Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

User account login method and apparatus, electronic device and storage medium

A technology for user accounts and login methods, applied in the Internet field, can solve problems such as poor browser compatibility, inability to ensure device security, and poor maintainability, and achieve the effects of convenient and flexible management, protection of fundamental interests, and reduction of the risk of theft

Inactive Publication Date: 2018-12-18
BEIJING JINGDONG SHANGKE INFORMATION TECH CO LTD +1
View PDF5 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] But this method has a lot of disadvantages. First, the browser compatibility of the digital certificate plug-in is relatively poor, which leads to the failure of digital certificates to take effect on many browsers, and the purpose of ensuring device security cannot be achieved.
Secondly, the current digital certificate service relies on third-party digital certificate services, not only paid software but also poor maintainability

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User account login method and apparatus, electronic device and storage medium
  • User account login method and apparatus, electronic device and storage medium
  • User account login method and apparatus, electronic device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0019] figure 1 It is a schematic flow chart of the user account login method in the embodiment of the present invention, and the specific steps are:

[0020] Step 11. After the server side receives the access request sent by the client to access the page, it obtains one or more combinations of the user agent UA field, HTTP header information field, hardware information field, and cookie field in the access request, and calculates The unique identifier of the client device;

[0021] Wherein, since each of the above fields is related to the user's personal usage habits and application environment, when combined together, the user equipment can be effectively distinguished, and can be used as a basis for distinguishing equipment information. Therefore, the purpose of collecting the above fields is to obtain the unique identifier (EID) of the client device. Specifically, the MurmurHash operation (hash function ) and perform hash encryption processing to calculate the unique dev...

Embodiment 2

[0049] The server side receives a reminder message including a malicious account, and the reminder message carries the name of the malicious account and the unique identifier of the client device under the name of the malicious account; according to the reminder message, the unique identifier of the client device under the name of the malicious account will be The login status is deleted. In this way, according to the way of EID kicking people, once a certain device in the common device list is identified to be at risk, the login status information on this device can be directly removed, and the user is forced to log in again to minimize the risk of account theft.

[0050] It should be noted that one account name can correspond to multiple unique identifiers of client devices, and the deleted malicious user refers to one of the unique identifiers of client devices under the account name.

[0051] In the present invention, the malicious account is obtained through the analysis ...

Embodiment 3

[0060] Based on the same inventive concept, an embodiment of the present application also proposes a user account login device. see figure 2 , figure 2 It is a schematic structural diagram of a device applied to the above technology in the embodiment of the present application. The device includes: an acquisition unit 201, an identity registration unit 202;

[0061] Obtaining unit 201, after receiving the access request of the access page sent by the client, obtains the user agent UA field in the access request, the HTTP header information field, the hardware information field, the combination of one or more of the cookie fields, and calculates the client The unique identifier of the terminal device;

[0062] The identity login unit 202 performs identity login, detects whether the unique identifier of the client device is stored in the common equipment list, if yes, then confirms that the identity login is successful; if not, then performs identity verification according ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a user account login method. The method comprises the following steps: after receiving the access request of the access page sent by the client end, the server end calculates the unique identifier of the client end equipment according to one or a combination of one or several of the user agent UA field, HTTP header information field, hardware information field and cookie field in the access request; At that server end, the identity login is carried out, whether the unique identification of the client equipment is saved in the common equipment list or not is detected, andif yes, the identity login is confirmed to be successful; If not, authentication is performed according to a payment password or a mobile phone number, and an authenticated client device unique identity is added to the list of commonly used devices. The present application also provides a user account login apparatus. The invention can improve the safety of the user account.

Description

technical field [0001] The present invention relates to the technical field of the Internet, in particular to a user account login method, device, electronic equipment and storage medium. Background technique [0002] With the rapid development of JD.com's business, user account information security has become a top priority. For account login protection based on device information, JD.com previously installed digital certificate services. When the user opens the digital certificate service, unique identification information will be generated locally. When the user performs subsequent login and other operations, it will be compared with the identification information retained by the remote server. Only when the identification information is consistent can it be determined The user is operating on the device where the digital certificate service is currently installed, allowing the user to perform related login and modification operations. [0003] But this method has great...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0807H04L63/083H04L63/0884H04L63/102
Inventor 许丹丹罗达张亮张伟祝光明穆永俊年静赵岩胡庆朋
Owner BEIJING JINGDONG SHANGKE INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products