WO2021012552A1 - 一种登录处理方法及相关设备 - Google Patents
一种登录处理方法及相关设备 Download PDFInfo
- Publication number
- WO2021012552A1 WO2021012552A1 PCT/CN2019/120959 CN2019120959W WO2021012552A1 WO 2021012552 A1 WO2021012552 A1 WO 2021012552A1 CN 2019120959 W CN2019120959 W CN 2019120959W WO 2021012552 A1 WO2021012552 A1 WO 2021012552A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- information
- digest
- password
- user
- sample
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/004—Arrangements for detecting or preventing errors in the information received by using forward error control
- H04L1/0056—Systems characterized by the type of code used
- H04L1/0061—Error detection codes
Definitions
- This application relates to the field of computer technology, in particular to a login processing method and related equipment.
- the embodiments of the present application provide a login processing method and related equipment, which help ensure the security of user information during the transmission process.
- an embodiment of the present application provides a login processing method, the method is applied to a client, and the method includes:
- the embodiments of the present application provide another login processing method, which is applied to a server, and the method includes:
- the first verification request carries a random number, a hash value corresponding to the encrypted digest information, and encrypted account information, the digest information is based on the client
- the specified information digest algorithm is obtained by data processing the password information entered by the user;
- Target digest sample information corresponding to target password sample information stored in association with the target account sample information, where the target digest sample information is obtained by data processing on the password sample information based on the specified information digest algorithm;
- the first indication information that has passed the verification is returned to the client, so that the client can log in the user based on the indication information, and the indication information is used to indicate the user’s password information and the Account information is verified.
- an embodiment of the present application provides a login processing device, which includes a module for executing the method of the first aspect.
- an embodiment of the present application provides another login processing device, and the login processing device includes a module for executing the method of the second aspect.
- an embodiment of the present application provides a client.
- the client includes an input device, an output device, a processor, and a memory, and the input device, output device, processor, and memory are connected to each other.
- the memory is used to store a computer program that supports the server to execute the above method
- the computer program includes program instructions
- the processor is configured to invoke the program instructions to execute the method of the above first aspect.
- an embodiment of the present application provides a server.
- the server includes a processor, a network interface, and a memory.
- the processor, the network interface, and the memory are connected to each other, wherein the network interface is controlled by the processor.
- the memory is used to store a computer program that supports the server to execute the above method
- the computer program includes program instructions
- the processor is configured to call the program instructions to execute the method of the second aspect described above.
- embodiments of the present application provide a computer non-volatile readable storage medium, the computer non-volatile readable storage medium stores a computer program, the computer program includes program instructions, and the program instructions When executed by a processor, the processor is caused to execute the method of the first aspect.
- a random number is used to hash the digest information corresponding to the password information, which ensures the randomness of the cipher text corresponding to the password information, which is beneficial to improve the security of the password information; Encryption of information and user information at the same time helps to further improve the security of user information during transmission.
- FIG. 1 is a schematic structural diagram of a login processing system provided by an embodiment of the present application
- FIG. 2 is a schematic flowchart of a login processing method provided by an embodiment of the present application.
- FIG. 3 is a schematic flowchart of another login processing method provided by an embodiment of the present application.
- FIG. 4 is a schematic flowchart of another login processing method provided by an embodiment of the present application.
- FIG. 5 is a schematic diagram of the interaction process of a login processing method provided by an embodiment of the present application.
- FIG. 6 is a schematic block diagram of a login processing apparatus provided by an embodiment of the present application.
- FIG. 7 is a schematic block diagram of a client provided by an embodiment of the present application.
- FIG. 8 is a schematic block diagram of another login processing apparatus provided by an embodiment of the present application.
- Fig. 9 is a schematic block diagram of a server provided by an embodiment of the present application.
- the login processing method described in the embodiment of the present application involves a client that can provide login access for users and a server that provides login services.
- Fig. 1 is a schematic structural diagram of a login processing system applicable to the embodiment of the present application.
- the login processing system may include a client 101 and a server 102.
- the server may refer to a server in a server group composed of multiple servers for providing login-related services such as login processing.
- the client may be a smart terminal in which an application requiring login processing or a website that can open the application is pre-installed in the smart terminal.
- the client may also be the application itself, which is not specifically limited in this application.
- the application may be an application corresponding to the log platform.
- the client 101 in the login processing system may receive a login request carrying user information, and the user information includes password information and account information input by the user. Further, the client 101 may generate digest information for the password information based on a specified information digest algorithm, generate a random number according to a preset rule, and hash the digest information through the random number to obtain the hash value corresponding to the digest information . Further, the client 101 may encrypt the hash value and account information, generate a first verification request including the random number, the encrypted hash value, and the encrypted account information, and perform the first verification The request is sent to the server 102.
- the server 102 may decrypt the encrypted hash value and account information based on the pre-configured key to obtain the plaintext information corresponding to the account information and decrypt it. After the hash value. Further, if the server 102 detects that there is target account sample information matching the plaintext information in the database, it determines that the verification of the account information is passed, and obtains the target summary sample information corresponding to the target password sample information stored in association with the target account sample information .
- the server 102 may perform a hash calculation on the target digest sample information based on the aforementioned random number to obtain the sample hash value corresponding to the target digest sample information, and if it is detected that the hash value matches the sample hash value, it is determined to match the password information After the verification is passed, the first indication information that the verification passed is returned to the client, and the first indication information is used to indicate that the password information and account information of the user are both verified.
- the client 101 may perform login processing based on the user.
- a random number is used to hash the digest information corresponding to the password information, which ensures the randomness of the password information corresponding to the cipher text, which is beneficial to improve the security of the password information; Encrypting user information at the same time helps to further improve the security of user information during transmission.
- Figure 2 is a schematic flowchart of a login processing method provided by an embodiment of the present application. The method is applied to the client and can be executed by the client. As shown in the figure, the login processing method may include:
- 201 Receive a login request carrying user information, where the user information includes password information and account information entered by the user.
- the designated information digest algorithm may include a message digest algorithm (Message-Digest Algorithm 5, MD5) or a cyclic redundancy check algorithm (Cyclic Redundancy Check, CRC), etc., and may also include other information digest algorithms. There is no specific limitation.
- MD5 has been widely used to determine the reliability of file transmission.
- the sending terminal provides an MD5 checksum in advance.
- the receiving terminal uses the MD5 algorithm to calculate the MD5 checksum of the received file, and then by checking whether the two checksums are consistent, the received file can be judged Whether there is an error. Even if you make a small change in the original text (such as replacing d with c), its MD5 checksum will change dramatically.
- the cyclic redundancy check CRC is a hash function that generates a short fixed-digit check code based on data such as network data packets or computer files. It can be used to detect or verify data transmission or storage. error. The generated numbers are calculated and appended to the data before transmission or storage, and then the receiver checks to determine whether the data has changed. That is, if the contents of two files are exactly the same, the CRCs of the two files must be the same. Therefore, it is possible to determine whether the specific contents of the two files are the same by comparing whether the CRCs of the two files are the same.
- the above-mentioned designated information digest algorithm may be selected from the information digest algorithm MD5 and cyclic redundancy check algorithm (CRC) preset by the user according to his own needs, or may be a system default setting.
