IP-based secure login control method and server

文档序号:1116108 发布日期:2020-09-29 浏览:8次 中文

阅读说明:本技术 一种基于ip的安全登录控制方法及服务器 (IP-based secure login control method and server ) 是由 黄世昌 于 2019-06-28 设计创作,主要内容包括:本发明涉及一种基于IP的安全登录控制方法及服务器,其中方法包括:步骤S1:接收到第一设备发送的备案请求后,基于备案请求向第三方系统申请用户的手机号,并获取当前第一设备的网络信息;步骤S2:接收到第三方系统反馈的手机号后,从用户信息库基于手机号匹配得到用户信息,并自动导入用户信息,结合当前第一设备的网络信息完成IP白名单记录;步骤S3:当接收到第二设备的登录请求后,验证第二设备的网络环境是否与当前所需登录用户的IP白名单记录匹配,若为是,则通过登录请求,反之,则拒绝登录请求。与现有技术相比,本发明利用第三方账户提供的手机号,自动导入相关信息,从而大大减少了用户进行IP备案的难度,用户体验好。(The invention relates to a safe login control method based on IP and a server, wherein the method comprises the following steps: step S1: after receiving a filing request sent by first equipment, applying for a mobile phone number of a user from a third-party system based on the filing request, and acquiring network information of the current first equipment; step S2: after receiving the mobile phone number fed back by the third-party system, obtaining user information from a user information base based on mobile phone number matching, automatically importing the user information, and finishing IP white list recording by combining the current network information of the first equipment; step S3: and after receiving a login request of the second equipment, verifying whether the network environment of the second equipment is matched with the IP white list record of the current user needing to login, if so, passing the login request, otherwise, rejecting the login request. Compared with the prior art, the method and the device have the advantages that the related information is automatically imported by using the mobile phone number provided by the third-party account, so that the difficulty of IP filing of the user is greatly reduced, and the user experience is good.)

1. An IP-based secure login control method is characterized by comprising the following steps:

step S1: after receiving a filing request sent by first equipment, applying for a mobile phone number of a user from a third-party system based on the filing request, and acquiring network information of the current first equipment;

step S2: after receiving the mobile phone number fed back by the third-party system, obtaining user information from a user information base based on mobile phone number matching, automatically importing the user information, and finishing IP white list recording by combining the current network information of the first equipment;

step S3: and after receiving a login request of the second equipment, verifying whether the network environment of the second equipment is matched with the IP white list record of the current user needing to login, if so, passing the login request, otherwise, rejecting the login request.

2. The IP-based secure login control method of claim 1, wherein the network information comprises public network IP information and local network IP information.

3. The IP-based secure login control method according to claim 2, wherein the condition that the matching in step S3 is successful is: the second device and the IP address in the IP white list record are located in the same local area network.

4. The IP-based secure login control method of claim 1, wherein the first device is a mobile phone.

5. A server, characterized in that the server is configured to perform the steps of:

step S1: after receiving a filing request sent by first equipment, applying for a mobile phone number of a user from a third-party system based on the filing request, and acquiring network information of the current first equipment;

step S2: after receiving the mobile phone number fed back by the third-party system, obtaining user information from a user information base based on mobile phone number matching, automatically importing the user information, and finishing IP white list recording by combining the current network information of the first equipment;

step S3: and after receiving a login request of the second equipment, verifying whether the network environment of the second equipment is matched with the IP white list record of the current user needing to login, if so, passing the login request, otherwise, rejecting the login request.

6. The server according to claim 5, wherein the network information comprises public network IP information and local network IP information.

7. The server according to claim 6, wherein the condition that the matching in step S3 is successful is: the second device and the IP address in the IP white list record are located in the same local area network.

8. The IP-based secure login control method of claim 5, wherein the first device is a mobile phone.

Technical Field

The present invention relates to network security technologies, and in particular, to a secure login control method and server based on an IP.

