CN109684818A - A kind of server log method for the cross-terminal formula for preventing owner's login password from revealing - Google Patents
A kind of server log method for the cross-terminal formula for preventing owner's login password from revealing Download PDFInfo
- Publication number
- CN109684818A CN109684818A CN201811430216.6A CN201811430216A CN109684818A CN 109684818 A CN109684818 A CN 109684818A CN 201811430216 A CN201811430216 A CN 201811430216A CN 109684818 A CN109684818 A CN 109684818A
- Authority
- CN
- China
- Prior art keywords
- owner
- security terminal
- terminal
- password
- login
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 25
- 238000010586 diagram Methods 0.000 description 3
- 241000700605 Viruses Species 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 2
- 235000014510 cooky Nutrition 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
- G06F21/445—Program or device authentication by mutual authentication, e.g. between devices or programs
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
- Information Transfer Between Computers (AREA)
Abstract
A kind of server log method for the cross-terminal formula for preventing owner's login password from revealing, belong to server security login techniques field, its feature exists: password is stored in the password storage module of security terminal, server log process is completed in security terminal when login, security terminal obtains authentication information from server, non-security terminal is sent by authentication information again, non-security terminal accesses listed server by authentication information, realizes sign-on access.Password is always without contacting non-security terminal.
Description
Technical field
It is a kind of prevent owner's login password reveal cross-terminal formula server log method be related to information security technology neck
The server log method of domain more particularly to cross-terminal formula.
Background technique
In technical development of computer, each software systems are mainly completed the identification to user by password and are authenticated, in uneasiness
Full terminal login can have wooden horse by record screen, and supervisory keyboard monitors the risk that the modes such as clipbook steal user password, use
Once losing, attacker can falsely use user identity on the internet, cause heavy losses to user, society family password.And
And since user often uses same password in not homologous ray, an account leakage can cause the identity of consecutive to falsely use generation.
In software systems, password is intended only as the voucher of identification user, after user completes verifying by password, server
Authentication information can be sent to user terminal, logging state, listed user terminal are marked such as cookie or Token
Subsidiary authentication information can be identified as logging state by server when sending new content to server.But each system at present
Authentication information of uniting only is used in local terminal, the risk for the password that is stolen when user is using the preceding password there are still input.
In the method and device of the multiple terminals login service device of Publication No. CN103475476A, describes multiple terminals and step on
Recording method: the device identification of associated terminal is obtained;Logging request is sent to server, the logging request includes logon account
The device identification of information and the associated terminal.By the method for the multiple terminals login service device, multiple terminals is only needed once
The verifying of logon account information can login service device, avoid repeatedly inputting logon account information.But this method needs are servicing
Device end is modified, and is trusted second terminal, and not can solve second terminal, there are security risk or temporary login second are whole
The problem of end.
Summary of the invention
The present invention provides a kind of server log method of cross-terminal formula, it is therefore an objective to prevent server log password from revealing.
A kind of server log method for the cross-terminal formula for preventing owner's login password from revealing, which is characterized in that be one
A cross-terminal formula server collectively constituted by server, contaminated non-security terminal and unpolluted security terminal is stepped on
In recording system, successively realize according to the following steps:
The non-security terminal refers to that the contaminated registration terminal including computer that owner uses, security terminal are
Refer to the unpolluted registration terminal including mobile phone that same owner uses;
Step 1, system initialization, the security terminal are a mobile phones, and the non-security terminal is a computer, institute
There is a password storage module in the mobile phone stated, is built-in with password, the owner's terminal device ID table of owner's login service device;
Step 2, owner inputs the device id of the non-security terminal to security terminal input terminal;
Step 3, owner issues the request of login service device in security terminal;
Step 4, security terminal finds the password of owner's login service device;
Step 5, the password login server of security terminal owner's login service device;
Step 6, security terminal obtains owner's authentication information from server;
Step 7, security terminal is recognized according to the device id of non-security terminal to owner's identity described in non-security terminal sending step 6
Demonstrate,prove information;
Step 8, non-security terminal owner's authentication information according to step 6 directly logs in the service of security terminal login
Device;
Step 9, owner's tell the server deletes authentication information described in step 6, resets non-security terminal from passing through
Owner's authentication information login service device described in step 6.
Preferably, in steps of 5, security terminal will use the device parameter login service device of non-security terminal, make step
The authentication information can use in non-security terminal.
The beneficial effect of technical solution of the present invention is: user only uses user name, password on security terminal, is not necessarily to
Other terminals input password, and are able to achieve sign-on access.Logging in non-security terminal the invention avoids user causes password stolen
The risk taken, realizes the Password Management of real cross-terminal, and user is close without transmitting user name when non-security terminal is logged in
High risk data as code, improve safety.The authentication caching of transmission can be recalled, can after user completes operation
It is logged in being nullified to server, keeps used authentication caching invalid.
Detailed description of the invention
Fig. 1 is the implementation process schematic diagram of safe login method provided in an embodiment of the present invention.
Fig. 2 is the structural schematic diagram in the embodiment of the present invention.