- the specified information digest algorithm when the specified information digest algorithm has been predetermined, the user can adjust the specified information digest algorithm according to his own needs.
- the predetermined specified information digest algorithm is MD5, and the subsequent user can follow his own It is required to change the specified information digest algorithm to CRC.
- the server may generate digest information for the password information based on the cyclic redundancy check algorithm CRC; or, when the designated message digest algorithm is the message digest algorithm MD5 , The server can generate digest information for the password information based on MD5. It can be seen that the above-mentioned summary information includes the summary information generated for the password information based on the cyclic redundancy check algorithm CRC or the summary information generated for the password information based on the information digest algorithm MD5.
- the preset rule indicates the value corresponding to the random number generated.
- the client may hash the digest information by using random numbers to obtain the hash value corresponding to the digest information. Using random numbers for hashing calculations, the same digest information will not appear after the hashing results are the same, ensuring the randomness of the obtained hash values.
- the hash processing of the digest information can be regarded as the encryption process of the password information, and the hash value after the hash processing can be regarded as the cipher text corresponding to the password information. Therefore, the random number is used for the hash calculation.
- the result is the same, which ensures the randomness of the ciphertext, and accordingly, improves the security of the password information.
- the summary information obtained in step 202 is an array, from a to z, 0 to 9, A to Z, a total of 62 characters, that is, index 0 in the array represents a, 1 Represents b, and so on.
- the server hashes the digest information through random numbers, and the specific process of obtaining the hash value corresponding to the digest information is as follows: The server divides the digest information into groups of 8 bits, and takes 4 groups in total (that is, only 32 characters). Further, the server processes each group, first converts the 8 bits of each group to hexadecimal, and performs bit-AND operation with 0x3FFFFFFF after the conversion to obtain the value A.
- the server can use A to do N (random number) processing times, and each time use A and 0x0000003D to perform bitwise AND operation to obtain a number (less than 62), use this number as an index to fetch the characters in the array to obtain character B, and at the same time Shift A to the right by 5 bits to generate a new A, and the new A(A) is used as a new round of processing to prevent the same A from being processed N times with the same result. Then finally N (random number) different Bs will be generated, and N B combinations are defined as C.
- the advantage of using random numbers to process digest information is: the digest value generated by the same password is the same, so brute force cracking (collision method) can be used, which can be collided in a certain time, and the success of collision is only time And the question of probability. Therefore, the digest must be hashed again.
- the purpose is that even if the same password is hashed with a random number after generating the same digest information, the result must be different. Can improve the security of the password.
- the server may use a preset encryption algorithm to encrypt the hash value and account information, and generate a first verification request including the encrypted hash value, encrypted account information, and the aforementioned random number .
- the preset encryption algorithm may include a symmetric encryption algorithm or an asymmetric encryption algorithm, which is not specifically limited in this application.
- the server may send the first verification request generated in step 204 to the server.
- the server may decrypt the encrypted hash value and account information based on the pre-configured key. Obtain the plaintext information corresponding to the account information and the decrypted hash value.
- the server detects that there is target account sample information matching the plaintext information in the database, it determines that the verification of the account information is passed, and obtains the target summary sample information corresponding to the target password sample information stored in association with the target account sample information. Further, the server may perform a hash calculation on the target digest sample information based on the above random number to obtain the sample hash value corresponding to the target digest sample information. If the hash value matches the sample hash value, it determines the password information After the verification is passed, the first instruction information indicating that the verification passed is returned to the client, and the first instruction information is used to indicate that the password information and account information of the user are both verified.
- the client After the client receives the instruction information, it can perform login processing based on the account information and password information input by the user, so as to realize the login of the account corresponding to the account information.
- the client uses random numbers to hash the digest information corresponding to the password information, which ensures the randomness of the cipher text corresponding to the password information, which is beneficial to improve the security of the password information;
- the password information and user information can be encrypted at the same time, which is beneficial to further improve the security of user information during transmission.
- FIG 3 is a schematic flowchart of another login processing method provided by an embodiment of the present application. The method is applied to the client and can be executed by the client. As shown in the figure, the login processing method may include:
- step 301 Receive a login request carrying user information, where the user information includes password information and account information entered by the user.
- the user information includes password information and account information entered by the user.
- step 301 For the specific implementation of step 301, reference may be made to the related description of step 201 in the foregoing embodiment, which is not repeated here.
- the cyclic redundancy check algorithm CRC is determined from the preset information digest algorithm MD5 and the cyclic redundancy check algorithm CRC to determine the specified information digest algorithm, and the first cipher information is generated based on the cyclic redundancy check algorithm CRC. Summary information.
- the reliability of the information digest algorithm MD5 is greater than that of the cyclic redundancy check algorithm CRC, that is, if the CRCs of the two files are different, it can be proved that the contents of the two files are definitely different.
- CRC cyclic redundancy check algorithm
- the cyclic redundancy check algorithm CRC may be selected as the designated information digest algorithm first, and the first digest information for the cryptographic information is generated based on the cyclic redundancy check algorithm CRC, thereby improving data Processing efficiency.
- the algorithm MD5 After receiving the first indication information that has passed the verification, if it is detected that the first indication information indicates that the first summary information matches the target summary sample information corresponding to the password sample information pre-stored in the database by the user, based on the information summary The algorithm MD5 generates the second digest information for the password information, and hashes the second digest information according to the random number to obtain the hash value corresponding to the second digest information.
- the first summary information corresponding to the password information may be generated first based on the CRC, and the subsequent steps are performed based on the first summary information 303 ⁇ 305.
- the server receives the first verification request, it can
- the encrypted hash value and account information are decrypted based on the pre-configured key. If the server detects that there is target account sample information in the database that matches the plaintext information, it will determine that the account information is verified and obtain Target summary sample information corresponding to the target password sample information stored in association with the target account sample information. Further, the server 102 may perform a hash calculation on the target digest sample information based on the above random number to obtain the sample hash value corresponding to the target digest sample information. If it is detected that the hash value and the sample hash value do not match, it determines that the password is not matched. If the verification of the information fails, the second indication information indicating that the verification failed may be returned to the client. The second indication information is used to indicate that the password information input by the user does not match the password sample information pre-stored by the user in the database.
- prompt information is output, and the prompt information is used to prompt the user that the password is entered incorrectly.
- the reliability of the information digest algorithm MD5 is greater than that of the cyclic redundancy check algorithm CRC, that is, if the CRC of the two files are different, it can be proved that the content of the two files must be different, but the CRC only accounts for two Bytes, while MD5 takes 16 bytes.
- the cyclic redundancy check algorithm CRC is firstly determined from the preset message digest algorithm MD5 and the cyclic redundancy check algorithm CRC to determine the specified message digest algorithm, and based on the cyclic redundancy check algorithm CRC, the password
- the first summary information of the information, and the subsequent steps 303 to 305 are executed based on the first summary information.
- the server verifies the password information, it is also based on the hash value corresponding to the first digest information. Therefore, if the hash value corresponding to the first digest information matches the sample corresponding to the pre-stored target digest sample information in the database, If the desired value does not match, it can be directly determined that the password information entered by the user does not match the password sample information pre-stored by the user in the database. In this way, since the CRC occupies fewer bytes, the data processing efficiency can be improved while ensuring the security of the password information.
