CN102214116A - Method and equipment for realizing direct login in network application - Google Patents

Method and equipment for realizing direct login in network application Download PDF

Info

Publication number
CN102214116A
CN102214116A CN2010101376235A CN201010137623A CN102214116A CN 102214116 A CN102214116 A CN 102214116A CN 2010101376235 A CN2010101376235 A CN 2010101376235A CN 201010137623 A CN201010137623 A CN 201010137623A CN 102214116 A CN102214116 A CN 102214116A
Authority
CN
China
Prior art keywords
user
network application
quick
login mode
submodule
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2010101376235A
Other languages
Chinese (zh)
Inventor
潘凯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN2010101376235A priority Critical patent/CN102214116A/en
Publication of CN102214116A publication Critical patent/CN102214116A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention discloses a method and equipment for realizing direct login in network application. The method comprises the steps of: generating a shortcut matched with the network application according to current login information of a user; and running the shortcut to start the network application. By applying the method and the equipment in the invention, the user can create starting shortcuts respectively for different accounts and create automatic login shortcuts for a plurality of accounts or users on the same terminal, and the user can complete the login in the network application as long as the shortcuts are opened without input of user names and passwords, so that the operation load of the user is reduced and the operation efficiency is increased.

Description

A kind of method and apparatus of realizing that direct logging in network is used
Technical field
The present invention relates to networking technology area, particularly a kind of method and apparatus of realizing that direct logging in network is used.
Background technology
Along with constantly advancing and development of internet science and technology, IM (Instant messing, instant messaging) software has become the important means that the user communicates by network.The function that immediate communication tool provides is powerful gradually, and the frequency that customer group and user use is also improving, thus the means of communication that becomes work in modern society, lives and be unable to do without.
The use of Instant Messenger (IM) software needs the user to use the username and password login usually.But, for the domestic consumer, has the shared computer of a plurality of users, and the computation level between the user is different, for the lower user of computation level, selecting number of the account, input password and log-in instant communication software is an operation that threshold is higher, can not satisfy each kinsfolk user's needs; On the other hand, for the user who logins and use a plurality of Instant Messenger (IM) software numbers of the account owing to need of work simultaneously, the user will repeatedly open the Instant Messenger (IM) software program and select corresponding number of the account to login, and the burden that this has increased the weight of the user has undoubtedly reduced the efficient of using.
Summary of the invention
The invention provides a kind of method and apparatus of realizing that direct logging in network is used, make the user need not to import username and password and just can use by logging in network, improve operating efficiency.
For achieving the above object, the invention provides a kind of method that realizes that direct logging in network is used, it is characterized in that, may further comprise the steps:
Generate the quick login mode that is complementary with described network application according to the current log-on message of user;
Move described quick login mode, directly login described network application according to the quick start-up parameter of described quick login mode correspondence.
Preferably, described according to before the quick login mode that the current log-on message of user generates and described network application is complementary, also comprise:
The quick start-up parameter of configuration in the start-up parameter of described network application;
Configuration is used to generate the triggering setting of described quick login mode in described network application.
Preferably, describedly generate the quick login mode that is complementary with described network application according to the current log-on message of user and comprise:
Be received in the triggering that in the network application of the current login of user described triggering is provided with;
Encrypt active user's information and encrypted result is kept in the local file;
The quick login mode that extracts user's head image information and be complementary according to described encrypted result generation and described network application.
Preferably, described encryption active user's information and encrypted result is kept in the local file comprises:
Encrypt described user profile and obtain ciphertext;
Generate and the unique corresponding index value of described ciphertext;
Described ciphertext and described index value are kept in the local file;
Wherein, described user profile comprises user account information and/or user password information.
Preferably, described extraction user's head image information and generate the quick login mode that is complementary with described network application according to described encrypted result and comprise:
Described index value is arranged in the target item of described quick login mode.
Preferably, the described quick login mode of described operation, directly login described network application according to the quick start-up parameter of described quick login mode correspondence and comprise:
Obtain the quick start-up parameter that is provided with in the described quick login mode;
In the local file corresponding, search and described quick start-up parameter corresponding ciphertext with described quick login mode;
If find corresponding ciphertext, then directly login described network application according to described ciphertext.
Describedly generate the quick login mode that is complementary with described network application according to the current log-on message of user and comprise:
Generate the quick login mode corresponding according to the current log-on message of user, the quick login mode that different user is corresponding different with described user.
The invention provides a kind of equipment of realizing that direct logging in network is used, it is characterized in that, comprising:
Generation module is used for generating the quick login mode that is complementary with network application according to the current log-on message of user;
Login module is connected with described generation module, is used for the corresponding directly described network application of login of quick start-up parameter of quick login mode that generates according to described generation module.
Preferably, described equipment also comprises:
