[go: up one dir, main page]

CN116723024B - Verification method and device for client login, electronic equipment and storage medium - Google Patents

Verification method and device for client login, electronic equipment and storage medium Download PDF

Info

Publication number
CN116723024B
CN116723024B CN202310774395.XA CN202310774395A CN116723024B CN 116723024 B CN116723024 B CN 116723024B CN 202310774395 A CN202310774395 A CN 202310774395A CN 116723024 B CN116723024 B CN 116723024B
Authority
CN
China
Prior art keywords
verified
login
interaction
sequence
interactive
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310774395.XA
Other languages
Chinese (zh)
Other versions
CN116723024A (en
Inventor
李赵强
许林
叶松林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing Selis Phoenix Intelligent Innovation Technology Co ltd
Original Assignee
Chongqing Selis Phoenix Intelligent Innovation Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing Selis Phoenix Intelligent Innovation Technology Co ltd filed Critical Chongqing Selis Phoenix Intelligent Innovation Technology Co ltd
Priority to CN202310774395.XA priority Critical patent/CN116723024B/en
Publication of CN116723024A publication Critical patent/CN116723024A/en
Application granted granted Critical
Publication of CN116723024B publication Critical patent/CN116723024B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The application relates to the technical field of communication, and provides a verification method and device for client login, electronic equipment and a storage medium. The method comprises the following steps: receiving a login request of a user at this time, and generating a plurality of interactive animations to be verified with interactive sequences according to the login request at this time; receiving interaction information to be verified, which is obtained by interaction between a user and a plurality of interaction animations to be verified; performing first login verification according to the interaction sequence to be verified between the user and the plurality of interaction animations to be verified, and obtaining a first login verification result; if the first login verification result is successful, text values corresponding to the interactive animations to be verified are sent to the server side, so that the server side performs second login verification according to the text values corresponding to the interactive animations to be verified, and a second login verification result is obtained; based on the second login verification result, whether the user logs in or not is confirmed, so that the login verification safety of the user client side is improved.