- the server determines that the user’s account information is passed, if the server verifies based on the hash value corresponding to the first digest information, it determines that the hash value corresponding to the first digest information is the same as the one in the database.
- the sample hash value corresponding to the stored target digest sample information matches, and the first indication information that has passed the verification can be sent to the client.
- the first indication information is used to indicate that the first digest information and the user's pre-stored password sample information in the database The corresponding target summary sample information matches.
- the client may generate second digest information for the password information based on the message digest algorithm MD5, and hash the second digest information according to the random number to obtain the second digest information corresponding
- Step 307 is executed to send a second verification request including the hash value corresponding to the encrypted second digest information to the server.
- the server may compare the hash value corresponding to the second summary information with the previously determined sample hash value corresponding to the target summary sample information, and if the comparison obtains the hash value corresponding to the second summary information If the sample hash value corresponding to the above-mentioned target summary sample information matches, the verified third indication information can be returned to the client.
- the third indication information is used to indicate the second summary information and the user's pre-stored password sample in the database The target summary sample information corresponding to the information matches.
- the client may perform login processing on the user when receiving the third instruction information.
- it is equivalent to first filtering out different password information through CRC, and then using MD5 for further verification only for password information with the same hash value corresponding to CRC, which is equivalent to a comprehensive use of two information digest algorithms.
- the advantage is that it can not only improve the verification efficiency of password information, but also ensure the reliability of verification.
- the client can comprehensively utilize the advantages of the two information digest algorithms, CRC and MD5, which can not only improve the verification efficiency of password information, but also ensure the reliability of verification.
- Figure 4 is a schematic flowchart of another login processing method provided by an embodiment of the present application.
- the method may be executed by a server.
- the login processing method may include:
- the first verification request carries a random number, a hash value corresponding to the encrypted digest information, and encrypted account information.
- the digest information is based on the client's specified information
- the digest algorithm is obtained by data processing the password information entered by the user.
- the keys required for server decryption are all set uniformly and stored in the designated area after the setting is completed. Any encrypted hash value and account information sent by the client can be decrypted using the unified key.
- the server after the server receives the first verification request, it can obtain a preset key from the designated area, and use the key to encrypt the hash value corresponding to the encrypted digest information and the encrypted The account information is decrypted.
- each user account may correspond to a storage area
- the storage area is associated with the account sample information of each user account and the summary sample information corresponding to the password sample information, and each storage area is A unique account ID is added.
- the server may find the storage area uniquely corresponding to the account identification from at least one preset storage area based on the account identification in the account information, and obtain the pre-stored target of the user in the storage area Account sample information, and then determine whether the pre-stored target account sample information and the plaintext information corresponding to the account information match, if they match, continue to obtain the pre-stored target summary corresponding to the user’s target password sample information from the storage area Sample information.
- one storage area corresponds to one user, which can improve the efficiency of querying user account information and password information.
- the above-mentioned target summary sample information is obtained by performing data processing on the password sample information based on a specified information digest algorithm.
- the above-mentioned designated information digest algorithm may include the information digest algorithm MD5 or the cyclic redundancy check algorithm CRC, and the first digest generated based on the cyclic redundancy check algorithm CRC for the target password sample information is pre-stored in the database.
- the server detects that there is target account sample information that matches the plaintext information in the database, it determines that the verification of the account information is passed, and obtains the target password sample information stored in association with the target account sample information from the first The one summary sample sub-information and the second summary sample sub-information select the target summary sample information matching the specified information summary algorithm.
- the server determines the second digest sample sub-information as the target digest sample information corresponding to the target password sample information; if the specified information digest algorithm is the cyclic redundancy check algorithm CRC, then the server determines the first digest sample sub-information as the target digest sample information corresponding to the target password sample information.
- step 404 Perform a hash calculation on the target digest sample information based on the random number to obtain a sample hash value corresponding to the target digest sample information. If a match between the hash value and the sample hash value is detected, it is determined that the verification of the password information is passed.
- how to use random numbers to hash the target summary sample information can refer to the related description of step 203 in the foregoing embodiment, which will not be repeated here.
- the sample hash value can be compared with the hash value for similarity, if the comparison shows that the similarity between the two is greater than or equal to the preset similarity
- the degree threshold is determined to pass the verification of the password information.
- the random number is used to hash the target digest sample information, so that the obtained sample hash value has randomness, is not easy to be tampered with, and can improve the accuracy of password information verification.
- the server may return to the client the first indication that the authentication is passed, and when the client receives the first indication, it may follow the user’s input Account information and password information for login processing.
- the server after the server obtains the sample hash value corresponding to the target digest sample information, if it detects that the hash value does not match the sample hash value, it can determine that the password information is not verified, and send the first sample to the client.
- Two indication information the second indication information is used to indicate that the password information input by the user does not match the password sample information pre-stored by the user in the database.
- the digest information (hereinafter referred to as the first digest information) corresponding to the encrypted hash value carried in the first verification request is obtained based on the cyclic redundancy check algorithm CRC.
- the server receives the first verification request and determines that the user’s account information is passed based on the first verification request, if it detects that the hash value matches the sample hash value, it determines the verification of the password information Pass, and send first instruction information to the server.
- the first instruction information also indicates that the first summary information matches the target summary sample information corresponding to the password sample information pre-stored by the user in the database.
- the verification of the password information input by the user can be further verified in combination with the information digest algorithm.
- the client after the client receives the first indication information for indicating that the first digest information matches the target digest sample information corresponding to the password sample information stored in the database in advance by the user, the client can generate the corresponding password based on the information digest algorithm MD5 The second digest information of the information, and hash the second digest information according to the random number to obtain the hash value corresponding to the second digest information.
- the client may perform encryption processing on the hash value corresponding to the second digest information, generate a second verification request including the hash value corresponding to the encrypted second digest information, and send the second verification request to the server. Further, after receiving the second verification request, the server can decrypt the hash value corresponding to the encrypted second digest information to obtain the hash value corresponding to the second digest information, and obtain the MD5 based on the information digest algorithm in advance.
- the target summary sample information obtained by performing data processing on the target password sample information is to obtain the aforementioned second summary sample sub-information.
- the server performs a hash calculation on the second digest sample sub-information based on the random number to obtain the sample hash value corresponding to the second digest sample sub-information, if it is detected that the hash value corresponds to the second digest sample sub-information If the hash value of the sample matches, it is determined that the verification of the password information is passed, and the third instruction information is sent to the client.
- the client receives the third instruction information, the user is logged in.
- the server uses random numbers to hash the target summary sample information, so that the obtained sample hash value is random, not easy to be tampered with, and can improve the accuracy of password information verification.
- FIG. 5 is an interactive schematic diagram of a login processing method proposed in an embodiment of the present application. The method includes the following steps:
- the client receives a login request carrying user information, where the user information includes password information and account information entered by the user.
- the client generates digest information for the password information based on the specified information digest algorithm, generates a random number according to a preset rule, and hashes the digest information through the random number to obtain a hash value corresponding to the digest information.
- step 501 to step 502 The client encrypts the hash value and account information, generates a first verification request including the random number, the encrypted hash value, and the encrypted account information, and sends the first verification request to the server.
