Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Login authentication method and device

A login authentication and login request technology, applied in the network field, can solve problems such as business interruption, achieve the effects of avoiding leakage, strong practicability, and improving data security

Active Publication Date: 2018-04-17
SUZHOU XIQUAN SOFTWARE TECH CO LTD
View PDF6 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The embodiment of the present disclosure provides a login authentication method and device, which can solve the problem in the related art that the current business must be interrupted when the encryption algorithm is upgraded

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Login authentication method and device
  • Login authentication method and device
  • Login authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] In order to make the purpose, technical solution and advantages of the present disclosure clearer, the implementation manners of the present disclosure will be further described in detail below in conjunction with the accompanying drawings.

[0036] figure 1 is a schematic diagram of an implementation environment provided by an embodiment of the present disclosure, such as figure 1 As shown, the implementation environment includes multiple terminals 101 and application servers 102 . Each terminal 101 can be connected to the application server 102 through a wireless or wired network, and each terminal 101 can be a desktop computer, a notebook computer, a mobile phone, etc., and the application server 102 can be a server, or a server cluster composed of several servers , or a cloud computing service center. Optionally, the application server 102 may also have at least one type of database, such as a ciphertext information database, a registered user information database...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a login authentication method and device, and belongs to the technical field of the network. The method comprises the following steps: acquiring ciphertext corresponding to a user identifier from ciphertext information when receiving a login request carrying the user identifier and use password, thereby obtaining the first ciphertext; performing login authentication based onthe first ciphertext and the user password by using a first encryption algorithm; when the first encryption algorithm authenticates that the login request is not passed, performing the login authentication on the login request based on the first ciphertext and the user password by adopting a second encryption algorithm; when the second encryption algorithm authenticates that the login request ispassed, replacing the first ciphertext in the ciphertext information with the second ciphertext; and performing the login authentication on the login request received again based on the second ciphertext in the ciphertext information when receiving the login request carrying the use identifier again. Based on the login authentication scheme provided by the invention, the current service is unnecessary to interrupt when upgrading the encryption algorithm.

Description

technical field [0001] The present disclosure relates to the field of network technologies, in particular to a login authentication method and device. Background technique [0002] The network usually includes a large number of terminals and application servers. The terminal can run the client of the application program and send a login request to the application server associated with the application program. After successfully logging in to the application server, the service provided by the application server can be obtained. To ensure security, the application server performs login authentication on the login request. [0003] The specific process of login authentication is as follows: when the application server receives the login request, it will analyze the login request, obtain the user ID and user password carried in the login request, and use the encryption algorithm to calculate the user ID to obtain the first ciphertext. From the ciphertext Obtain the ciphertext...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/16
CPCH04L9/16H04L63/083
Inventor 莫卉
Owner SUZHOU XIQUAN SOFTWARE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products