Specific embodiment
In order to illustrate the embodiments of the present invention more clearly and technical solution, below in conjunction with accompanying drawings and embodiments to the present invention
Technical solution be described in detail, it is clear that described embodiment is a part of the embodiments of the present invention, rather than complete
Portion's embodiment.Based on the embodiment of the present invention, those of ordinary skill in the art are obtained without creative efforts
The every other embodiment obtained, shall fall within the protection scope of the present invention.
User needs to complete proof of identity by register before using each software systems.But under multiple terminals,
User is it is difficult to ensure that all login environment safe enoughs.Family can be used to need only assure that in safe login method provided by the invention
One terminal security can realize secure log in all terminals.User only saves password on ensuring safe terminal,
Logging device environment is simulated by security terminal login module to complete to log in, and obtains the authentication cache information in server,
And authentication caching is transmitted to the non-security terminal to be logged in, non-security terminal is joined by authentication caching and server
System completes sign-on access.Here, the terminal includes but is not limited to smart phone, tablet computer, PC.
Fig. 1 is the implementation process schematic diagram of safe login method provided in an embodiment of the present invention, as shown in Figure 1, this method
Include:
Step 101, system initialization, the security terminal are a mobile phones, and the non-security terminal is a computer,
There is a password storage module in the mobile phone, is built-in with the password of owner's login service device, the device id of owner's terminal
Table.
Specifically, security terminal is not affected by computer virus, wooden horse, loophole pollution, non-security terminal has been subjected to calculating
Machine virus, wooden horse, loophole pollution.User needs login service device on computers.User preserves login service on mobile phone
The password that device uses.
Step 102, owner inputs the device id of the computer to mobile phone.
Wherein, user inputs the device id of computer on mobile phone in step 102, establishes mobile phone with computer and is associated with.Input
ID is to input identifying code, bluetooth binding by barcode scanning, and the modes such as data line connection are realized.
Step 103, owner issues the request of login service device in mobile phone.
Wherein, owner can issue the request of login service device to associated mobile phone on computers in step 103, and sending needs
The username information of the server address, login to be logged in.
More preferably, operating system from computer to associated mobile phone, login software name that chance sends are calculated in step 103
Claim, version information.
Step 104, mobile phone finds the password of owner's login service device.
Step 105, the mobile phone password login server.
Wherein, in step 105, mobile phone can to computer described in login service device sending step 103 operating system,
Dbase, version information are logged in, the authentication obtained can be used on computers.
Step 106, mobile phone obtains authentication information from server.
Wherein, after the user name of server confirmation mobile phone transmission, password are correct, an authentication information label can be generated
User, and the authentication information is sent to mobile phone, mobile phone can allow server subsequently through sending authentication information
It is judged as user's operation.Authentication information can be cookie, token form.
Step 107, mobile phone is according to the device id of computer to authentication information described in computer sending step 6;
Step 108, computer authentication information according to step 6 directly logs in the server of mobile phone login.
Step 109, owner deletes authentication information described in step 6 to server for services device, makes non-security end
End cannot pass through the authentication information login service device described in step 6.
Wherein, in step 109, owner completes register on computers, needs that computer is prevented to continue to log in clothes
Business device device, but computer has been left, the letter of authentication described in step 6 can be deleted to server for services device on mobile phone
Breath, after server device deletes authentication information, computer by reset authentication information cannot login service device again, mobile phone
Server can be logged on by user name, password.
Describe the main flow of the server log of cross-terminal formula respectively above, the process is by security terminal, non-security
Terminal, server are completed, and the connection relationship in embodiment between each terminal server is shown in Figure 2, wherein non-security terminal
Logging request is issued to security terminal, security terminal finds game server after password, and security terminal is returned from server
The authentication information returned, security terminal transmit ID card information to non-security terminal, and non-security terminal is passed according to security terminal
The ID card information login service device passed.
It completes after logging in, security terminal request server deletes authentication information.
Illustrate again, the above is the embodiment of the present invention, is not intended to limit the scope of the invention, all
Changed using equivalent structure made by description of the invention and accompanying drawing content and equivalent process, such as the technology between each embodiment
Feature be combined with each other, and is applied directly or indirectly in other relevant technical fields, and is similarly included in patent of the invention
In protection scope.
Claims (3)
1. a kind of server log method for the cross-terminal formula for preventing owner's login password from revealing, which is characterized in that be at one
By server, cross-terminal formula server log that contaminated non-security terminal and unpolluted security terminal collectively constitute
In system, successively realize according to the following steps:
The non-security terminal refers to that the contaminated registration terminal including computer that owner uses, security terminal are
Refer to the unpolluted registration terminal including mobile phone that same owner uses;
Step 1, system initialization, the security terminal are a mobile phones, and the non-security terminal is a computer, institute
There is a password storage module in the mobile phone stated, is built-in with the password of owner's login service device, owner uses non-security terminal
Device id;
Step 2, owner inputs the device id of the non-security terminal to security terminal;
Step 3, owner issues the request of login service device in security terminal;
Step 4, security terminal finds the password of owner's login service device;
Step 5, security terminal owner's login service device password login server;
Step 6, security terminal obtains owner's authentication information from server;
Step 7, security terminal is recognized according to the device id of non-security terminal to owner's identity described in non-security terminal sending step 6
Demonstrate,prove information;
Step 8, non-security terminal owner's authentication information according to step 6 directly logs in the service of security terminal login
Device.
