User login method, user terminal and server

A technology of user terminals and servers, applied in the electronic field, can solve problems such as low security, achieve the effect of improving security and solving low security

Active Publication Date: 2017-03-22
SICHUAN JIUZHOU ELECTRIC GROUP
View PDF6 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The embodiment of the present application provides a user login method, a user terminal and a server, which are used to solve the tec

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User login method, user terminal and server
  • User login method, user terminal and server
  • User login method, user terminal and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0078] Please refer to figure 1 , is a flow chart of a user login method provided in Embodiment 1 of the present application, the method is applied to a user terminal, and the user terminal is connected to a server, and the method includes:

[0079] S101: Obtain the user account and user password of the user based on the user's input operation;

[0080] S102: Generate a random number of the user terminal, and encrypt the random number of the user terminal, and obtain the encrypted random number of the user terminal;

[0081] S103: Obtain the server random number of the server;

[0082] S104: Encrypt the user password based on the user terminal random number and the server random number to obtain an encrypted user password;

[0083] S105: Send the encrypted user password and the encrypted user terminal random number to the server, so that the user password is verified at the server based on the encrypted user password and the encrypted user terminal random number After the v...

Embodiment 2

[0107] Based on the same inventive concept as Embodiment 1 of this application, please refer to figure 2 , is a flow chart of a user login method provided in Embodiment 2 of the present application. The method is applied to a server, and the server is connected to the user terminal as in Embodiment 1. The method includes:

[0108] S201: Receive the encrypted user password and the encrypted user terminal random number sent by the user terminal, wherein the encrypted user password is the user password input by the user terminal based on the user, the user terminal random number and the server random number Generated;

[0109] S202: Decrypt the encrypted user terminal random number to obtain the user terminal random number;

[0110] S203: Obtain the server random number;

[0111] S204: Based on the user terminal random number and the server random number, decrypt the encrypted user password to obtain the user password;

[0112] S205: Verify the user password with the preset p...

Embodiment 3

[0132] Based on the same inventive concept as Embodiment 1 of this application, please refer to image 3 , which is a structural block diagram of a user terminal provided in Embodiment 4 of the present application, where the user terminal includes:

[0133] The first obtaining unit 101 is configured to obtain the user account and user password of the user based on the user's input operation;

[0134] The first execution unit 102 is configured to generate a user terminal random number, and perform encryption processing on the user terminal random number, to obtain an encrypted user terminal random number;

[0135] The second acquiring unit 103 is configured to acquire the server random number of the server;

[0136] The second execution unit 104 is configured to encrypt the user password based on the random number of the user terminal and the random number of the server, and obtain an encrypted user password;

[0137] The first sending unit 105 is configured to send the encry...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a user login method, a user terminal and a server. The user terminal is connected with the server. The method comprises the following steps: acquiring a user account and a user password of a user based on an input operation of the user; generating a user terminal random number, encrypting the user terminal random number, and acquiring an encrypted user terminal random number; acquiring a server random number of the server; encrypting the user password based on the user terminal random number and the server random number, and acquiring an encrypted user password; and transmitting the encrypted user password and the encrypted user terminal random number to the server, so that the user finishes login after successful verification of the user password based on the encrypted user password and the encrypted user terminal random number by the server.

Description

technical field [0001] The invention relates to the field of electronic technology, in particular to a user login method, a user terminal and a server. Background technique [0002] In various websites or applications, users usually log in by way of user name and password after registration. Especially for some applications in the financial field, user login information such as account numbers and passwords will be used to log in to bank websites, etc., so as to obtain personal information such as the user's bank flow data. Obviously, during user identity authentication, a very high user login security control method is required to verify user login information to ensure that the user login password is not leaked. [0003] In the prior art, in view of the above problems, the following methods are currently used to realize user login security control: (1) adopt simple static encryption to encrypt user passwords; (2) adopt login authentication based on user terminal random nu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L29/06
Inventor 刘念林吴新勇邱吉刚李汶隆
Owner SICHUAN JIUZHOU ELECTRIC GROUP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products