Configuration module is used for the quick start-up parameter of start-up parameter configuration in described network application, and configuration is used to generate the triggering setting of quick login mode in described network application.
Preferably, described generation module specifically comprises:
Receive submodule, be used to be received in the triggering that in the network application of the current login of user described triggering is provided with;
Encrypt submodule, be connected, when the reception submodule receives the triggering that described triggering is provided with, be used for encrypting active user's information and encrypted result is kept at local file with described reception submodule;
Generate submodule, is connected, be used to extract user's head image information and according to the quick login mode that encrypted result generates and described network application is complementary of described encryption submodule with described encryption submodule.
Preferably, described encryption submodule also is used for:
Encrypt described user profile and obtain ciphertext, generate and the unique corresponding index value of described ciphertext, and described ciphertext and described index value are kept in the local file;
Wherein, described user profile comprises user account information and/or user password information.
Preferably, described generation submodule also is used for: the target item that described index value is arranged on described quick login mode.
Preferably, described login module specifically comprises:
Obtain submodule, be used for obtaining the quick start-up parameter that described quick login mode is provided with;
Search submodule, link to each other, be used to search with described and obtain the quick start-up parameter corresponding ciphertext that submodule gets access to the described submodule that obtains;
The login submodule links to each other with the described submodule of searching, if the described submodule of searching finds corresponding ciphertext, then directly logins described network application according to described ciphertext.
Compared with prior art, the present invention has the following advantages at least:
Directly start network application by the shortcut that is complementary with network application, thereby make the user only need open described shortcut, need not import username and password, just can finish the login of network application, alleviate user's operation burden, improved operating efficiency.
Description of drawings
In order to be illustrated more clearly in the present invention or technical scheme of the prior art, to do to introduce simply to the accompanying drawing of required use in the present invention or the description of the Prior Art below, apparently, accompanying drawing in describing below only is some embodiments of the present invention, for those of ordinary skills, under the prerequisite of not paying creative work, can also obtain other accompanying drawing according to these accompanying drawings
Fig. 1 is the login interface synoptic diagram that logging in network is used in the prior art;
A kind of method flow diagram of realizing that direct logging in network is used that Fig. 2 proposes for the present invention;
Fig. 3 is for generating the method flow diagram of the shortcut that is used for direct logging in network application in the embodiment of the invention;
Fig. 4 is used to generate the synoptic diagram that starts the shortcut trigger button for disposing in the embodiment of the invention on the network application interface;
Fig. 5 is used to generate the synoptic diagram that starts the shortcut drop-down menu for disposing in the embodiment of the invention on the network application interface;
Fig. 6 is the attribute synoptic diagram by the shortcut of using technical scheme generation of the present invention;
Fig. 7 realizes the method flow diagram that direct logging in network is used down for the concrete application scenarios that the present invention proposes;
A kind of device structure synoptic diagram of realizing that direct logging in network is used that Fig. 8 proposes for the present invention.
Embodiment
Below in conjunction with the accompanying drawing among the present invention, technical scheme of the present invention is clearly and completely described, obviously, described embodiment is the present invention's part embodiment, rather than whole embodiment.Based on the embodiment among the present invention, those of ordinary skills belong to the scope of protection of the invention not making the every other embodiment that is obtained under the creative work prerequisite.
The invention provides a kind of method that realizes that direct logging in network is used, as shown in Figure 2, this method may further comprise the steps:
Step 201, generate the quick login mode that is complementary with network application according to the current log-on message of user.Wherein, the current log-on message of user specifically comprises user account, login password, can also comprise the head portrait that the user uses, and can also comprise the information that other users register in the network application of current use.Before the quick login mode that the current log-on message of user generates and network application is complementary, also comprise: configuration is used for the start-up parameter of startup fast in the start-up parameter of network application; Configuration is used to generate the triggering setting of quick login mode in network application.
In this step, generate the quick login mode that is complementary with network application, specifically comprise: be received in the network application of the current login of user triggering the triggering that is provided with according to the current log-on message of user; Encrypt active user's information and encrypted result is kept in the local file; The quick login mode that extracts user's head image information and be complementary according to encrypted result generation and network application.
Wherein, encrypt active user's information and encrypted result is kept at local file and specifically comprise: encrypting user information obtains ciphertext, generate and the unique corresponding index value of ciphertext, ciphertext and index value are kept in the local file, and user profile comprises user account information and/or user password information.
Further, extract user's head image information and generate the shortcut that is complementary with network application according to encrypted result and comprise: described index value is arranged in the target item of described quick login mode.
Step 202, move quick login mode, use according to the direct logging in network of the quick start-up parameter of quick login mode correspondence.
In this step, use according to the direct logging in network of the quick start-up parameter of described quick login mode correspondence, comprise: obtain the start-up parameter of startup fast that is used for that is provided with in the quick login mode, in the local file corresponding, search and the start-up parameter corresponding ciphertext with quick login mode, if find corresponding ciphertext, then use according to the direct logging in network of this ciphertext.
