Login verification method, system and instant messaging (IM) server

A login verification and server technology, applied in the fields of login verification methods, systems and IM servers, can solve the problem of low security

Active Publication Date: 2012-08-29
ALIBABA GRP HLDG LTD
View PDF4 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of the present application provides a login verification method, system, and IM server to so...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Login verification method, system and instant messaging (IM) server
  • Login verification method, system and instant messaging (IM) server
  • Login verification method, system and instant messaging (IM) server

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0034] see figure 1 , which is the flow chart of the first embodiment of the login verification method of this application:

[0035] Step 101: The IM server receives the first login request sent by the IM client, and the first login request includes the user name and password of the IM client.

[0036] If a traditional IM client wants to log in to the IM server, the IM client user will register on the IM server in advance, and the user name and password of the user login account are set during the registration process, and the IM server can save the corresponding relationship between the user name and the password, so that When the user logs in through the IM client, the user account is verified. Usually the IM server can store the corresponding relationship between the user name and the password in a separate UIC (User Information Centre, User Information Center). When the user logs in through the IM client, the IM server can communicate with the UIC to verify the user name ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a login verification method, a system and an instant messaging (IM) server. The method comprises the following steps that: the IM server receives first-time login requests sent by an IM client, and the first-time login requests comprise user names and passwords of the IM client; when the first-time login request verification is passed, the IM client is notified to carry out second-time verification; the second-time login requests sent by the IM client is received, the second-time login requests comprise random character strings returned by a web server to the IM client after the second-time verification of the IM client to the web server is passed; whether the random character strings in the second-time login requests are valid or not is verified; and when verification results show that the random character strings are valid, the IM server returns the login successful information to the IM client. Because of the introduction of the second-time verification process in the embodiment of the invention, only the login security of users is improved.

Description

technical field [0001] The present application relates to the technical field of network communication, in particular to a login verification method, system and IM (Instant Messaging, instant messaging) server. Background technique [0002] In existing network applications, IM is a real-time communication service that allows users to establish some kind of private chat room on the network. Before establishing an instant messaging connection, the user needs to log in to the IM client, that is, the user needs to enter a user name and password in the login interface. With the widespread use of IM, security issues such as stolen user accounts and property losses of users gradually appear in the prior art. [0003] It can be seen from this that, since the existing IM client logs in, it adopts the traditional verification based on the user account number and password, so once the user password is intercepted or cracked, the complete control authority of the user account can be ob...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/58
Inventor 赵坤孙江伟徐樟锦
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products