Login verification method, login request method and secure login system
A login request and login verification technology, applied in the field of information security, can solve the problem of low security of the login method, achieve the effect of increasing the difficulty of blasting, preventing brute force cracking, and improving security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0048] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.
[0049] refer to figure 1 , The first embodiment of the login verification method of the present invention provides a login verification method, the login verification method includes:
[0050] Step S110, if the login request sent by the client is received, obtain the identity of the client, and the account name and combined password carried in the login request.
[0051] The present invention proposes a new login mode. In the process of login verification, a combined password including a verification code and a real login password is used. Even if the login request is intercepted by an attacker, the correct password cannot be cracked according to the password in the login request. The login password; and the server can correctly analyze the combined password in the login request to obtain the verification code and th...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com