Method, device and system for login authentication

A login authentication and user technology, applied in the login authentication field, can solve problems such as low account security, property loss, account theft, etc.

Active Publication Date: 2013-05-01
HISENSE BROADBAND MULTIMEDIA TECH
View PDF2 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] It can be seen from the above that the existing user login authentication method that encrypts the account password can protect the legitimate rights and interests of the user to a certain extent and avoid illegal user login by encrypting the account password to achieve login authentication. Encryption method is used for login authentication. The login authentication process is relatively simple, which makes the account security low. Once the account password is leaked, it is very easy for the account to be stolen and cause property loss.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and system for login authentication
  • Method, device and system for login authentication
  • Method, device and system for login authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0071] The technical solutions of the various embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings. Apparently, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0072] The existing login authentication method that encrypts the account password uses a single encryption method to encrypt the account password, and the security of the account is low. Once the account password is leaked, the account is easily stolen, so that the legitimate rights and interests of the user cannot be protected. .

[0073] In the embodiment of the present invention, encrypting the account password is likely to cause the disadvantages of the password being stolen or...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The application discloses a method, a device and a system for login authentication. The method comprises the steps that terminal equipment sequentially obtains account password information input by a user and timestamp information; according to the sequentially obtained timestamp information, password input frequency information is computed; the obtained account password information and the password input frequency information are encrypted, user identity information is carried and the encrypted information is output to a server; according to a user identity, the server inquires to obtain login authentication information which is preset by the user and is stored in the server; and the received information is decrypted to obtain the account password information and the password input frequency information, then matching with the login authentication information obtained through inquiry is conducted, and if the matching is successful, the user passes the login authentication. By using the method, the device and the system for login authentication provided by the application, the login authentication security can be improved and the legitimate rights and interests of users can be guaranteed.

Description

technical field [0001] The invention relates to communication security technology, in particular to a login authentication method, device and system. Background technique [0002] With the development of information technology, it has become an indispensable way in people's daily life to connect to the Internet through terminal equipment, obtain relevant technical information, and conduct online transactions. While the Internet brings infinite convenience to people, it also brings people Many unexpected troubles, for example, user databases are leaked, user information is uploaded to the Internet for public download, and stored value card numbers, bank account numbers, and network account numbers containing user information are stolen by illegal users, resulting in damage to users' legitimate rights and interests. [0003] In order to protect the legitimate rights and interests of users, user data, such as bank accounts and network accounts, etc., are encrypted with password...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 张鹤蒋艳兵
Owner HISENSE BROADBAND MULTIMEDIA TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products