WO2018113690A1 - 登录授权方法和装置、登录方法和装置 - Google Patents

登录授权方法和装置、登录方法和装置 Download PDF

Info

Publication number
WO2018113690A1
WO2018113690A1 PCT/CN2017/117397 CN2017117397W WO2018113690A1 WO 2018113690 A1 WO2018113690 A1 WO 2018113690A1 CN 2017117397 W CN2017117397 W CN 2017117397W WO 2018113690 A1 WO2018113690 A1 WO 2018113690A1
Authority
WO
WIPO (PCT)
Prior art keywords
login
terminal
authorization
terminal identifier
credential
Prior art date
Application number
PCT/CN2017/117397
Other languages
English (en)
French (fr)
Inventor
王宇
许鑫城
王虎
王晖
孙丰静
孙善鹏
Original Assignee
腾讯科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 腾讯科技(深圳)有限公司 filed Critical 腾讯科技(深圳)有限公司
Publication of WO2018113690A1 publication Critical patent/WO2018113690A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations

Definitions

  • the present application relates to the field of computer security technologies, and in particular, to the field of login technologies, and in particular, to a login authorization method and apparatus, a login method, and an apparatus.
  • the login is an important means for verifying the identity of the user. After the user sends a login request to the server through the terminal device, the server verifies the identity of the user, so that the user obtains the permission to perform the operation by the verified identity.
  • the current common login method is to enter the user account and user password to log in.
  • the embodiment of the present application provides a login authorization method and device, a login method, and a device, which can implement fast login, ensure the convenience of login, and take into account the security of login to a certain extent.
  • a login authorization method including:
  • the login authorization is performed corresponding to the terminal identifier
  • the updated login credentials are delivered to the terminal.
  • a login authorization device includes a processor and a memory having stored thereon computer readable instructions that are executed by the processor to perform the following operations:
  • the login authorization is performed corresponding to the terminal identifier
  • the updated login credentials are delivered to the terminal.
  • a login method including:
  • a login device includes a processor and a memory having stored thereon computer readable instructions that are executed by the processor to perform the following operations:
  • a login authorization method for a server includes a processor and a memory, and the method includes:
  • the login authorization is performed corresponding to the terminal identifier
  • the updated login credentials are delivered to the terminal.
  • a login method is used on a terminal, the terminal includes a processor and a memory, and the method includes:
  • a non-volatile storage medium having stored therein computer readable instructions executable by a processor to perform the following operations:
  • the login authorization is performed corresponding to the terminal identifier
  • the updated login credentials are delivered to the terminal.
  • a non-volatile storage medium having stored therein computer readable instructions executable by a processor to perform the following operations:
  • FIG. 1 is an application environment diagram of a login authorization method and a login method in an embodiment
  • FIG. 2 is a schematic diagram showing the internal structure of a server in an embodiment
  • FIG. 3 is a schematic diagram showing the internal structure of a terminal in an embodiment
  • FIG. 4 is a schematic flowchart of a login authorization method in an embodiment
  • FIG. 5 is a schematic flowchart of a step of performing login authorization by using a user intervention mode when a login request does not carry login credentials in an embodiment
  • FIG. 6 is a schematic flowchart of a step of obtaining user input type check data and a terminal identifier according to a login request and performing verification according to user input type check data when the login request does not carry the login credential in an embodiment
  • FIG. 7 is a schematic flowchart of a step of performing login authorization corresponding to a terminal identifier when the extracted login credentials are consistent with the queried login credentials in an embodiment
  • FIG. 8 is a schematic flow chart of a login method in an embodiment
  • FIG. 9 is a schematic flowchart of a step of using a user intervention mode to log in when a login credential is not stored locally in an embodiment
  • FIG. 10 is a schematic diagram of a login page in a specific application scenario
  • FIG. 11 is a structural block diagram of a login authorization device in an embodiment
  • FIG. 12 is a structural block diagram of a login authorization device in another embodiment
  • Figure 13 is a block diagram showing the structure of a login device in an embodiment
  • Figure 14 is a block diagram showing the structure of a login device in another embodiment.
  • the browser may provide a function of automatically saving the user account and the user password. Through this function, when the user enters the login interface, the browser can automatically input the user account and the user password, thereby achieving quick login.
  • FIG. 1 is an application environment diagram of a login authorization method and a login method in an embodiment.
  • the login authorization method and login method are applied to a login system including a terminal 110, a mobile terminal 120, an electronic device 130, and a server 140.
  • Terminal 110, mobile terminal 120, and electronic device 130 can each be connected to server 140 via a network.
  • Terminal 110 can be a personal computer or another mobile terminal that is distinct from mobile terminal 120.
  • Terminal 110 and mobile terminal 120 may be held by the same or different personnel, such as a programmer.
  • the electronic device 130 is held by an administrator.
  • the login system can be applied to the login of the program development platform.
  • FIG. 2 is a schematic diagram showing the internal structure of the server 140 in one embodiment.
  • the server 140 includes a processor, a non-volatile storage medium, an internal memory, and a network interface connected by a system bus.
  • the non-volatile storage medium of the server 140 stores an operating system, a database, and a login authorization device.
  • the database stores the correspondence between the terminal identifier and the login credentials, the correspondence between the login credentials and the user account, and the correspondence between the user account and the administrator account.
  • the login authorization device is used to implement a login authorization method.
  • the processor of the server 140 is used to provide computing and control capabilities to support the operation of the entire server 140.
  • the internal memory of the server 140 provides an environment for the operation of a login authorization device in a non-volatile storage medium, and the internal memory can store computer readable instructions that, when executed by the processor, can cause the processor Perform a login authorization method.
  • the network interface of the server 140 is used for network communication with the outside, such as receiving a login request sent by the terminal 110, feeding back login credentials to the terminal 110, and the like.
  • the server 140 can be implemented by a stand-alone server or a server cluster composed of a plurality of servers.
  • the structure shown in FIG. 2 is only a block diagram of a part of the structure related to the solution of the present application, and does not constitute a limitation on the server to which the solution of the present application is applied.
  • the specific server may include more or as shown in the figure. Fewer parts, or some parts, or different parts.
  • FIG. 3 is a schematic diagram showing the internal structure of the terminal 110 in one embodiment.
  • the terminal 110 includes a processor, a non-volatile storage medium, an internal memory, a network interface, a display screen, and an input device connected by a system bus.
  • the non-volatile storage medium of the terminal 110 stores an operating system, and also stores a login device.
  • the login device is used to implement a login method.
  • the processor of terminal 110 is used to provide computing and control capabilities to support the operation of the entire terminal 110.
  • the internal memory in the terminal 110 provides an environment for the operation of the login device in the non-volatile storage medium.
  • the internal memory can store computer readable instructions that, when executed by the processor, cause the processor to perform a login method.
  • the network interface of the terminal is used for network communication with the server, such as sending a login request or receiving login credentials.
  • the display screen of the terminal 110 may be a liquid crystal display or an electronic ink display.
  • the input device of the terminal 110 may be a touch layer covered on the display screen, or may be a button, a trackball or a touchpad disposed on the outer casing of the terminal 110. It can be an external keyboard, trackpad or mouse.
  • the terminal 110 may be a personal computer or a mobile terminal, and the mobile terminal includes at least one of a mobile phone, a tablet computer, a personal digital assistant, or a wearable device. The structure shown in FIG.
  • 3 is only a block diagram of a part of the structure related to the solution of the present application, and does not constitute a limitation on the terminal to which the solution of the present application is applied.
  • the specific terminal may include more than the figure or Fewer parts, or some parts, or different parts.
  • FIG. 4 is a schematic flow chart of a login authorization method in an embodiment. This embodiment is mainly illustrated by the method being applied to the server 140 in FIG. 1 described above. Referring to FIG. 4, the login authorization method specifically includes the following steps:
  • the terminal may trigger a login request through a browser running on the terminal or through a non-browser application, and send the login request to the server, which is received by the server.
  • the login request is a request for requesting login authorization for the terminal that initiated the login request.
  • the login credential and the terminal identifier are extracted from the login request, where the extracted login credential is generated by the server and delivered to the terminal when the terminal completes the login authorization.
  • the terminal when generating the login request, the terminal adds the login credential stored locally by the terminal and the terminal identifier of the terminal to the login request, and sends the login credential to the server; after receiving the login request sent by the terminal, the server extracts the login request from the login request.
  • Login credentials and terminal ID The login credentials and the terminal identifier can be encrypted, and the login credentials and the terminal identifier are obtained after decryption by the server.
  • the login request may further include, for example, an identifier of the browser (UA), an IP address of the terminal, and the like.
  • the terminal identifier is used to uniquely identify the terminal, and may be a MAC (Media Access Control) address of the terminal or an International Mobile Equipment Identity (IMEI).
  • the login credentials are data used to verify the identity of the user. The login credentials are different from the user account and user password, and the login credentials change each time the login is authorized.
  • the login credential may be a random number, and may be a random number of a fixed length, or a random number whose length exceeds a preset value and whose length is not constant.
  • the login credentials correspond to the user account, and the login credentials for different user accounts are different.
  • the login permissions corresponding to the login credentials corresponding to different user accounts are different.
  • the terminal can store the user account corresponding to the login credentials.
  • a user account corresponds to a unique login credentials. There may be more than one login credential on the terminal. In this case, each login credential corresponds to a different user account.
  • the terminal when the terminal initiates the login request, if there is only one login credential corresponding to the user account, the login request is directly generated according to the login credential and the terminal identifier corresponding to the one user account.
  • the user may log in to multiple accounts through the browser.
  • the terminal initiates the login request, if there are multiple login credentials corresponding to the user account on the terminal, multiple users are displayed.
  • the account corresponding to the option after the user selects the account that he wants to log in, for example, after clicking the option, the terminal obtains the user's selection instruction, and obtains the user account of one of the options selected by the selection instruction, according to the user account corresponding to the option.
  • the corresponding login credential and terminal identifier generate a login request. S406. Query the login credentials generated and stored when the login authorization is completed last time corresponding to the terminal identifier.
  • the server when the user logs in to the server through the terminal and completes the login authorization by the server, the server generates a corresponding login credential, and the server stores the login credential and the terminal identifier on the server.
  • the login credentials and the terminal ID can correspond to the database or file stored on the server.
  • the server receives the login request sent by the terminal, after extracting the login credential and the terminal identifier, the server directly queries the login credential corresponding to the extracted terminal identifier.
  • the login authorization is performed corresponding to the terminal identifier.
  • the server authenticates based on the extracted login credentials and terminal identity.