Wherein, ciphertext is by obtaining according to setting in advance user profile encrypted.
For technical scheme provided by the invention more clearly is described,, the method that the direct logging in network among the present invention is used is carried out detailed, concrete description below in conjunction with a kind of concrete application scenarios.This network application comprises instant communication software, blog (blog), Email, recreation, SNS (SocialNetworking Services, social network services) etc.As shown in Figure 3, for generating the method flow diagram of the shortcut that is used for direct logging in network application in the embodiment of the invention, this method may further comprise the steps:
Step 301, configuration is used to generate the triggering setting of quick login mode in the network application interface.
Concrete, by the web application code is rewritten, in program code, add the description that is provided with about the triggering that is used to generate quick login mode, compile revised program code, the triggering setting of the quick login mode that triggering of generation is provided for generating on the network application interface, this triggering setting can be a button on the network application interface, as shown in Figure 4, button of configuration on the network application interface, click this button, will generate a quick login mode for active user's information; It also can be a menu on the network application interface, as shown in Figure 5, with mouse right click network application interface, drop-down menu appears, increase the option that is used to generate for the quick login mode of active user's information in the menu, select this will generate for active user's information fast login mode, the present invention does not limit triggering the particular type that is provided with.
When step 302, user are in logging status or presence, if need to generate quick login mode, the then triggering setting on the trigger network application interface, web application is transferred this user's user profile.
Concrete, the user who comprises promising current login on the network application interface generates the triggering setting of quick login mode, be 123456 to be example with user account in the present embodiment, and the triggering setting on the network application interface is that a button describes, when the user need generate a quick login mode that is used for the login user account, only need to click this button, just generate the function of quick login mode in can the trigger network application program, web application can be transferred this user's user profile from corresponding file, this user profile comprises this user account information and/or this user's password information, what should be illustrated is herein, this encrypted message is not the original plaintext password that the user logins time input, is the expressly password ciphertext through generating behind the hash function encrypting of the original password inputed of user.
Preferred a kind of embodiment in the technique scheme indication present embodiment, the ins and outs that change wherein do not influence protection scope of the present invention.
Step 303, encrypting user information obtain ciphertext, and are saved in the quickly starting item preservation file after generating unique index value.
Concrete, web application is with the user profile of obtaining in the step 302, for example, this user's account information and/or this user's password information are encrypted and are generated the index ciphertext, wherein, encrypted process can be encrypted according to certain encryption rule, also can directly this user's user profile (for example account information and corresponding encrypted message) be stored, the concrete mode of encrypting is not limited among the present invention, simultaneity factor can generate a unique index value corresponding with this index ciphertext at random, and this index value and the index ciphertext of encrypting generation are mated.Matching way is specially sets up a map listing, preserves index value and index ciphertext corresponding to different accounts in this map listing, and the index value of same account and index ciphertext are the relations of shining upon one by one.For keep depositing in map listing be convenient in order retrieve in the subsequent step, data in the table need be sorted, the rule of ordering can sort for the sequencing according to the holding time, also can sort, can also sort according to the sequencing of the initial of index ciphertext according to the sequencing of the initial of index value.
Illustrate for a specific example below how this step realizes, as shown in Figure 6, for by using the attribute of the quick login mode that technical scheme of the present invention generates.
When user A Kai clicks the button of the quick login mode of generation on the QQ interface, the QQ program can be extracted the account information of user A Kai and the password ciphertext after the process hash encryption, and above-mentioned two information are encrypted, encrypt the back and generate the index ciphertext, wherein, encrypted process can be encrypted according to certain encryption rule, password ciphertext after also can directly encrypting with the account information of user A Kai and through hash is stored, the concrete mode of encrypting is not limited among the present invention, generate an index value simultaneously, the coupling of shining upon one by one with the index ciphertext, for example, in Fig. 6, axA07x00 is an index value, this index value is encrypted the index ciphertext that the back generates corresponding to the user profile of A Kai, and this corresponding relation is mapping one by one, and is kept at the map listing in the quickly starting item preservation file.
Step 304, extraction user's head image information, and under the catalogue of user's correspondence, generate a corresponding ICON file, be used as the icon of shortcut.
Concrete, instant communication software allows the user personalized picture to be set as head portrait usually, and this user-defined head portrait picture can be used as the preferably source of user's shortcut icon.The icon of the quick login mode that the head portrait picture that is provided with user oneself is set up as the user can allow the user distinguish intuitively in a plurality of different quick login modes.
User-defined head portrait picture is accepted in network application, the picture format of self-defined head portrait is several picture formats (BMP commonly used, GI, JPG, PNG), if the user is provided with self-defined head portrait picture, this head portrait picture has a head portrait picture backup file usually on user's local terminal, this backup file can be kept in the file of network application acquiescence, also can be kept in the file in user-defined path.If the user was not provided with self-defining head portrait picture, then use the head portrait of a general default icon file as the user.Extract the user head image information process can for, from the file of preserving the head portrait picture backup file, search the backup file of the head portrait picture of current login account; When the user uses a too much head portrait, when storing a plurality of head portrait file under the user folder, the process of extracting user's head image information also can be the head portrait picture that extracts the current use of user.
