Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Safety logging method, system and device of mobile application

A mobile application and secure login technology, applied in the field of mobile internet, can solve the problems of user information leakage, obtaining user password, slow response speed of https protocol, etc., to protect user privacy and ensure security.

Active Publication Date: 2013-12-04
BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
View PDF8 Cites 30 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] (1) The gateways of some mobile operators do not support the https protocol, such as the earlier CMWAP gateways
[0006] (2) Due to the slow transmission speed of the mobile network itself, and the three-way SSL handshake process and the https certificate verification process in the https protocol, and the certificate verification agencies are all abroad, these lead to the use of the https protocol on the domestic mobile network. There is a problem with very slow response
[0009] (2) If the client uses an asymmetric encryption algorithm when encrypting the user password, the hacker cannot use the method in (1) to obtain the real password of the user
Therefore, account information is easily stolen, causing user information to be leaked and user accounts to be compromised.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety logging method, system and device of mobile application
  • Safety logging method, system and device of mobile application
  • Safety logging method, system and device of mobile application

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention.

[0041] Refer below figure 1 A secure login method for mobile applications according to an embodiment of the present invention is described, including the following steps:

[0042] Step S110: the cloud server and the mobile application in the mobile terminal negotiate an encryption key, and store the encryption key in the cloud server and the mobile terminal respectively.

[0043] Wherein, the encryption key negotiation between the cloud server and the mobile application in the mobile terminal further includes:

[0044] Step S111: Default...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a safety logging method of a mobile application. The safety logging method includes the following steps that the encryption key arrangement is performed on the mobile application in a cloud server and a mobile terminal, and an encryption key is stored in the cloud server and the mobile terminal respectively; the cloud server receives a logging verification request sent by the mobile application, wherein the logging verification request comprises a user name and a first encryption string, and the first encryption string comprises information obtained after a user code is encrypted through the encryption key; the cloud server decrypts the first encryption string according to the encryption key so as to obtain the user code; the cloud server performs logging verification on the mobile terminal according to the user code. According to the safety logging method of the mobile application, through the encryption key arrangement, safety of a logging system on the mobile application is ensured, and user privacy is protected. The invention further discloses a safety logging system and the cloud server for the mobile application.

Description

technical field [0001] The invention relates to the technical field of mobile internet, in particular to a method, system and device for securely logging in to mobile applications. Background technique [0002] The growth of the Internet has also been accompanied by the growth of cybersecurity threats. Services in many websites can only be used after the user logs in. During the login process, the user's account number and password need to be transmitted. Many hackers maliciously steal user accounts and passwords by intercepting transmitted user login information, threatening the security of users' personal accounts. [0003] Generally, when a traditional login system submits a user login request, in order to ensure the safe transmission of the user password, it generally adopts a data transmission mechanism based on the SSL protocol, such as the HTTPS protocol. [0004] Under the domestic mobile network, using the https protocol will cause the following fatal problems: ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 朱建庭
Owner BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products