  • the server compares the extracted login credentials with the logged login credentials corresponding to the terminal identifier, and determines whether the extracted login credentials are consistent with the queried login credentials.
  • the server performs login authorization on the terminal corresponding to the terminal identifier, so that the terminal has the logged-in right corresponding to the login credential, for example, in the end user.
  • the user may have permission to send articles, reply to other users, and modify the configuration of the public number.
  • the authentication fails and the login authorization is denied.
  • the terminal may be notified to delete the terminal.
  • the corresponding login credentials on . This step can be achieved, for example, by performing the following steps.
  • the server may encrypt the terminal identifier, the fixed length random number, and the current time into a character string, and encrypt it by the message digest algorithm fifth edition (MD5) to generate a new login credential, the new login credential and the former
  • MD5 message digest algorithm fifth edition
  • the login credentials generated and stored when the login authorization is completed are different.
  • the server replaces the login credentials generated and stored when the login authorization was completed corresponding to the terminal identifier with the generated new login credentials, and updates the login credentials.
  • the server sends the updated login credential to the terminal that initiates the login request, so that the terminal updates the login credential stored on the terminal to the login credential delivered by the server.
  • the terminal can store the login credentials by the browser or non-browser application that initiated the login request.
  • the terminal may delete the login credential when the login credential exceeds the preset duration and is not updated.
  • the previous login credentials are used and the login is combined with the terminal identifier. If the server completes the login authorization, the updated login credentials are sent to the terminal for the next login of the terminal. use. In this way, when the user logs in, it is not necessary to input the user account and the user password frequently, and the fast login can be realized on the same terminal, thereby ensuring the convenience of login. Moreover, even if the login credentials issued by the previous login are leaked, the login credentials are updated when the user logs in again, so the security is further improved.
  • the login authorization method further includes the step of performing login authorization by using a user intervention manner when the login request does not carry the login credentials.
  • the step of using the user intervention mode to perform login authorization includes the following steps:
  • the server determines whether the login request carries the login credentials. If the login request carries the login credentials, the server proceeds to step S404. If the login request does not carry the login credentials, for example, the user logs in for the first time or the user clears the browser cookie, step S502 is performed.
  • the user input type verification data refers to verification data that can be input by the user, such as a user account and a user password.
  • the user input type verification data may be a user account and a user password.
  • the server may extract the user account, the user password, and the terminal identifier from the login request, and perform verification according to the extracted user account and the user password.
  • the server performs verification according to the extracted user account and the user password
  • the user password corresponding to the user account on the server may be queried, and the extracted user password is compared with the queried user password. If the comparison result is consistent, the verification is passed. If the comparison result is inconsistent, the verification fails.
  • the server when the server passes the verification, the server performs login authorization, generates a new login credential, stores the new login credential and the terminal identifier on the server, and delivers the currently generated login credential to the terminal. Causes the terminal to store the login credentials. Further, when the server fails to pass the verification, the server may feed back the notification of the login failure to the terminal.
  • the terminal when the login credential is missing on the terminal, so that the terminal cannot perform fast login through the login credential, the terminal can also complete the login authorization by using the user input type verification data.
  • the login authorization is completed, the login credentials are generated and sent to the terminal, and the terminal can then log in quickly by using the login credentials.
  • step S502 specifically includes the following steps:
  • the server can directly extract the terminal identifier from the login request.
  • the barcode is a graphic of the recoverable character obtained by encoding the character according to a preset rule, and the barcode may include a one-dimensional barcode and a two-dimensional barcode (2-Dimensional Bar Code).
  • a one-dimensional bar code is a graphic identifier that expresses a set of information by arranging a plurality of black bars and spaces of unequal widths according to a certain encoding rule.
  • the two-dimensional barcode is abbreviated as a two-dimensional code, which is a bar code for recording data symbol information by using a certain geometric pattern in a two-dimensional direction of a plane according to a certain rule.
  • S606 Send the barcode to the terminal and display, so that the mobile terminal that logs in with the user account collects the barcode and parses the verification address.
  • the server uses a preset barcode encoding manner to encode the check address corresponding to the terminal identifier into a barcode, and sends the barcode to the terminal, and the barcode is displayed by the terminal.
  • the user logs in the mobile terminal with the user account, and collects the barcode displayed by the terminal by scanning the barcode displayed by the terminal on the camera on the mobile terminal, and the mobile terminal parses the verification address from the barcode.
  • the check address may be in the form of a URL (Uniform Resource Locator).
  • the mobile terminal sends a login authorization page request carrying the user account to the server according to the check address.
  • the server receives the login authorization page request, extracts the user account from the user account, and feeds back to the mobile terminal a login authorization page corresponding to the user account.
  • the mobile terminal acquires a login confirmation command triggered in the login authorization page, for example, receives a confirmation button in the user clicking the login authorization page, triggers a login authorization notification according to the login confirmation instruction, and sends the login authorization notification to the server. If the server receives the login authorization notification sent by the mobile terminal, it indicates that the verification is passed.
  • the login authorization notification in this embodiment is user input type verification data.
  • the mobile terminal scans the barcode on the terminal to implement convenient login, and when the login authorization is completed, the server generates the login credentials and sends the login credentials to the terminal, so that the terminal can perform the quick login through the login credentials.
  • the login authorization method further includes: when the verification passes, acquiring location information of the terminal and corresponding to the terminal identification record; step S408 includes: extracting location information of the terminal from the login request; and extracting the location information Matching with the recorded location information, and the extracted login credentials are consistent with the queried login credentials, the login authorization is performed corresponding to the terminal identifier.
  • the location information is information indicating the location of the terminal, and may be an IP (Internet Protocol) segment or a geographic location coordinate.
  • the geographic coordinates can be expressed in terms of longitude and latitude of the location of the terminal.
  • the geographic location coordinates can be reported by the terminal or calculated based on the IP address of the terminal.
  • the extracted location information matches the recorded location information, which may be the same or the difference is within a preset range. When the extracted location information does not match the recorded location information and/or the extracted login credentials are inconsistent with the queried login credentials, the login authorization is denied.
  • the login credential is used for verification, but also the matching of the location information of the two adjacent logins is used for verification, and the illegal login may be avoided due to the loss of the terminal, thereby further improving the security.
  • step S408 includes the following steps:
  • the server may store a correspondence between the user account and the login credentials, and store a correspondence between the user account and the administrator account.
  • the correspondence between the user account and the administrator account is used to indicate the relationship between the administrator and the managed user.
  • the server determines that the extracted login credential is consistent with the queried login credential, the server queries the user account corresponding to the login credential, and queries the administrator account corresponding to the user account, thereby registering the e-mail with the administrator account.
  • the device sends a login notification.
  • the electronic device can be a personal computer, a mobile terminal, or a dedicated device.
  • the electronic device may obtain the user account corresponding to the login credential carried by the login request according to the login notification, display the user account and/or the user information corresponding to the user account, and display the permission.
  • Authorized options and options to deny authorization may be obtained.
  • the electronic device can detect a user's selection operation of the displayed option, select an option to grant authorization, or an option to deny authorization.
  • the electronic device sends an authorization command to the server, and the authorization command is received by the server.
  • the electronic device sends a reject login command to the server, which is received by the server.
  • the user here is, for example, a manager who manages the end user.
  • the electronic device obtains the user account according to the login notification, and specifically obtains the user account from the login notification, or requests the server to obtain the user account.
  • the server may also request from the server to obtain user information corresponding to the user account.
  • User information such as user name, user position, and user's department.
  • the server after receiving the authorization command sent by the electronic device, the server performs login authorization on the terminal that initiates the login request. If the server receives the reject login command, or does not receive the feedback from the electronic device for more than the predetermined duration, the server refuses to log in to the terminal.
  • the login security is ensured by the changed login credentials, but also the login of the user is uniformly managed by the electronic device logged in by the administrator account, thereby further improving the security of the login.
  • the user account is, for example, a program developer account
  • the administrator account is, for example, an account for managing a program development project, and ensures the security and convenience of login when developing the program.
  • the method further includes: receiving a downlink command sent by the electronic device for the terminal identifier; canceling the login authorization corresponding to the terminal identifier according to the offline command, and registering the login corresponding to the terminal identifier The credentials are cleared.
  • the electronic device may store the terminal identifier that is authorized by the login, or query the terminal identifier that is authorized by the login from the server.
  • the electronic device can detect the selection operation, select the terminal identifier according to the selection operation, initiate a downline command for the selected terminal identifier, and send the offline command to the server.
  • the server may cancel the login authorization for the terminal corresponding to the terminal identifier, and clear all login credentials corresponding to the terminal identifier, or only the login credentials used for the current login corresponding to the terminal identifier.
  • the electronic device corresponding to the administrator account can directly control the offline terminal after login to prevent the electronic device from being used by a malicious user.
  • the login authorization method further includes: receiving an operation request of the terminal-specified request specifying operation; acquiring user input type verification data according to the operation request; according to the user The input type verification data is verified; when the verification is passed, the specified operation requested by the operation request is executed.
  • the terminal can request two types of operations.
  • One type of operation can be directly responded by the server after the terminal initiates, and the operation result can be fed back to the terminal if necessary.
  • the terminal needs to authorize the specified operation by the user in a user intervention manner when initiating the specified operation.
  • the specified action can be a sensitive operation that can have a significant impact, such as a bulk message. Whether the operation is preconfigured for the specified operation.
  • the server can feed back the corresponding operation result to the terminal after performing the specified operation. When the server performs verification according to the user input type check data and the check fails, the server may feed back the message that the operation fails.