After extracting user's head portrait picture, system will generate a corresponding ICON file with the user's head portrait picture that extracts, concrete, system carries out format conversion with the user's head portrait picture that extracts, the icon of the shortcut that the generation compliance with system needs, and be kept under the IM software installation directory of user's correspondence, conversion regime can for, change by moving concrete switching software, for example, related by the pre-configured parameter of IconPackager (icon wrapper) with switching software, after extracting row user head portrait picture, the information of user's head portrait picture is added in the parameter, need find switching software by parameter, user's head portrait is changed.In the image conversion process, if image is animated format such as GIF, then get the bitmap of first frame, if the size dimension of image does not meet the standard icon size of operating system then the size of bitmap is carried out suitable convergent-divergent, for example the icon sizes of the last standard of XP is 32*32.
Because the quick login mode of generation is the account for login user, and the head portrait picture of user account the most the image representative user account, so need the account of login for the user can easily be chosen, among the present invention with user's head portrait picture icon as the quick login mode that generates.For the situation that the multi-user need use quick login mode logging in network to use, the user also can generate shortcut with own specified icons, among the present invention this is not limited.
Need to prove: in windows operating system herein; generally the form of shortcut icon is the ICON form; therefore in the time user's head portrait picture need being generated the icon of shortcut; the form of original head portrait picture file will be changed; for example; with JPEG (Joint PhotographicExperts Group; JPEG (joint photographic experts group)) picture of form converts the picture of ICON form to; certainly the applied environment of present embodiment includes but not limited to windows operating system; can also comprise as Visita (version of Windows operating system); Mac OS (running on the operating system on the Apple Macintosh series computer); Linux all multiple operating systems such as (general designations of Unix computer operating system); to repeat no more in the present embodiment; accordingly user's head portrait picture being converted to the ICON form is the preferred a kind of embodiment of the present invention, and the ins and outs that change wherein do not influence protection scope of the present invention.
Step 305, extract user's head image information and generate quick login mode according to encrypted result.
Concrete, according to the icon that converts, and use and the unique corresponding index value of family account, according to user's appointed positions, generate the quick login mode of windows of a standard, in the present embodiment, the target of quick login mode is QQ.exe-q axA07x00, and wherein, axA07x00 is an index value, this index value is the parameter that starts fast, the position that generates quick login mode is the desktop of user's appointment or the file of user's appointment, when the user need start shooting when just logining certain account, also the set positions of this shortcut can started a menu, like that, the present invention will repeat no more.
Need to prove, in the embodiment of the invention, if the user is first login, then the user need import account number cipher and logins, on the interface of network application, trigger the triggering setting that generates quick login mode then, for example, button in the present embodiment, right strong menu is to trigger and is provided with, the user needs button click or choice menus respective selection to generate quick login mode, if not being first logging in network, the user uses, just then the user only needs the directly logging in network application of quick login mode that direct operation has been created.
As shown in Figure 7, use the method flow diagram that the quick login mode that is complementary is directly logined the shortcut of QQ for operational network in the embodiment of the invention, this method may further comprise the steps:
Step 701, when the user needs directly startup QQ, move quick login mode.
Concrete, move the concrete mode of quick login mode and do not do qualification in the present invention, include but not limited to that double-click is opened, right button is opened, can also comprise other unfolding mode, for example, Starting mode such as the automatic operation of start.
Step 702, system start QQ according to the command line parameter that writes down in the quick login mode.
Concrete, system starts according to the command line parameter of quick login mode record, search current being operating as of will carrying out and start the QQ program, (this sentences QQ is example, but be not limited to QQ), executable operations starts QQ, also preserves the unique index value corresponding with ciphertext simultaneously in this command line parameter, as the QQ.exe-q axA07x00 of Fig. 6, in axA07x00.
Step 703, QQ program extract index value from command line parameter, and load quickly starting item preservation file.
Concrete QQ program is resolved command line parameter, when " q " in being resolved to command line parameter behind the qq.exe, the QQ program knows that what need carry out is the action of a login herein, login required concrete parameter, as account information, index value xxxxxxxx after by " q " such as encrypted message, indicate, the QQ program is according to this index value, load the quickly starting item and preserve file, wherein, load the quickly starting item and preserve map listing of preservation in the file, this map listing is writing down all index ciphertexts and corresponding index value with it.
Step 704, judging at the quickly starting item to preserve in the file whether preserve above-mentioned index value, is execution in step 706 then; Otherwise execution in step 705.
Concrete, judge whether this index value has been kept at the quickly starting item and has preserved in the file, the foundation of judging is that the quickly starting item preserves in the file whether have the index value identical with this index value, determination methods is that poll is judged, promptly preserve each bar index value of preserving in the file with the quickly starting item and compare one by one, if comparison result is identical, then judged result is for being, if the last item record of comparing in the map listing does not find identical index value, then judged result is for denying.