- step 501 to step 502 reference may be made to the related description of step 201 to step 205 in the foregoing embodiment, which will not be repeated here.
- the server decrypts the encrypted hash value and account information based on the pre-configured key, and obtains the plaintext information corresponding to the account information and the decrypted hash value. If it detects that there is a matching plaintext information in the database The target account sample information confirms that the verification of the account information is passed.
- the server obtains the target digest sample information corresponding to the target password sample information stored in association with the target account sample information, and performs a hash calculation on the target digest sample information based on the above random number to obtain the sample hash value corresponding to the target digest sample information , If it is detected that the hash value matches the sample hash value, it is determined that the verification of the password information is passed.
- step 506 The server returns the first indication information that the verification is passed to the client.
- step 504 to step 505 reference may be made to the related description of step 401 to step 405 in the foregoing embodiment, which will not be repeated here.
- the client performs login processing on the user.
- the client may perform login processing based on the user's account information and password information.
- the embodiment of the present application also provides a login processing device.
- the device includes a module for executing the method described in FIG. 2 or FIG. 3, and is configured on the client.
- FIG. 6, which is a schematic block diagram of a login processing apparatus provided by an embodiment of the present application.
- the login processing device of this embodiment includes:
- the input module 10 is configured to receive a login request carrying user information, the user information including password information and account information entered by the user;
- the processing module 11 is configured to generate digest information for the password information based on a specified information digest algorithm, generate a random number according to a preset rule, and hash the digest information by the random number to obtain the digest information Corresponding to the hash value, encrypting the hash value and the account information, and generating a first verification request including the random number, the encrypted hash value, and the encrypted account information;
- the output module 12 is configured to send the first verification request to the server, so that the server verifies the user based on the first verification request, and returns the verified first to the client after the verification is passed.
- the processing module 11 is further configured to perform login processing on the user when the input module 10 receives the first indication information that the authentication is passed, and the first indication information is used to indicate the password information of the user and the Account information is verified.
- the specified information digest algorithm includes an information digest algorithm MD5 or a cyclic redundancy check algorithm CRC
- the digest information includes digest information generated for the cryptographic information based on the cyclic redundancy check algorithm CRC Or based on the digest information generated by the information digest algorithm MD5 for the password information.
- the processing module 11 is specifically configured to determine the cyclic redundancy check algorithm CRC as the designated information digest algorithm from the preset information digest algorithm MD5 and the cyclic redundancy check algorithm CRC;
- the cyclic redundancy check algorithm CRC generates first summary information for the cryptographic information.
- the summary information is the first summary information
- the processing module 11 is further configured to receive second indication information returned by the server after failing to verify the user; if the second information is detected If the instruction information indicates that the password information input by the user does not match the password sample information pre-stored in the database by the user, prompt information is output through the output module 12, and the prompt information is used to prompt the user to input the password error.
- the summary information is the first summary information
- the processing module 11 is further configured to: after the input module 10 receives the first indication information that the verification is passed, if the first indication information is detected An indication information indicates that the first summary information matches the target summary sample information corresponding to the password sample information pre-stored in the database by the user, and the second summary information for the password information is generated based on the information digest algorithm MD5 , And hash the second digest information according to the random number to obtain the hash value corresponding to the second digest information; perform encryption processing on the hash value corresponding to the second digest information to generate
- the encrypted second digest information corresponds to the second verification request of the hash value, and the second verification request is sent to the server through the output module 12, so that the server can base on the encrypted second verification request.
- the second digest information corresponds to the hash value verification, and after the password information entered by the user matches the password sample information pre-stored in the database by the user, return the third indication information that the verification passed to the client;
- the client in this embodiment may include: one or more processors 20; one or more input devices 21, one or more output devices 22, and a memory 23.
- the aforementioned processor 20, input device 21, output device 22, and memory 23 are connected by a bus.
- the memory 23 is configured to store a computer program including program instructions, and the processor 20 is configured to execute the program instructions stored in the memory 23.
- the processor 20 is configured to call the program instructions to execute: receive a login request carrying user information, the user information includes password information and account information entered by the user; and generate information based on a specified information digest algorithm for the password information
- the summary information ; generate random numbers according to preset rules, and hash the summary information through the random numbers to obtain the hash value corresponding to the summary information; compare the hash value and the account information Perform encryption processing to generate a first verification request including the random number, the encrypted hash value, and the encrypted account information; send the first verification request to the server so that the server can base on the first verification request
- the verification request verifies the user, and after the verification is passed, returns to the client the first indication information that the verification is passed; when the first indication information that the verification passes is received, the user is logged in,
- the first indication information is used to indicate that the password information of the user and the account information are both verified.
- the so-called processor 20 may be a central processing unit (Central Processing Unit, CPU), and the processor may also be other general-purpose processors or digital signal processors (Digital Signal Processors, DSP). , Application Specific Integrated Circuit (ASIC), Field-Programmable Gate Array (FPGA) or other programmable logic devices, discrete gates or transistor logic devices, discrete hardware components, etc.
- the general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like.
- the input device 21 may include a touch panel, a microphone, etc.
- the output device 22 may include a display (LCD, etc.), a speaker, and the like.
- the memory 23 may include a read-only memory and a random access memory, and provides instructions and data to the processor 20. A part of the memory 23 may also include a non-volatile random access memory. For example, the memory 23 may also store device type information.
- the processor 20, input device 21, and output device 22 described in the embodiment of this application can execute the implementation described in the method embodiment in FIG. 2 or FIG. 3 provided in the embodiment of this application, and may also execute The implementation of the device described in FIG. 6 in the embodiment of the present application will not be repeated here.
- the embodiment of the present application also provides a login processing device.
- the device includes a module for executing the method described in FIG. 4, and is configured on a server.
- FIG. 8 is a schematic block diagram of a login processing apparatus provided by an embodiment of the present application.
- the login processing device of this embodiment includes:
- the communication module 30 is configured to receive a first verification request from the client, the first verification request carrying a random number, a hash value corresponding to the encrypted digest information, and encrypted account information, the digest information Is obtained by the client terminal performing data processing on the password information input by the user based on a specified information digest algorithm;
- the processing module 31 is configured to decrypt the encrypted hash value and the account information based on the pre-configured key to obtain the plain text information corresponding to the account information and the decrypted hash value. If there is target account sample information matching the plaintext information in the database, it is determined that the verification of the account information is passed;
- the processing module 31 is further configured to obtain target digest sample information corresponding to the target password sample information stored in association with the target account sample information, and perform a hash calculation on the target digest sample information based on the random number to obtain If the hash value of the sample corresponding to the target digest sample information is detected to match the hash value of the sample, it is determined that the verification of the password information is passed;
- the communication module 30 is further configured to return to the client the first indication information that has passed the verification, so that the client can log in the user based on the indication information, and the indication information is used to indicate Both the password information of the user and the account information are verified.
- the specified information digest algorithm includes an information digest algorithm MD5 or a cyclic redundancy check algorithm CRC
- the database pre-stores information based on the cyclic redundancy check algorithm CRC for the target password sample
- the generated first summary sample sub-information and the second summary sample sub-information generated for the target password information based on the information digest algorithm MD5 the processing module 31 is specifically configured to: communicate with the target account sample information in advance From the first summary sample sub-information and the second summary sample sub-information corresponding to the target password sample information stored in association, target summary sample information that matches the specified information digest algorithm is selected.
