Login verification method, login request method and secure login system

A login request and login verification technology, applied in the field of information security, can solve the problem of low security of the login method, achieve the effect of increasing the difficulty of blasting, preventing brute force cracking, and improving security

Active Publication Date: 2017-11-03
PING AN TECH (SHENZHEN) CO LTD
View PDF5 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The main purpose of the present invention is to provide a login verification method, a login request method and a secure login system, aiming to solve the technical problem of low security of the existing login methods

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Login verification method, login request method and secure login system
  • Login verification method, login request method and secure login system
  • Login verification method, login request method and secure login system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0049] refer to figure 1 , The first embodiment of the login verification method of the present invention provides a login verification method, the login verification method includes:

[0050] Step S110, if the login request sent by the client is received, obtain the identity of the client, and the account name and combined password carried in the login request.

[0051] The present invention proposes a new login mode. In the process of login verification, a combined password including a verification code and a real login password is used. Even if the login request is intercepted by an attacker, the correct password cannot be cracked according to the password in the login request. The login password; and the server can correctly analyze the combined password in the login request to obtain the verification code and th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a login verification method. The method comprises the following steps: if a login request sent by a client is received, obtaining an identity identifier of the client and an account name and a combined password carried in the login request; splitting the combined password to obtain a login password and a check code according to a preset combination rule; verifying the check code according to the identity identifier of the client and a preset check code record; verifying the login password according to the account number and a preset login password database; and if the check code is verified, the login password is verified, determining that the login request is verified, and allowing the client to log in. The invention further discloses a login request method and a secure login system. By adoption of the login verification method, the security of the login mode is greatly improved.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a login verification method, a login request method and a secure login system. Background technique [0002] At present, many websites and application software use the form of "account + password" for login verification. If the password entered by the user during login is the same as the password pre-configured by the user, the user is allowed to log in. Since the user's private information may be recorded in the account, and even the user's property information may be involved, the security of the account information has always been a concern of the user. [0003] However, the existing login method only performs login verification on the login password, and cannot effectively guarantee the security of the account. When a user logs in to a WEB application or APP, the login request sent by the client carries the account and the corresponding login password. If the a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06G06F21/36
CPCG06F21/36H04L63/08H04L63/083H04L63/0876
Inventor 秦伟强
Owner PING AN TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products