Above-mentioned basis for estimation and determination methods are the preferred a kind of embodiment of the present invention, and the ins and outs that change wherein do not influence protection scope of the present invention.
Step 705, prompting error message.
Concrete, when judged result is not, when promptly in quickly starting item preservation file, not preserving above-mentioned index value, will point out and make mistakes, and regenerate direct startup shortcut after pointing out the user to login QQ.
For example, when the user has cancelled the Auto Login feature of certain account, or for a certain reason, as maloperation, or system mistake etc., deleted at the quickly starting item and preserved the ciphertext of the information of account in the file and corresponding index value with it, if but the user does not cancel the quick login mode of account correspondence timely, when this quick login mode of operation, can't match corresponding index value, will point out and make mistakes this moment, and regenerate direct startup shortcut after pointing out the user to login QQ.
Step 706, extraction and deciphering index ciphertext obtain user profile.
Concrete, when judged result for being, promptly detecting the quickly starting item preserves when preserving above-mentioned index value in the file, index ciphertext that will be corresponding with this index value is decrypted and obtains user account information, wherein above-mentioned user account information comprises user's account information and/or user's password information, decrypting process is the inverse process of ciphering process, and concrete mode can also can be an account information of directly extracting the user for being decrypted by certain deciphering rule.The present invention does not limit the concrete mode of deciphering.
The user profile login that step 707, basis decrypt.
Concrete, comprise user's account information and/or user's password information in the above-mentioned user account information, QQ logins according to above-mentioned user profile.
By adopting method provided by the invention, use the shortcut that is complementary with network application directly to start network application, thereby make the user only need open described shortcut, need not import username and password, just can finish the login of network application, alleviate user's operation burden, improved operating efficiency.
Concrete, based on above-mentioned inventive concept, the invention allows for out a kind of equipment of realizing that direct logging in network is used, as shown in Figure 8, comprising:
Configuration module 10 is used for the quick start-up parameter of start-up parameter configuration in described network application, and configuration is used to generate the triggering setting of quick login mode in described network application;
Generation module 20 is used for generating the quick login mode that is complementary with network application according to the current log-on message of user;
Login module 30 is connected 20 with described generation module, is used for the corresponding directly described network application of login of quick start-up parameter of quick login mode that generates according to described generation module 20.
Preferably, generation module 20 specifically comprises:
Receive submodule 201, be used to be received in the triggering that in the network application of the current login of user described triggering is provided with;
Encrypt submodule 202, be connected, when reception submodule 201 receives the triggering that described triggering is provided with, be used for encrypting active user's information and encrypted result is kept at local file with described reception submodule 201;
Generate submodule 203, is connected, be used to extract user's head image information and according to the quick login mode that encrypted result generates and described network application is complementary of described encryption submodule with described encryption submodule 202.
Preferably, described encryption submodule 202 also is used for:
Encrypt described user profile and obtain ciphertext, generate and the unique corresponding index value of described ciphertext, and described ciphertext and described index value are kept in the local file;
Wherein, described user profile comprises user account information and/or user password information.
Preferably, described generation submodule 203 also is used for: the target item that described index value is arranged on described quick login mode.
Preferably, described login module 30 specifically comprises:
Obtain submodule 301, be used for obtaining the quick start-up parameter that described quick login mode is provided with;
Search submodule 302, link to each other, be used to search with described and obtain the quick start-up parameter corresponding ciphertext that submodule 301 gets access to the described submodule 301 that obtains;
Login submodule 303 links to each other with the described submodule 302 of searching, if the described submodule 302 of searching finds corresponding ciphertext, then directly logins described network application according to described ciphertext.
By adopting equipment provided by the invention, use the shortcut that is complementary with network application directly to start network application, thereby make the user only need open described shortcut, need not import username and password, just can finish the login of network application, alleviate user's operation burden, improved operating efficiency.
Through the above description of the embodiments, those skilled in the art can be well understood to the present invention and can realize by hardware, also can realize by the mode of software and necessary general hardware platform.Based on such understanding, technical scheme of the present invention can embody with the form of software product, it (can be CD-ROM that this software product can be stored in a non-volatile memory medium, USB flash disk, portable hard drive etc.) in, comprise some instructions with so that computer equipment (can be personal computer, server, the perhaps network equipment etc.) each implements the described method of scene to carry out the present invention.
It will be appreciated by those skilled in the art that accompanying drawing is a preferred synoptic diagram of implementing scene, module in the accompanying drawing or flow process might not be that enforcement the present invention is necessary.
It will be appreciated by those skilled in the art that the module in the device of implementing in the scene can be distributed in the device of implementing scene according to implementing scene description, also can carry out respective change and be arranged in the one or more devices that are different from this enforcement scene.The module of above-mentioned enforcement scene can be merged into a module, also can further split into a plurality of submodules.
The invention described above sequence number is not represented the quality of implementing scene just to description.
More than disclosed only be several concrete enforcement scene of the present invention, still, the present invention is not limited thereto, any those skilled in the art can think variation all should fall into protection scope of the present invention.

