A login authentication method, server and user terminal

A user terminal and login authentication technology, which is applied in the communication field, can solve problems such as user login security threats, and achieve the effect of improving login authentication security

Active Publication Date: 2022-05-10
中国移动通信集团内蒙古有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] Then use the packet capture tool to easily capture the entire process of user terminal login, and the packet capture tool fiddler can tamper with the JSON data returned by the server, for example, change "status": "failed" in JSON format to "status": "success", successfully deceived the user terminal to log in directly to the client, which poses a considerable threat to the security of user login

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A login authentication method, server and user terminal
  • A login authentication method, server and user terminal
  • A login authentication method, server and user terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are the Some, but not all, embodiments are invented. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0050] figure 1 It is a schematic flowchart of a login authentication method provided by an embodiment of the present invention, as shown in figure 1 As shown, this embodiment provides a login authentication method, including:

[0051] S101. Receive a login request sent by a user terminal, where the login request carries preset authentication information and user iden...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Embodiments of the present invention provide a login authentication method, a server and a user terminal. The method includes: receiving a login request sent by a user terminal, the login request carrying preset authentication information and user identity information encrypted according to a first preset encryption algorithm; decrypting the login request according to the first preset decryption algorithm to obtain Preset authentication information and user identity information; if it is determined that the user terminal is successfully authenticated according to the user identity information, then according to the preset authentication information and the preset authentication success identifier, a digest of the successful authentication message is generated, and the digest of the successful authentication message is sent to the user terminal , so that the user terminal matches the received authentication success message digest with the local authentication success message digest, and judges whether the login is successful according to the matching result. The server and user terminal are used to execute the above method. The method, server and user terminal provided by the embodiment of the present invention improve the security of user login authentication.

Description

technical field [0001] The embodiments of the present invention relate to the field of communication technologies, and in particular, to a login authentication method, a server, and a user terminal. Background technique [0002] With the continuous development of communication technology, clients in all walks of life generally use clients to open online services to users. Users can request to log in to corresponding clients through pre-registered identity information such as user names and passwords, and servers generally log in to user terminals. Authentication, in order to improve the login security, therefore, the research on the login authentication method is also more and more people's attention. [0003] Under the existing technical conditions, the general user terminal uses JSON (JavaScript Object Notation) or Extensible Markup Language (Extensible Markup Language, XML) format to transmit data between the server when logging in to the client. JSON is a lightweight dat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L9/32
CPCH04L63/0876H04L63/0435H04L63/123H04L9/3242H04L9/3239
Inventor 李敏捷王谱新康雅萍
Owner 中国移动通信集团内蒙古有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products