Login method, login verification method, corresponding device, and electronic device

A login method and login verification technology, applied in the login method, login verification method and corresponding devices, and electronic equipment fields, can solve problems affecting user information security, etc., and achieve the effect of avoiding account password leakage and ensuring personal information security

Active Publication Date: 2021-04-06
BEIJING QIHOO TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When the password is leaked, illegal users can use the stolen password to log in to the user's account, seriously affecting the security of user information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Login method, login verification method, corresponding device, and electronic device
  • Login method, login verification method, corresponding device, and electronic device
  • Login method, login verification method, corresponding device, and electronic device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0051] The embodiment of this application provides a login method, such as figure 1 As shown, the method includes:

[0052] Step S101: Send a login request to the server, and receive the random string returned by the server.

[0053] In this embodiment of the application, the method is executed by a client. In practical applications, the client may be an application program on an electronic device such as a computer, a tablet computer, or a mobile terminal, which is not limited in this embodiment of the application.

[0054] In this step, the login request sent by the client to the server may include user description information, such as address information, identity information, etc., so that the server can specify the client that needs to log in, and generate a random string to return to the client.

[0055] Wherein, besides random content, the random string can also be random in length, so that the random range can be further expanded without affecting the solution of the ...

Embodiment 2

[0089] The embodiment of this application provides a login verification method, such as figure 2 As shown, the method includes:

[0090] Step S201: Receive the login request sent by the client, and return the generated random string to the client.

[0091] In the embodiment of the present application, the executing subject of the method is the server.

[0092] In this step, the login request sent by the client may include user description information, such as address information, identity information, etc. After receiving the login request sent by the client, the server specifies the client that needs to log in, and generates a random string and returns it to the client. client.

[0093] Wherein, the server may generate a random string according to a preset random algorithm or a random string generator approved by the State Cryptography Administration, which is not limited in this embodiment of the present application.

[0094] In the embodiment of this application, the ra...

Embodiment 3

[0119] The embodiment of this application provides a login device, such as image 3 As shown, the login device 30 may include: a random string acquisition module 301, a topic determination module 302, a zero-knowledge proof information generation module 303, and a login module 304, wherein,

[0120] Random string acquisition module 301, configured to send a login request to the server, and receive the random string r returned by the server;

[0121] The topic determination module 302 is used to determine the topic to be verified by the server according to the held account password ps and random string r;

[0122] The zero-knowledge proof information generation module 303 is used to generate zero-knowledge proof information required for login according to the account password ps, random string r and title;

[0123] The login module 304 is configured to send the zero-knowledge proof information to the server, so that the server generates a verification result according to the z...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present application provides a login method, a login verification method, a corresponding device, and electronic equipment. The login method includes: sending a login request to the server and receiving the random string returned by the server; determining the subject to be verified by the server according to the held account password and random string; generating the zero required for login according to the account password, random string and title Knowledge proof information; send the zero-knowledge proof information to the server, so that the server generates a verification result based on the zero-knowledge proof information. This application uses zero-knowledge proof to log in, which effectively avoids information leakage, and the random string returned by the server in each proof process makes the zero-knowledge proof information generated each time different, even if the data is leaked during transmission , It can also prevent illegals from cracking the login method, effectively ensuring the security of the user's personal information.

Description

technical field [0001] The present application relates to the technical field of Internet security, in particular, to a login method, a login verification method, corresponding devices, and electronic equipment. Background technique [0002] In the Internet world, users often need to use corresponding account numbers and passwords to log in and access various network services, so as to realize personal identity authentication and ensure the security of personal information. [0003] The traditional login method mainly relies on the server to store the hash value of the user's account number and password, and the user can log in by showing the account number and password to the server. However, the security of this login method is open to question. [0004] As we all know, password leaks have become commonplace in the Internet age. When the password is leaked, illegal users can use the stolen password to log in to the user's account, seriously affecting the security of user...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/08
CPCH04L9/0869H04L9/3221H04L63/08
Inventor 胡宇光殷宇辉
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products