Claims (13)

1. a method that realizes that direct logging in network is used is characterized in that, may further comprise the steps:
Generate the quick login mode that is complementary with described network application according to the current log-on message of user;
Move described quick login mode, directly login described network application according to the quick start-up parameter of described quick login mode correspondence.
2. the method for claim 1 is characterized in that, and is described according to before the quick login mode that the current log-on message of user generates and described network application is complementary, and also comprises:
The quick start-up parameter of configuration in the start-up parameter of described network application;
Configuration is used to generate the triggering setting of described quick login mode in described network application.
3. method as claimed in claim 2 is characterized in that, describedly generates the quick login mode that is complementary with described network application according to the current log-on message of user and comprises:
Be received in the triggering that in the network application of the current login of user described triggering is provided with;
Encrypt active user's information and encrypted result is kept in the local file;
The quick login mode that extracts user's head image information and be complementary according to described encrypted result generation and described network application.
4. method as claimed in claim 3 is characterized in that, described encryption active user's information and encrypted result is kept in the local file comprises:
Encrypt described user profile and obtain ciphertext;
Generate and the unique corresponding index value of described ciphertext;
Described ciphertext and described index value are kept in the local file;
Wherein, described user profile comprises user account information and/or user password information.
5. method as claimed in claim 4 is characterized in that, described extraction user's head image information also generates the quick login mode that is complementary with described network application according to described encrypted result and comprises:
Described index value is arranged in the target item of described quick login mode.
6. the method for claim 1 is characterized in that, the described quick login mode of described operation is directly logined described network application according to the quick start-up parameter of described quick login mode correspondence and comprised:
Obtain the quick start-up parameter that is provided with in the described quick login mode;
In the local file corresponding, search and described quick start-up parameter corresponding ciphertext with described quick login mode;
If find corresponding ciphertext, then directly login described network application according to described ciphertext.
7. the method for claim 1 is characterized in that, describedly generates the quick login mode that is complementary with described network application according to the current log-on message of user and comprises:
Generate the quick login mode corresponding according to the current log-on message of user, the quick login mode that different user is corresponding different with described user.
8. an equipment of realizing that direct logging in network is used is characterized in that, comprising:
Generation module is used for generating the quick login mode that is complementary with network application according to the current log-on message of user;
Login module is connected with described generation module, is used for the corresponding directly described network application of login of quick start-up parameter of quick login mode that generates according to described generation module.
9. equipment as claimed in claim 8 is characterized in that, also comprises:
Configuration module is used for the quick start-up parameter of start-up parameter configuration in described network application, and configuration is used to generate the triggering setting of quick login mode in described network application.
10. equipment as claimed in claim 9 is characterized in that, described generation module specifically comprises:
Receive submodule, be used to be received in the triggering that in the network application of the current login of user described triggering is provided with;
Encrypt submodule, be connected, when the reception submodule receives the triggering that described triggering is provided with, be used for encrypting active user's information and encrypted result is kept at local file with described reception submodule;
Generate submodule, is connected, be used to extract user's head image information and according to the quick login mode that encrypted result generates and described network application is complementary of described encryption submodule with described encryption submodule.
11. equipment as claimed in claim 10 is characterized in that, described encryption submodule also is used for:
Encrypt described user profile and obtain ciphertext, generate and the unique corresponding index value of described ciphertext, and described ciphertext and described index value are kept in the local file;
Wherein, described user profile comprises user account information and/or user password information.
12. equipment as claimed in claim 11 is characterized in that, described generation submodule also is used for: the target item that described index value is arranged on described quick login mode.
13. equipment as claimed in claim 8 is characterized in that, described login module specifically comprises:
Obtain submodule, be used for obtaining the quick start-up parameter that described quick login mode is provided with;
Search submodule, link to each other, be used to search with described and obtain the quick start-up parameter corresponding ciphertext that submodule gets access to the described submodule that obtains;
The login submodule links to each other with the described submodule of searching, if the described submodule of searching finds corresponding ciphertext, then directly logins described network application according to described ciphertext.
CN2010101376235A 2010-04-01 2010-04-01 Method and equipment for realizing direct login in network application Pending CN102214116A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2010101376235A CN102214116A (en) 2010-04-01 2010-04-01 Method and equipment for realizing direct login in network application

