Login authentication method and device

A login verification and login page technology, which is applied in the computer field, can solve problems such as theft, the inability to provide security protection for multiple users at the same time, and the inability to guarantee the security of user accounts, so as to prevent theft of one's own password information, prevent theft, and ensure account security. safe effect

Active Publication Date: 2015-04-01
BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the problem with the above two methods of storage is that the list of phishing website domain names needs to be regularly updated. When the domain name of a phishing website is not in the list of phishing website domain names, sensitive information such as user accounts and passwords still have the danger of being stolen by phishing websites. The security of

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Login authentication method and device
  • Login authentication method and device
  • Login authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0023] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary and are intended to explain the present invention and should not be construed as limiting the present invention.

[0024] The following describes the login verification method and device of the embodiments of the present invention with reference to the accompanying drawings.

[0025] figure 1 is a flowchart of a login verification method according to an embodiment of the present invention, such as figure 1 As shown, the login verification methods include:

[0026] S101. Receive the account information input by the user on the login page of the current application, and send a stamp query request to the server, so that the server can judge th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a login authentication method and device. The method comprises the following steps: receiving account information input by a user on a login page of a current application, transmitting a stamp query request to a server to enable that the server judges a webpage source according to the stamp query request, and returning the stamp information when the webpage source is legal; receiving the stamp information returned by the server and displaying a corresponding stamp on the login page; receiving password information input by the user after the user determines that the stamp is valid, and transmitting the password information to the server to finish login authentication. According to the login authentication method and device provided by the embodiment of the invention, the own password information can be effectively prevented from being stolen by a phishing website to guarantee the account safety of the user.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a login verification method and device. Background technique [0002] With the continuous development of the Internet, more and more people begin to do things like shopping, transferring money, and paying utility bills on the Internet. While the Internet is convenient for people's daily life, it also brings many new security risks. One of the most important risks comes from phishing websites. Because the domain names and styles of phishing websites are very similar to some real websites, users are easily lured to a phishing website that is very similar to real websites during online operations. When entering sensitive information such as account numbers and passwords without knowing it, phishing websites will steal user account information and conduct illegal activities based on user account information, such as fraudulent financial transactions, causing irreparable economic lo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/0815H04L63/083H04L63/126H04L63/1483
Inventor 朱建庭王继平郭杏荣
Owner BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products