Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A user verification method, server and system

A technology for authentication server and user authentication, applied in the fields of user authenticator, user authentication method, authentication server and user authentication system, can solve problems such as hidden dangers of system security, and achieve the effect of ensuring security, reducing load and improving efficiency

Active Publication Date: 2016-06-01
BEIJING QIHOO TECH CO LTD
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, due to the security of cookies and other reasons, if the cookie information is not verified, some malicious users will log in to the system by forging cookies, which will lead to hidden dangers in the security of the system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A user verification method, server and system
  • A user verification method, server and system
  • A user verification method, server and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0033] It is mentioned in related technologies that after a user logs in to a network application for the first time, he can use a cookie to directly enter the system within a certain period of time without re-authentication. However, based on the attributes of the cookie itself, malicious users may forge the cookie to log in to the system, causing hidden dangers to the security of the system.

[0034] In order to solve the above tec...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a verification server. The verification server comprises a user verifier, an information acquisition device and a user login interface, wherein the user verifier is used for verifying a login request, the information acquisition device is used for parsing basic information of a user and sending the basic information to the user when verification is successful, and the user login interface is used for presenting a user login interface to the user when verification fails. The user verifier comprises a receiving module, an encryption module and a verification module, wherein the receiving module receives the login request including verification information, a first information part of the verification information includes the basic information of the user, and a second information part includes a first check character string generated after the basic information of the user is encrypted by the aid of the predetermined encryption rule; the encryption module is used for encrypting the basic information of the user by the aid of the predetermined encryption rule to obtain a second check character string; and the verification module is used for determining verification to be successful if the second check character string is matched with the first check character string. By the verification server, the technical problem that system security risk due to the fact that a malicious user logins a system through a counterfeit cookie is solved. The invention further discloses a corresponding user verification server and a corresponding user verification system.

Description

technical field [0001] The invention relates to the field of network security, in particular to a user verification method, a user verifier, a verification server and a user verification system. Background technique [0002] With the rapid development of the Internet, more and more network applications appear, and users of these network applications also increase. In order to respond to a large number of user login requests and ensure the security of user login, network applications usually need to build a background database to authenticate users. At present, in the network application system, when the user logs in to the network application system, the network application will obtain the user name and password, and compare it with the user name and password stored in the database, so as to determine whether the user can log in to the network application system correctly. That is, each time the network application receives a user's login request, it will obtain correspondi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 于富龙黄来安
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products