+

CN109684818A - A kind of server log method for the cross-terminal formula for preventing owner's login password from revealing - Google Patents

A kind of server log method for the cross-terminal formula for preventing owner's login password from revealing Download PDF

Info

Publication number
CN109684818A
CN109684818A CN201811430216.6A CN201811430216A CN109684818A CN 109684818 A CN109684818 A CN 109684818A CN 201811430216 A CN201811430216 A CN 201811430216A CN 109684818 A CN109684818 A CN 109684818A
Authority
CN
China
Prior art keywords
owner
security terminal
terminal
password
login
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811430216.6A
Other languages
Chinese (zh)
Inventor
黄朝阳
曹羽超
其他发明人请求不公开姓名
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Entropy Plus Network Technology (beijing) Co Ltd
Original Assignee
Entropy Plus Network Technology (beijing) Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Entropy Plus Network Technology (beijing) Co Ltd filed Critical Entropy Plus Network Technology (beijing) Co Ltd
Priority to CN201811430216.6A priority Critical patent/CN109684818A/en
Publication of CN109684818A publication Critical patent/CN109684818A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • G06F21/445Program or device authentication by mutual authentication, e.g. between devices or programs

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

A kind of server log method for the cross-terminal formula for preventing owner's login password from revealing, belong to server security login techniques field, its feature exists: password is stored in the password storage module of security terminal, server log process is completed in security terminal when login, security terminal obtains authentication information from server, non-security terminal is sent by authentication information again, non-security terminal accesses listed server by authentication information, realizes sign-on access.Password is always without contacting non-security terminal.