  • the user input type verification data may be a user account and a user password.
  • the server may extract the user account, the user password, and the terminal identifier from the operation request, and perform verification according to the extracted user account and the user password.
  • the server performs verification according to the extracted user account and the user password
  • the user password corresponding to the user account on the server may be queried, and the extracted user password is compared with the queried user password. If the comparison result is consistent, the verification is passed. If the comparison result is inconsistent, the verification fails.
  • the server may obtain the barcode of the terminal according to the operation request, generate a barcode corresponding to the identifier of the terminal, and send the barcode to the terminal and display the barcode, and the mobile terminal that is logged in by the user account collects the barcode and parses the verification address.
  • the server passes the verification when receiving the operation authorization notification initiated by the mobile terminal according to the verification address.
  • the user intervention mode is used for verification, and the specified operation is performed after the verification is passed, thereby further ensuring security.
  • FIG. 8 is a schematic flowchart of a login method in an embodiment. This embodiment is mainly illustrated by the application of the login method to the terminal 110 in FIG. 1. Referring to FIG. 8, the login method specifically includes the following steps:
  • the terminal acquires a terminal identifier local to the terminal.
  • the terminal can store, by using a browser or a non-browser application, the login credentials sent by the server when the previous login authorization is completed.
  • the first login request that carries the login credential and the terminal identifier is sent to the server, so that the server performs login authorization after the login credential and the terminal identifier are successfully authenticated.
  • the server extracts the login credential and the terminal identifier from the first login request, and the extracted login credential is generated and delivered to the terminal when the terminal completes the login authorization.
  • the server queries the login credentials generated and stored when the previous login authorization is completed corresponding to the terminal identifier.
  • the server performs login authorization corresponding to the terminal identifier.
  • the server may determine that the authentication succeeds when both the login credential and the terminal identifier carried by the first login request are recorded on the server. In an embodiment, the server may also determine that the authentication succeeds when the login credential and the terminal identifier carried by the first login request are both recorded on the server and the corresponding relationship exists.
  • the login credential issued by the previous time is used and the login is combined with the terminal identifier.
  • the server will issue the updated login credential for the next login.
  • the method further includes the step of logging in by user intervention when the login credentials are not stored locally.
  • the step of using the user intervention mode to log in when the login credentials are not stored locally includes the following steps:
  • the second login request carrying the terminal identifier is generated, and the second login request is sent to the server.
  • S906 Display a barcode, so that the mobile terminal that logs in with the user account collects the barcode and parses the verification address, and sends a login authorization notification to the server according to the verification address, so that the server performs login authorization after receiving the login authorization notification.
  • the terminal when the login credential is missing on the terminal, so that the terminal cannot perform fast login through the login credential, the terminal can also complete the login authorization by using the user input type verification data.
  • the login authorization is completed, the login credentials are generated and sent to the terminal, and the terminal can then log in quickly by using the login credentials.
  • the login method further includes: when requesting the specified operation, sending an operation request carrying the terminal identifier to the server. Receive the barcode that the server feeds back according to the operation request. The barcode is displayed, so that the mobile terminal that logs in with the user account collects the barcode and parses the verification address, and sends a login authorization notification to the server according to the verification address, so that the server performs the specified operation after receiving the login authorization notification.
  • the user intervention mode is used for verification, and the specified operation is performed after the verification is passed, thereby further ensuring security.
  • the user A logs in on the terminal, and the terminal stores the login credentials issued by the server when the previous login of the user A is completed.
  • User B has not logged in on the terminal, and the terminal does not store the login credentials of User B.
  • the terminal can be logged in by User A and User B.
  • User A or User B accesses a login page as shown in FIG. 10, in which a quick login button 1001 corresponding to User A is displayed.
  • the user account input box 1002, the user password input box 1003, and the login button 1004 may also be displayed in the login page, or the two-dimensional code 1005 for login may be displayed.
  • User A can directly log in by clicking the quick login button.
  • User B can enter the user account in the account input box 1002, enter the user password in the user password input box 1003, and click the login button 1004 to complete the login.
  • User B can also use the mobile phone to scan the QR code 1005 to log in.
  • the terminal obtains the login credentials sent by the server and stores it locally.
  • the login page displays a quick login button corresponding to user A and user B.
  • FIG. 11 is a block diagram showing the structure of the login authorization device 1100 in one embodiment.
  • the login authorization apparatus 1100 includes a login request processing module 1101, a login credential query module 1102, a login authorization module 1103, and a login credential management module 1104.
  • the login request processing module 1101 is configured to receive a login request sent by the terminal, and extract the login credential and the terminal identifier from the login request, where the extracted login credential is generated and delivered to the terminal when the terminal completes the login authorization.
  • the login credential query module 1102 is configured to query the login credential generated and stored when the login authorization is completed last time corresponding to the terminal identifier.
  • the login authorization module 1103 is configured to perform login authorization corresponding to the terminal identifier when the extracted login credentials are consistent with the queried login credentials.
  • the login credential management module 1104 is configured to update the stored login credential corresponding to the terminal identifier; and send the updated login credential to the terminal.
  • the login authorization module 1103 is further configured to: when the login request does not carry the login credential, obtain the user input type verification data and the terminal identifier according to the login request, and perform verification according to the user input type verification data; When the verification is passed, the login authorization is performed corresponding to the terminal identifier, and the login credentials corresponding to the terminal identifier are generated and stored, and the currently generated login credentials are sent to the terminal.
  • the login authorization module 1103 is further configured to: acquire a terminal identifier according to the login request; generate a barcode corresponding to the terminal identifier; send the barcode to the terminal and display, so that the mobile terminal that logs in with the user account collects the barcode and parses the data. Check the address; when the mobile terminal receives the login authorization notification initiated by the verification address, the verification passes.
  • the login authorization module 1103 is further configured to acquire location information of the terminal and correspond to the terminal identification record when the verification is passed.
  • the login request processing module 1101 is further configured to extract location information of the terminal from the login request.
  • the login authorization module 1103 is further configured to: when the extracted location information matches the recorded location information, and the extracted login credentials are consistent with the queried login credentials, the login authorization is performed corresponding to the terminal identifier.
  • the login authorization module 1103 is further configured to: when the extracted login credentials are consistent with the queried login credentials, send a login notification to the electronic device corresponding to the administrator account; the administrator account and the user corresponding to the login credentials The account corresponds to; the receiving electronic device responds to the authorization command fed back by the login notification; and according to the authorization command, performs login authorization corresponding to the terminal identifier.
  • FIG. 12 is a block diagram showing the structure of the login authorization device 1100 in one embodiment.
  • the login authorization apparatus 1100 further includes: an offline processing module 1105, configured to receive a downlink command sent by the electronic device for the terminal identifier; and according to the offline command, cancel the login authorization corresponding to the terminal identifier, and The login credentials corresponding to the terminal ID are cleared.
  • the login authorization module 1103 is further configured to receive an operation request initiated by the terminal when requesting the specified operation; acquire user input type verification data according to the operation request; perform verification according to the user input type verification data; When the pass is passed, the specified operation is performed.
  • the login authorization device 1100 uses the login credentials previously issued and logs in with the terminal identifier each time the login is completed. When the login authorization is completed, the updated login credentials are issued for use in the next login. In this way, when the user logs in, it is not necessary to input the user account and the user password frequently, and the fast login can be implemented on the same terminal, which ensures the convenience of login, and the security of the login is taken into consideration to some extent. Moreover, even if the login credentials issued by the previous login are leaked, the login credentials are updated when the user logs in again, so the security is further improved.
  • FIG. 13 is a block diagram showing the structure of the login device 1300 in one embodiment.
  • the login device 1300 includes an acquisition module 1301, a sending module 1302, a receiving module 1303, and an updating module 1304.
  • the obtaining module 1301 is configured to obtain the terminal identifier of the local terminal, and obtain the locally stored login credential, which is sent by the server to the terminal when the local login is authorized by the server.
  • the sending module 1302 is configured to send a first login request that carries the login credential and the terminal identifier to the server, so that the server performs login authorization after the login credential and the terminal identifier are successfully authenticated.
  • the receiving module 1303 is configured to receive login credentials that are updated and sent when the server completes the login authorization.
  • the update module 1304 is configured to update the locally stored login credentials to the received login credentials.
  • FIG. 14 is a block diagram showing the structure of the login device 1300 in one embodiment.
  • the login device 1300 further includes a display module 1305.
  • the sending module 1302 is further configured to: when the login credential is not stored locally, send a second login request that carries the terminal identifier to the server.
  • the receiving module 1303 is further configured to receive a barcode that is fed back by the server according to the second login request.
  • the display module 1305 is configured to display a barcode, so that the mobile terminal that logs in with the user account collects the barcode and parses the verification address, and sends a login authorization notification to the server according to the verification address, so that the server performs login authorization after receiving the login authorization notification.
  • the receiving module 1303 is further configured to receive the login credential generated and sent by the server after completing the login authorization, and notify the update module to update the locally stored login credential to the received login credential.
  • the login device 1300 uses the login credential issued the previous time and logs in with the terminal identifier.
  • the login credential is issued and the updated login credential is issued for the next login.
  • the fast login can be implemented on the same terminal, which ensures the convenience of login, and the security of the login is taken into consideration to some extent.
  • the login credentials issued by the previous login are leaked, the login credentials are updated when the user logs in again, so the security is further improved.
  • the storage medium may be a non-volatile storage medium such as a magnetic disk, an optical disk, a read-only memory (ROM), or a random access memory (RAM).

