Login method and system

A login method and login system technology, applied in the transmission system, electrical components, user identity/authority verification, etc., to achieve the effect of improving login security and improving technical effects

Inactive Publication Date: 2021-03-19
北京英迈琪科技有限公司
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the current authentication method always has the security threat of attackers forging or stealing the user's identity credentials to log in

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Login method and system
  • Login method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The technical solutions in the embodiments of the present invention are clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are part of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without making creative efforts belong to the protection scope of the present invention.

[0020] Such as figure 1 As shown, the present application provides a login system, including: at least one client and a server.

[0021] Wherein, at least one client 110: is used to send login information; receives and executes a verification data acquisition instruction, and sends the obtained verification data to the server.

[0022] Server 120: for performing the following steps:

[0023] Receive login information, wherein the login information at least includ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a login method and system, and the system comprises at least one client and a server. At least one client is used for sending login information, receiving and executing a verification data acquisition instruction, and sending the acquired verification data to the server; the server is used for executing the following steps: receiving the login information, wherein the logininformation at least comprises basic information and real-time information; determining a verification mode according to the login information; calling at least one verification model according to the verification mode, and processing the obtained verification data through the verification model to generate a verification result; and generating a login result according to the verification result,the login result being login failure or login success. The method and the device have the technical effects that the login risk is dynamically recognized, and further management and control measuresare realized according to the login risk, so that the login security is improved.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to a login method and system thereof. Background technique [0002] With the development of Internet of Things technology, various Internet of Things applications are becoming more and more extensive. When a user uses various network applications, the application provider usually requires the user to register the application with a username and password. However, the user name and password are extremely easy to leak, and other people may perform various illegal operations after obtaining the user's user name and password to log in to the application. [0003] In addition, in order to ensure the security of identity authentication, various authentication methods such as user name / password, digital certificate, biometric feature and dynamic password are also provided in different identity authentication systems. However, the current authentication method always has the s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/32H04L63/08H04L63/107H04L2463/082
Inventor 徐小君
Owner 北京英迈琪科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products