Description

A kind of server log method for the cross-terminal formula for preventing owner's login password from revealing
Technical field
It is a kind of prevent owner's login password reveal cross-terminal formula server log method be related to information security technology neck The server log method of domain more particularly to cross-terminal formula.
Background technique
In technical development of computer, each software systems are mainly completed the identification to user by password and are authenticated, in uneasiness Full terminal login can have wooden horse by record screen, and supervisory keyboard monitors the risk that the modes such as clipbook steal user password, use Once losing, attacker can falsely use user identity on the internet, cause heavy losses to user, society family password.And And since user often uses same password in not homologous ray, an account leakage can cause the identity of consecutive to falsely use generation.
In software systems, password is intended only as the voucher of identification user, after user completes verifying by password, server Authentication information can be sent to user terminal, logging state, listed user terminal are marked such as cookie or Token Subsidiary authentication information can be identified as logging state by server when sending new content to server.But each system at present Authentication information of uniting only is used in local terminal, the risk for the password that is stolen when user is using the preceding password there are still input.
In the method and device of the multiple terminals login service device of Publication No. CN103475476A, describes multiple terminals and step on Recording method: the device identification of associated terminal is obtained;Logging request is sent to server, the logging request includes logon account The device identification of information and the associated terminal.By the method for the multiple terminals login service device, multiple terminals is only needed once The verifying of logon account information can login service device, avoid repeatedly inputting logon account information.But this method needs are servicing Device end is modified, and is trusted second terminal, and not can solve second terminal, there are security risk or temporary login second are whole The problem of end.
Summary of the invention
The present invention provides a kind of server log method of cross-terminal formula, it is therefore an objective to prevent server log password from revealing.
A kind of server log method for the cross-terminal formula for preventing owner's login password from revealing, which is characterized in that be one A cross-terminal formula server collectively constituted by server, contaminated non-security terminal and unpolluted security terminal is stepped on In recording system, successively realize according to the following steps:
The non-security terminal refers to that the contaminated registration terminal including computer that owner uses, security terminal are Refer to the unpolluted registration terminal including mobile phone that same owner uses;
Step 1, system initialization, the security terminal are a mobile phones, and the non-security terminal is a computer, institute There is a password storage module in the mobile phone stated, is built-in with password, the owner's terminal device ID table of owner's login service device;
Step 2, owner inputs the device id of the non-security terminal to security terminal input terminal;
Step 3, owner issues the request of login service device in security terminal;
Step 4, security terminal finds the password of owner's login service device;
Step 5, the password login server of security terminal owner's login service device;
Step 6, security terminal obtains owner's authentication information from server;
Step 7, security terminal is recognized according to the device id of non-security terminal to owner's identity described in non-security terminal sending step 6 Demonstrate,prove information;
Step 8, non-security terminal owner's authentication information according to step 6 directly logs in the service of security terminal login Device;
Step 9, owner's tell the server deletes authentication information described in step 6, resets non-security terminal from passing through Owner's authentication information login service device described in step 6.
Preferably, in steps of 5, security terminal will use the device parameter login service device of non-security terminal, make step The authentication information can use in non-security terminal.
The beneficial effect of technical solution of the present invention is: user only uses user name, password on security terminal, is not necessarily to Other terminals input password, and are able to achieve sign-on access.Logging in non-security terminal the invention avoids user causes password stolen The risk taken, realizes the Password Management of real cross-terminal, and user is close without transmitting user name when non-security terminal is logged in High risk data as code, improve safety.The authentication caching of transmission can be recalled, can after user completes operation It is logged in being nullified to server, keeps used authentication caching invalid.
Detailed description of the invention
Fig. 1 is the implementation process schematic diagram of safe login method provided in an embodiment of the present invention.
Fig. 2 is the structural schematic diagram in the embodiment of the present invention.
Specific embodiment
In order to illustrate the embodiments of the present invention more clearly and technical solution, below in conjunction with accompanying drawings and embodiments to the present invention Technical solution be described in detail, it is clear that described embodiment is a part of the embodiments of the present invention, rather than complete Portion's embodiment.Based on the embodiment of the present invention, those of ordinary skill in the art are obtained without creative efforts The every other embodiment obtained, shall fall within the protection scope of the present invention.
User needs to complete proof of identity by register before using each software systems.But under multiple terminals, User is it is difficult to ensure that all login environment safe enoughs.Family can be used to need only assure that in safe login method provided by the invention One terminal security can realize secure log in all terminals.User only saves password on ensuring safe terminal, Logging device environment is simulated by security terminal login module to complete to log in, and obtains the authentication cache information in server, And authentication caching is transmitted to the non-security terminal to be logged in, non-security terminal is joined by authentication caching and server System completes sign-on access.Here, the terminal includes but is not limited to smart phone, tablet computer, PC.
Fig. 1 is the implementation process schematic diagram of safe login method provided in an embodiment of the present invention, as shown in Figure 1, this method Include:
Step 101, system initialization, the security terminal are a mobile phones, and the non-security terminal is a computer, There is a password storage module in the mobile phone, is built-in with the password of owner's login service device, the device id of owner's terminal Table.
Specifically, security terminal is not affected by computer virus, wooden horse, loophole pollution, non-security terminal has been subjected to calculating Machine virus, wooden horse, loophole pollution.User needs login service device on computers.User preserves login service on mobile phone The password that device uses.
Step 102, owner inputs the device id of the computer to mobile phone.
Wherein, user inputs the device id of computer on mobile phone in step 102, establishes mobile phone with computer and is associated with.Input ID is to input identifying code, bluetooth binding by barcode scanning, and the modes such as data line connection are realized.
Step 103, owner issues the request of login service device in mobile phone.
Wherein, owner can issue the request of login service device to associated mobile phone on computers in step 103, and sending needs The username information of the server address, login to be logged in.
More preferably, operating system from computer to associated mobile phone, login software name that chance sends are calculated in step 103 Claim, version information.
Step 104, mobile phone finds the password of owner's login service device.
Step 105, the mobile phone password login server.
Wherein, in step 105, mobile phone can to computer described in login service device sending step 103 operating system, Dbase, version information are logged in, the authentication obtained can be used on computers.
Step 106, mobile phone obtains authentication information from server.
Wherein, after the user name of server confirmation mobile phone transmission, password are correct, an authentication information label can be generated User, and the authentication information is sent to mobile phone, mobile phone can allow server subsequently through sending authentication information It is judged as user's operation.Authentication information can be cookie, token form.
Step 107, mobile phone is according to the device id of computer to authentication information described in computer sending step 6;
Step 108, computer authentication information according to step 6 directly logs in the server of mobile phone login.
Step 109, owner deletes authentication information described in step 6 to server for services device, makes non-security end End cannot pass through the authentication information login service device described in step 6.
Wherein, in step 109, owner completes register on computers, needs that computer is prevented to continue to log in clothes Business device device, but computer has been left, the letter of authentication described in step 6 can be deleted to server for services device on mobile phone Breath, after server device deletes authentication information, computer by reset authentication information cannot login service device again, mobile phone Server can be logged on by user name, password.
Describe the main flow of the server log of cross-terminal formula respectively above, the process is by security terminal, non-security Terminal, server are completed, and the connection relationship in embodiment between each terminal server is shown in Figure 2, wherein non-security terminal Logging request is issued to security terminal, security terminal finds game server after password, and security terminal is returned from server The authentication information returned, security terminal transmit ID card information to non-security terminal, and non-security terminal is passed according to security terminal The ID card information login service device passed.
It completes after logging in, security terminal request server deletes authentication information.
Illustrate again, the above is the embodiment of the present invention, is not intended to limit the scope of the invention, all Changed using equivalent structure made by description of the invention and accompanying drawing content and equivalent process, such as the technology between each embodiment Feature be combined with each other, and is applied directly or indirectly in other relevant technical fields, and is similarly included in patent of the invention In protection scope.