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

本申请涉及一种登录授权方法和装置、登录方法和装置,该登录授权方法包括:接收终端发送的登录请求;从所述登录请求中提取登录凭据和终端标识,且提取的登录凭据在所述终端前次完成登录授权时生成并下发至所述终端;查询与所述终端标识对应的前次完成登录授权时生成并存储的登录凭据;当提取的登录凭据与查询到的登录凭据一致时,对应于所述终端标识进行登录授权;更新存储的与所述终端标识对应的登录凭据;将更新的登录凭据下发至所述终端。

Description

登录授权方法和装置、登录方法和装置
本申请要求于2016年12月23日提交中国专利局、申请号为201611208735.9、发明名称为“登录授权方法和装置、登录方法和装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及计算机安全技术领域,尤其涉及登录技术领域,特别是涉及一种登录授权方法和装置、登录方法和装置。
背景技术
登录是校验用户身份的一种重要手段,用户通过终端设备向服务器发送登录请求后,由服务器对用户身份进行校验,从而使得用户获得以通过校验的身份执行操作的权限。目前常见的登录方式为输入用户账号和用户密码进行登录的方式。
发明内容
本申请实施例提供了一种登录授权方法和装置、登录方法和装置,可以实现快速登录,保障了登录的便捷性,并一定程度上兼顾了登录的安全性。
一种登录授权方法,包括:
接收终端发送的登录请求;
从所述登录请求中提取登录凭据和终端标识,其中所提取的登录凭据是在所述终端前次完成登录授权时生成并下发至所述终端的;
查询与所述终端标识对应的前次完成登录授权时生成并存储的登录凭据;
当提取的登录凭据与查询到的登录凭据一致时,对应于所述终端标识进行登录授权;
更新存储的与所述终端标识对应的登录凭据;
将更新的登录凭据下发至所述终端。
一种登录授权装置,包括:处理器和存储器,所述存储器上存储有计算机可读指令,所述计算机可读指令由所述处理器执行以完成以下操作:
接收终端发送的登录请求;
从所述登录请求中提取登录凭据和终端标识,其中所提取的登录凭据是在所述终端前次完成登录授权时生成并下发至所述终端的;
查询与所述终端标识对应的前次完成登录授权时生成并存储的登录凭据;
当提取的登录凭据与查询到的登录凭据一致时,对应于所述终端标识进行登录授权;
更新存储的与所述终端标识对应的登录凭据;
将更新的登录凭据下发至所述终端。
一种登录方法,包括:
获取终端本地的终端标识;
获取本地存储的登录凭据,所述登录凭据是在本地前次登录被服务器授权时由所述服务器下发给终端的;
向所述服务器发送携带有所述登录凭据和所述终端标识的第一登录请求,使得所述服务器根据携带的登录凭据和终端标识鉴权成功后进行登录授权;
接收所述服务器完成登录授权时更新并发送的登录凭据;
将本地存储的登录凭据更新为接收到的登录凭据。
一种登录装置,包括:处理器和存储器,所述存储器上存储有计算机可读指令,所述计算机可读指令由所述处理器执行以完成以下操作:
获取终端本地的终端标识;
获取本地存储的登录凭据,所述登录凭据是在本地前次登录被服务器授权时由所述服务器下发给终端的;
向所述服务器发送携带有所述登录凭据和所述终端标识的第一登录请求,使得所述服务器根据携带的登录凭据和终端标识鉴权成功后进行登录授权;
接收所述服务器完成登录授权时更新并发送的登录凭据;
将本地存储的登录凭据更新为接收到的登录凭据。
一种登录授权方法,用于服务器上,该服务器包括处理器和存储器,所述方法包括:
接收终端发送的登录请求;
从所述登录请求中提取登录凭据和终端标识,其中所提取的登录凭据是在所述终端前次完成登录授权时生成并下发至所述终端的;
查询与所述终端标识对应的前次完成登录授权时生成并存储的登录凭据;
当提取的登录凭据与查询到的登录凭据一致时,对应于所述终端标识进行登录授权;
更新存储的与所述终端标识对应的登录凭据;
将更新的登录凭据下发至所述终端。
一种登录方法,用于终端上,该终端包括处理器和存储器,所述方法包括:
获取终端本地的终端标识;
获取本地存储的登录凭据,所述登录凭据是在本地前次登录被服务器授权时由所述服务器下发给终端的;
向所述服务器发送携带有所述登录凭据和所述终端标识的第一登录请求,使得所述服务器根据携带的登录凭据和终端标识鉴权成功后进行登录授权;
接收所述服务器完成登录授权时更新并发送的登录凭据;
将本地存储的登录凭据更新为接收到的登录凭据。
一种非易失性存储介质,其中存储有计算机可读指令,所述计算机可读指令可以由处理器执行以完成以下操作:
接收终端发送的登录请求;
从所述登录请求中提取登录凭据和终端标识,其中所提取的登录凭据是在所述终端前次完成登录授权时生成并下发至所述终端的;
查询与所述终端标识对应的前次完成登录授权时生成并存储的登录凭据;
当提取的登录凭据与查询到的登录凭据一致时,对应于所述终端标识进行登录授权;
更新存储的与所述终端标识对应的登录凭据;
将更新的登录凭据下发至所述终端。
一种非易失性存储介质,其中存储有计算机可读指令,所述计算机可读指令可以由处理器执行以完成以下操作:
获取终端本地的终端标识;
获取本地存储的登录凭据,所述登录凭据是在本地前次登录被服务器授权时由所述服务器下发给终端的;
向所述服务器发送携带有所述登录凭据和所述终端标识的第一登录请求,使得所述服务器根据携带的登录凭据和终端标识鉴权成功后进行登录授权;
接收所述服务器完成登录授权时更新并发送的登录凭据;
将本地存储的登录凭据更新为接收到的登录凭据。
附图简要说明
图1为一个实施例中登录授权方法和登录方法的应用环境图;
图2为一个实施例中服务器的内部结构示意图;
图3为一个实施例中终端的内部结构示意图;
图4为一个实施例中登录授权方法的流程示意图;
图5为一个实施例中当登录请求未携带登录凭据时,采用用户介入方式进行登录授权的步骤的流程示意图;
图6为一个实施例中当登录请求未携带登录凭据时,则根据登录请求获取 用户输入型校验数据和终端标识,并根据用户输入型校验数据进行校验的步骤的流程示意图;
图7为一个实施例中当提取的登录凭据与查询到的登录凭据一致时,对应于终端标识进行登录授权的步骤的流程示意图;
图8为一个实施例中登录方法的流程示意图;
图9为一个实施例中当本地未存储登录凭据时采用用户介入方式进行登录的步骤的流程示意图;
图10为一个具体应用场景中登录页面的示意图;
图11为一个实施例中登录授权装置的结构框图;
图12为另一个实施例中登录授权装置的结构框图;
图13为一个实施例中登录装置的结构框图;
图14为另一个实施例中登录装置的结构框图。
实施本发明的方式
为了使本申请的目的、技术方案及优点更加清楚明白,以下结合附图及实施例,对本申请进行进一步详细说明。应当理解,此处所描述的具体实施例仅仅用以解释本申请,并不用于限定本申请。
在现有技术的通过输入用户账号和用户密码进行登录的方式中,为了避免用户频繁输入用户账号和用户密码,提高操作便捷性,浏览器可能会提供自动保存用户账号和用户密码的功能。通过该功能,当用户进入登录界面后,浏览器可以自动输入用户账号和用户密码,从而实现快速登录。
然而,用户账号和用户密码由除用户和服务器之外的浏览器保存,增加了暴露用户密码的风险,安全性较低。
图1为一个实施例中登录授权方法和登录方法的应用环境图。参照图1,该登录授权方法和登录方法应用于一种登录***,该登录***包括终端110、移动终端120、电子设备130和服务器140。终端110、移动终端120和电子设备130均可通过网络连接到服务器140。终端110可以是个人计算机或者区别于移动终 端120的另一个移动终端。终端110和移动终端120可由相同或不同的人员持有,比如程序开发人员。电子设备130由管理员持有。登录***可应用于程序开发平台的登录。
图2为一个实施例中服务器140的内部结构示意图。参照图2,该服务器140包括通过***总线连接的处理器、非易失性存储介质、内存储器和网络接口。其中,该服务器140的非易失性存储介质存储有操作***、数据库和登录授权装置。数据库中存储有终端标识和登录凭据的对应关系,登录凭据和用户账号的对应关系,以及用户账号和管理员账号的对应关系。登录授权装置用于实现一种登录授权方法。该服务器140的处理器用于提供计算和控制能力,支撑整个服务器140的运行。该服务器140的内存储器为非易失性存储介质中的登录授权装置的运行提供环境,该内存储器中可储存有计算机可读指令,该计算机可读指令被处理器执行时,可使得处理器执行一种登录授权方法。该服务器140的网络接口用于与外部进行网络通信,比如接收终端110发送的登录请求,向终端110反馈登录凭据等。服务器140可以用独立的服务器或者是多个服务器组成的服务器集群来实现。图2中示出的结构,仅仅是与本申请方案相关的部分结构的框图,并不构成对本申请方案所应用于其上的服务器的限定,具体的服务器可以包括比图中所示更多或更少的部件,或者组合某些部件,或者具有不同的部件布置。
图3为一个实施例中终端110的内部结构示意图。参照图3,该终端110包括通过***总线连接的处理器、非易失性存储介质、内存储器、网络接口、显示屏和输入装置。其中,终端110的非易失性存储介质存储有操作***,还存储有一种登录装置。该登录装置用于实现一种登录方法。终端110的处理器用于提供计算和控制能力,支撑整个终端110的运行。终端110中的内存储器为非易失性存储介质中的登录装置的运行提供环境。该内存储器中可存储有计算机可读指令,该计算机可读指令被处理器执行时,可使得处理器执行一种登录方法。终端的网络接口用于与服务器进行网络通信,如发送登录请求或接收登录凭据等。终端110的显示屏可以是液晶显示屏或者电子墨水显示屏,终端110 的输入装置可以是显示屏上覆盖的触摸层,也可以是终端110外壳上设置的按键、轨迹球或触控板,还可以是外接的键盘、触控板或鼠标等。该终端110可以是个人计算机或者移动终端,移动终端包括手机、平板电脑、个人数字助理或者穿戴式设备等中的至少一种。图3中示出的结构,仅仅是与本申请方案相关的部分结构的框图,并不构成对本申请方案所应用于其上的终端的限定,具体的终端可以包括比图中所示更多或更少的部件,或者组合某些部件,或者具有不同的部件布置。
图4为一个实施例中登录授权方法的流程示意图。本实施例主要以该方法应用于上述图1中的服务器140来举例说明。参照图4,该登录授权方法具体包括如下步骤:
S402,接收终端发送的登录请求。
具体地,终端可通过终端上运行的浏览器,或者通过非浏览器的应用程序,触发登录请求,并将登录请求发送至服务器,由服务器接收。该登录请求是用于请求对发起登录请求的终端进行登录授权的请求。
S404,从登录请求中提取登录凭据和终端标识,其中,提取的登录凭据是在终端前次完成登录授权时服务器生成并下发至终端的。
具体地,终端在生成登录请求时,将终端本地存储的登录凭据以及终端的终端标识添加到登录请求中,发送给服务器;服务器在收到终端发送的登录请求后,从该登录请求中提取出登录凭据以及终端标识。登录凭据和终端标识可经过加密,服务器提取时经过解密得到登录凭据和终端标识。所述登录请求中还可以包括例如浏览器的标识UA(User Agent)、终端的IP地址等。
