represents that the login password is not expired, determining that the system login result is the login success of the user login information.
6. The system security login method according to any one of claims 1 to 5, wherein the verifying, in response to a system login request sent by a front-end measurement system, user login information carried by the system login request based on a target information verification rule configured in advance in a visualized manner includes:
And responding to the system login request, inquiring the target information verification rule for verifying the user login information from a plurality of information verification rules stored in a database in advance, and verifying the user login information based on the target information verification rule.
7. The system secure login method according to any one of claims 1 to 5, wherein the method further comprises:
Responding to a verification rule storage request, storing a plurality of information verification rules carried in the verification rule storage request, wherein each information verification rule in the plurality of information verification rules is determined based on a detected editing input result by the front-end measuring and calculating system for editing input monitoring of a corresponding verification rule visual configuration item in a verification rule configuration page.
8. A system security login device, comprising:
the login information verification unit is used for responding to a system login request sent by the front-end measuring and calculating system and verifying user login information carried by the system login request based on target information verification rules configured in advance;
The login result determining unit is used for determining a system login result corresponding to the user login information based on the verification result;
and the login result feedback unit is used for feeding back the system login result to the target user corresponding to the user login information.
9. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the system security login method of any one of claims 1 to 7 when the program is executed by the processor.
10. A non-transitory computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when executed by a processor, implements the system security login method according to any one of claims 1 to 7.
CN202311865387.2A 2023-12-29 2023-12-29 System security login method and device, electronic equipment and storage medium Pending CN118051901A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311865387.2A CN118051901A (en) 2023-12-29 2023-12-29 System security login method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311865387.2A CN118051901A (en) 2023-12-29 2023-12-29 System security login method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN118051901A true CN118051901A (en) 2024-05-17

Family

ID=91052781

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311865387.2A Pending CN118051901A (en) 2023-12-29 2023-12-29 System security login method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN118051901A (en)

Similar Documents

Publication Publication Date Title
CN108768654B (en) Identity verification method based on voiceprint recognition, server and storage medium
JP6782778B2 (en) Data processing method and equipment
US20080148375A1 (en) Authentication system, authentication device, and authentication method
CN108875404B (en) Data desensitization method and device based on machine learning and storage medium
US20120144004A1 (en) Authentication server apparatus, authentication server apparatus-use program and authentication method
CN110673936A (en) Breakpoint continuous operation method and device for arranging service, storage medium and electronic equipment
US11899770B2 (en) Verification method and apparatus, and computer readable storage medium
CN104346035A (en) Indicating automatically corrected words
CN118051901A (en) System security login method and device, electronic equipment and storage medium
CN112181482B (en) Version verification method and device, electronic equipment and storage medium
CN106060000B (en) Method and equipment for identifying verification information
CN107016613B (en) Data modification method and device
CN118332544A (en) Information security management method, electronic device and storage medium
CN110046491B (en) Method and device for verifying security problem, electronic equipment and storage medium
CN112686140A (en) Electronic signature identification method, system, device and storage medium
CN113868210A (en) Validity verification method, system, equipment and storage medium for imported data
CN112363933A (en) Automatic verification method and device for word paragraph table, computer equipment and storage medium
CN110099070A (en) A kind of single input frame login validation method and device
Sivasakthi et al. Development of E-polling Website using MERN
CN110516416B (en) Identity authentication method, authentication end and client
JP4546777B2 (en) Character string processing device and computer program for processing character string
CN117372190A (en) Bill batch processing method, device, equipment and storage medium
CN111898498B (en) Matching threshold determining method, identity verification method, device and storage medium
CN110716927B (en) Data correction method, device, equipment and computer readable storage medium
CN111460422B (en) Method and device for generating verification code

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication