A method and system for user login verification and security detection based on domestic CPU

A technology of login verification and detection method, applied in the computer field, can solve the problems of destroying the normal authentication process of the system, affecting the user experience, illegal interception of authentication marks, etc., so as to improve the security detection mechanism, realize free customization, and improve the security of use. Effect

Active Publication Date: 2022-04-12
SHANDONG LANGCHAO YUNTOU INFORMATION TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If this solution does not provide an additional security authentication mechanism, there will be some problems that affect the user experience, such as the current authentication logo invalidation and the need to log in again; Access requests disrupt the normal authentication process of the system, resulting in system security issues
[0003] For the above problems, if the valid time of the unified authentication logo is shortened in order to improve security, frequent login failures and re-logins will seriously affect the user experience. On the contrary, if the valid time of the same authentication logo is extended for better user experience, there is There may be security issues caused by the illegal interception of the authentication logo

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for user login verification and security detection based on domestic CPU

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The present invention will be further described below in conjunction with accompanying drawing and specific embodiment, so that those skilled in the art can better understand the present invention and can be implemented, but the embodiment given is not as the limitation of the present invention, in the case of no conflict Next, the embodiments of the present invention and the technical features in the embodiments can be combined with each other.

[0036] It should be understood that in the description of the embodiments of the present invention, words such as "first" and "second" are only used to distinguish the purpose of description, and cannot be understood as indicating or implying relative importance, nor can they be understood as indicating or imply order. "Multiple" in the embodiments of the present invention refers to two or more.

[0037] The term "and / or" in the embodiment of the present invention is only an association relationship describing associated obje...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a user login verification and security detection method and system based on a domestic CPU. The method of the invention includes S1, the client requests a Token identification from the server through the login information; S2, the client receives the Token sent by the server Identify and save locally on the client; S3. The client obtains the Assist auxiliary identifier through the third-party verification interface of the server through the requested Token; S4. The client receives the Assist auxiliary identifier and saves it locally on the client. The system of the present invention includes a client and a server. In addition to the authentication logo, the present invention is also provided with an auxiliary logo, so that the authentication logo on the current login device can be kept in a long-term valid state, and the client can avoid the state of frequent login authentication caused by authentication failure and improve user experience.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a user login verification and safety detection method and system based on a domestic CPU. Background technique [0002] In the existing application software or service website, the user's account and password are used to log in to verify the identity, so as to realize the security authentication functions such as user login and user rights management. When the user logs in successfully, a unified authentication logo is issued, and the user obtains access to the system. If this solution does not provide an additional security authentication mechanism, there will be some problems that affect the user experience, such as the current authentication logo invalidation and the need to log in again; The access request destroys the normal authentication process of the system, thus causing system security problems. [0003] For the above problems, if the valid time of the unified authe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L9/32
CPCH04L63/0807H04L9/3213
Inventor 王井
Owner SHANDONG LANGCHAO YUNTOU INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products