Description

Verification method and device for client login, electronic equipment and storage medium
Technical Field
The present application relates to the field of communications technologies, and in particular, to a method and apparatus for verifying client login, an electronic device, and a storage medium.
Background
In network activities, how to secure a network environment is what needs to be considered with great importance. At present, in order to improve the security of network activities of a user, a mobile phone short message authentication login technology, a picture authentication technology and the like can be adopted when the user logs in a client, but the technologies all have certain problems, for example, the mobile phone short message authentication login needs to pay a fee to an operator, so that the operation cost is increased; the picture verification technology comprises a picture verification code and a mode of dragging the complement picture verification, wherein the picture verification code needs to generate picture content and an Identity (Identity, ID) corresponding to the picture by a server, and the corresponding picture ID is already known when the picture content is acquired, so that the picture is easy to capture and identify; the method of dragging the complement picture is usually verified by identifying the coordinate range, and the verification method does not need to be participated by a server, so that the security is low.
Disclosure of Invention
In view of this, the embodiments of the present application provide a method, an apparatus, a computer device, and a storage medium for verifying client login, so as to solve the problem in the prior art that the security of client login is low.
In a first aspect of the embodiment of the present application, a method for verifying client login is provided, including:
Receiving a login request of a user, and generating a plurality of interactive animations to be verified with interactive sequences according to the login request, wherein the interactive animations to be verified are obtained according to corresponding text values for login verification;
Receiving to-be-verified interaction information obtained by interaction between a user and a plurality of to-be-verified interaction animations, wherein the to-be-verified interaction information comprises to-be-verified interaction sequences between the user and the plurality of to-be-verified interaction animations and text values corresponding to the plurality of to-be-verified interaction animations arranged according to the to-be-verified interaction sequences;
Performing first login verification according to the interaction sequence to be verified between the user and the plurality of interaction animations to be verified, and obtaining a first login verification result;
if the first login verification result is successful, text values corresponding to the interactive animations to be verified are sent to the server side, so that the server side performs second login verification according to the text values corresponding to the interactive animations to be verified, and a second login verification result is obtained;
And based on the second login verification result, confirming whether the user logs in.
In a second aspect of the embodiment of the present application, there is provided a verification apparatus for client login, including:
The animation generation module is configured to receive a login request of a user, and generate a plurality of interactive animations to be verified with an interactive sequence according to the login request, wherein the interactive animations to be verified are obtained according to corresponding text values for login verification;
the interactive module is configured to receive to-be-verified interactive information obtained by interaction between a user and a plurality of to-be-verified interactive animations, wherein the to-be-verified interactive information comprises to-be-verified interactive sequences between the user and the plurality of to-be-verified interactive animations and text values corresponding to the plurality of to-be-verified interactive animations arranged according to the to-be-verified interactive sequences;
The first verification module is configured to perform first login verification according to the interaction sequence to be verified between the user and the plurality of interaction animations to be verified, and a first login verification result is obtained;
The second verification module is configured to send text values corresponding to the plurality of interactive animations to be verified to the server if the first login verification result is successful, so that the server performs second login verification according to the text values corresponding to the plurality of interactive animations to be verified to obtain a second login verification result;
And a login module configured to confirm whether the user is logged in based on the second login verification result.
In a third aspect of the embodiments of the present application, there is provided an electronic device comprising a memory, a processor and a computer program stored in the memory and executable on the processor, the processor implementing the steps of the above method when executing the computer program.
In a fourth aspect of the embodiments of the present application, there is provided a computer readable storage medium storing a computer program which, when executed by a processor, implements the steps of the above method.
Compared with the prior art, the embodiment of the application has the beneficial effects that: receiving a login request of a user at this time through a client, and generating a plurality of interactive animations to be verified with interactive sequences according to the login request at this time, wherein the interactive animations to be verified are obtained according to corresponding text values for login verification; receiving to-be-verified interaction information obtained by interaction between a user and a plurality of to-be-verified interaction animations, wherein the to-be-verified interaction information comprises to-be-verified interaction sequences between the user and the plurality of to-be-verified interaction animations and text values corresponding to the plurality of to-be-verified interaction animations arranged according to the to-be-verified interaction sequences; performing first login verification according to the interaction sequence to be verified between the user and the plurality of interaction animations to be verified, and obtaining a first login verification result; if the first login verification result is successful, text values corresponding to the interactive animations to be verified are sent to the server side, so that the server side performs second login verification according to the text values corresponding to the interactive animations to be verified, and a second login verification result is obtained; and based on the second login verification result, confirming whether the user logs in or not, thereby improving the security of the user logging in the client.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings used in the embodiments or the description of the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic view of an application scenario according to an embodiment of the present application;
fig. 2 is a flow chart of a verification method for client login according to an embodiment of the present application;
Fig. 3 is a schematic structural diagram of a verification device for client login according to an embodiment of the present application;
Fig. 4 is a schematic structural diagram of an electronic device according to an embodiment of the present application;
Fig. 5 is a schematic plan view of an interactive animation to be verified according to an embodiment of the present application.
Detailed Description
In the following description, for purposes of explanation and not limitation, specific details are set forth such as the particular system architecture, techniques, etc., in order to provide a thorough understanding of the embodiments of the present application. It will be apparent, however, to one skilled in the art that the present application may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present application with unnecessary detail.
A method and apparatus for verifying client login according to embodiments of the present application will be described in detail with reference to the accompanying drawings.
Fig. 1 is a schematic view of an application scenario according to an embodiment of the present application. The application scenario may comprise a first terminal device 1, a second terminal device 2, a third terminal device 3, a server 4 and a network 5.
