Login method, registration method and login device as well as login and refrigeration system

A login method and login request technology, applied in the Internet field, can solve the problems of high distribution and maintenance costs, loss, third-party interception or cracking, etc., and achieve the effect of convenient login and registration methods, easy operation, and high security.

Active Publication Date: 2015-04-29
PEOPLE CN CO LTD
View PDF12 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The above methods have their own advantages and disadvantages. For example, the use of passwords or passphrases is cheap and easy to operate, but it is easy to be intercepted or cra

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Login method, registration method and login device as well as login and refrigeration system
  • Login method, registration method and login device as well as login and refrigeration system
  • Login method, registration method and login device as well as login and refrigeration system

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0052] Hereinafter, exemplary embodiments of the present disclosure will be described in more detail with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure can be implemented in various forms and should not be limited by the embodiments set forth herein. On the contrary, these embodiments are provided to enable a more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0053] figure 1 Shows a flowchart of a login method according to an embodiment of the present invention. The method is suitable for a server, such as figure 1 As shown, the method includes the following steps:

[0054] Step S110: Receive a login request sent by the client.

[0055] The client is an application running on the terminal, which can be a browser, an instant messaging application, etc. For example, a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a login method, a registration method and a login device as well as a login and refrigeration system. The login method comprises the following steps: receiving a login request sent by a client, wherein the login request carries user identification information and private key information provided by a user; encrypting a verification quest into a ciphertext by use of a public key corresponding to the user identification information in the login request and returning the ciphertext to the client to allow the client to decrypt the ciphertext by use of a pre-stored private key, and obtaining the verification question and an answer to be verified of the user to the verification question; receiving the answer to be verified sent by the client and determining whether the answer to be verified is correct; if the answer to be verified is correct, logging in by use of the user identification information. According to the login method, a plurality of authentication manners such as the public key, the private key, the private key password and the verification question are combined to achieve higher safety.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to a login method, a registration method, a login device, and a login and registration system. Background technique [0002] Network account registration and login is a basic and important task on the Internet. With the popularization of the Internet, various forms and various online services require users to remember more and more network accounts, which brings certain burdens and risks to users. [0003] User authentication is involved in registration and login. The authentication of user identity in the current registration and login is generally carried out in three ways, 1) what is the user, through fingerprint, face, DNA information to determine the user's identity; 2) what does the user have, for example, to verify the user's key, certificate , tokens, etc.; 3) what the user knows, such as passwords, passphrases, etc. Network account identification and verification wi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/32H04L9/3226H04L9/3228H04L63/083
Inventor 刘振兴唐胜宏
Owner PEOPLE CN CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products