Method and system for improving login security

A login request and re-login technology, applied in the field of communication, can solve problems such as login insecurity, and achieve the effect of improving login security

Inactive Publication Date: 2014-06-25
SANGFOR NETWORK TECH SHENZHEN
View PDF4 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in many cases, for the convenience of logging in, the user sets the automatic input function of remembering the password on the browser, that is, the user can log in without entering the user name and password when logging in next time, which will lead to unsafe login. When hacked, the user name and password can be stolen, or after the user logs in on a computer and remembers the password, other people using the computer can continue to log in, which will lead to unsafe login

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for improving login security
  • Method and system for improving login security
  • Method and system for improving login security

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0051] refer to figure 1 , figure 1 It is a schematic flow chart of the first embodiment of the method for improving login security in the present invention, the method includes:

[0052] S10. On the gateway, intercept the first login request sent by the user through the client, where the first login request includes a first user name and a first password.

[0053] The gateway (Gateway) is also called an Internet connector and a protocol converter. The gateway is at the network layer to realize network interconnection. It is the most complex network interconnection device and is only used for the interconnection of two networks with different high-level protocols. The gateway can be used for both wide area network interconnection and local area network interconnection. In this embodiment, the gateway may be a firewall, an online behavior management device, a flow control management device, and the like.

[0054]The first login request may be a request to log in to an http s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and system for improving login security. The method includes the steps that a first login request sent by a user through a client is intercepted on the gateway, and the first login request comprises a first user name and a first password; security check is conducted to the first login request according to the preset password protection strategy; if the first login request does not meet the preset password protection strategy, the user is informed to re-login. The invention further provides a system for improving login security. By the adoption of the method and system for improving login security, security check is conducted to the login request at the gateway, so that login security is improved.

Description

technical field [0001] The invention relates to the communication field, in particular to a method and system for improving login security. Background technique [0002] With the development of Internet services and the increase in the number of Internet users, in order to better provide services for users, various service servers generally provide users with login services, that is, users register login accounts in service servers, and then use the service servers When providing services, you can log in to the service server through its registered login account. [0003] The user submits the user name and password to the business server by entering the user name and password, and the business server verifies the user name and password submitted by the user. If the verification is passed, the user is allowed to use the corresponding service provided by the business server. If the verification fails, the user is rejected. After logging in, the user will not be able to use th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 陈钊毅
Owner SANGFOR NETWORK TECH SHENZHEN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products