The first terminal device 1, the second terminal device 2, and the third terminal device 3 may be hardware or software. When the first, second, and third terminal devices 1,2,3 are hardware, they may be various electronic devices having a display screen and supporting communication with the server 4, including but not limited to smartphones, tablets, laptop and desktop computers, etc.; when the first terminal device 1, the second terminal device 2, the third terminal device 3 are software, they may be installed in the electronic device as described above. The first terminal device 1, the second terminal device 2, and the third terminal device 3 may be implemented as a plurality of software or software modules, or may be implemented as a single software or software module, which is not limited in the embodiment of the present application. Further, various applications, such as a data processing application, an instant messaging tool, social platform software, a search class application, a shopping class application, etc., may be installed on the first terminal device 1, the second terminal device 2, the third terminal device 3.
The server 4 may be a server that provides various services, for example, a background server that receives a request transmitted from a terminal device with which communication connection is established, and the background server may perform processing such as receiving and analyzing the request transmitted from the terminal device and generate a processing result. The server 4 may be a server, a server cluster formed by a plurality of servers, or a cloud computing service center, which is not limited in this embodiment of the present application.
It should be noted that, the server 4 may be hardware, or may be software. When the server 4 is hardware, it may be various electronic devices that provide various services to the first terminal device 1, the second terminal device 2, and the third terminal device 3. When the server 4 is software, it may be a plurality of software or software modules providing various services to the first terminal device 1, the second terminal device 2, and the third terminal device 3, or may be a single software or software module providing various services to the first terminal device 1, the second terminal device 2, and the third terminal device 3, which is not limited in this embodiment of the present application.
The network 5 may be a wired network using coaxial cable, twisted pair wire, and optical fiber connection, or may be a wireless network that can implement interconnection of various Communication devices without wiring, for example, bluetooth (Bluetooth), near Field Communication (NFC), infrared (Infrared), etc., which are not limited in this embodiment of the present application.
The user can establish a communication connection with the server 4 via the network 5 through the first terminal device 1, the second terminal device 2, the third terminal device 3, to receive or transmit information or the like. Specifically, after the user sends a login request to the first terminal device 1, the second terminal device 2, and the third terminal device 3, the first terminal device 1, the second terminal device 2, and the third terminal device 3 perform first login verification according to the login request, obtain a first login verification result, then perform second login verification through the server 4, obtain a second login verification result, and the server 4 feeds back the second login verification result to the first terminal device 1, the second terminal device 2, and the third terminal device 3, so as to confirm the user login.
It should be noted that the specific types, numbers and combinations of the first terminal device 1, the second terminal device 2, the third terminal device 3, the server 4 and the network 5 may be adjusted according to the actual requirements of the application scenario, which is not limited in the embodiment of the present application.
Fig. 2 is a flow chart of a verification method for client login according to an embodiment of the present application. The authentication method of the client login of fig. 2 may be performed by the terminal of fig. 1. As shown in fig. 2, the verification method for client login includes:
201, receiving a login request of a user, and generating a plurality of interactive animations to be verified with interactive sequences according to the login request, wherein the interactive animations to be verified are obtained according to corresponding text values for login verification;
202, receiving to-be-verified interaction information obtained by interaction between a user and a plurality of to-be-verified interaction animations, wherein the to-be-verified interaction information comprises to-be-verified interaction sequences between the user and the plurality of to-be-verified interaction animations and text values corresponding to the plurality of to-be-verified interaction animations arranged according to the to-be-verified interaction sequences;
203, performing first login verification according to the interaction sequence to be verified between the user and the plurality of interaction animations to be verified, and obtaining a first login verification result;
204, if the first login verification result is successful, sending text values corresponding to the plurality of interactive animations to be verified to the server, so that the server performs second login verification according to the text values corresponding to the plurality of interactive animations to be verified, and obtaining a second login verification result;
205, based on the second login verification result, confirming whether the user is logged in.
Specifically, the embodiment of the application can be applied to a scene that a user carries out login verification at a client, a login request of the user is received through the client, and a plurality of interactive animations to be verified with interactive sequences are generated according to the login request of the user, wherein the interactive animations to be verified are obtained according to corresponding text values for login verification. And then the user interacts with the client in a mode of clicking, touching and the like according to the interactive animation to be verified displayed by the client, and the client receives interactive information to be verified, which is obtained by the interaction of the user with a plurality of interactive animations to be verified, wherein the interactive information to be verified comprises the interactive sequence to be verified between the user and the interactive animations to be verified and text values corresponding to the interactive animations to be verified, which are arranged according to the interactive sequence to be verified. The client performs first login verification according to the interaction sequence to be verified between the user and the plurality of interactive animations to be verified, a first login verification result is obtained, if the first login verification result is successful, the client sends text values corresponding to the plurality of interactive animations to be verified to the server, the server performs second login verification according to the text values corresponding to the plurality of interactive animations to be verified, a second login verification result is obtained, and the client confirms whether the user logs in or not based on the second login verification result, so that the safety of the user in the process of client login verification is improved.
In step 201, it is exemplarily illustrated that a login request of the user is received, a plurality of interactive animations to be verified with an interactive sequence are generated according to the login request of the user, wherein the interactive animations to be verified are obtained according to corresponding text values for login verification, for example, the user sends the login request through a display interface of the client, and the client receives the login request of the user and then randomly generates a plurality of interactive animations to be verified with an interactive sequence. In some implementations, the interactive animation to be verified can be obtained by rendering the animation on the page of the client, and can be displayed in the form of dynamic collision animation as shown in fig. 5, so as to improve the interactivity between the user and the client, wherein A, B, C, D, H in the interactive animation to be verified is a text value corresponding to each interactive animation to be verified, further, the interactive animation to be verified has a certain interactive sequence, the interactive sequence is determined according to the arrangement sequence of the text values A, B, C, D, H, and a corresponding interactive requirement can be sent to the user through the display interface of the client, for example, the interactive sequence is A, B, C, D, H, and then the interactive requirement can be sent as follows: "please click A, B, C, D, H" in sequence.