Background

The IP address is used as a tracing basis of the equipment on the Internet, has a vital function, and can improve the safety of Internet application by utilizing the IP address.

For enterprise applications, there are often fixed IP outlets or fixed IP in the lan, and for personal users, there is also often a handset device that logs on daily.

Disclosure of Invention

The present invention provides a secure login control method and server based on IP to overcome the above-mentioned drawbacks of the prior art.

The purpose of the invention can be realized by the following technical scheme:

an IP-based secure login control method comprises the following steps:

step S1: after receiving a filing request sent by first equipment, applying for a mobile phone number of a user from a third-party system based on the filing request, and acquiring network information of the current first equipment;

step S2: after receiving the mobile phone number fed back by the third-party system, obtaining user information from a user information base based on mobile phone number matching, automatically importing the user information, and finishing IP white list recording by combining the current network information of the first equipment;

step S3: and after receiving a login request of the second equipment, verifying whether the network environment of the second equipment is matched with the IP white list record of the current user needing to login, if so, passing the login request, otherwise, rejecting the login request.

The network information comprises public network IP information and local network IP information.

The conditions for successful matching in step S3 are as follows: the second device and the IP address in the IP white list record are located in the same local area network.

The first device is a mobile phone.

A server configured to perform the steps of:

step S1: after receiving a filing request sent by first equipment, applying for a mobile phone number of a user from a third-party system based on the filing request, and acquiring network information of the current first equipment;

step S2: after receiving the mobile phone number fed back by the third-party system, obtaining user information from a user information base based on mobile phone number matching, automatically importing the user information, and finishing IP white list recording by combining the current network information of the first equipment;

step S3: and after receiving a login request of the second equipment, verifying whether the network environment of the second equipment is matched with the IP white list record of the current user needing to login, if so, passing the login request, otherwise, rejecting the login request.

Compared with the prior art, the invention has the following beneficial effects:

1) and related information is automatically imported by using the mobile phone number provided by the third party account, so that the difficulty of IP filing of the user is greatly reduced, and the user experience is good.

2) And the local area network information is used for IP record matching, so that the safety of Web login can be improved.

Drawings

FIG. 1 is a schematic flow chart of the main steps of the method of the present invention.

Detailed Description

The invention is described in detail below with reference to the figures and specific embodiments. The present embodiment is implemented on the premise of the technical solution of the present invention, and a detailed implementation manner and a specific operation process are given, but the scope of the present invention is not limited to the following embodiments.

An IP-based secure login control method in the form of a computer program that is executed by a server, as shown in fig. 1, includes:

step S1: after receiving a filing request sent by first equipment, applying for a mobile phone number of a user from a third-party system based on the filing request, and acquiring network information of the current first equipment, wherein the first equipment is preferably a mobile phone;

step S2: after receiving the mobile phone number fed back by the third-party system, obtaining user information from a user information base based on mobile phone number matching, automatically importing the user information, and finishing IP white list recording by combining the current network information of the first equipment;

step S3: and after receiving a login request of the second equipment, verifying whether the network environment of the second equipment is matched with the IP white list record of the current user needing to login, if so, passing the login request, otherwise, rejecting the login request.

The network information includes public network IP information and local network IP information, and the condition that the matching is successful in step S3 is preferably: the second device and the IP address in the IP white list record are located in the same local area network.

Logging in a WeChat applet (only if a user is assigned a right to see the Fei fish background system icon, otherwise, the icon cannot be seen, and white list IP filing operation is performed), clicking the icon on the page, displaying the icon IP application on the page, automatically acquiring the IP address under the current environment, clicking the application operation, opening a browser to log in the Fei fish background address for access, and ensuring that the network environment applied by the applet is consistent with the network environment for opening the browser, if the IP login address is different from the IP login address applied by the applet, the Fei fish background system cannot be accessed.

5页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:一种扫码登录信息处理方法

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!

技术分类