Login authentication method, server and user terminal

A user terminal and login authentication technology, applied in the field of communication, can solve problems such as user login security threats

Active Publication Date: 2019-09-06
中国移动通信集团内蒙古有限公司
View PDF4 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] Then use the packet capture tool to easily capture the entire process of user terminal login, and the packet capture tool fiddler can tamper with the JSON data returned by the server, for example, change "status": "failed" in JSON format to "status": "success", successfully deceived the user terminal to log in directly to the client, which poses a considerable threat to the security of user login

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Login authentication method, server and user terminal
  • Login authentication method, server and user terminal
  • Login authentication method, server and user terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are the Some, but not all, embodiments are invented. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0050] figure 1 It is a schematic flowchart of a login authentication method provided by an embodiment of the present invention, as shown in figure 1 As shown, this embodiment provides a login authentication method, including:

[0051] S101. Receive a login request sent by a user terminal, where the login request carries preset authentication information and user iden...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a login authentication method, a server and a user terminal. The method comprises the following steps: receiving a login request sent by a user terminal, wherein the login request carries preset authentication information and user identity information encrypted according to a first preset encryption algorithm; decrypting the login request according to a first preset decryption algorithm to obtain preset authentication information and user identity information; if it is judged that the user terminal is successfully authenticated according to the user identity information, generating an authentication success message abstract according to the preset authentication information and the preset authentication success identifier, and sending the authentication success message abstract to the user terminal, so as to enable the user terminal to match the received authentication success message abstract with a local authentication success message abstract, and judging whether login is successful or not according to a matching result. The server and the user terminal are used for executing the method. According to the method, the server and the user terminal provided by the embodiment of the invention, the security of user login authentication is improved.

Description

technical field [0001] The embodiments of the present invention relate to the field of communication technologies, and in particular, to a login authentication method, a server, and a user terminal. Background technique [0002] With the continuous development of communication technology, clients in all walks of life generally use clients to open online services to users. Users can request to log in to corresponding clients through pre-registered identity information such as user names and passwords, and servers generally log in to user terminals. Authentication, in order to improve the login security, therefore, the research on the login authentication method is also more and more people's attention. [0003] Under the existing technical conditions, the general user terminal uses JSON (JavaScript Object Notation) or Extensible Markup Language (Extensible Markup Language, XML) format to transmit data between the server when logging in to the client. JSON is a lightweight dat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L63/0876H04L63/0435H04L63/123H04L9/3242H04L9/3239
Inventor 李敏捷王谱新康雅萍
Owner 中国移动通信集团内蒙古有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products