Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

A login control method and device capable of preventing violent cracking

A control method and anti-violence technology, applied in the field of anti-violence cracking login control method and device, can solve problems such as poor user experience, increased user authentication, and high complexity, so as to improve user experience, prevent brute force cracking, and prevent login The effect of the attack

Active Publication Date: 2019-05-03
蓝卓数字科技有限公司
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] The above-mentioned anti-brute force cracking methods are basically carried out from the perspective of user identity information authentication, and the user's interaction and participation are high. Therefore, although the above-mentioned anti-brute force cracking method can play a certain effect, it also improves the time when the user logs in to the system. The complexity and workload of the operation, and the more complex the verification process of user identity authentication, the higher the failure rate of user login; at the same time, from the system side, after the user fails to log in, it only uses the above-mentioned verification code-based, The conventional verification methods such as verifying pictures increase the complexity of user authentication, and do not use more intelligent means to prevent attacks
Therefore, the existing anti-brute force cracking methods have problems such as high complexity of user operations, poor user experience, and low intelligence in the means of system-side anti-brute force cracking.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A login control method and device capable of preventing violent cracking
  • A login control method and device capable of preventing violent cracking
  • A login control method and device capable of preventing violent cracking

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0069] refer to figure 1 , is a schematic flowchart of the login control method for preventing brute force cracking provided in Embodiment 1 of the present application, as shown in figure 1 As shown, the login control method for preventing brute force cracking includes the following steps:

[0070] Step 101, judging whether the user logs in to the system successfully or not.

[0071] In this application, the user is a general term for users who normally use systems such as the Industrial Internet, Information Internet, and Telecommunications Internet, and users who perform brute force cracking on the login authentication and authorization systems of these systems.

[0072] When users log in to systems such as the Industrial Internet, Information Internet, and Telecom Internet, in order to prevent their login authentication and authorization systems from being brute force cracked, and thus prevent systems such as the Industrial Internet, Information Internet, and Telecom Inter...

Embodiment 2

[0090] In Embodiment 2 of the present application, the login control method for preventing brute force cracking may further include the following processing steps:

[0091] When the user fails to log in for the first time, record the user information and / or user client information, so that when it is necessary to restrict or prohibit the user from logging in later, based on the recorded user information and / or user client information, restrict or Prohibit users and / or user clients from logging into the system.

[0092] For example and not limitation, the user information may be a user account, and the user client information may be an IP (Internet Protocol Address, Internet Protocol Address) of the user client.

[0093] When the user fails to log in for the first time, user information and / or user client information can be recorded, such as user account number and / or user client IP, etc. Based on the recorded user information and / or user client information, restrict / prohibit ...

Embodiment 3

[0096] refer to image 3 Shown is a schematic flowchart of a login control method for preventing brute force cracking. In Embodiment 3 of the present application, the login control method for preventing brute force cracking may further include the following steps:

[0097] Step 101', accepting the elevator parameters configured by the administrator for the authenticated elevator, so that based on the elevator parameters configured by the administrator, the login control of preventing brute force cracking is performed on the user;

[0098] Wherein, the elevator parameters include at least one of the following parameters:

[0099] The number of elevator shafts, the number of login failures corresponding to each elevator shaft, and the minimum time interval allowed for re-login after login failures corresponding to each elevator shaft.

[0100] In this application, various elevator parameters such as the number of elevator shafts corresponding to the authenticated elevator, the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a login control method and device capable of preventing violent cracking. Violent cracking of a login authentication and authorization system is realized. According to the scheme of the invention, Continuous multiple login operations in the violent cracking process can be controlled based on authentication of all elevator shafts from the first to the Nth in the elevator; and finally, login operation of violent cracking can be limited or login of the violent cracking can be completely forbidden based on long limiting time required by the Nth elevator shaft. Therefore, violent cracking of the login authentication and authorization system can be effectively prevented by utilizing the scheme of the invention; In addition, relevant parameters for authenticating the elevator are configurable; a dynamic login attack prevention function is realized; Meanwhile, compared with a conventional verification mode based on a verification code, a verification picture and the like in the prior art, the method focuses on using an intelligent authentication means based on an authentication elevator at a system end to prevent attacks, a user does not need to execute complex interactive operation, the intelligent degree is high, and the user experience is effectively improved.

Description

technical field [0001] The invention belongs to the application fields of industrial Internet, information Internet and telecommunication network, and in particular relates to a login control method and device for preventing brute force cracking. Background technique [0002] In the field of industrial Internet, there are many problems that the login authentication and authorization systems of industrial Internet applications and industrial Internet operating system platforms are cracked and attacked by violence. Therefore, it is necessary to take corresponding measures to prevent the login authentication and authorization systems from being cracked by violence, so as to avoid the industrial Internet system. login attacks and leakage of user information. [0003] The traditional way to prevent brute force cracking is to add a verification code on the front-end login page of the system; in the widely used JWT (Json Web Token, Json Web Token) authentication mode, if the client...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L29/06
Inventor 顾静军谭彰汪月林张静杨明明
Owner 蓝卓数字科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products