Verification method and device used for server log-in

A verification method and server technology, applied in the verification method and device field of server login, can solve the problems of being unable to block weak password attacks of hackers and low security of Windows servers, so as to increase the complexity of verification and reduce the possibility of brute force cracking, The effect of reducing the waste of network resources

Active Publication Date: 2018-10-26
BEIJING QIHOO TECH CO LTD
View PDF5 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] It can be seen that the existing remote login method of Windows server cannot block the weak password attack of hackers, resulting in low security of Windows server

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verification method and device used for server log-in
  • Verification method and device used for server log-in
  • Verification method and device used for server log-in

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach 1

[0100]Embodiment 1: The user terminal that initiates the server login request and intercepts the server login request by the same device. Specifically, an interception application plug-in for intercepting the login request of the server is installed on the user terminal, and the interception application plug-in runs on the user terminal. When the user terminal initiates a server login request, the server login request is intercepted by an interception application plug-in running on the user terminal.

Embodiment approach 2

[0101] Embodiment 2: The user terminal that initiates the server login request and the device that intercepts the server login request do not belong to the same device. Specifically, the device that intercepts the server login request is an intermediate device between the target server and the user terminal that initiates the server login request. The user terminal initiates a server login request to the target server through the intermediate device, and the intermediate device intercepts the user terminal.

Embodiment approach 3

[0102] Embodiment 3: An interception application plug-in for intercepting server login requests is installed on the device where the target server is located. When the user terminal initiates a server login request, the server login request is intercepted by the interception application plug-in running on the device where the target server is located.

[0103] In the specific implementation process, the server login request initiated by each user terminal can be intercepted, and then steps S102 to S103 are executed to verify whether each server login request initiated by each user terminal needs to be sent to the target server . This implementation can absolutely ensure the security of the target server.

[0104] In the specific implementation process, in order to improve the timeliness of server login. It is also possible to set the interception conditions for intercepting the server login request. When the current situation meets the set interception conditions, the server ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Embodiments of the invention provide a verification method and device for server log-in, and the verification method and device are applied to the technical field of a computer. The method includes the following steps: intercepting a server login request initiated by a user terminal and used for requesting a login target server, wherein the server login request carries first login information required by the login target server; responding to an event of intercepting the server login request, and outputting a virtual login interface including a confirmation button area, wherein the confirmation button area is used for accepting an operation of determining the login target server; sending the intercepted server login request to the target server if the operation on the confirmation button area is detected, and making a user terminal log in the target server based on the first login information; and otherwise, do not sending the intercepted server login request to the target server. Through the verification method and device, the technical problem of low safety of a Windows server is solved.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a verification method and device for server login. Background technique [0002] With the development of informatization and the popularization of computer technology and Internet technology, in order to facilitate the management of Windows servers, users often realize it through Windows remote desktop connection, and the server has always been the focus of hacker attacks because it is unattended. [0003] At present, in the existing Windows remote desktop connection login mechanism, users usually enter the address of the Windows server they want to log in in the remote desktop provided by the Windows system, such as IP address, domain name, etc. to connect to the corresponding Windows server . After the user terminal is connected to the Windows server, a login interface will be displayed to the user, and the user can log in to the Windows server by inputting a username and pa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0815H04L63/1441H04L63/306H04L67/08
Inventor 袁志明孙诚
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products