Claims (3)

1. a kind of server log method for the cross-terminal formula for preventing owner's login password from revealing, which is characterized in that be at one By server, cross-terminal formula server log that contaminated non-security terminal and unpolluted security terminal collectively constitute In system, successively realize according to the following steps:
The non-security terminal refers to that the contaminated registration terminal including computer that owner uses, security terminal are Refer to the unpolluted registration terminal including mobile phone that same owner uses;
Step 1, system initialization, the security terminal are a mobile phones, and the non-security terminal is a computer, institute There is a password storage module in the mobile phone stated, is built-in with the password of owner's login service device, owner uses non-security terminal Device id;
Step 2, owner inputs the device id of the non-security terminal to security terminal;
Step 3, owner issues the request of login service device in security terminal;
Step 4, security terminal finds the password of owner's login service device;
Step 5, security terminal owner's login service device password login server;
Step 6, security terminal obtains owner's authentication information from server;
Step 7, security terminal is recognized according to the device id of non-security terminal to owner's identity described in non-security terminal sending step 6 Demonstrate,prove information;
Step 8, non-security terminal owner's authentication information according to step 6 directly logs in the service of security terminal login Device.
2. a kind of server log method of cross-terminal formula for preventing owner's login password from revealing according to claim 1, It is characterized in that, there are also step 9 owner's tell the servers to delete owner's authentication information described in step 6 after step 8, Non-security terminal cannot pass through owner's authentication information login service device described in playback step 6.
3. a kind of server log method of cross-terminal formula for preventing owner's login password from revealing according to claim 1, It is characterized in that, in steps of 5, security terminal will use the device parameter login service device of non-security terminal, make described in step 6 Owner's authentication information can be used in non-security terminal.
CN201811430216.6A 2018-11-28 2018-11-28 A kind of server log method for the cross-terminal formula for preventing owner's login password from revealing Pending CN109684818A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811430216.6A CN109684818A (en) 2018-11-28 2018-11-28 A kind of server log method for the cross-terminal formula for preventing owner's login password from revealing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811430216.6A CN109684818A (en) 2018-11-28 2018-11-28 A kind of server log method for the cross-terminal formula for preventing owner's login password from revealing

Publications (1)

Publication Number Publication Date
CN109684818A true CN109684818A (en) 2019-04-26

Family

ID=66184998

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811430216.6A Pending CN109684818A (en) 2018-11-28 2018-11-28 A kind of server log method for the cross-terminal formula for preventing owner's login password from revealing

Country Status (1)

Country Link
CN (1) CN109684818A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116980238A (en) * 2023-09-25 2023-10-31 北京智麟科技有限公司 Multi-terminal login control method and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103248612A (en) * 2012-02-08 2013-08-14 北京磊友信息科技有限公司 Method and server for providing application among multiple terminals
CN106330844A (en) * 2015-07-02 2017-01-11 阿里巴巴集团控股有限公司 A cross-terminal free login method and device
CN106339613A (en) * 2016-08-15 2017-01-18 腾讯科技(深圳)有限公司 Application data processing method, terminal and server
CN107317813A (en) * 2017-06-30 2017-11-03 北京奇虎科技有限公司 Terminal logs in method and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103248612A (en) * 2012-02-08 2013-08-14 北京磊友信息科技有限公司 Method and server for providing application among multiple terminals
CN106330844A (en) * 2015-07-02 2017-01-11 阿里巴巴集团控股有限公司 A cross-terminal free login method and device
CN106339613A (en) * 2016-08-15 2017-01-18 腾讯科技(深圳)有限公司 Application data processing method, terminal and server
CN107317813A (en) * 2017-06-30 2017-11-03 北京奇虎科技有限公司 Terminal logs in method and system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116980238A (en) * 2023-09-25 2023-10-31 北京智麟科技有限公司 Multi-terminal login control method and system
CN116980238B (en) * 2023-09-25 2023-12-08 北京智麟科技有限公司 Multi-terminal login control method and system

Similar Documents

Publication Publication Date Title
US12143817B2 (en) Secure mobile initiated authentications to web-services
US11438764B2 (en) Secure mobile initiated authentication
US10382434B2 (en) Actively federated mobile authentication
US9491155B1 (en) Account generation based on external credentials
CA2736582C (en) Authorization of server operations
CN105978855B (en) Personal information safety protection system and method under a kind of system of real name
CA3122376A1 (en) Systems and methods for securing login access
CN109495458A (en) A kind of method, system and the associated component of data transmission
CN103401686A (en) User Internet identity authentication system and application method thereof
CN118316688A (en) Gateway authentication method, device and system
CN109684818A (en) A kind of server log method for the cross-terminal formula for preventing owner's login password from revealing
US10708301B2 (en) Method of, and apparatus for, secure online electronic communication
CN102314566A (en) Computer-to-computer authentication and man-to-machine authentication method applied to cloud computing
CN107872320A (en) Terminal digital signature method and system and the terminal for digital signature
JP5351805B2 (en) One-time password issuing device, one-time password issuing system
Kumar et al. Efficiently improving the security of OTP
KR20150104667A (en) Authentication method
Ahmad et al. Enhancing the Authentication Mechanism of Social Media Websites using Face Detection
JP2023019935A (en) Communication processing device and communication processing program
CN116305280A (en) Personal data management method and system based on digital identity
CN118611969A (en) Single sign-on method, device, system, electronic device and storage medium
CN113987461A (en) Identity authentication method and device and electronic equipment
KR20140007984A (en) Method for login with instant message

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20190426

WD01 Invention patent application deemed withdrawn after publication
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载