In step 202, it is exemplarily illustrated that to-be-verified interaction information obtained by interaction between a user and a plurality of to-be-verified interaction animations is received, where the to-be-verified interaction information includes to-be-verified interaction sequences between the user and the plurality of to-be-verified interaction animations and text values corresponding to the plurality of to-be-verified interaction animations arranged according to the to-be-verified interaction sequences, for example, the user interacts with the client in a manner of clicking with a mouse, touching, etc. according to an interaction requirement sent by the client, sequentially selects the text values corresponding to the to-be-verified interaction animations, and records the clicking sequence and the corresponding text values to obtain the to-be-verified interaction information.
In step 203, it is exemplarily illustrated that the first login verification is performed according to the interaction sequence to be verified between the user and the plurality of interactive animations to be verified, so as to obtain a first login verification result, for example, first login verification is performed on the user at the client, where the first login verification is verification of the interaction sequence to be verified, specifically, whether the interaction sequence to be verified when the user interacts with the client is consistent with the interaction sequence required by the client is compared, if so, the first login verification result is successful, and if not, the first login result is failed.
In step 204, it is exemplarily illustrated that if the first login verification result is successful, text values corresponding to the multiple interactive animations to be verified are sent to the server, so that the server performs second login verification according to the text values corresponding to the multiple interactive animations to be verified, and obtains the second login verification result, for example, only when the first login verification result of the client is successful, the second login verification of the server is performed, and security of the user login verification is ensured through two login verification. Specifically, the server verifies the text value corresponding to the interactive animation to be verified, if the text value clicked by the user is consistent with the verification information provided by the server, the second login verification result is successful, and if the text value is inconsistent with the verification information, the second login verification result is failed.
In step 205, it is exemplarily illustrated that, based on the second login verification result, it is determined whether the user logs in, for example, the server side sends the second login verification result to the client side, the client side determines whether the user logs in according to the second login verification result, if the second login verification result is successful, the client side allows the user to log in to the client side, and if the second login verification result is failed, the client side denies the user to log in.
In some embodiments, receiving a login request of a user at this time, generating a plurality of interactive animations to be verified with an interactive sequence according to the login request at this time, where the plurality of interactive animations to be verified are obtained according to corresponding text values for login verification, and the method includes: receiving a login request of a user at this time, and judging whether the login request is a first login request or not; if the login request is a first login request, acquiring a plurality of text values for login verification, generating an interaction sequence according to a random mode by the plurality of text values, and acquiring a first interaction sequence corresponding to the login request and a plurality of text values arranged according to the first interaction sequence; and generating a plurality of interactive animations to be verified, wherein the interactive sequence of the interactive animations is the first interactive sequence, based on the text values arranged according to the first interactive sequence.
Specifically, the interactive sequence of the interactive animation to be verified is obtained through the arrangement sequence of text values, when the login request of the user is the first login request, the client generates a first interactive sequence in a random mode, arranges the text values according to the first interactive sequence, and then generates a corresponding interactive animation to be verified through rendering according to the text values arranged according to the first interactive sequence.
In some embodiments, after receiving the login request of the user and determining whether the login request is the first login request, the method further includes: if the login request is not the first login request, acquiring a plurality of text values for login verification, generating an interaction sequence according to a random mode by the plurality of text values, and acquiring a second interaction sequence corresponding to the login request and a plurality of text values arranged according to the second interaction sequence; the method comprises the steps of obtaining interaction sequences of a plurality of text values corresponding to a previous login request of a user, and comparing the interaction sequences corresponding to the text values of the previous login request with second interaction sequences corresponding to the text values of the current login request to obtain a comparison result; and if the number of the text values which are arranged in the second interaction sequence and are the same as the number of the text values arranged in the last interaction sequence is greater than or equal to a preset number threshold value, regenerating the interaction sequence for the plurality of text values.
Specifically, if the login request of the user is not the first login request, generating a second interaction sequence in a random mode, then acquiring the previous interaction sequence of the user, comparing the second interaction sequence with the previous interaction sequence, and if the interaction sequence in which more than 2 text values are located is the same as the second interaction sequence, regenerating the interaction sequence again until the sequence in which more than 2 text values are located is not present, so as to further improve the login verification security of the user client.
In some embodiments, performing a first login verification according to a to-be-verified interaction sequence between a user and a plurality of to-be-verified interaction animations, to obtain a first login verification result, including: acquiring text values corresponding to a plurality of interactive animations to be verified and an interactive sequence corresponding to the text values; comparing the interaction sequence to be verified with the interaction sequence corresponding to the text value to obtain a comparison result; according to the comparison result, if the interaction sequence to be verified is consistent with the interaction sequence corresponding to the text value, the first login verification result is successful; if the interaction sequence to be verified is different from the interaction sequence corresponding to the text value, the first login verification result is failure.
Specifically, the text value selected by the user is sequentially checked, namely, the interaction sequence to be checked corresponding to the text value selected by the user is compared with the interaction sequence generated in the previous embodiment, and if the interaction sequence to be checked is consistent with the randomly generated interaction sequence, the first login verification of the client is successful; otherwise, the first login verification of the client fails, so that the operation pressure of the server is reduced.
In some embodiments, if the first login verification result is successful, sending text values corresponding to the plurality of interactive animations to be verified to the server, so that the server performs second login verification according to the text values corresponding to the plurality of interactive animations to be verified, and obtaining a second login verification result includes: if the first login verification result is successful, a mapping relation between the text value and the token is obtained, and a corresponding token is obtained according to the text values corresponding to the plurality of interactive animations to be verified, wherein the token is obtained by encrypting the configured character string according to the server side; taking the token as a data value for constructing a form for second login verification, and arranging the data values according to the interaction sequence to be verified; acquiring a character string configured by a server side, and taking the character string as a keyword for constructing a form for second login verification; and constructing a form for second login verification according to the data values and the keywords which are arranged according to the interaction sequence to be verified, and sending the form to the server side so that the server side performs the second login verification according to the form to obtain a second login verification result.
