A complete and secure user login system_PHP tutorial
When programming in PHP, I have a habit of not using ready-made library files, such as PHPLib or other similar libraries. In this system, I also plan to write a library file myself, which Need to handle authentication, email confirmation, account update (password, email) and other matters.
In order to ensure the security of the system without increasing the burden on my existing database. Therefore this new system relies on cookies. This is indeed a dilemma, because it is very unsafe to just set a cookie with a user name. This will not work, but considering the burden on the database, I cannot add a simple unordered code and hand it over to my database for verification.
The solution is to set two cookies at the same time, one is the user name cookie, and the other is the unordered cookie. This unordered code is actually generated by a combination of the username and a super password (known only to the programmer) through the md5() function operation. Since md5() is a one-way disordered code, it cannot be cracked. When the user changes their email, I can also use the email and super password to generate a random code to allow the user to confirm the change. This is actually a public key/private key type system. not understand? It doesn't matter, I will explain it slowly below.
Interestingly, the scalability of this system can reach infinite, because the main work of the system is to calculate the value of the md5() function, and it is completed by the web server. When the load increases, other servers can be added to share the load. Although the authentication system does not drag across a database, doing so makes the final bottleneck only appear in the database.
The following are two functions in this library - token generation and token authentication functions.
$hidden_hash_var='your_secret_password_here';
$LOGGED_IN=false;
unset($LOGGED_IN);
function user_isloggedin() {
global $user_name,$id_hash,$hidden_hash_var,$LOGGED_IN;
File://Has the disorder code been detected?
file://If yes, return the variable
if ( isset($LOGGED_IN) ) {
Return $LOGGED_IN;
}
file://are both cookies present?
if ($user_name && $id_hash) {
/*
A random code for authentication is generated from the user name and system super password obtained from cookies. If the random code is the same as the random code in the cookie, then the variables in the cookies are credible and the user has logged in
*/
$hash=md5($user_name.$hidden_hash_var);
if ($hash == $id_hash) {
File:// unordered code matches, set a global variable, so that when we call the function again,
file://, there is no need to perform the md5() operation again
$LOGGED_IN=true;
return true;
} else {
file://The two disorder codes do not match and there is no login
$LOGGED_IN=false;
return false;
}
} else {
$LOGGED_IN=false;
return false;
}
}
function user_set_tokens($user_name_in) {
/*
Once the username and password are verified, call this function

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics



PHP 8.4 brings several new features, security improvements, and performance improvements with healthy amounts of feature deprecations and removals. This guide explains how to install PHP 8.4 or upgrade to PHP 8.4 on Ubuntu, Debian, or their derivati

Visual Studio Code, also known as VS Code, is a free source code editor — or integrated development environment (IDE) — available for all major operating systems. With a large collection of extensions for many programming languages, VS Code can be c

If you are an experienced PHP developer, you might have the feeling that you’ve been there and done that already.You have developed a significant number of applications, debugged millions of lines of code, and tweaked a bunch of scripts to achieve op

This tutorial demonstrates how to efficiently process XML documents using PHP. XML (eXtensible Markup Language) is a versatile text-based markup language designed for both human readability and machine parsing. It's commonly used for data storage an

JWT is an open standard based on JSON, used to securely transmit information between parties, mainly for identity authentication and information exchange. 1. JWT consists of three parts: Header, Payload and Signature. 2. The working principle of JWT includes three steps: generating JWT, verifying JWT and parsing Payload. 3. When using JWT for authentication in PHP, JWT can be generated and verified, and user role and permission information can be included in advanced usage. 4. Common errors include signature verification failure, token expiration, and payload oversized. Debugging skills include using debugging tools and logging. 5. Performance optimization and best practices include using appropriate signature algorithms, setting validity periods reasonably,

A string is a sequence of characters, including letters, numbers, and symbols. This tutorial will learn how to calculate the number of vowels in a given string in PHP using different methods. The vowels in English are a, e, i, o, u, and they can be uppercase or lowercase. What is a vowel? Vowels are alphabetic characters that represent a specific pronunciation. There are five vowels in English, including uppercase and lowercase: a, e, i, o, u Example 1 Input: String = "Tutorialspoint" Output: 6 explain The vowels in the string "Tutorialspoint" are u, o, i, a, o, i. There are 6 yuan in total

Static binding (static::) implements late static binding (LSB) in PHP, allowing calling classes to be referenced in static contexts rather than defining classes. 1) The parsing process is performed at runtime, 2) Look up the call class in the inheritance relationship, 3) It may bring performance overhead.

Pythonempowersbeginnersinproblem-solving.Itsuser-friendlysyntax,extensivelibrary,andfeaturessuchasvariables,conditionalstatements,andloopsenableefficientcodedevelopment.Frommanagingdatatocontrollingprogramflowandperformingrepetitivetasks,Pythonprovid
