User authentication method and device

A user authentication and user technology, applied in the field of network security, can solve problems such as hidden dangers of system security, and achieve the effects of ensuring security, improving efficiency, and reducing load

Active Publication Date: 2016-10-05
BEIJING QIHOO TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, due to the security of cookies and other reasons, if the cookie information is not verified, some malicious users will log in to the system by forging cookies, which will lead to hidden dangers in the security of the system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User authentication method and device
  • User authentication method and device
  • User authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0032] It is mentioned in related technologies that after a user logs in to a network application for the first time, he can use a cookie to directly enter the system within a certain period of time without re-authentication. However, based on the attributes of the cookie itself, malicious users may forge the cookie to log in to the system, causing hidden dangers to the security of the system.

[0033] In order to solve the above t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a user authentication device, which comprises a receiving module, an encryption module and an authentication module, wherein the receiving module is used for receiving a logging request including authentication information from a user; the authentication information comprises a first information part and a second information part; the first information part comprises basic information of the user; the second information part comprises a first verification character string generated after the basic information of the user is encrypted by a preset encrypting rule; the encryption module is used for encrypting the basic information of the user is encrypted by the preset encrypting rule to obtain a second verification character string; and the authentication module is used for determining whether the second verification character string is matched with the first verification character string or not, and the authentication is successfully if the second verification character string is matched with the first verification character string. By adopting the user authentication device provided by the invention, a technical problem of potential safety hazard of a system, which is caused by the fact that a malicious user forges cookie to log into the system, can be solved. The invention further discloses a corresponding user authentication method and system.

Description

technical field [0001] The invention relates to the field of network security, in particular to a user verification method, a user verification device, a verification server and a user verification system. Background technique [0002] With the rapid development of the Internet, more and more network applications appear, and users of these network applications also increase. In order to respond to a large number of user login requests and ensure the security of user login, network applications usually need to build a background database to authenticate users. At present, in the network application system, when the user logs in to the network application system, the network application will obtain the user name and password, and compare it with the user name and password stored in the database, so as to determine whether the user can log in to the network application system correctly. That is, each time the network application receives a user's login request, it will obtain ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 于富龙黄来安
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products