Check patentability & draft patents in minutes with Patsnap Eureka AI!

Secure login method and device

A technology for secure login and successful login, applied in the field of communication, can solve the problems of sensitive information tampering and sensitive information leakage, and achieve the effect of improving security

Active Publication Date: 2017-09-12
CHINA MOBILE GROUP JIANGSU
View PDF7 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Embodiments of the present invention provide a secure login method and device to solve the problem in the prior art that illegal remote login causes sensitive information leakage or the risk of sensitive information being tampered with

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure login method and device
  • Secure login method and device
  • Secure login method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings. Obviously, the described embodiments are only some embodiments of the present invention, rather than all embodiments . Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0020] see figure 1 As shown, the embodiment of the present invention provides a schematic flow diagram of a secure login method, and the specific implementation method includes:

[0021] In step S101, the user's login information is obtained, and a host terminal identifier and a mobile terminal identifier bound to the login account are determined according to the login account in the login information.

[0022] Step S102, determining fir...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a secure login method and device. The method comprises the steps of: obtaining login information of a user, and determining a host terminal identifier and a mobile terminal identifier bound with a login account according to the login account in the login information; according to the mobile terminal identifier, determining the first geographical position information of a mobile terminal; according to the host terminal identifier, determining the second geographical position information of a host terminal; and, comparing the first geographical position information with the set geographical position information of the mobile terminal, furthermore, comparing the second geographical position information with the set geographical position information of the host terminal, and, if a comparison result satisfies a set condition, authenticating that login is successful. The problem of sensitive information leakage or the sensitive information tampering risk due to illegal remote login in the prior art can be solved.

Description

technical field [0001] The invention relates to the communication field, in particular to a method and device for secure login. Background technique [0002] At present, the staff and customer service personnel of the operator's business hall are scattered in various places, lacking a unified and effective management and control method. The management of business personnel is limited to account management and authority management, but there are still abnormal logins. The so-called abnormal login mainly refers to illegal remote locations Login, that is, the user who successfully logs in at another geographical location is not the legal owner of the login account. [0003] In view of the above problems, the existing technology usually creates an account for each log-in person, sets a password when registering the account, registers the mobile phone number of each log-in person, and all account authentication strategies are static password + SMS verification code authentication...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/083H04L63/0876H04L63/107H04L63/18
Inventor 陈若鹏赵鹏
Owner CHINA MOBILE GROUP JIANGSU
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More