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2010101376235A CN102214116A (en) 2010-04-01 2010-04-01 Method and equipment for realizing direct login in network application

Publications (1)

Publication Number Publication Date
CN102214116A true CN102214116A (en) 2011-10-12

Family

ID=44745437

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010101376235A Pending CN102214116A (en) 2010-04-01 2010-04-01 Method and equipment for realizing direct login in network application

Country Status (1)

Country Link
CN (1) CN102214116A (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103036899A (en) * 2012-12-25 2013-04-10 广东欧珀移动通信有限公司 Method and system of automatic login user account
CN103049249A (en) * 2011-10-13 2013-04-17 金蝶软件(中国)有限公司 Generation method, using method, generation device and using device of rapid program
CN104158790A (en) * 2013-05-14 2014-11-19 腾讯科技(深圳)有限公司 User login method, device and equipment
CN104252283A (en) * 2013-06-25 2014-12-31 腾讯科技(北京)有限公司 Method and device for starting microblog page
CN104869164A (en) * 2015-05-26 2015-08-26 北京金和网络股份有限公司 BS software application system configuration and image rapid switching method on registration page
CN104883341A (en) * 2014-02-28 2015-09-02 宇龙计算机通信科技(深圳)有限公司 Application management device, terminal and application management method
CN104935558A (en) * 2014-03-21 2015-09-23 四三九九网络股份有限公司 Network user rapid registration and login method and system
CN105338176A (en) * 2015-10-01 2016-02-17 陆俊 Account number switching method and mobile terminal
CN105391678A (en) * 2014-08-20 2016-03-09 王基旆 Computer network system with single key fast and safe login function
CN105472608A (en) * 2014-09-09 2016-04-06 联想(北京)有限公司 Information processing method and first electronic equipment
CN105760045A (en) * 2016-01-29 2016-07-13 宇龙计算机通信科技(深圳)有限公司 Application program login method, application program login device and terminal
CN105824498A (en) * 2016-01-29 2016-08-03 维沃移动通信有限公司 Starting method for electronic email application program and mobile terminal
CN108830115A (en) * 2018-05-30 2018-11-16 郑州云海信息技术有限公司 A kind of method and device of information processing
CN110837630A (en) * 2019-11-11 2020-02-25 维沃移动通信有限公司 Login method, image processing method and electronic device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030046392A1 (en) * 2001-08-29 2003-03-06 Sayling Wen Automatic network connecting system and method
CN1842012A (en) * 2005-03-29 2006-10-04 腾讯科技(深圳)有限公司 Method for providing local user operation inlet in instant communication client
CN1979419A (en) * 2005-12-09 2007-06-13 腾讯科技(深圳)有限公司 Method for setting up short-cut of programe module in software and starting method therefor
CN101197677A (en) * 2007-12-27 2008-06-11 腾讯科技(深圳)有限公司 Internet product login method and apparatus supporting extra parameter login
CN101677442A (en) * 2008-09-17 2010-03-24 艾威梯科技(北京)有限公司 Method and equipment for automatically logging in application programs