- FIG. 9 is a schematic block diagram of a server provided by an embodiment of the present application.
- the server includes a processor 40, a memory 41 and a network interface 42.
- the above-mentioned processor 40, memory 41, and network interface 42 may be connected by a bus or in other ways.
- connection by a bus is taken as an example.
- the network interface 42 is controlled by the processor to send and receive messages, the memory 41 is used to store a computer program, and the computer program includes program instructions, and the processor 40 is used to execute the program instructions stored in the memory 41.
- the processor 40 is configured to call the program instructions to execute: receive processing result information for processing the target document through the network interface 42, where the processing result information includes the processing request identifier corresponding to the processing of the target document and the processing station The document processing information corresponding to the target document; from the pre-established correspondence between the processing application identifier and the processing item, the target processing item corresponding to the processing application identifier of the target document is determined, and the target option to which the target processing item belongs is detected Type, and based on the correspondence between the preset option type and the preset storage mode, determine the target storage mode matching the target option type, and then store the bill processing information according to the target storage mode.
- the so-called processor 40 may be a central processing unit (Central Processing Unit, CPU), and the processor 40 may also be other general-purpose processors, digital signal processors (Digital Signal Processors, DSPs). ), Application Specific Integrated Circuit (ASIC), Field-Programmable Gate Array (FPGA) or other programmable logic devices, discrete gates or transistor logic devices, discrete hardware components, etc.
- the general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like.
- the memory 41 may include a read-only memory and a random access memory, and provides instructions and data to the processor 40. A part of the memory 41 may also include a non-volatile random access memory. For example, the memory 41 may also store device type information.
- the processor 40, the memory 41, and the network interface 42 described in the embodiment of the present application can perform the implementation described in the method embodiment described in FIG. 4 provided by the embodiment of the present application, and can also perform the implementation of the present application For example, the implementation of the login processing device described in FIG. 8 will not be repeated here.
- a computer-readable storage medium stores a computer program
- the computer program includes program instructions
- the program instructions are executed by a processor to realize: receiving A login request carrying user information, the user information including the password information and account information entered by the user; generating summary information for the password information based on a specified information digest algorithm; generating random numbers according to preset rules, and passing the random numbers Perform a hash process on the digest information to obtain a hash value corresponding to the digest information; perform an encryption process on the hash value and the account information to generate a hash including the random number and the encrypted process Value and the encrypted first verification request of the account information; sending the first verification request to the server, so that the server verifies the user based on the first verification request, and sends the first verification request to the
- the client returns the first indication information that the authentication is passed; when receiving the first indication information that the authentication is passed, the user is logged in, and the first indication information is used to indicate the user's password information and the password.
- a computer-readable storage medium stores a computer program, the computer program includes program instructions, and the program instructions are executed by a processor to realize: receiving A first verification request from the client, the first verification request carries a random number, a hash value corresponding to the encrypted digest information, and encrypted account information, the digest information is based on the client's specified