Specifically, in some implementation processes, the token is generated by the server, specifically, in order to reduce the operation cost of login verification, first, the login configuration of the server is obtained by requesting a back-end service, for example, the configuration content may be a character string in the form of "AAAA2cddlddkddl", where the number of the same a indicates the number of source characters in the character string, 2 indicates the interval length of the source characters in the character string, dd indicates the interval placeholder of the source characters in the character string, and the source characters are represented as characters for generating the token in real time, so as to avoid the token from being easily intercepted and cracked, in the character string, the characters for generating the token include c, l, k, l, and the corresponding encrypted character string of the token is obtained by respectively performing encryption processing on c, l, k, l, and it should be noted that the source characters may be numerals, letters or special characters, and the encryption may be encrypted by the data encryption standard (Data Encryption Standard, DES) without being specifically limited. In some implementation processes, the server randomly generates keywords by using specific characters, wherein the characters are corresponding text values in the interactive animation to be verified. The server takes the token as a data value and forms corresponding dictionary mapping with the keyword, so that the mapping relation between the text value and the token is further obtained. In some implementation processes, the interactive animation to be verified generated by the client is created according to the number of tokens and is consistent with the number of the tokens, each interactive animation to be verified is bound with the corresponding token, and then, when the interactive animation to be verified is displayed, keywords mapped by the tokens are displayed as text values. Further, according to the mapping relation, a token corresponding to a text value of the interactive animation to be verified, which is clicked by the user, can be obtained, then the client builds a form for the second login verification by using the token and the character string configured by the server, specifically, the client arranges the token according to the interactive sequence to be verified and stores the token into an array, then the character string configured by the server is used as a keyword in form data, the token stored into the array is used as a data value in the form data, complete form verification data is built, and the form is sent to the server for the second login verification.
In some embodiments, based on the second login verification result, confirming whether the user is logged in includes: obtaining a successful result of the second login verification from the server, wherein the server decrypts tokens in the form according to the interaction sequence to be verified to obtain source characters arranged according to the interaction sequence to be verified, the server extracts corresponding source characters according to a preset rule according to character strings in the form, compares the source characters corresponding to the tokens with the source characters arranged according to the interaction sequence to be verified, and if the source characters arranged according to the interaction sequence to be verified are identical to the source characters extracted by the character strings, the second login verification result is successful; and confirming the user login according to the successful result of the second login verification.
Specifically, the server decrypts the token in the form through the DES to obtain a source character corresponding to the token, extracts the source character in the form through a preset rule, compares the source character corresponding to the token with the source character extracted through the preset rule, and if the comparison is that the source character corresponding to the token can be in one-to-one correspondence with the source character extracted through the preset rule, the second login verification is successful, otherwise, the second login verification is failed. The preset rules are different according to different character strings configured by the server, for example, a character string of 'AAAA 2 cddlddkddl', and the characters AAAA, 2 and dd are filtered out, so that corresponding source characters can be obtained.
In some embodiments, obtaining a string configured by a server includes: and acquiring a character string configured by the server, wherein the character string comprises characters used for representing the number of source characters in the character string, characters used for representing the interval length between the source characters in the character string, characters used for representing the interval occupation between the source characters in the character string and the source characters.
Any combination of the above optional solutions may be adopted to form an optional embodiment of the present application, which is not described herein.
The following are examples of the apparatus of the present application that may be used to perform the method embodiments of the present application. For details not disclosed in the embodiments of the apparatus of the present application, please refer to the embodiments of the method of the present application.
Fig. 3 is a schematic diagram of a verification device for client login according to an embodiment of the present application. As shown in fig. 3, the verification device for client login includes:
The animation generation module 301 is configured to receive a login request of a user, and generate a plurality of interactive animations to be verified with an interactive sequence according to the login request, where the interactive animations to be verified are obtained according to corresponding text values for login verification;
the interaction module 302 is configured to receive interaction information to be verified, which is obtained by interaction between a user and a plurality of interaction animations to be verified, wherein the interaction information to be verified comprises interaction sequences to be verified between the user and the plurality of interaction animations to be verified and text values corresponding to the plurality of interaction animations to be verified, which are arranged according to the interaction sequences to be verified;
the first verification module 303 is configured to perform first login verification according to the interaction sequence to be verified between the user and the plurality of interaction animations to be verified, and obtain a first login verification result;
The second verification module 304 is configured to send text values corresponding to the plurality of interactive animations to be verified to the server if the first login verification result is successful, so that the server performs second login verification according to the text values corresponding to the plurality of interactive animations to be verified to obtain a second login verification result;
the login module 305 is configured to confirm whether the user is logged in based on the second login verification result. According to the technical scheme provided by the embodiment of the application, through
In some embodiments, the first verification module 303 is configured to receive a login request of the user at this time, and determine whether the login request of this time is a first login request; if the login request is a first login request, acquiring a plurality of text values for login verification, generating an interaction sequence according to a random mode by the plurality of text values, and acquiring a first interaction sequence corresponding to the login request and a plurality of text values arranged according to the first interaction sequence; and generating a plurality of interactive animations to be verified, wherein the interactive sequence of the interactive animations is the first interactive sequence, based on the text values arranged according to the first interactive sequence.
