Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Username locking method and server

A user name and server technology, applied in the computer field, can solve problems such as unfavorable network security

Active Publication Date: 2018-04-24
NEUSOFT CORP
View PDF7 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method of operation enables network attackers to identify whether the user name is a registered user name, which provides convenience for network attackers to carry out credential stuffing attacks, and is not conducive to network security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Username locking method and server
  • Username locking method and server
  • Username locking method and server

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0063] see figure 1 , this figure is a flow chart of the username locking method provided by this embodiment, and the username locking method provided by this embodiment includes the following steps:

[0064] S101: Receive a current login request to a target website, where the current login request carries a user name and a login password.

[0065] It should be noted that the user name locking methods provided in the following embodiments of the present application can be applied to servers. It should also be noted that, unless otherwise specified, the users mentioned in the following embodiments of the present application may be legitimate users of the target website (legal users for short), or network attackers.

[0066] In addition, this embodiment does not limit the type of the target website, for example, the target website may be a news website, a shopping website, a portal website and so on.

[0067] Such as figure 2 As shown, when the user sends a login request to ...

no. 2 example

[0083] Regarding the user name locking method provided in the first embodiment, the second embodiment will specifically introduce an implementation method of S104 in the first embodiment with reference to the accompanying drawings.

[0084] see image 3 , this figure is a flow chart of the username locking method provided by this embodiment, and the username locking method provided by this embodiment includes the following steps:

[0085] S301: Record a first request time, where the first request time is a request time corresponding to a current login request carrying the username.

[0086] It should be noted that when implementing S301, a time queue can be maintained for each username that has not passed verification in the cache or other storage locations, that is, as long as a new username is parsed from the login request, and If the new user name is an unregistered user name, or the new user name is a registered user name but the login password is wrong, a time queue is c...

no. 3 example

[0115] Considering that in practical applications, before a legitimate user visits the target website for the first time, he needs to register a user name and set a corresponding password. Then, the legitimate user can use the user name and password to send a login request on the login interface provided by the target website, and the user can access the target website only after the login is successful.

[0116] In view of this, the embodiment of the present application also provides a user name locking method, which mainly introduces user registration and user access in detail, and the third embodiment will introduce the method with reference to the accompanying drawings.

[0117] see Image 6 , which is a flowchart of a method for locking a user name provided in this embodiment. The method for locking a user name provided in this embodiment includes the following steps:

[0118] S601: Receive a registration request to the target website, where the registration request carr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a username locking method and server. No matter a username used by a user to try to log in a target website is a registered username or an unregistered username, identical treatment is adopted as long as login failure occurs. Namely, whether the username meets a preset locking condition is determined. If the username meets the preset locking condition, the username is locked. If the username does not meet the preset locking condition, prompt information is output. Therefore, since identical treatment is adopted for each username that cannot achieve login success, network attacks cannot identify whether the current username is a registered username or not, so that the registered username identification difficulty is improved and network safety is further improved.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to a user name locking method and server. Background technique [0002] In the current network environment, the credential stuffing attack is a common attack method. The credential stuffing attack is that the network attacker collects the user name and password information that has been leaked on the Internet, generates the corresponding dictionary table, and tries to log in to other websites in batches. A series of users who can log in. In this way, once the user sets the same user name and password on multiple websites to save trouble, it is easy for the network attacker to log in to these websites through the existing information in the dictionary table, so as to obtain the relevant information of the user, such as mobile phone number, identity ID card number, home address, Alipay and online banking information, etc. If such information is leaked, it will not only br...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/083H04L63/1441
Inventor 林祝庆
Owner NEUSOFT CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products