- the information digest algorithm is obtained by data processing on the password information input by the user; the encrypted hash value and the account information are decrypted based on the pre-configured key to obtain the plaintext information corresponding to the account information and The decrypted hash value; if it is detected that there is target account sample information matching the plaintext information in the database, it is determined that the verification of the account information is passed; and the target password sample stored in association with the target account sample information is obtained
- the target digest sample information corresponding to the information, the target digest sample information is obtained by data processing the password sample information based on the specified information digest algorithm; the target digest sample information is hashe
- the computer-readable storage medium may be the internal storage unit of the server or the client described in any of the foregoing embodiments, such as the hard disk or memory of the server or the client.
- the computer-readable storage medium may also be an external storage device of the server or the client, such as a plug-in hard disk equipped on the server or the client, a smart memory card (Smart Media Card, SMC), and a secure digital (Secure Digital) Digital, SD) card, flash card (Flash Card), etc.
- the computer-readable storage medium may also include both an internal storage unit of the server and an external storage device.
- the computer-readable storage medium is used to store the computer program and other programs and data required by the server or client.
- the computer-readable storage medium can also be used to temporarily store data that has been output or will be output.
- the program can be stored in a computer readable storage medium. During execution, it may include the procedures of the above-mentioned method embodiments.
- the storage medium may be a magnetic disk, an optical disc, a read-only memory (Read-Only Memory, ROM), or a random access memory (Random Access Memory, RAM), etc.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
- Computer And Data Communications (AREA)
- Information Transfer Between Computers (AREA)
Abstract
Description
Claims (20)
- 一种登录处理方法,所述方法应用于客户端,其特征在于,所述方法包括:接收携带有用户信息的登录请求,所述用户信息包括用户输入的密码信息和账号信息;基于指定信息摘要算法生成针对所述密码信息的摘要信息;根据预设规则生成随机数,并通过所述随机数对所述摘要信息进行哈希处理,得到所述摘要信息对应的哈希值;对所述哈希值和所述账号信息进行加密处理,生成包括所述随机数、加密处理后的哈希值以及加密处理后的账号信息的第一验证请求;将所述第一验证请求发送至服务器,以便于服务器基于所述第一验证请求对所述用户进行验证,并在验证通过后向所述客户端返回验证通过的第一指示信息;当接收到所述验证通过的第一指示信息时,对所述用户进行登录处理,所述第一指示信息用于指示所述用户的密码信息和所述账号信息均验证通过。
- 根据权利要求1所述的方法,其特征在于,所述指定信息摘要算法包括信息摘要算法MD5或者循环冗余校验算法CRC,所述摘要信息包括基于所述循环冗余校验算法CRC针对所述密码信息生成的摘要信息或者基于所述信息摘要算法MD5针对所述密码信息生成的摘要信息。
- 根据权利要求2所述的方法,其特征在于,所述基于指定信息摘要算法生成针对所述密码信息的摘要信息,包括:从预设的信息摘要算法MD5和循环冗余校验算法CRC中将所述循环冗余校验算法CRC确定为指定信息摘要算法;基于所述循环冗余校验算法CRC生成针对所述密码信息的第一摘要信息。
- 根据权利要求3所述的方法,其特征在于,所述摘要信息为所述第一摘要信息,所述将所述验证请求发送至服务器之后,所述方法还包括:接收所述服务器对所述用户验证失败后返回的第二指示信息;若检测到所述第二指示信息指示了所述用户输入的所述密码信息与所述用户预先存储在数据库中的密码样本信息不匹配,则输出提示信息,所述提示信息用于提示所述用户密码输入错误。
- 根据权利要求3所述的方法,其特征在于,所述摘要信息为所述第一摘要信息,所述方法还包括:接收到所述验证通过的所述第一指示信息后,若检测到所述第一指示信息指示了所述第一摘要信息与所述用户预先存储在数据库中的密码样本信息对应的目标摘要样本信息匹配;基于所述信息摘要算法MD5生成针对所述密码信息的第二摘要信息,并根据所述随机数对所述第二摘要信息进行哈希处理,得到所述第二摘要信息对应的哈希值;对所述第二摘要信息对应的哈希值进行加密处理,生成包括加密处理后的所述第二摘要信息对应哈希值的第二验证请求,并将所述第二验证请求发送至所述服务器,以便于服务器基于所述加密处理后的所述第二摘要信息对应哈希值验证得到所述用户输入的密码信息与所述用户预先存储在数据库中的密码样本信息匹配后,向所述客户端返回验证通过的第三指示信息;当接收到所述第三指示信息时,触发执行所述对所述用户进行登录处理的步骤。
- 一种登录处理方法,所述方法应用于服务器,所述方法包括:接收来自客户端的第一验证请求,所述第一验证请求中携带有随机数、加密处理后的 摘要信息对应的哈希值以及加密处理后的账号信息,所述摘要信息是所述客户端基于指定信息摘要算法对用户输入的密码信息进行数据处理得到的;基于预先配置的密钥对所述加密处理后的哈希值和所述账号信息进行解密处理,得到所述账号信息对应的明文信息以及解密后的哈希值;若检测到数据库中存在与所述明文信息匹配的目标账号样本信息,则确定对所述账号信息的验证通过;获取与所述目标账号样本信息关联存储的目标密码样本信息对应的目标摘要样本信息,所述目标摘要样本信息是基于所述指定信息摘要算法对所述密码样本信息进行数据处理得到的;基于所述随机数对所述目标摘要样本信息进行哈希计算,得到所述目标摘要样本信息对应的样本哈希值,若检测到所述哈希值和所述样本哈希值匹配,则确定对所述密码信息的验证通过;向所述客户端返回验证通过的第一指示信息,以便于所述客户端基于所述指示信息,对所述用户进行登录处理,所述指示信息用于指示所述用户的密码信息和所述账号信息均验证通过。
- 根据权利要求6所述的方法,其特征在于,所述若检测到数据库中存在与所述明文信息匹配的目标账号样本信息,则确定对所述账号信息的验证通过之前,所述方法还包括:从所述明文信息中获取账号标识;从预先设置的至少一个存储区域中查找所述账号标识对应的存储区域,并在所述账号标识对应的存储区域中检测是否存在与所述明文信息匹配的目标账号样本信息。
- 一种登录处理装置,所述装置配置于客户端,其特征在于,所述装置包括:输入模块,用于接收携带有用户信息的登录请求,该用户信息包括用户输入的密码信息和账号信息;处理模块,用于基于指定信息摘要算法生成针对所述密码信息的摘要信息,根据预设规则生成随机数,并通过所述随机数对所述摘要信息进行哈希处理,得到所述摘要信息对应的哈希值,对所述哈希值和所述账号信息进行加密处理,生成包括所述随机数、加密处理后的哈希值以及加密处理后的账号信息的第一验证请求;输出模块,用于将所述第一验证请求发送至服务器,以便于服务器基于所述第一验证请求对所述用户进行验证,并在验证通过后向所述客户端返回验证通过的第一指示信息;处理模块,还用于当所述输入模块接收到所述验证通过的第一指示信息时,对所述用户进行登录处理,所述第一指示信息用于指示所述用户的密码信息和所述账号信息均验证通过。
- 根据权利要求8所述的装置,其特征在于,所述指定信息摘要算法包括信息摘要算法MD5或者循环冗余校验算法CRC,所述摘要信息包括基于所述循环冗余校验算法CRC针对所述密码信息生成的摘要信息或者基于所述信息摘要算法MD5针对所述密码信息生成的摘要信息。
- 根据权利要求9所述的装置,其特征在于,所述处理模块,具体用于从预设的信息摘要算法MD5和循环冗余校验算法CRC中将所述循环冗余校验算法CRC确定为指定信息摘要算法;基于所述循环冗余校验算法CRC生成针对所述密码信息的第一摘要信息。
- 根据权利要求10所述的装置,其特征在于,所述装置还包括输出模块,其中:所述输入模块,还用于接收所述服务器对所述用户验证失败后返回的第二指示信息;所述输出模块,用于若所述处理模块检测到所述第二指示信息指示了所述用户输入的所述密码信息与所述用户预先存储在数据库中的密码样本信息不匹配,则输出提示信息,所述提示信息用于提示所述用户密码输入错误。
