Login method and system

A login method and a login system technology, applied in the login method and system fields, can solve problems such as potential safety hazards, impact on Internet user information security, huge losses, etc., and achieve the effect of avoiding unnecessary losses

Inactive Publication Date: 2016-08-17
张红军
View PDF2 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

After some websites have been registered, due to long-term inactivity, when they suddenly need to access one day, they forget their usernames and passwords, or even cannot remember any information, resulting in this account becoming a spam account, which brings certain losses to both the user and the website.
[0003] For too many websites, some users use different websites and use

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Login method and system
  • Login method and system
  • Login method and system

Examples

Experimental program
Comparison scheme
Effect test

Example

[0036] first embodiment

[0037] like figure 1 Shown is a system block diagram of the login system provided by the preferred embodiment of the present invention. The login system includes a user terminal 100, a proxy server 200 and a target server 300. The user terminal 100 is used to log in to the proxy server 200 through the first account information, and the proxy server 200 is used to log in the user terminal 100 through the first account information. Forward the second account information uploaded by the user terminal 100 to the target server 300, and after receiving the second account information forwarded by the proxy server 200, the target server 300 feeds back to the proxy server 200 a first security pass information bound to the second account information , so that when the user terminal 100 logs in to the target server 300 again, it can directly log in to the target server 300 through the first security pass information stored in the proxy server 200 .

[0038] Ta...

Example

[0042] second embodiment

[0043] see figure 2 , is a flow chart of the login method provided by the preferred embodiment of the present invention. The following will be figure 2 The specific process shown will be described in detail.

[0044] The method provided by the embodiment of the present invention is used to realize quick and convenient login to the target server through the proxy server, and is especially suitable for the situation where multiple different website servers correspond to multiple different accounts. It includes the following steps.

[0045] Step S101: Log in to the proxy server through the first account information.

[0046] When using the method provided by the embodiment of the present invention to log in to the target server for the first time, first, the user terminal logs in to the proxy server through the web interface provided by the proxy server through the first account information (account number and password, etc.) that has successfully...

Example

[0054] third embodiment

[0055] see image 3 , is a flowchart of another login method provided by a preferred embodiment of the present invention. The following will be image 3 The specific process shown will be described in detail.

[0056] Step S201: Log in to the proxy server through the first account information.

[0057] Step S202: the proxy server forwards the second account information to the target server.

[0058] Step S203: the proxy server receives the first safe pass information bound with the second account information fed back by the target server.

[0059] Step S204: the target server determines whether the second account information has been modified.

[0060] Since the first security pass information generated by the target server is bound to the second account information forwarded to it by the proxy server, when certain information in the second account information used to log in to the target server (such as password or user contact information, etc....

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a login method and system, which relate to the technical field of information security. The login method includes logging into the proxy server through the first account information; the proxy server forwards the second account information to the target server; The first secure pass information is logged into the target server. The login method and system provided by the present invention can effectively prevent the account from becoming a spam account due to forgetting the relevant information of the account when there are too many accounts, and avoid causing unnecessary losses to the user and the website.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to a login method and system. Background technique [0002] With the rapid development of the Internet, users need to use too many websites, and it is difficult to remember user names and passwords. After some websites have been registered, due to long-term inactivity, when they suddenly need to access one day, they forget their usernames and passwords, or even cannot remember any information, resulting in this account becoming a spam account, which brings certain losses to both the user and the website. . [0003] There are too many websites, and some users use different websites and use the same user name and password, which will cause the leakage of user information on one website, and there are certain security risks in other user websites. The well-known CSDN password leakage incident and the recent 12306 and Alipay credential stuffing incidents did not c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/0815H04L63/0823H04L63/0884
Inventor 张红军
Owner 张红军
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products