2. a kind of server log method of cross-terminal formula for preventing owner's login password from revealing according to claim 1,
It is characterized in that, there are also step 9 owner's tell the servers to delete owner's authentication information described in step 6 after step 8,
Non-security terminal cannot pass through owner's authentication information login service device described in playback step 6.
3. a kind of server log method of cross-terminal formula for preventing owner's login password from revealing according to claim 1,
It is characterized in that, in steps of 5, security terminal will use the device parameter login service device of non-security terminal, make described in step 6
Owner's authentication information can be used in non-security terminal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811430216.6A CN109684818A (en) | 2018-11-28 | 2018-11-28 | A kind of server log method for the cross-terminal formula for preventing owner's login password from revealing |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811430216.6A CN109684818A (en) | 2018-11-28 | 2018-11-28 | A kind of server log method for the cross-terminal formula for preventing owner's login password from revealing |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109684818A true CN109684818A (en) | 2019-04-26 |
Family
ID=66184998
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811430216.6A Pending CN109684818A (en) | 2018-11-28 | 2018-11-28 | A kind of server log method for the cross-terminal formula for preventing owner's login password from revealing |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109684818A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116980238A (en) * | 2023-09-25 | 2023-10-31 | 北京智麟科技有限公司 | Multi-terminal login control method and system |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103248612A (en) * | 2012-02-08 | 2013-08-14 | 北京磊友信息科技有限公司 | Method and server for providing application among multiple terminals |
CN106330844A (en) * | 2015-07-02 | 2017-01-11 | 阿里巴巴集团控股有限公司 | A cross-terminal free login method and device |
CN106339613A (en) * | 2016-08-15 | 2017-01-18 | 腾讯科技(深圳)有限公司 | Application data processing method, terminal and server |
CN107317813A (en) * | 2017-06-30 | 2017-11-03 | 北京奇虎科技有限公司 | Terminal logs in method and system |
-
2018
- 2018-11-28 CN CN201811430216.6A patent/CN109684818A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103248612A (en) * | 2012-02-08 | 2013-08-14 | 北京磊友信息科技有限公司 | Method and server for providing application among multiple terminals |
CN106330844A (en) * | 2015-07-02 | 2017-01-11 | 阿里巴巴集团控股有限公司 | A cross-terminal free login method and device |
CN106339613A (en) * | 2016-08-15 | 2017-01-18 | 腾讯科技(深圳)有限公司 | Application data processing method, terminal and server |
CN107317813A (en) * | 2017-06-30 | 2017-11-03 | 北京奇虎科技有限公司 | Terminal logs in method and system |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116980238A (en) * | 2023-09-25 | 2023-10-31 | 北京智麟科技有限公司 | Multi-terminal login control method and system |
CN116980238B (en) * | 2023-09-25 | 2023-12-08 | 北京智麟科技有限公司 | Multi-terminal login control method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US12143817B2 (en) | Secure mobile initiated authentications to web-services | |
US11438764B2 (en) | Secure mobile initiated authentication | |
US10382434B2 (en) | Actively federated mobile authentication | |
US9491155B1 (en) | Account generation based on external credentials | |
CA2736582C (en) | Authorization of server operations | |
CN105978855B (en) | Personal information safety protection system and method under a kind of system of real name | |
CA3122376A1 (en) | Systems and methods for securing login access | |
CN109495458A (en) | A kind of method, system and the associated component of data transmission | |
CN103401686A (en) | User Internet identity authentication system and application method thereof | |
CN118316688A (en) | Gateway authentication method, device and system | |
CN109684818A (en) | A kind of server log method for the cross-terminal formula for preventing owner's login password from revealing | |
US10708301B2 (en) | Method of, and apparatus for, secure online electronic communication | |
CN102314566A (en) | Computer-to-computer authentication and man-to-machine authentication method applied to cloud computing | |
CN107872320A (en) | Terminal digital signature method and system and the terminal for digital signature | |
JP5351805B2 (en) | One-time password issuing device, one-time password issuing system | |
Kumar et al. | Efficiently improving the security of OTP | |
KR20150104667A (en) | Authentication method | |
Ahmad et al. | Enhancing the Authentication Mechanism of Social Media Websites using Face Detection | |
JP2023019935A (en) | Communication processing device and communication processing program | |
CN116305280A (en) | Personal data management method and system based on digital identity | |
CN118611969A (en) | Single sign-on method, device, system, electronic device and storage medium | |
CN113987461A (en) | Identity authentication method and device and electronic equipment | |
KR20140007984A (en) | Method for login with instant message |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20190426 |
|
WD01 | Invention patent application deemed withdrawn after publication |