- 根据权利要求10所述的装置,其特征在于,所述摘要信息为所述第一摘要信息,所述处理模块,还用于通过所述输入模块接收到所述验证通过的所述第一指示信息后,若检测到所述第一指示信息指示了所述第一摘要信息与所述用户预先存储在数据库中的密码样本信息对应的目标摘要样本信息匹配,基于所述信息摘要算法MD5生成针对所述密码信息的第二摘要信息,并根据所述随机数对所述第二摘要信息进行哈希处理,得到所述第二摘要信息对应的哈希值;对所述第二摘要信息对应的哈希值进行加密处理,生成包括加密处理后的所述第二摘要信息对应哈希值的第二验证请求;所述输出模块,还用于将所述第二验证请求发送至所述服务器,以便于服务器基于所述加密处理后的所述第二摘要信息对应哈希值验证得到所述用户输入的密码信息与所述用户预先存储在数据库中的密码样本信息匹配后,向所述客户端返回验证通过的第三指示信息;所述处理模块,还用于当通过所述输入模块接收到所述第三指示信息时,触发执行所述对所述用户进行登录处理的步骤。
- 一种登录处理装置,所述装置配置于服务器,其特征在于,所述装置包括:通信模块,用于接收来自客户端的第一验证请求,所述第一验证请求中携带有随机数、加密处理后的摘要信息对应的哈希值以及加密处理后的账号信息,所述摘要信息是所述客户端基于指定信息摘要算法对用户输入的密码信息进行数据处理得到的;处理模块,用于基于预先配置的密钥对所述加密处理后的哈希值和所述账号信息进行解密处理,得到所述账号信息对应的明文信息以及解密后的哈希值,若检测到数据库中存在与所述明文信息匹配的目标账号样本信息,则确定对所述账号信息的验证通过;所述处理模块,还用于获取与所述目标账号样本信息关联存储的目标密码样本信息对应的目标摘要样本信息,并基于所述随机数对所述目标摘要样本信息进行哈希计算,得到所述目标摘要样本信息对应的样本哈希值,若检测到所述哈希值和所述样本哈希值匹配,则确定对所述密码信息的验证通过;所述通信模块,还用于向所述客户端返回验证通过的第一指示信息,以便于所述客户端基于所述指示信息,对所述用户进行登录处理,所述指示信息用于指示所述用户的密码信息和所述账号信息均验证通过。
- 根据权利要求13所述的装置,其特征在于,所述处理模块,还用于从所述明文信息中获取账号标识,从预先设置的至少一个存储区域中查找所述账号标识对应的存储区域,并在所述账号标识对应的存储区域中检测是否存在与所述明文信息匹配的目标账号样本信息。
- 一种客户端,其特征在于,包括处理器、存储器、输入设备和输出设备,所述处理器和所述存储器相互连接,其中,所述存储器用于存储计算机程序,所述计算机程序包括程序指令,所述处理器被配置用于调用所述程序指令执行:通过所述输入设备接收携带有用户信息的登录请求,所述用户信息包括用户输入的密码信息和账号信息;基于指定信息摘要算法生成针对所述密码信息的摘要信息;根据预设规则生成随机数,并通过所述随机数对所述摘要信息进行哈希处理,得到所述摘要信息对应的哈希值;对所述哈希值和所述账号信息进行加密处理,生成包括所述随机数、加密处理后的哈希值以及加密处理后的账号信息的第一验证请求;通过所述输出设备将所述第一验证请求发送至服务器,以便于服务器基于所述第一验证请求对所述用户进行验证,并在验证通过后向所述客户端返回验证通过的第一指示信息;当通过所述输入设备接收到所述验证通过的第一指示信息时,对所述用户进行登录处理,所述第一指示信息用于指示所述用户的密码信息和所述账号信息均验证通过。
- 根据权利要求15所述的客户端,其特征在于,所述指定信息摘要算法包括信息摘 要算法MD5或者循环冗余校验算法CRC,所述摘要信息包括基于所述循环冗余校验算法CRC针对所述密码信息生成的摘要信息或者基于所述信息摘要算法MD5针对所述密码信息生成的摘要信息。
- 根据权利要求16所述的客户端,其特征在于,所述处理器,具体用于从预设的信息摘要算法MD5和循环冗余校验算法CRC中将所述循环冗余校验算法CRC确定为指定信息摘要算法;基于所述循环冗余校验算法CRC生成针对所述密码信息的第一摘要信息。
- 一种服务器,其特征在于,包括处理器、存储器和网络接口,所述处理器、所述存储器和所述网络接口相互连接,其中,所述存储器用于存储计算机程序,所述计算机程序包括程序指令,所述处理器被配置用于调用所述程序指令执行:通过所述网络接口接收来自客户端的第一验证请求,所述第一验证请求中携带有随机数、加密处理后的摘要信息对应的哈希值以及加密处理后的账号信息,所述摘要信息是所述客户端基于指定信息摘要算法对用户输入的密码信息进行数据处理得到的;基于预先配置的密钥对所述加密处理后的哈希值和所述账号信息进行解密处理,得到所述账号信息对应的明文信息以及解密后的哈希值;若检测到数据库中存在与所述明文信息匹配的目标账号样本信息,则确定对所述账号信息的验证通过;获取与所述目标账号样本信息关联存储的目标密码样本信息对应的目标摘要样本信息,所述目标摘要样本信息是基于所述指定信息摘要算法对所述密码样本信息进行数据处理得到的;基于所述随机数对所述目标摘要样本信息进行哈希计算,得到所述目标摘要样本信息对应的样本哈希值,若检测到所述哈希值和所述样本哈希值匹配,则确定对所述密码信息的验证通过;通过所述网络接口向所述客户端返回验证通过的第一指示信息,以便于所述客户端基于所述指示信息,对所述用户进行登录处理,所述指示信息用于指示所述用户的密码信息和所述账号信息均验证通过。
- 根据权利要求18所述的服务器,其特征在于,所述处理器,还用于从所述明文信息中获取账号标识,从预先设置的至少一个存储区域中查找所述账号标识对应的存储区域,并在所述账号标识对应的存储区域中检测是否存在与所述明文信息匹配的目标账号样本信息。
- 一种计算机非易失性可读存储介质,其特征在于,所述计算机非易失性可读存储介质存储有计算机程序,所述计算机程序包括程序指令,所述程序指令当被处理器执行时使所述处理器执行如权利要求1-5任意一项或者6-7任意一项所述的方法。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910679227.6A CN110493197B (zh) | 2019-07-25 | 2019-07-25 | 一种登录处理方法及相关设备 |
CN201910679227.6 | 2019-07-25 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2021012552A1 true WO2021012552A1 (zh) | 2021-01-28 |
Family
ID=68548280
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2019/120959 WO2021012552A1 (zh) | 2019-07-25 | 2019-11-26 | 一种登录处理方法及相关设备 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN110493197B (zh) |
WO (1) | WO2021012552A1 (zh) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112860702A (zh) * | 2021-03-02 | 2021-05-28 | 岭东核电有限公司 | 试验执行工单验证方法、装置、计算机设备和存储介质 |
CN113378146A (zh) * | 2021-05-27 | 2021-09-10 | 广州朗国电子科技有限公司 | 一种使用nfc快捷登录用户的方法 |
CN113536367A (zh) * | 2021-06-11 | 2021-10-22 | 深圳市优克联新技术有限公司 | 一种注册方法、隐私服务器、业务信息服务器及注册*** |
CN113746833A (zh) * | 2021-09-02 | 2021-12-03 | 上海商汤智能科技有限公司 | 通信方法及装置、电子设备和存储介质 |
CN114020346A (zh) * | 2021-09-29 | 2022-02-08 | 苏州浪潮智能科技有限公司 | 一种配置文件的处理方法、装置、电子设备及存储介质 |
CN114338158A (zh) * | 2021-12-28 | 2022-04-12 | 中国电信股份有限公司 | 鉴权验证方法、***以及装置 |
CN114430346A (zh) * | 2022-01-27 | 2022-05-03 | 亿咖通(湖北)技术有限公司 | 登录方法、装置及电子设备 |
CN114584310A (zh) * | 2021-12-31 | 2022-06-03 | 中钞***产业发展有限公司杭州区块链技术研究院 | 身份验证方法、装置、设备、介质及产品 |
CN114759972A (zh) * | 2022-04-01 | 2022-07-15 | 权浩 | 一种基于北斗卫星的信息查验方法及*** |
CN115604012A (zh) * | 2022-10-20 | 2023-01-13 | 浪潮云信息技术股份公司(Cn) | 一种政务云场景下实现重要数据完整存储的方法及*** |
CN115622794A (zh) * | 2022-11-15 | 2023-01-17 | 北京密码云芯科技有限公司 | 一种加解密方法、装置、设备以及存储介质 |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110493197B (zh) * | 2019-07-25 | 2022-02-01 | 深圳壹账通智能科技有限公司 | 一种登录处理方法及相关设备 |
CN111026798B (zh) * | 2019-12-05 | 2023-07-14 | 江苏中车城市发展有限公司 | 一种机电设备数据库***及其控制方法 |
CN112333133B (zh) * | 2020-07-08 | 2024-06-07 | 深圳Tcl新技术有限公司 | 数据安全传输方法、装置、设备及计算机可读存储介质 |
CN112804030A (zh) * | 2021-01-17 | 2021-05-14 | 国网辽宁省电力有限公司电力科学研究院 | 一种基于crc+md5散列函数双向连通的数据校验方法 |
CN113259136B (zh) * | 2021-07-07 | 2021-11-16 | 浙江宇视科技有限公司 | 特征识别的多客户端协同认证方法、装置、设备及介质 |
CN114154126B (zh) * | 2021-10-31 | 2024-04-19 | 苏州浪潮智能科技有限公司 | 一种bmc登录认证方法、装置以及介质 |
CN114499859A (zh) * | 2022-03-22 | 2022-05-13 | 深圳壹账通智能科技有限公司 | 密码验证方法、装置、设备及存储介质 |
CN115378694A (zh) * | 2022-08-19 | 2022-11-22 | 山东大学 | 一种登录验证方法及*** |
CN117668936A (zh) * | 2024-01-31 | 2024-03-08 | 荣耀终端有限公司 | 数据处理方法及相关装置 |
CN117938546B (zh) * | 2024-03-21 | 2024-05-17 | 苏州阿基米德网络科技有限公司 | 一种电子账号的验证及数据访问方法 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107295011A (zh) * | 2017-08-04 | 2017-10-24 | 杭州安恒信息技术有限公司 | 网页的安全认证方法及装置 |