In some embodiments, the first verification module 303 is configured to obtain a plurality of text values for login verification if the login request is not the first login request, and generate an interaction sequence according to a random manner by the plurality of text values, so as to obtain a second interaction sequence corresponding to the login request and a plurality of text values arranged according to the second interaction sequence; the method comprises the steps of obtaining interaction sequences of a plurality of text values corresponding to a previous login request of a user, and comparing the interaction sequences corresponding to the text values of the previous login request with second interaction sequences corresponding to the text values of the current login request to obtain a comparison result; and if the number of the text values which are arranged in the second interaction sequence and are the same as the number of the text values arranged in the last interaction sequence is greater than or equal to a preset number threshold value, regenerating the interaction sequence for the plurality of text values.
In some embodiments, the first verification module 303 is configured to obtain text values corresponding to a plurality of interactive animations to be verified and an interactive sequence corresponding to the text values; comparing the interaction sequence to be verified with the interaction sequence corresponding to the text value to obtain a comparison result; according to the comparison result, if the interaction sequence to be verified is consistent with the interaction sequence corresponding to the text value, the first login verification result is successful; if the interaction sequence to be verified is different from the interaction sequence corresponding to the text value, the first login verification result is failure.
In some embodiments, the second verification module 304 is configured to obtain a mapping relationship between the text value and the token if the first login verification result is successful, and obtain a corresponding token according to the text values corresponding to the multiple interactive animations to be verified, where the token is obtained by encrypting the configured character string according to the server; taking the token as a data value for constructing a form for second login verification, and arranging the data values according to the interaction sequence to be verified; acquiring a character string configured by a server side, and taking the character string as a keyword for constructing a form for second login verification; and constructing a form for second login verification according to the data values and the keywords which are arranged according to the interaction sequence to be verified, and sending the form to the server side so that the server side performs the second login verification according to the form to obtain a second login verification result.
In some embodiments, the second verification module 304 is configured to obtain a success result of the second login verification from the server, where the server decrypts the token in the form according to the interaction sequence to be verified to obtain source characters arranged according to the interaction sequence to be verified, the server extracts corresponding source characters according to a preset rule according to the character string in the form, compares the source characters corresponding to the token with the source characters arranged according to the interaction sequence to be verified, and if the source characters arranged according to the interaction sequence to be verified are the same as the source characters extracted by the character string, the second login verification result is successful; and confirming the user login according to the successful result of the second login verification.
In some embodiments, the second verification module 304 is configured to obtain a string configured by the server, where the string includes a character for indicating a number of source characters in the string, a character for indicating a length of an interval between source characters in the string, a character for indicating an interval occupation between source characters in the string, and a source character.
It should be understood that the sequence number of each step in the foregoing embodiment does not mean that the execution sequence of each process should be determined by the function and the internal logic, and should not limit the implementation process of the embodiment of the present application.
Fig. 4 is a schematic diagram of an electronic device 4 according to an embodiment of the present application. As shown in fig. 4, the electronic apparatus 4 of this embodiment includes: a processor 401, a memory 402 and a computer program 403 stored in the memory 402 and executable on the processor 401. The steps of the various method embodiments described above are implemented by processor 401 when executing computer program 403. Or the processor 401, when executing the computer program 403, performs the functions of the modules/units in the above-described device embodiments.
The electronic device 4 may be a desktop computer, a notebook computer, a palm computer, a cloud server, or the like. The electronic device 4 may include, but is not limited to, a processor 401 and a memory 402. It will be appreciated by those skilled in the art that fig. 4 is merely an example of the electronic device 4 and is not limiting of the electronic device 4 and may include more or fewer components than shown, or different components.
The Processor 401 may be a central processing unit (Central Processing Unit, CPU) or may be other general purpose Processor, digital signal Processor (DIGITAL SIGNAL Processor, DSP), application SPECIFIC INTEGRATED Circuit (ASIC), field-Programmable gate array (Field-Programmable GATE ARRAY, FPGA) or other Programmable logic device, discrete gate or transistor logic device, discrete hardware components, or the like.
The memory 402 may be an internal storage unit of the electronic device 4, for example, a hard disk or a memory of the electronic device 4. The memory 402 may also be an external storage device of the electronic device 4, such as a plug-in hard disk, a smart memory card (SMART MEDIA CARD, SMC), a Secure Digital (SD) card, a flash memory card (FLASH CARD) or the like, which are provided on the electronic device 4. Memory 402 may also include both internal storage units and external storage devices of electronic device 6. The memory 402 is used to store computer programs and other programs and data required by the electronic device.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-described division of the functional units and modules is illustrated, and in practical application, the above-described functional distribution may be performed by different functional units and modules according to needs, i.e. the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above-described functions. The functional units and modules in the embodiment may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit, where the integrated units may be implemented in a form of hardware or a form of a software functional unit.
The integrated modules/units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer readable storage medium. Based on such understanding, the present application may implement all or part of the flow of the method of the above embodiment, or may be implemented by a computer program to instruct related hardware, and the computer program may be stored in a computer readable storage medium, where the computer program, when executed by a processor, may implement the steps of each of the method embodiments described above. The computer program may comprise computer program code, which may be in source code form, object code form, executable file or in some intermediate form, etc. The computer readable medium may include: any entity or device capable of carrying computer program code, a recording medium, a U disk, a removable hard disk, a magnetic disk, an optical disk, a computer Memory, a Read-Only Memory (ROM), a random access Memory (Random Access Memory, RAM), an electrical carrier signal, a telecommunications signal, a software distribution medium, and so forth. It should be noted that the content of the computer readable medium can be appropriately increased or decreased according to the requirements of the jurisdiction's jurisdiction and the patent practice, for example, in some jurisdictions, the computer readable medium does not include electrical carrier signals and telecommunication signals according to the jurisdiction and the patent practice.
The above embodiments are only for illustrating the technical solution of the present application, and are not limiting; although the application has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present application, and are intended to be included in the scope of the present application.

