Account login method, device, computing device and storage medium

A technology of account login and account, which is applied in the information field, can solve problems such as unrestricted and inability to discover account authentication in time, and achieve the effect of reducing costs

Active Publication Date: 2021-11-26
ZHUHAI KINGSOFT ONLINE GAME TECH CO LTD +1
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this traditional technology cannot restrict other people who know the account password from logging in to the account when the user's password is guessed by others, or the real user of the account has not changed the password in time after telling others the password, or the user cannot log in to the account after someone else logs in to the account. , the real user cannot find out that the account has been authenticated by others in time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Account login method, device, computing device and storage medium
  • Account login method, device, computing device and storage medium
  • Account login method, device, computing device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0071] In the following description, numerous specific details are set forth in order to provide a thorough understanding of the specification. However, this specification can be implemented in many other ways different from those described here, and those skilled in the art can make similar extensions without violating the connotation of this specification, so this specification is not limited by the specific implementations disclosed below.

[0072] In this article, "first", "second", etc. are only used to distinguish each other, not to indicate the degree of importance and order, or the prerequisite for mutual existence.

[0073] figure 1 is a structural block diagram illustrating a computing device 100 according to an embodiment of the present specification. Components of the computing device 100 include, but are not limited to, a memory 110 and a processor 120 . The processor 120 is connected to the memory 110 through the bus 130, and the database 150 is used to save th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This manual provides an account login method, device, computing device, and storage medium, wherein the method includes: receiving a first authentication request for a first account within a preset security period, where the first authentication request includes the first account and password to be authenticated; Authenticate the first authentication request; if the authentication is successful, display an additional access password to the user who initiated the first authentication request, and allow the user who initiated the first authentication request to log in to the business system corresponding to the first account; For a non-first-time authentication request of an account, the user who initiates the non-first-time authentication request is prompted to provide authentication items, and the authentication item includes at least an additional access password; the non-first-time authentication request is authenticated according to the additional access password provided by the user who initiated the non-first-time authentication request ; If the authentication is successful, the user who initiated the non-first authentication request is allowed to log in to the business system corresponding to the first account.

Description

technical field [0001] This specification relates to the field of information technology, and in particular to an account login method, device, computing device and storage medium. Background technique [0002] In computer system design, security policies are largely designed for password protection. Almost all account security policies focus on enhancing the complexity of passwords, enhancing the complexity of account authentication processes, and restricting user authentication environments. This strategy can ensure that the password of the system account is not easy to be stolen or exhaustively obtained by automated test scripts. However, this traditional technology cannot restrict other people who know the account password from logging in to the account when the user's password is guessed by others, or the real user of the account has not changed the password in time after telling others the password, or the user cannot log in to the account after someone else logs in t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3226H04L63/0815H04L63/083
Inventor 蔡淼
Owner ZHUHAI KINGSOFT ONLINE GAME TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products