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030046392A1 (en) * 2001-08-29 2003-03-06 Sayling Wen Automatic network connecting system and method
CN1842012A (en) * 2005-03-29 2006-10-04 腾讯科技(深圳)有限公司 Method for providing local user operation inlet in instant communication client
CN1979419A (en) * 2005-12-09 2007-06-13 腾讯科技(深圳)有限公司 Method for setting up short-cut of programe module in software and starting method therefor
CN101197677A (en) * 2007-12-27 2008-06-11 腾讯科技(深圳)有限公司 Internet product login method and apparatus supporting extra parameter login
CN101677442A (en) * 2008-09-17 2010-03-24 艾威梯科技(北京)有限公司 Method and equipment for automatically logging in application programs

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103049249A (en) * 2011-10-13 2013-04-17 金蝶软件(中国)有限公司 Generation method, using method, generation device and using device of rapid program
CN103036899A (en) * 2012-12-25 2013-04-10 广东欧珀移动通信有限公司 Method and system of automatic login user account
CN104158790A (en) * 2013-05-14 2014-11-19 腾讯科技(深圳)有限公司 User login method, device and equipment
WO2014183370A1 (en) * 2013-05-14 2014-11-20 Tencent Technology (Shenzhen) Company Limited Systems and methods for user login
CN104158790B (en) * 2013-05-14 2016-05-25 腾讯科技(深圳)有限公司 user login method, device and equipment
CN104252283A (en) * 2013-06-25 2014-12-31 腾讯科技(北京)有限公司 Method and device for starting microblog page
CN104883341A (en) * 2014-02-28 2015-09-02 宇龙计算机通信科技(深圳)有限公司 Application management device, terminal and application management method
CN104883341B (en) * 2014-02-28 2019-01-25 宇龙计算机通信科技(深圳)有限公司 Application management device, terminal and application management method
CN104935558A (en) * 2014-03-21 2015-09-23 四三九九网络股份有限公司 Network user rapid registration and login method and system
CN104935558B (en) * 2014-03-21 2018-01-30 四三九九网络股份有限公司 A kind of network user fast registers and login method and system
CN105391678A (en) * 2014-08-20 2016-03-09 王基旆 Computer network system with single key fast and safe login function
CN105472608A (en) * 2014-09-09 2016-04-06 联想(北京)有限公司 Information processing method and first electronic equipment
CN105472608B (en) * 2014-09-09 2019-01-15 联想(北京)有限公司 A kind of information processing method and the first electronic equipment
CN104869164A (en) * 2015-05-26 2015-08-26 北京金和网络股份有限公司 BS software application system configuration and image rapid switching method on registration page
CN105338176A (en) * 2015-10-01 2016-02-17 陆俊 Account number switching method and mobile terminal
CN105824498A (en) * 2016-01-29 2016-08-03 维沃移动通信有限公司 Starting method for electronic email application program and mobile terminal
CN105760045A (en) * 2016-01-29 2016-07-13 宇龙计算机通信科技(深圳)有限公司 Application program login method, application program login device and terminal
CN108830115A (en) * 2018-05-30 2018-11-16 郑州云海信息技术有限公司 A kind of method and device of information processing
CN110837630A (en) * 2019-11-11 2020-02-25 维沃移动通信有限公司 Login method, image processing method and electronic device

Similar Documents

Publication Publication Date Title
CN102214116A (en) Method and equipment for realizing direct login in network application
US9430211B2 (en) System and method for sharing information in a private ecosystem
KR102330538B1 (en) Roaming content wipe actions across devices
CN106599723B (en) File encryption method and device and file decryption method and device
US20170046531A1 (en) Data encryption method and system for use with cloud storage
US8621189B2 (en) System and method for hardware strengthened passwords
US9811568B2 (en) Device and method for distributed database keyword searching
CN104331644A (en) Transparent encryption and decryption method for intelligent terminal file
US10630722B2 (en) System and method for sharing information in a private ecosystem
US20120233675A1 (en) Authentication with massively pre-generated one-time passwords
US9787624B2 (en) Taking actions on notifications using an incomplete data set from a message
US10582348B2 (en) Message-based management service enrollment
US8892897B2 (en) Method for generating and detecting auditable passwords
CN105101183A (en) Method and system for protecting private contents at mobile terminal
EP3043285B1 (en) Method and electronic device for managing data
CN104820794A (en) Method and device for processing login data
CN103036852A (en) Method and device for achieving network login
CN106203141A (en) The data processing method of a kind of application and device
JP5982422B2 (en) Method for encrypting and decrypting files using telephone numbers
CA3006135A1 (en) Method and system for using a plurality of accounts in an instant messaging application
CN106101188B (en) A kind of data processing method of network cloud USB flash disk
KR20180090865A (en) Provisioning deliverable storage devices and getting data from deliverable storage devices
EP2469441A1 (en) System and method for hardware strenghtened passwords
JP6565194B2 (en) Terminal determination apparatus, method, and program
CN106453335B (en) Data transmission method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20111012