Claims (9)

1. A method for verifying client login, comprising:
Receiving a login request of a user, and generating a plurality of interactive animations to be verified with an interactive sequence according to the login request of the user, wherein the interactive animations to be verified are obtained according to corresponding text values for login verification;
receiving to-be-verified interaction information obtained by interaction between the user and the to-be-verified interaction animations, wherein the to-be-verified interaction information comprises to-be-verified interaction sequences between the user and the to-be-verified interaction animations and the text values corresponding to the to-be-verified interaction animations arranged according to the to-be-verified interaction sequences;
performing first login verification according to the interaction sequence to be verified between the user and the plurality of interaction animations to be verified, and obtaining a first login verification result;
If the first login verification result is successful, a mapping relation between the text values and tokens is obtained, and corresponding tokens are obtained according to the text values corresponding to the multiple interactive animations to be verified, wherein the tokens are obtained by encrypting the configured character strings according to a server side; taking the token as a data value for constructing a form for second login verification, and arranging the data values according to the interaction sequence to be verified; acquiring the character string configured by the server side, and taking the character string as a keyword for constructing the form for the second login verification; constructing the form for the second login verification according to the data values and the keywords which are arranged according to the interaction sequence to be verified, and sending the form to a server, so that the server performs the second login verification according to the form to obtain a second login verification result;
And based on the second login verification result, confirming whether the user logs in.
2. The method according to claim 1, wherein receiving a login request of a user at this time, generating a plurality of interactive animations to be verified having an interactive sequence according to the login request at this time, wherein the plurality of interactive animations to be verified are obtained according to corresponding text values for login verification, and include:
receiving a login request of a user at this time, and judging whether the login request of this time is a first login request or not;
If the login request is a first login request, acquiring a plurality of text values for login verification, generating the interaction sequence according to a random mode by the plurality of text values, and acquiring a first interaction sequence corresponding to the login request and a plurality of text values arranged according to the first interaction sequence;
Generating the interactive animation to be verified, of which the interactive sequence is the first interactive sequence, based on the text values arranged according to the first interactive sequence.
3. The authentication method according to claim 2, further comprising, after receiving a login request of a user this time and determining whether the login request of this time is a first login request:
If the login request is not the first login request, acquiring a plurality of text values for login verification, generating the interaction sequence according to a random mode by the plurality of text values, and acquiring a second interaction sequence corresponding to the login request and a plurality of text values arranged according to the second interaction sequence;
The interactive sequence of the text values corresponding to the last login request of the user is obtained, and the interactive sequence corresponding to the text values of the last login request is compared with a second interactive sequence corresponding to the text values of the current login request, so that a comparison result is obtained;
and if the number of the text values which are arranged in the second interaction sequence and are the same as the arrangement in the last interaction sequence is greater than or equal to a preset number threshold, regenerating the interaction sequence for the text values.
4. The authentication method according to claim 1, wherein performing a first login authentication according to a sequence of interactions to be authenticated between the user and the plurality of interactions to be authenticated, obtaining a first login authentication result, comprises:
acquiring text values corresponding to the multiple interactive animations to be verified and the interactive sequence corresponding to the text values;
comparing the interaction sequence to be verified with the interaction sequence corresponding to the text value to obtain a comparison result;
According to the comparison result, if the interaction sequence to be verified is consistent with the interaction sequence corresponding to the text value, the first login verification result is successful;
if the interaction sequence to be verified is different from the interaction sequence corresponding to the text value, the first login verification result is failure.
5. The authentication method according to claim 1, wherein confirming whether the user is logged in based on the second login authentication result includes:
Obtaining a successful result of the second login verification from the server, wherein the server decrypts the tokens in the form according to the interaction sequence to be verified to obtain source characters arranged according to the interaction sequence to be verified, the server extracts the corresponding source characters according to a preset rule according to the character strings in the form, compares the source characters corresponding to the tokens with the source characters arranged according to the interaction sequence to be verified, and if the source characters arranged according to the interaction sequence to be verified are identical to the source characters extracted by the character strings, the second login verification result is successful;
and confirming the user login according to the successful result of the second login verification.
6. The authentication method according to claim 5, wherein obtaining the server-side configured character string comprises:
and acquiring the character string configured by the server, wherein the character string comprises characters used for representing the number of the source characters in the character string, characters used for representing the interval length between the source characters in the character string, characters used for representing the interval occupation between the source characters in the character string and the source characters.
7. A client login verification apparatus, comprising:
The animation generation module is configured to receive a login request of a user, and generate a plurality of interactive animations to be verified with an interactive sequence according to the login request of the user, wherein the interactive animations to be verified are obtained according to corresponding text values for login verification;
the interaction module is configured to receive interaction information to be verified, which is obtained by interaction between the user and the plurality of interaction animations to be verified, wherein the interaction information to be verified comprises interaction sequences to be verified between the user and the plurality of interaction animations to be verified and text values corresponding to the plurality of interaction animations to be verified, which are arranged according to the interaction sequences to be verified;
the first verification module is configured to perform first login verification according to the interaction sequence to be verified between the user and the plurality of interaction animations to be verified, and obtain a first login verification result;
The second verification module is configured to acquire a mapping relation between the text value and the token if the first login verification result is successful, and acquire corresponding tokens according to the text values corresponding to the plurality of interactive animations to be verified, wherein the tokens are obtained by encrypting the configured character strings according to a server side; taking the token as a data value for constructing a form for second login verification, and arranging the data values according to the interaction sequence to be verified; acquiring the character string configured by the server side, and taking the character string as a keyword for constructing the form for the second login verification; constructing the form for the second login verification according to the data values and the keywords which are arranged according to the interaction sequence to be verified, and sending the form to a server, so that the server performs the second login verification according to the form to obtain a second login verification result;
And the login module is configured to confirm whether the user logs in or not based on the second login verification result.
8. An electronic device comprising a memory, a processor and a computer program stored in the memory and executable on the processor, characterized in that the processor implements the steps of the method according to any of claims 1 to 6 when the computer program is executed.
9. A computer readable storage medium storing a computer program, characterized in that the computer program when executed by a processor implements the steps of the method according to any one of claims 1 to 6.
CN202310774395.XA 2023-06-28 2023-06-28 Verification method and device for client login, electronic equipment and storage medium Active CN116723024B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310774395.XA CN116723024B (en) 2023-06-28 2023-06-28 Verification method and device for client login, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310774395.XA CN116723024B (en) 2023-06-28 2023-06-28 Verification method and device for client login, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN116723024A CN116723024A (en) 2023-09-08
CN116723024B true CN116723024B (en) 2024-08-16