其中,终端标识用于唯一标识终端,可以是终端的MAC(Media Access Control,媒体访问控制)地址或者IMEI(International Mobile Equipment Identity,国际移动设备身份码)。登录凭据是用以校验用户身份的数据。登录凭据不同于用户账号和用户密码,登录凭据在每次登录授权时会发生变化。登录凭据可以是随机数,具体可以是固定长度的随机数,也可以是长度超过预设值且长度不恒定的随机数。终端前次完成授权登录时,是指相同的用户通过本终端上一次 向服务器发送登录请求,且服务器根据该登录请求对终端进行了登录授权。
登录凭据与用户账号对应,不同的用户账号对应的登录凭据是不同的。不同用户账号各自对应的登录凭据所对应的登录后的权限是不同的。终端可将用户账号与登录凭据对应存储。终端或者服务器上,一个用户账号对应唯一的登录凭据。终端上可以存在多于一个的登录凭据,此种情况下每个登录凭据分别对应不同的用户账号。
在一个实施例中,终端在发起登录请求时,若终端上仅存在一个用户账号所对应的登录凭据时,则直接根据该一个用户账号所对应的登录凭据和终端标识生成登录请求。
在一个实施例中,用户可能通过浏览器登录过多个账号,在这种情况下,终端在发起登录请求时,若终端上存在多个用户账号所对应的登录凭据时,则显示多个用户账号各自对应的选项,在用户选择自己要登录的账号,例如点击所述选项后,终端获取用户的选择指令,获取该选择指令所选中的一个选项的用户账号,根据与该选项对应的用户账号所对应的登录凭据和终端标识生成登录请求。S406,查询与终端标识对应的前次完成登录授权时生成并存储的登录凭据。
具体地,在用户前次通过终端登录服务器并由服务器完成登录授权时,服务器会生成相应的登录凭据,服务器将该登录凭据与终端标识对应存储在服务器上。登录凭据与终端标识可对应存储在服务器上的数据库或者文件中。当此次服务器收到终端发送的登录请求时,在提取到登录凭据和终端标识后,直接从服务器查询与提取的终端标识对应的登录凭据。
S408,当提取的登录凭据与查询到的登录凭据一致时,对应于终端标识进行登录授权。
服务器根据提取的登录凭据和终端标识进行鉴权。服务器具体将提取的登录凭据与查询到的与终端标识对应的登录凭据比较,判断提取的登录凭据与查询到的登录凭据是否一致。当提取的登录凭据与查询到的登录凭据一致时,鉴权成功,则服务器对终端标识对应的终端进行登录授权,使得该终端具有了该 登录凭据所对应的登陆后的权限,例如在终端用户为一个即时通信应用的公众号的情况下,用户可以有群发文章、回复其他用户留言、修改公众号配置等权限。
当提取的登录凭据与查询到的登录凭据不一致时,鉴权失败,拒绝进行登录授权。在一个实施例中,当提取的登录凭据与查询到的登录凭据不一致时,例如,在用户没有开启Cookie、或用户清理了Cookie、或用户重装了浏览器的情况下,可通知终端删除终端上的相应登录凭据。这个步骤例如可以通过执行以下的步骤实现。
S410,更新存储的与终端标识对应的登录凭据。
具体地,服务器可以通过将终端标识、固定长度的随机数以及当前时间组合成字符串,通过消息摘要算法第五版(MD5)对其加密,生成新的登录凭据,该新的登录凭据与前次完成登录授权时生成并存储的登录凭据不同。服务器将与终端标识对应的前次完成登录授权时生成并存储的登录凭据,替换为生成的新的登录凭据,实现登录凭据的更新。
S412,将更新的登录凭据下发至终端。
具体地,服务器将更新的登录凭据下发至发起登录请求的终端,使得终端将终端上存储的登录凭据更新为服务器下发的登录凭据。终端可通过发起登录请求所用的浏览器或者非浏览器的应用程序存储登录凭据。在一个实施例中,终端可在其上登录凭据超过预设时长未更新时删除该登录凭据。
上述登录授权方法,每次用户在终端上登录时采用前一次下发的登录凭据并结合终端标识进行登录,如服务器完成登录授权则会下发更新的登录凭据给终端,供终端下次登录时使用。这样用户登录时就不必频繁输入用户账号和用户密码,在同一终端上可以实现快速登录,保障了登录的便捷性。而且,即使前次登录下发的登录凭据被泄露,但用户再次登录时登录凭据就会更新,因此安全性进一步提高。
在一个实施例,在步骤S402之后,该登录授权方法还包括当登录请求未携带登录凭据时,采用用户介入方式进行登录授权的步骤。参照图5,该当登录请 求未携带登录凭据时,采用用户介入方式进行登录授权的步骤具体包括如下步骤:
S502,当登录请求未携带登录凭据时,则根据登录请求获取用户输入型校验数据和终端标识,并根据用户输入型校验数据进行校验。
具体地,服务器在接收到终端发来的登录请求后,判断该登录请求是否携带登录凭据。若登录请求携带有登录凭据,服务器则执行步骤S404。若登录请求未携带登录凭据,例如,用户首次登录或用户清理了浏览器Cookie,则执行步骤S502。其中,用户输入型校验数据是指能够由用户输入的校验数据,如用户账号和用户密码。
在一个实施例中,用户输入型校验数据可以是用户账号和用户密码。具体地,服务器可从登录请求中提取用户账号、用户密码和终端标识,根据提取的用户账号和用户密码进行校验。服务器在根据提取的用户账号和用户密码进行校验时,具体可查询服务器上与用户账号对应的用户密码,将提取的用户密码和查询到的用户密码比较,若比较结果为一致则校验通过,若比较结果为不一致则校验未通过。
S504,当校验通过时,则对应于终端标识进行登录授权,生成与终端标识对应的登录凭据并存储,并将当前生成的登录凭据下发至终端。
具体地,服务器在校验通过时,对终端进行登录授权,生成全新的登录凭据,并在服务器上将该全新的登录凭据与终端标识对应存储,并将当前生成的登录凭据下发至终端,使得终端存储该登录凭据。进一步地,服务器在校验未通过时,可向终端反馈登录失败的通知。
本实施例中,当终端上缺失登录凭据,使得终端无法通过登录凭据进行快速登录,那么终端也可以通过用户输入型校验数据完成登录授权。而且完成登录授权时,会生成登录凭据并下发至终端,那么终端后续就可以通过登录凭据来进行快速登录。
如图6所示,在一个实施例中,步骤S502具体包括如下步骤:
S602,根据登录请求获取终端标识。
具体地,服务器可从登录请求中直接提取终端标识。
S604,生成与终端标识对应的条码。该条码用于唯一标识本次登录的信息。
其中,条码(Bar Code)是将字符按照预设规则编码得到的可还原出字符的图形,条码可以包括一维条码和二维条码(2-Dimensional Bar Code)。一维条码是将宽度不等的多个黑条和空白,按照一定的编码规则排列,用以表达一组信息的图形标识符。二维条码简称二维码,是指用某种特定的几何图形按一定规律在平面二维方向分布的图形记录数据符号信息的条码。
S606,将条码发送至终端并显示,使得以用户账号登录的移动终端采集条码并解析得到校验地址。
具体地,服务器采用预设的条码编码方式,将终端标识对应的校验地址编码形成条码,并将条码发送至终端,由终端显示该条码。用户以用户账号登录移动终端,并通过移动终端上的摄像头扫描终端所显示的条码的方式采集由终端所显示的条码,移动终端从条码中解析出校验地址。校验地址可以是URL(Uniform Resource Locator,统一资源定位符)形式。
S608,接收到移动终端根据校验地址所发起的登录授权通知时,校验通过。
具体地,移动终端根据校验地址,向服务器发送携带有用户账号的登录授权页面请求。服务器接收到登录授权页面请求,从中提取出用户账号,并向移动终端反馈与该用户账号对应的登录授权页面。移动终端获取在该登录授权页面中触发的登录确认指令,例如接收到用户点击登录授权页面中的确认键,根据该登录确认指令触发登录授权通知,并将该登录授权通知发送至服务器。服务器若接收到移动终端发送的登录授权通知,则表示校验通过。本实施例中登录授权通知是用户输入型校验数据。
本实施例中,通过移动终端扫描终端上的条码的方式实现便捷登录,而且完成登录授权时,服务器会生成登录凭据并下发至终端,那么终端后续就可以通过登录凭据来进行快速登录。
在一个实施例中,该登录授权方法还包括:当校验通过时,获取终端的位置信息并对应于终端标识记录;步骤S408包括:从登录请求中提取终端的位置 信息;当提取的位置信息与记录的位置信息匹配,且提取的登录凭据与查询到的登录凭据一致时,对应于终端标识进行登录授权。
其中,位置信息是表示终端位置的信息,可以是IP(Internet Protocol,网际协议)段,也可以是地理位置坐标。地理位置坐标可以用终端所在位置的经度和纬度表示。地理位置坐标可以由终端主动上报,也可以根据终端的IP地址计算得到。提取的位置信息与记录的位置信息匹配,可以是相同或者相差在预设范围内。当提取的位置信息与记录的位置信息不匹配和/或提取的登录凭据与查询到的登录凭据不一致时,拒绝进行登录授权。
本实施例中,不仅采用登录凭据进行校验,还结合相邻两次登录的位置信息的匹配情况进行校验,可尽量避免因终端丢失而导致非法登录,可进一步提高安全性。
如图7所示,在一个实施例中,步骤S408包括如下步骤:
S702,当提取的登录凭据与查询到的登录凭据一致时,向管理员账号所对应的电子设备发送登录通知;管理员账号与登录凭据所对应的用户账号对应。
具体地,服务器可存储用户账号和登录凭据之间的对应关系,并存储用户账号和管理员账号之间的对应关系。其中用户账号和管理员账号之间的对应关系用于表示管理员与被管理用户之间的关系。
进一步地,服务器在判断到提取的登录凭据与查询到的登录凭据一致时,查询该登录凭据对应的用户账号,并查询该用户账号对应的管理员账号,从而向以该管理员账号登录的电子设备发送登录通知。电子设备可以是个人计算机、移动终端或者专用设备。
S704,接收电子设备响应于登录通知所反馈的授权命令。
具体地,电子设备在接收到登录通知后,可根据该登录通知获取登录请求所携带的登录凭据所对应的用户账号,显示该用户账号和/或该用户账号所对应的用户信息,并显示准许授权的选项和拒绝授权的选项。
进一步地,电子设备可检测用户对显示的选项的选择操作,选中准许授权的选项或者拒绝授权的选项。当用户选中准许授权的选项时,电子设备向服务 器发送授权命令,由服务器接收该授权命令。当用户选中拒绝授权的选项时或者超过预设时长未选择时,电子设备向服务器发送拒绝登录命令,由服务器接收。此处的用户例如为管理终端用户的管理者。
其中电子设备根据登录通知获取用户账号,具体可从登录通知中获取用户账号,也可以从服务器请求以获得用户账号。服务器还可以从服务器请求以获得用户账号所对应的用户信息。用户信息如用户姓名、用户职位以及用户所在部门等。
S706,根据授权命令,对应于终端标识进行登录授权。
具体地,服务器在接收到电子设备发送的授权命令后,对发起登录请求的终端进行登录授权。服务器若接收到拒绝登录命令,或者超过预定时长未接收电子设备反馈的命令,则拒绝对终端进行登录授权。
本实施例中,不仅通过变化的登录凭据来保证登录安全,还通过以管理员账号登录的电子设备统一对用户的登录进行管理,进一步提高了登录的安全性。而且在应用到程序开发领域时,用户账号例如为程序开发人员账号,管理员账号则例如是对程序开发项目进行管理的账号,保证开发程序时登录的安全性和便捷性。
在一个实施例中,步骤S706之后,该方法还包括:接收电子设备发送的针对终端标识的下线命令;根据下线命令,取消对应于终端标识的登录授权,并将与终端标识对应的登录凭据清除。
具体地,电子设备可存储经过登录授权的终端标识,或者从服务器查询经过登录授权的终端标识。电子设备可检测选择操作,根据选择操作选中终端标识,从而发起针对该选中的终端标识的下线命令,并将下线命令发送至服务器。服务器在接收到下线命令后,可取消对终端标识所对应终端的登录授权,并且清除与终端标识对应的所有登录凭据,或者仅清除与终端标识对应的当前登录所用的登录凭据。
本实施例中,通过管理员账号所对应的电子设备,可以直接控制登录后的终端下线,防止电子设备被恶意用户使用。
