Login verification method and device, terminal device and storage medium

A technology of login verification and verification method, which is applied in the field of login verification methods, terminal equipment and storage media, and devices, and can solve the problems of reducing login security and low verification efficiency, so as to ensure login security, reduce verification operations, and improve verification The effect of efficiency and login efficiency

Active Publication Date: 2018-10-12
PING AN TECH (SHENZHEN) CO LTD
View PDF4 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Embodiments of the present invention provide a login verification method, device, terminal equipment, and storage medium to solve the problems in the prior art that repeated verification operations when login verification fails lead to low verification efficiency and lower login security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Login verification method and device, terminal device and storage medium
  • Login verification method and device, terminal device and storage medium
  • Login verification method and device, terminal device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0029] see figure 1 , figure 1 The implementation process of the login verification method provided by this embodiment is shown, and the details are as follows:

[0030] S1: Receive the user's login request message sent by the client, where the login request message includes login data and login device identification information.

[0031] Specifically, once the client detects that the login control is triggered, that is, after the user enters relevant and valid login data such as user name and password in the target application and clicks to log in, the client sends a login request message to the server. Wherein, the target application includes the management system of the mobile phone software or the webpage that the user is visiting.

[0032] In the embodiment of the present invention, the server receives the login request message sent by the client, and the login request message includes login data and login device identification information of the login device used by th...

Embodiment 2

[0124] Corresponding to the login method in Example 1, Figure 5 The login verification device corresponding to the login verification method provided in Embodiment 1 is shown, and for the convenience of description, only the parts related to the embodiment of the present invention are shown.

[0125] Such as Figure 5 As shown, the login verification device includes: a receiving module 51 , a security verification module 52 , a quick verification module 53 , a comprehensive verification module 54 , and a completion verification module 55 . The detailed description of each functional module is as follows:

[0126] The receiving module 51 is configured to receive a user's login request message sent by the client, wherein the login request message includes login data and login device identification information;

[0127] The security verification module 52 is used to set the user's login verification method to a preset security verification method if the user's login data is no...

Embodiment 3

[0159] This embodiment provides a computer-readable storage medium, and a computer program is stored on the computer-readable storage medium. When the computer program is executed by the processor, the login verification method in Embodiment 1 is implemented, or, when the computer program is executed by the processor Realize the functions of each module / unit in the login verification device in Embodiment 2. To avoid repetition, details are not repeated here.

[0160] It can be understood that the computer-readable storage medium may include: any entity or device capable of carrying the computer program code, recording medium, U disk, mobile hard disk, magnetic disk, optical disk, computer memory, read-only memory (Read- Only Memory, ROM), random access memory (Random Access Memory, RAM), electric carrier signal and telecommunication signal, etc.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a login verification method and device, a terminal device and a storage medium. The method comprises the following steps: receiving a login request message of a user sent by aclient; if the login data of the user is not queried in a preset history login database, setting the login verification mode of the user to be a preset security verification mode; if the login data and login device identification information of the user are queried, setting the login verification mode to be a preset shortcut verification mode; if the login data of the user is queried and the logindevice identification information of the user is not queried, setting the login verification mode to be a preset comprehensive verification mode; and completing the login security verification for the user according to the login verification mode. The technical scheme of the present invention implements different verification modes for different historical login situations, so as to effectively improve the verification efficiency and login efficiency of user login while ensuring the user login security.

Description

technical field [0001] The present invention relates to the field of computer technology, in particular to a login verification method, device, terminal equipment and storage medium. Background technique [0002] When the user is logging in for authentication, in order to prevent the login data and its login password from being stolen by hackers for illegal purposes, it is necessary to perform a human-machine identification verification process on the user ID to improve the security of login data protection. [0003] Today’s commonly used graphic verification methods, due to the high degree of interference to the picture, it is difficult to identify the content of the picture, and further input of verification information is required to complete the verification operation. When the user enters the wrong verification code and the login verification fails, often The same verification operation method will be used to re-authenticate, which will easily cause login security risks...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/0807H04L63/0876H04L63/083H04L63/1408H04W12/61H04W12/68
Inventor 叶力
Owner PING AN TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products