Family

ID=87871410

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310774395.XA Active CN116723024B (en) 2023-06-28 2023-06-28 Verification method and device for client login, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN116723024B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108959901A (en) * 2018-07-13 2018-12-07 浙江每日互动网络科技股份有限公司 Identifying code reminding method based on picture carousel
CN110765441A (en) * 2019-09-27 2020-02-07 苏州浪潮智能科技有限公司 Method, device and medium for safe login

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5326035B1 (en) * 2012-10-18 2013-10-30 株式会社 ディー・エヌ・エー Server device
CN104869127B (en) * 2015-06-24 2018-09-04 郑州悉知信息科技股份有限公司 A kind of Website logging method, barcode scanning client and server
CN111683072A (en) * 2020-05-29 2020-09-18 呱呱网络科技(大连)有限公司 Remote verification method and remote verification system
CN113395249A (en) * 2021-01-07 2021-09-14 杭州涂鸦信息技术有限公司 Client login authentication method, system and computer equipment

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108959901A (en) * 2018-07-13 2018-12-07 浙江每日互动网络科技股份有限公司 Identifying code reminding method based on picture carousel
CN110765441A (en) * 2019-09-27 2020-02-07 苏州浪潮智能科技有限公司 Method, device and medium for safe login

Also Published As

Publication number Publication date
CN116723024A (en) 2023-09-08

Similar Documents

Publication Publication Date Title
CN108551437B (en) Method and apparatus for authenticating information
CN111556006A (en) Third-party application system login method, device, terminal and SSO service platform
CN107249004B (en) Identity authentication method, device and client
CN112534792A (en) Method and system for providing secure access to cloud services in a cloud computing environment
CN112039826A (en) Login method and device applied to applet terminal
CN113572763B (en) Data processing method and device, electronic equipment and storage medium
CN112187702A (en) Method and device for verifying client
CN114036364B (en) Method, apparatus, device, medium, and system for identifying crawlers
CN110602098A (en) Identity authentication method, device, equipment and storage medium
CN114461912A (en) Information processing method and device, electronic equipment and storage medium
CN114282506A (en) Certificate generation method, system, electronic device and storage medium
CN116723024B (en) Verification method and device for client login, electronic equipment and storage medium
CN113395326A (en) Network service-based login method, device and computer-readable storage medium
CN111786936A (en) Method and device for authentication
CN117336092A (en) Client login method and device, electronic equipment and storage medium
CN117156061A (en) Data processing method and device, electronic equipment and storage medium
CN116647345A (en) Generation method and device, storage medium, and computer equipment of authority token
CN114417318A (en) Method, device and electronic device for jumping to third-party pages
CN113783835A (en) Password sharing method, device, equipment and storage medium
CN108804713B (en) Image output method, electronic device, and computer-readable medium
CN114331455A (en) Information authentication method and device
CN113381982A (en) Registration method, registration device, electronic equipment and storage medium
CN105959406A (en) User right splitting method and system
CN114584978B (en) Value-added service authentication methods, devices, equipment and readable media
CN110690973A (en) Identity verification method, identity verification device, identity verification medium and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20240118

Address after: No. 13 Xingxiang Road, Zengjia Town, High tech Zone, Shapingba District, Chongqing, 400039

Applicant after: Chongqing Selis Phoenix Intelligent Innovation Technology Co.,Ltd.

Address before: 401120 No. 618 Liangjiang Avenue, Longxing Town, Yubei District, Chongqing City

Applicant before: Chongqing Celes New Energy Automobile Design Institute Co.,Ltd.

GR01 Patent grant
GR01 Patent grant