在一个实施例中,步骤S408或步骤S504之后,该登录授权方法还包括:接收所述终端发起的请求指定操作的操作请求;根据所述操作请求获取用户输入型校验数据;根据所述用户输入型校验数据进行校验;当校验通过时,执行所述操作请求所请求的指定操作。
具体地,终端在登录后,可请求两种类型的操作。一种类型的操作可在终端发起后,由服务器直接响应,若需要还可以向终端反馈操作结果。对于另一种类型的操作也就是指定操作,终端在发起该指定操作时需要服务器采用用户介入方式对该指定操作进行授权。指定操作可以是能够造成重大影响的敏感操作,如群发消息。操作是否为指定操作可预先配置。服务器可在执行指定操作后,向终端反馈相应的操作结果。服务器在根据用户输入型校验数据进行校验且校验未通过时,可向终端反馈操作失败的消息。
在一个实施例中,用户输入型校验数据可以是用户账号和用户密码。具体地,服务器可从操作请求中提取用户账号、用户密码和终端标识,根据提取的用户账号和用户密码进行校验。服务器在根据提取的用户账号和用户密码进行校验时,具体可查询服务器上与用户账号对应的用户密码,将提取的用户密码和查询到的用户密码比较,若比较结果为一致则校验通过,若比较结果为不一致则校验未通过。
在一个实施例中,服务器可根据操作请求获取终端标识,生成与终端标识对应的条码,将条码发送至终端并显示,使得以用户账号登录的移动终端采集条码并解析得到校验地址。服务器在接收到移动终端根据校验地址所发起的操作授权通知时,校验通过。
本实施例中,在登录后请求指定操作时,采用用户介入方式进行校验,校验通过后执行指定操作,可进一步保证安全性。
图8为一个实施例中登录方法的流程示意图。本实施例主要以该登录方法应用于图1中的终端110来举例说明。参照图8,该登录方法具体包括如下步骤:
S802,获取本地的终端标识。
具体地,终端获取终端本地的终端标识。
S804,获取本地存储的登录凭据,所述登录凭据是在终端本地前次登录被服务器授权时由所述服务器下发的。
具体地,终端可通过浏览器或者非浏览器的应用程序,存储本地前次完成登录授权时由服务器下发的登录凭据。
S806,向服务器发送携带有登录凭据和终端标识的第一登录请求,使得服务器根据携带的登录凭据和终端标识鉴权成功后进行登录授权。
具体地,服务器从第一登录请求中提取登录凭据和终端标识,且提取的登录凭据在终端前次完成登录授权时生成并下发至终端。服务器查询与终端标识对应的前次完成登录授权时生成并存储的登录凭据。当提取的登录凭据与查询到的登录凭据一致时,服务器对应于终端标识进行登录授权。
在一个实施例中,服务器可在第一登录请求所携带的登录凭据和终端标识均记录于服务器上时,判定鉴权成功。在一个实施例中,服务器还可以在第一登录请求所携带的登录凭据和终端标识均记录于服务器上、且存在对应关系时,判定鉴权成功。
S808,接收服务器完成登录授权时更新并发送的登录凭据。
S810,将本地存储的登录凭据更新为接收到的登录凭据。
上述登录方法,每次用户在终端登录时采用前一次下发的登录凭据并结合终端标识进行登录,在服务器完成登录授权则服务器会下发更新的登录凭据,供用户下次登录时使用。这样用户登录时就不必频繁输入用户账号和用户密码,在同一终端上可以实现快速登录,保障了登录的便捷性,并一定程度上兼顾了登录的安全性。而且,即使前次登录下发的登录凭据被泄露,但用户再次登录时登录凭据就会更新,因此安全性进一步提高。
在一个实施例中,在步骤S802之后,该方法还包括当本地未存储登录凭据时采用用户介入方式进行登录的步骤。参照图9,该当本地未存储登录凭据时采用用户介入方式进行登录的步骤具体包括如下步骤:
S902,当本地未存储登录凭据时,则向服务器发送携带有终端标识的第二登录请求。
具体地,当本地未存储当前用户对应的登录凭据时,生成携带有终端标识的第二登录请求,并将第二登录请求发送至服务器。
S904,接收服务器根据第二登录请求反馈的条码。
S906,显示条码,使得以用户账号登录的移动终端采集条码并解析得到校验地址,根据校验地址向服务器发送登录授权通知,使得服务器在接收到登录授权通知后进行登录授权。
S908,接收服务器完成登录授权后生成并发送的登录凭据,并执行步骤S810。
本实施例中,当终端上缺失登录凭据,使得终端无法通过登录凭据进行快速登录,那么终端也可以通过用户输入型校验数据完成登录授权。而且完成登录授权时,会生成登录凭据并下发至终端,那么终端后续就可以通过登录凭据来进行快速登录。
在一个实施例中,在步骤S806之后,该登录方法还包括:在请求指定操作时,向服务器发送携带有终端标识的操作请求。接收服务器根据操作请求反馈的条码。显示条码,使得以用户账号登录的移动终端采集条码并解析得到校验地址,根据校验地址向服务器发送登录授权通知,使得服务器在接收到登录授权通知后执行指定操作。
本实施例中,在登录后请求指定操作时,采用用户介入方式进行校验,校验通过后执行指定操作,可进一步保证安全性。
下面用一个具体应用场景来说明上述登录授权方法和登录方法的原理。参照图10,用户A在终端上登录过,终端存储有用户A前次登录完成时由服务器下发的登录凭据。用户B未在终端上登陆过,终端未存储用户B的登录凭据。终端作为一种信任设备,可由用户A和用户B登录。用户A或用户B访问如图10所示的登录页面,该登录页面中显示有对应于用户A的快速登录按钮1001。登录页面中还可以显示用户账号输入框1002、用户密码输入框1003和登录按钮1004,或者显示用于登录的二维码1005。用户A可以直接点击快速登录按钮进行登录。用户B则可以通过在账号输入框1002中输入用户账号,在用户密码输 入框1003中输入用户密码,并点击登录按钮1004,完成登录。用户B也可以用手机扫描二维码1005实现登录。终端在用户B完成登录后会获得服务器下发的登录凭据并存储于本地。后续用户A或者用户B访问登录页面时,登录页面将显示对应于用户A和用户B的快速登录按钮。
图11为一个实施例中登录授权装置1100的结构框图。参照图11,该登录授权装置1100包括:登录请求处理模块1101、登录凭据查询模块1102、登录授权模块1103和登录凭据管理模块1104。
登录请求处理模块1101,用于接收终端发送的登录请求;从登录请求中提取登录凭据和终端标识,其中所提取的登录凭据是在终端前次完成登录授权时生成并下发至终端的。
登录凭据查询模块1102,用于查询与终端标识对应的前次完成登录授权时生成并存储的登录凭据。
登录授权模块1103,用于当提取的登录凭据与查询到的登录凭据一致时,对应于终端标识进行登录授权。
登录凭据管理模块1104,用于更新存储的与终端标识对应的登录凭据;将更新的登录凭据下发至终端。
在一个实施例中,登录授权模块1103还用于当登录请求未携带登录凭据时,则根据登录请求获取用户输入型校验数据和终端标识,并根据用户输入型校验数据进行校验;当校验通过时,则对应于终端标识进行登录授权,生成与终端标识对应的登录凭据并存储,并将当前生成的登录凭据下发至终端。
在一个实施例中,登录授权模块1103还用于根据登录请求获取终端标识;生成与终端标识对应的条码;将条码发送至终端并显示,使得以用户账号登录的移动终端采集条码并解析得到校验地址;接收到移动终端根据校验地址所发起的登录授权通知时,校验通过。
在一个实施例中,登录授权模块1103还用于当校验通过时,获取终端的位置信息并对应于终端标识记录。
登录请求处理模块1101还用于从登录请求中提取终端的位置信息。
登录授权模块1103还用于当提取的位置信息与记录的位置信息匹配,且提取的登录凭据与查询到的登录凭据一致时,对应于终端标识进行登录授权。
在一个实施例中,登录授权模块1103还用于当提取的登录凭据与查询到的登录凭据一致时,向管理员账号所对应的电子设备发送登录通知;管理员账号与登录凭据所对应的用户账号对应;接收电子设备响应于登录通知所反馈的授权命令;根据授权命令,对应于终端标识进行登录授权。
图12为一个实施例中登录授权装置1100的结构框图。参照图12,该登录授权装置1100还包括:下线处理模块1105,用于接收电子设备发送的针对终端标识的下线命令;根据下线命令,取消对应于终端标识的登录授权,并将与终端标识对应的登录凭据清除。
在一个实施例中,登录授权模块1103还用于接收终端在请求指定操作时所发起的操作请求;根据操作请求获取用户输入型校验数据;根据用户输入型校验数据进行校验;当校验通过时,执行指定操作。
上述登录授权装置1100,每次登录时采用前一次下发的登录凭据并结合终端标识进行登录,完成登录授权则会下发更新的登录凭据,供下次登录时使用。这样用户登录时就不必频繁输入用户账号和用户密码,在同一终端上可以实现快速登录,保障了登录的便捷性,并一定程度上兼顾了登录的安全性。而且,即使前次登录下发的登录凭据被泄露,但用户再次登录时登录凭据就会更新,因此安全性进一步提高。
图13为一个实施例中登录装置1300的结构框图。参照图13,该登录装置1300包括:获取模块1301、发送模块1302、接收模块1303和更新模块1304。
获取模块1301,用于获取终端本地的终端标识;获取本地存储的登录凭据,所述登录凭据是在本地前次登录被服务器授权时由所述服务器下发给终端的。
发送模块1302,用于向服务器发送携带有登录凭据和终端标识的第一登录请求,使得服务器根据携带的登录凭据和终端标识鉴权成功后进行登录授权。
接收模块1303,用于接收服务器完成登录授权时更新并发送的登录凭据。
更新模块1304,用于将本地存储的登录凭据更新为接收到的登录凭据。
图14为一个实施例中登录装置1300的结构框图。参照图14,该登录装置1300还包括显示模块1305。
发送模块1302还用于当本地未存储登录凭据时,则向服务器发送携带有终端标识的第二登录请求。
接收模块1303还用于接收服务器根据第二登录请求反馈的条码。
显示模块1305用于显示条码,使得以用户账号登录的移动终端采集条码并解析得到校验地址,根据校验地址向服务器发送登录授权通知,使得服务器在接收到登录授权通知后进行登录授权。
接收模块1303还用于接收服务器完成登录授权后生成并发送的登录凭据,并通知更新模块将本地存储的登录凭据更新为接收到的登录凭据。
上述登录装置1300,每次登录时采用前一次下发的登录凭据并结合终端标识进行登录,完成登录授权则会下发更新的登录凭据,供下次登录时使用。这样用户登录时就不必频繁输入用户账号和用户密码,在同一终端上可以实现快速登录,保障了登录的便捷性,并一定程度上兼顾了登录的安全性。而且,即使前次登录下发的登录凭据被泄露,但用户再次登录时登录凭据就会更新,因此安全性进一步提高。
实现上述实施例方法中的全部或部分流程,是可以通过计算机程序来指令相关的硬件来完成,该计算机程序可存储于一计算机可读取存储介质中,该程序在执行时,可包括如上述各方法的实施例的流程。其中,前述的存储介质可为磁碟、光盘、只读存储记忆体(Read-Only Memory,ROM)等非易失性存储介质,或随机存储记忆体(Random Access Memory,RAM)等。
以上实施例的各技术特征可以进行任意的组合,为使描述简洁,未对上述实施例中的各个技术特征所有可能的组合都进行描述,然而,只要这些技术特征的组合不存在矛盾,都应当认为是本说明书记载的范围。
以上实施例仅表达了本申请的几种实施方式,其描述较为具体和详细,但并不能因此而理解为对申请专利范围的限制。应当指出的是,对于本领域的普 通技术人员来说,在不脱离本申请构思的前提下,还可以做出若干变形和改进,这些都属于本申请的保护范围。因此,本申请专利的保护范围应以所附权利要求为准。

