Method, device and system for terminal, server and account security login

A technology for secure login and server, applied in the field of account security login, which can solve the problem that the security of user information cannot be guaranteed.

Active Publication Date: 2019-06-11
シェンジェンインムーテクノロジーシーオーエルティーディー
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The technical problem to be solved by this application is to provide a terminal, server and account security login method, device and system, which solves the problem that the password entered by the user in the prior art is not encrypted when it is transmitted in the network. Some users can use tools to obtain user account numbers and passwords, such as grabbing network logs through the wireshark tool, and the user name and password can be clearly seen from the logs, resulting in the problem that the security of user information cannot be guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and system for terminal, server and account security login
  • Method, device and system for terminal, server and account security login
  • Method, device and system for terminal, server and account security login

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The following will clearly and completely describe the technical solutions in the embodiments of the present application with reference to the accompanying drawings in the embodiments of the present application. Obviously, the described embodiments are only some of the embodiments of the present application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0048] refer to figure 1 , which shows a flow chart of Embodiment 1 of a method for account security login of the present application, which may include the following steps:

[0049] Step S101: Obtain the password input by the user.

[0050] When the user needs to log in the account on the terminal device, the account number and the corresponding password need to be input. After the user enters the password, the terminal device obtains the passwo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The application provides an account security login method. The method comprises the steps of obtaining a cipher inputted by a user; utilizing an encryption algorithm to encrypt the cipher inputted by the user to form the ciphertext information; taking the ciphertext information as the current cipher of the user to send to a server; receiving the feedback information of the server; according to the feedback information, executing a login operation. During the sending process, when other users capture a weblog to obtain the account and the cipher of the user with the help of tools, the obtained cipher is just the encrypted cipher, and the cipher inputted by the user is not obtained, thereby effectively avoiding a phenomenon that the user information is stolen, and guaranteeing the security of the user information.

Description

technical field [0001] The present application relates to the field of account security login, and in particular to a terminal, a server, and a method, device and system for account security login. Background technique [0002] With the development of technology, people pay more and more attention to the secure login of accounts. [0003] When logging in to a network application in an existing mobile terminal device, the password entered by the user is not encrypted when it is transmitted in the network. In this way, most users can use tools to obtain the user account and password, such as through wireshark The tool captures network logs, and the user's username and password can be clearly seen from the logs, which makes it impossible to guarantee the security of user information. [0004] Therefore, how to effectively ensure the security of user information and realize the secure login of accounts is a technical problem that those skilled in the art need to solve at presen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0442H04L63/083
Inventor 任锴
Owner シェンジェンインムーテクノロジーシーオーエルティーディー
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products