US20190028273A1 (en) * | 2016-01-18 | 2019-01-24 | Roland Harras | Method for saving data with multi-layer protection, in particular log-on data and passwords |
CN110493197A (zh) * | 2019-07-25 | 2019-11-22 | 深圳壹账通智能科技有限公司 | 一种登录处理方法及相关设备 |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107733656A (zh) * | 2017-10-23 | 2018-02-23 | 北京深思数盾科技股份有限公司 | 一种密码认证方法及装置 |
CN107911343B (zh) * | 2017-10-27 | 2020-09-15 | 深圳英飞拓科技股份有限公司 | 安全的密码存储验证方法和装置 |
-
2019
- 2019-07-25 CN CN201910679227.6A patent/CN110493197B/zh active Active
- 2019-11-26 WO PCT/CN2019/120959 patent/WO2021012552A1/zh active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20190028273A1 (en) * | 2016-01-18 | 2019-01-24 | Roland Harras | Method for saving data with multi-layer protection, in particular log-on data and passwords |
CN107295011A (zh) * | 2017-08-04 | 2017-10-24 | 杭州安恒信息技术有限公司 | 网页的安全认证方法及装置 |
CN110493197A (zh) * | 2019-07-25 | 2019-11-22 | 深圳壹账通智能科技有限公司 | 一种登录处理方法及相关设备 |
Cited By (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112860702A (zh) * | 2021-03-02 | 2021-05-28 | 岭东核电有限公司 | 试验执行工单验证方法、装置、计算机设备和存储介质 |
CN113378146A (zh) * | 2021-05-27 | 2021-09-10 | 广州朗国电子科技有限公司 | 一种使用nfc快捷登录用户的方法 |
CN113536367A (zh) * | 2021-06-11 | 2021-10-22 | 深圳市优克联新技术有限公司 | 一种注册方法、隐私服务器、业务信息服务器及注册*** |
CN113536367B (zh) * | 2021-06-11 | 2023-10-10 | 深圳市优克联新技术有限公司 | 一种注册方法、隐私服务器、业务信息服务器及注册*** |
CN113746833B (zh) * | 2021-09-02 | 2023-06-16 | 上海商汤智能科技有限公司 | 通信方法及装置、电子设备和存储介质 |
CN113746833A (zh) * | 2021-09-02 | 2021-12-03 | 上海商汤智能科技有限公司 | 通信方法及装置、电子设备和存储介质 |
CN114020346A (zh) * | 2021-09-29 | 2022-02-08 | 苏州浪潮智能科技有限公司 | 一种配置文件的处理方法、装置、电子设备及存储介质 |
CN114020346B (zh) * | 2021-09-29 | 2023-07-18 | 苏州浪潮智能科技有限公司 | 一种配置文件的处理方法、装置、电子设备及存储介质 |
CN114338158A (zh) * | 2021-12-28 | 2022-04-12 | 中国电信股份有限公司 | 鉴权验证方法、***以及装置 |
CN114338158B (zh) * | 2021-12-28 | 2024-05-14 | 中国电信股份有限公司 | 鉴权验证方法、***以及装置 |
CN114584310A (zh) * | 2021-12-31 | 2022-06-03 | 中钞***产业发展有限公司杭州区块链技术研究院 | 身份验证方法、装置、设备、介质及产品 |
CN114430346A (zh) * | 2022-01-27 | 2022-05-03 | 亿咖通(湖北)技术有限公司 | 登录方法、装置及电子设备 |
CN114430346B (zh) * | 2022-01-27 | 2023-09-05 | 亿咖通(湖北)技术有限公司 | 登录方法、装置及电子设备 |
CN114759972A (zh) * | 2022-04-01 | 2022-07-15 | 权浩 | 一种基于北斗卫星的信息查验方法及*** |
CN114759972B (zh) * | 2022-04-01 | 2023-06-23 | 权浩 | 一种基于北斗卫星的信息查验方法及*** |
CN115604012A (zh) * | 2022-10-20 | 2023-01-13 | 浪潮云信息技术股份公司(Cn) | 一种政务云场景下实现重要数据完整存储的方法及*** |
CN115622794A (zh) * | 2022-11-15 | 2023-01-17 | 北京密码云芯科技有限公司 | 一种加解密方法、装置、设备以及存储介质 |
CN115622794B (zh) * | 2022-11-15 | 2023-04-07 | 北京密码云芯科技有限公司 | 一种加解密方法、装置、设备以及存储介质 |
Also Published As
Publication number | Publication date |
---|---|
CN110493197A (zh) | 2019-11-22 |
CN110493197B (zh) | 2022-02-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2021012552A1 (zh) | 一种登录处理方法及相关设备 | |
US10652015B2 (en) | Confidential communication management | |
US9847880B2 (en) | Techniques for ensuring authentication and integrity of communications | |
US8001383B2 (en) | Secure serial number | |
US20110202992A1 (en) | method for authenticating a trusted platform based on the tri-element peer authentication(tepa) | |
CN110719173B (zh) | 一种信息处理方法及装置 | |
KR100702499B1 (ko) | 메시지 무결성 보증 시스템, 방법 및 기록 매체 | |
JP2016515235A5 (zh) | ||
US8566952B1 (en) | System and method for encrypting data and providing controlled access to encrypted data with limited additional access | |
CN108805571B (zh) | 数据保护方法、平台、区块链节点、***和存储介质 | |
US20050235150A1 (en) | Bi-directionally verifying measurable aspects associated with modules, pre-computing solutions to configuration challenges, and using configuration challenges along with other authentication mechanisms | |
KR102137122B1 (ko) | 보안 체크 방법, 장치, 단말기 및 서버 | |
CN110071937B (zh) | 基于区块链的登录方法、***及存储介质 | |
WO2018112482A1 (en) | Method and system for distributing attestation key and certificate in trusted computing | |
KR101253683B1 (ko) | 연쇄 해시에 의한 전자서명 시스템 및 방법 | |
CN113688399A (zh) | 固件数字签名保护方法、装置、计算机设备及存储介质 | |
CN111639325A (zh) | 基于开放平台的商户认证方法、装置、设备和存储介质 | |
WO2018047120A1 (en) | A system and method for data block modification detection and authentication codes | |
US9027096B2 (en) | Method and device for enhancing security of user security model | |
CN116881936A (zh) | 可信计算方法及相关设备 | |
CN114726606B (zh) | 一种用户认证方法、客户端、网关及认证服务器 | |
CN108242997B (zh) | 安全通信的方法与设备 | |
CN113221074B (zh) | 一种离线授权方法 | |
CN115604034A (zh) | 一种通信连接的加解密方法、***及电子设备 | |
CN115550060A (zh) | 基于区块链的可信证书验证方法、装置、设备和介质 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 19938575 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 19938575 Country of ref document: EP Kind code of ref document: A1 |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205 DATED 09/08/2022) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 19938575 Country of ref document: EP Kind code of ref document: A1 |