Claims (29)

  1. 一种登录授权方法,所述方法包括:
    接收终端发送的登录请求;
    从所述登录请求中提取登录凭据和终端标识,其中所提取的登录凭据是在所述终端前次完成登录授权时生成并下发至所述终端的;
    查询与所述终端标识对应的前次完成登录授权时生成并存储的登录凭据;
    当提取的登录凭据与查询到的登录凭据一致时,对应于所述终端标识进行登录授权;
    更新存储的与所述终端标识对应的登录凭据;
    将更新的登录凭据下发至所述终端。
  2. 根据权利要求1所述的方法,其特征在于,所述接收终端发送的登录请求之后,所述方法还包括:
    当所述登录请求未携带登录凭据时,则根据所述登录请求获取用户输入型校验数据和终端标识,并根据所述用户输入型校验数据进行校验;
    当校验通过时,则对应于所述终端标识进行登录授权,生成与所述终端标识对应的登录凭据并存储,并将当前生成的登录凭据下发至所述终端。
  3. 根据权利要求2所述的方法,其特征在于,所述根据所述登录请求获取用户输入型校验数据和终端标识,并根据所述用户输入型校验数据进行校验包括:
    根据所述登录请求获取终端标识;
    生成与所述终端标识对应的条码;
    将所述条码发送至所述终端并显示,使得以用户账号登录的移动终端采集所述条码并解析得到校验地址;
    接收到所述移动终端根据所述校验地址所发起的登录授权通知时,校验通过。
  4. 根据权利要求2所述的方法,其特征在于,所述方法还包括:
    当校验通过时,获取所述终端的位置信息并对应于所述终端标识记录;
    所述当提取的登录凭据与查询到的登录凭据一致时,对应于所述终端标识进行登录授权包括:
    从所述登录请求中提取所述终端的位置信息;
    当提取的位置信息与记录的位置信息匹配,且提取的登录凭据与查询到的登录凭据一致时,对应于所述终端标识进行登录授权。
  5. 根据权利要求1所述的方法,其特征在于,所述当提取的登录凭据与查询到的登录凭据一致时,对应于所述终端标识进行登录授权包括:
    当提取的登录凭据与查询到的登录凭据一致时,向管理员账号所对应的电子设备发送登录通知;所述管理员账号与所述登录凭据所对应的用户账号对应;
    接收所述电子设备响应于所述登录通知所反馈的授权命令;
    根据所述授权命令,对应于所述终端标识进行登录授权。
  6. 根据权利要求5所述的方法,其特征在于,所述对应于所述终端标识进行登录授权之后,所述方法还包括:
    接收所述电子设备发送的针对所述终端标识的下线命令;
    根据所述下线命令,取消对应于所述终端标识的登录授权,并将与所述终端标识对应的登录凭据清除。
  7. 根据权利要求1所述的方法,其特征在于,所述对应于所述终端标识进行登录授权之后,所述方法还包括:
    接收所述终端发起的请求指定操作的操作请求;
    根据所述操作请求获取用户输入型校验数据;
    根据所述用户输入型校验数据进行校验;
    当校验通过时,执行所述操作请求所请求的指定操作。
  8. 一种登录方法,所述方法包括:
    获取终端本地的终端标识;
    获取本地存储的登录凭据,所述登录凭据是在本地前次登录被服务器授权时由所述服务器下发给终端的;
    向所述服务器发送携带有所述登录凭据和所述终端标识的第一登录请求,使得所述服务器根据携带的登录凭据和终端标识鉴权成功后进行登录授权;
    接收所述服务器完成登录授权时更新并发送的登录凭据;
    将本地存储的登录凭据更新为接收到的登录凭据。
  9. 根据权利要求8所述的方法,其特征在于,所述获取本地的终端标识之后,所述方法还包括:
    当本地未存储所述登录凭据时,则
    向所述服务器发送携带有所述终端标识的第二登录请求;
    接收所述服务器根据所述第二登录请求反馈的条码;
    显示所述条码,使得以用户账号登录的移动终端采集所述条码并解析得到校验地址,根据所述校验地址向所述服务器发送登录授权通知,使得所述服务器在接收到所述登录授权通知后进行登录授权;
    接收所述服务器完成登录授权后生成并发送的登录凭据;
    执行所述将本地存储的登录凭据更新为接收到的登录凭据的步骤。
  10. 一种登录授权装置,其特征在于,包括:处理器和存储器,所述存储器上存储有计算机可读指令,所述计算机可读指令由所述处理器执行以完成以下操作:
    接收终端发送的登录请求;
    从所述登录请求中提取登录凭据和终端标识,其中所提取的登录凭据是在所述终端前次完成登录授权时生成并下发至所述终端的;
    查询与所述终端标识对应的前次完成登录授权时生成并存储的登录凭据;
    当提取的登录凭据与查询到的登录凭据一致时,对应于所述终端标识进行登录授权;
    更新存储的与所述终端标识对应的登录凭据;
    将更新的登录凭据下发至所述终端。
  11. 根据权利要求10所述的装置,其特征在于,所述计算机可读指令还使 所述处理器执行以下操作:
    当所述登录请求未携带登录凭据时,则根据所述登录请求获取用户输入型校验数据和终端标识,并根据所述用户输入型校验数据进行校验;
    当校验通过时,则对应于所述终端标识进行登录授权,生成与所述终端标识对应的登录凭据并存储,并将当前生成的登录凭据下发至所述终端。
  12. 根据权利要求11所述的装置,其特征在于,所述根据所述登录请求获取用户输入型校验数据和终端标识,并根据所述用户输入型校验数据进行校验包括:
    根据所述登录请求获取终端标识;
    生成与所述终端标识对应的条码;
    将所述条码发送至所述终端并显示,使得以用户账号登录的移动终端采集所述条码并解析得到校验地址;
    接收到所述移动终端根据所述校验地址所发起的登录授权通知时,校验通过。
  13. 根据权利要求11所述的装置,其特征在于,所述计算机可读指令还使所述处理器执行以下操作:
    当校验通过时,获取所述终端的位置信息并对应于所述终端标识记录;
    所述当提取的登录凭据与查询到的登录凭据一致时,对应于所述终端标识进行登录授权包括:
    从所述登录请求中提取所述终端的位置信息;
    当提取的位置信息与记录的位置信息匹配,且提取的登录凭据与查询到的登录凭据一致时,对应于所述终端标识进行登录授权。
  14. 根据权利要求10所述的装置,其特征在于,所述当提取的登录凭据与查询到的登录凭据一致时,对应于所述终端标识进行登录授权包括:
    当提取的登录凭据与查询到的登录凭据一致时,向管理员账号所对应的电子设备发送登录通知;所述管理员账号与所述登录凭据所对应的用户账号对应;
    接收所述电子设备响应于所述登录通知所反馈的授权命令;
    根据所述授权命令,对应于所述终端标识进行登录授权。
  15. 根据权利要求14所述的装置,其特征在于,在所述对应于所述终端标识进行登录授权之后,所述计算机可读指令还使所述处理器执行以下操作:
    接收所述电子设备发送的针对所述终端标识的下线命令;
    根据所述下线命令,取消对应于所述终端标识的登录授权,并将与所述终端标识对应的登录凭据清除。
  16. 根据权利要求10所述的装置,其特征在于,所述对应于所述终端标识进行登录授权之后,所述计算机可读指令还使所述处理器执行以下操作:
    接收所述终端发起的请求指定操作的操作请求;
    根据所述操作请求获取用户输入型校验数据;
    根据所述用户输入型校验数据进行校验;
    当校验通过时,执行所述操作请求所请求的指定操作。
  17. 一种登录装置,其特征在于,包括:处理器和存储器,所述存储器上存储有计算机可读指令,所述计算机可读指令由所述处理器执行以完成以下操作:
    获取终端本地的终端标识;
    获取本地存储的登录凭据,所述登录凭据是在本地前次登录被服务器授权时由所述服务器下发给终端的;
    向所述服务器发送携带有所述登录凭据和所述终端标识的第一登录请求,使得所述服务器根据携带的登录凭据和终端标识鉴权成功后进行登录授权;
    接收所述服务器完成登录授权时更新并发送的登录凭据;
    将本地存储的登录凭据更新为接收到的登录凭据。
  18. 根据权利要求17所述的装置,其特征在于,在所述获取本地的终端标识之后,所述计算机可读指令还使所述处理器执行以下操作:
    当本地未存储所述登录凭据时,则
    向所述服务器发送携带有所述终端标识的第二登录请求;
    接收所述服务器根据所述第二登录请求反馈的条码;
    显示所述条码,使得以用户账号登录的移动终端采集所述条码并解析得到校验地址,根据所述校验地址向所述服务器发送登录授权通知,使得所述服务器在接收到所述登录授权通知后进行登录授权;
    接收所述服务器完成登录授权后生成并发送的登录凭据;
    执行所述将本地存储的登录凭据更新为接收到的登录凭据的步骤。
  19. 一种登录授权方法,用于服务器上,该服务器包括处理器和存储器,所述方法包括:
    接收终端发送的登录请求;
    从所述登录请求中提取登录凭据和终端标识,其中所提取的登录凭据是在所述终端前次完成登录授权时生成并下发至所述终端的;
    查询与所述终端标识对应的前次完成登录授权时生成并存储的登录凭据;
    当提取的登录凭据与查询到的登录凭据一致时,对应于所述终端标识进行登录授权;
    更新存储的与所述终端标识对应的登录凭据;
    将更新的登录凭据下发至所述终端。
  20. 根据权利要求19所述的方法,其特征在于,所述接收终端发送的登录请求之后,所述方法还包括:
    当所述登录请求未携带登录凭据时,则根据所述登录请求获取用户输入型校验数据和终端标识,并根据所述用户输入型校验数据进行校验;
    当校验通过时,则对应于所述终端标识进行登录授权,生成与所述终端标识对应的登录凭据并存储,并将当前生成的登录凭据下发至所述终端。
  21. 根据权利要求20所述的方法,其特征在于,所述根据所述登录请求获取用户输入型校验数据和终端标识,并根据所述用户输入型校验数据进行校验包括:
    根据所述登录请求获取终端标识;
    生成与所述终端标识对应的条码;
    将所述条码发送至所述终端并显示,使得以用户账号登录的移动终端采集所述条码并解析得到校验地址;
    接收到所述移动终端根据所述校验地址所发起的登录授权通知时,校验通过。
  22. 根据权利要求20所述的方法,其特征在于,所述方法还包括:
    当校验通过时,获取所述终端的位置信息并对应于所述终端标识记录;
    所述当提取的登录凭据与查询到的登录凭据一致时,对应于所述终端标识进行登录授权包括:
    从所述登录请求中提取所述终端的位置信息;
    当提取的位置信息与记录的位置信息匹配,且提取的登录凭据与查询到的登录凭据一致时,对应于所述终端标识进行登录授权。
  23. 根据权利要求19所述的方法,其特征在于,所述当提取的登录凭据与查询到的登录凭据一致时,对应于所述终端标识进行登录授权包括:
    当提取的登录凭据与查询到的登录凭据一致时,向管理员账号所对应的电子设备发送登录通知;所述管理员账号与所述登录凭据所对应的用户账号对应;
    接收所述电子设备响应于所述登录通知所反馈的授权命令;
    根据所述授权命令,对应于所述终端标识进行登录授权。
  24. 根据权利要求23所述的方法,其特征在于,所述对应于所述终端标识进行登录授权之后,所述方法还包括:
    接收所述电子设备发送的针对所述终端标识的下线命令;
    根据所述下线命令,取消对应于所述终端标识的登录授权,并将与所述终端标识对应的登录凭据清除。
  25. 根据权利要求19所述的方法,其特征在于,所述对应于所述终端标识进行登录授权之后,所述方法还包括:
    接收所述终端发起的请求指定操作的操作请求;
    根据所述操作请求获取用户输入型校验数据;
    根据所述用户输入型校验数据进行校验;
    当校验通过时,执行所述操作请求所请求的指定操作。
  26. 一种登录方法,用于终端上,该终端包括处理器和存储器,所述方法包括:
    获取终端本地的终端标识;
    获取本地存储的登录凭据,所述登录凭据是在本地前次登录被服务器授权时由所述服务器下发给终端的;
    向所述服务器发送携带有所述登录凭据和所述终端标识的第一登录请求,使得所述服务器根据携带的登录凭据和终端标识鉴权成功后进行登录授权;
    接收所述服务器完成登录授权时更新并发送的登录凭据;
    将本地存储的登录凭据更新为接收到的登录凭据。
  27. 根据权利要求26所述的方法,其特征在于,所述获取本地的终端标识之后,所述方法还包括:
    当本地未存储所述登录凭据时,则
    向所述服务器发送携带有所述终端标识的第二登录请求;
    接收所述服务器根据所述第二登录请求反馈的条码;
    显示所述条码,使得以用户账号登录的移动终端采集所述条码并解析得到校验地址,根据所述校验地址向所述服务器发送登录授权通知,使得所述服务器在接收到所述登录授权通知后进行登录授权;
    接收所述服务器完成登录授权后生成并发送的登录凭据;
    执行所述将本地存储的登录凭据更新为接收到的登录凭据的步骤。
  28. 一种非易失性存储介质,其特征在于,其中存储有计算机可读指令,所述计算机可读指令可以由处理器执行以完成如权利要求1至7中任一项的方法。
  29. 一种非易失性存储介质,其特征在于,其中存储有计算机可读指令,所述计算机可读指令可以由处理器执行以完成如权利要求8至9中任一项的方法。
PCT/CN2017/117397 2016-12-23 2017-12-20 登录授权方法和装置、登录方法和装置 WO2018113690A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201611208735.9A CN106657068A (zh) 2016-12-23 2016-12-23 登录授权方法和装置、登录方法和装置
CN201611208735.9 2016-12-23

Publications (1)

Publication Number Publication Date
WO2018113690A1 true WO2018113690A1 (zh) 2018-06-28

Family

ID=58827024

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/117397 WO2018113690A1 (zh) 2016-12-23 2017-12-20 登录授权方法和装置、登录方法和装置

Country Status (2)

Country Link
CN (1) CN106657068A (zh)
WO (1) WO2018113690A1 (zh)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109992601A (zh) * 2019-03-12 2019-07-09 中国平安财产保险股份有限公司 待办事项信息的推送方法、装置和计算机设备
CN110995416A (zh) * 2019-10-12 2020-04-10 武汉信安珞珈科技有限公司 一种将移动端与客户端关联的方法
CN111523862A (zh) * 2020-04-27 2020-08-11 广东电网有限责任公司培训与评价中心 一种获取人才数据的方法和相关设备
CN112019505A (zh) * 2020-07-22 2020-12-01 北京达佳互联信息技术有限公司 登录方法、装置、服务器、电子设备及存储介质
CN113992353A (zh) * 2021-09-27 2022-01-28 北京达佳互联信息技术有限公司 登录凭证的处理方法、装置、电子设备及存储介质
CN114640880A (zh) * 2020-11-30 2022-06-17 腾讯科技(深圳)有限公司 账号登录控制方法、装置及介质
CN114793177A (zh) * 2022-04-28 2022-07-26 阿里巴巴(中国)有限公司 服务登录方法、装置和电子设备

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106657068A (zh) * 2016-12-23 2017-05-10 腾讯科技(深圳)有限公司 登录授权方法和装置、登录方法和装置
CN108322461B (zh) * 2018-01-31 2020-10-27 百度在线网络技术(北京)有限公司 应用程序自动登录的方法、***、装置、设备和介质
CN108616360B (zh) * 2018-03-22 2020-12-18 创新先进技术有限公司 用户身份校验、注册方法及装置
CN109218326A (zh) * 2018-10-10 2019-01-15 广州虎牙信息科技有限公司 登录验证方法、装置、存储介质及服务器
CN111600858B (zh) * 2020-05-06 2021-12-14 腾讯科技(深圳)有限公司 一种应用登录方法、装置及***
CN112187811B (zh) * 2020-09-30 2023-02-24 湖南快乐阳光互动娱乐传媒有限公司 一种app登录方法及***
CN112272167B (zh) * 2020-10-09 2023-02-03 深圳安泰创新科技股份有限公司 ***登录方法、终端设备及计算机可读存储介质
CN112417405A (zh) * 2020-11-30 2021-02-26 北京小熊博望科技有限公司 一种多云盘聚合方法
CN112967056A (zh) * 2021-03-30 2021-06-15 建信金融科技有限责任公司 一种访问信息处理方法、装置、电子设备及介质
CN113382024B (zh) * 2021-08-12 2021-12-21 阿里云计算有限公司 凭据的轮转方法、计算设备及存储介质
CN114124382B (zh) * 2021-12-01 2024-04-09 深圳市闪剪智能科技有限公司 凭证更新方法、***、设备及存储介质

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080148377A1 (en) * 2006-12-15 2008-06-19 Yahoo! Inc. Management of Network Login Identities
KR20130039745A (ko) * 2013-03-28 2013-04-22 삼성에스디에스 주식회사 인증 연동 시스템 및 방법
CN103327115A (zh) * 2013-07-05 2013-09-25 百度在线网络技术(北京)有限公司 应用程序的登录控制方法和装置
CN103973652A (zh) * 2013-02-01 2014-08-06 深圳市天时通科技有限公司 登录方法和登录***
CN105530224A (zh) * 2014-09-30 2016-04-27 中国电信股份有限公司 终端认证的方法和装置
CN105991559A (zh) * 2015-02-05 2016-10-05 同济大学 一种基于图像加密技术的用户安全登陆方法
CN106059776A (zh) * 2016-07-07 2016-10-26 乐视控股(北京)有限公司 网站登录方法及装置
CN106657068A (zh) * 2016-12-23 2017-05-10 腾讯科技(深圳)有限公司 登录授权方法和装置、登录方法和装置

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1276342C (zh) * 2001-05-11 2006-09-20 范平志 基于动态口令的身份鉴别方法
CN1177445C (zh) * 2001-09-29 2004-11-24 华为技术有限公司 一种pc客户端的安全认证方法
CN100561915C (zh) * 2004-11-25 2009-11-18 郑维 密钥变换型一次一密密码体系
CN101166094A (zh) * 2007-08-10 2008-04-23 林明辉 一种客户端以智能加密方式自动登录服务器的方法
US8156546B2 (en) * 2009-10-29 2012-04-10 Satyam Computer Services Limited Of Mayfair Centre System and method for flying squad re authentication of enterprise users

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080148377A1 (en) * 2006-12-15 2008-06-19 Yahoo! Inc. Management of Network Login Identities
CN103973652A (zh) * 2013-02-01 2014-08-06 深圳市天时通科技有限公司 登录方法和登录***
KR20130039745A (ko) * 2013-03-28 2013-04-22 삼성에스디에스 주식회사 인증 연동 시스템 및 방법
CN103327115A (zh) * 2013-07-05 2013-09-25 百度在线网络技术(北京)有限公司 应用程序的登录控制方法和装置
CN105530224A (zh) * 2014-09-30 2016-04-27 中国电信股份有限公司 终端认证的方法和装置
CN105991559A (zh) * 2015-02-05 2016-10-05 同济大学 一种基于图像加密技术的用户安全登陆方法
CN106059776A (zh) * 2016-07-07 2016-10-26 乐视控股(北京)有限公司 网站登录方法及装置
CN106657068A (zh) * 2016-12-23 2017-05-10 腾讯科技(深圳)有限公司 登录授权方法和装置、登录方法和装置

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109992601A (zh) * 2019-03-12 2019-07-09 中国平安财产保险股份有限公司 待办事项信息的推送方法、装置和计算机设备
CN109992601B (zh) * 2019-03-12 2023-10-27 中国平安财产保险股份有限公司 待办事项信息的推送方法、装置和计算机设备
CN110995416A (zh) * 2019-10-12 2020-04-10 武汉信安珞珈科技有限公司 一种将移动端与客户端关联的方法
CN111523862A (zh) * 2020-04-27 2020-08-11 广东电网有限责任公司培训与评价中心 一种获取人才数据的方法和相关设备
CN111523862B (zh) * 2020-04-27 2024-02-23 广东电网有限责任公司培训与评价中心 一种获取人才数据的方法和相关设备
CN112019505A (zh) * 2020-07-22 2020-12-01 北京达佳互联信息技术有限公司 登录方法、装置、服务器、电子设备及存储介质
CN114640880A (zh) * 2020-11-30 2022-06-17 腾讯科技(深圳)有限公司 账号登录控制方法、装置及介质
CN114640880B (zh) * 2020-11-30 2023-06-30 腾讯科技(深圳)有限公司 账号登录控制方法、装置及介质
CN113992353A (zh) * 2021-09-27 2022-01-28 北京达佳互联信息技术有限公司 登录凭证的处理方法、装置、电子设备及存储介质
CN113992353B (zh) * 2021-09-27 2024-01-09 北京达佳互联信息技术有限公司 登录凭证的处理方法、装置、电子设备及存储介质
CN114793177A (zh) * 2022-04-28 2022-07-26 阿里巴巴(中国)有限公司 服务登录方法、装置和电子设备
CN114793177B (zh) * 2022-04-28 2024-01-05 阿里巴巴(中国)有限公司 服务登录方法、装置和电子设备

Also Published As

Publication number Publication date
CN106657068A (zh) 2017-05-10

Similar Documents

Publication Publication Date Title
WO2018113690A1 (zh) 登录授权方法和装置、登录方法和装置
US11647023B2 (en) Out-of-band authentication to access web-service with indication of physical access to client device
US11361065B2 (en) Techniques for authentication via a mobile device
AU2020201528B2 (en) Automated password generation and change
KR102390108B1 (ko) 정보 처리 시스템 및 제어 방법
EP3500972B1 (en) Protection feature for data stored at storage service
CN109067813B (zh) 网络漏洞检测方法、装置、存储介质和计算机设备
US11563724B1 (en) System and method for allowing access to an application or features thereof on each of one or more user devices
US20170126733A1 (en) Protection against end user account locking denial of service (dos)
US20180159842A1 (en) System and method for a single sign on connection in a zero-knowledge vault architecture
JP6374947B2 (ja) 回復機能を有し、かつ復元可能な動的装置識別
US20160085861A1 (en) Private cloud api
US11546376B2 (en) Systems and methods for securing user domain credentials from phishing attacks
CN109831435B (zh) 一种数据库操作方法、***及代理服务器和存储介质
EP3674938B1 (en) Identifying computing processes on automation servers
US20220311771A1 (en) Information processing apparatus, non-transitory computer readable medium, and information processing method
JP2021152975A (ja) 情報処理装置、制御方法、およびプログラム
US11450069B2 (en) Systems and methods for a SaaS lens to view obfuscated content
US11502840B2 (en) Password management system and method
US11411733B1 (en) Systems and methods for identity and access control
JP2016057737A (ja) サービス提供システム及びこれに用いる管理サーバー及び管理方法
KR20140043628A (ko) 보안 로그인 처리 방법
JP7174730B2 (ja) 端末装置、情報処理方法及び情報処理プログラム
CN116366335A (zh) 远程访问内网的方法、装置、计算机设备和存储介质
JP2001195373A (ja) エージェント実行装置、エージェント管理装置、エージェント処理システム、エージェント実行方法およびエージェント管理方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17884018

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17884018

Country of ref document: EP

Kind code of ref document: A1