CN102546914A - Automatic login system based on smart phone and control method - Google Patents

Automatic login system based on smart phone and control method Download PDF

Info

Publication number
CN102546914A
CN102546914A CN2010106071587A CN201010607158A CN102546914A CN 102546914 A CN102546914 A CN 102546914A CN 2010106071587 A CN2010106071587 A CN 2010106071587A CN 201010607158 A CN201010607158 A CN 201010607158A CN 102546914 A CN102546914 A CN 102546914A
Authority
CN
China
Prior art keywords
identifying code
background server
mobile phone
smart mobile
checking
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2010106071587A
Other languages
Chinese (zh)
Inventor
梁志龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN2010106071587A priority Critical patent/CN102546914A/en
Publication of CN102546914A publication Critical patent/CN102546914A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention provides a control method for automatic login based on a smart phone, comprising the steps of: a. sending login request information to a background server; b. receiving a first verification code from the background server; c. obtaining the first verification code, generating verification request information based on the first verification code, and sending the verification request information to the background server; and d. receiving a verification result from the background server. A system is automatically logged in by sending login request information via a client installed in a smart phone without the need of necessary elements in a traditional verification method such as password submission and the like, so that the cumbersome process of repeatedly inputting the username and password in mobile equipment during the login process is avoided.

Description

A kind of automatic login system and control method based on smart mobile phone
Technical field
The present invention relates to the smart mobile phone application system, particularly, relate to the system and the control corresponding method of in smart mobile phone, carrying out safety verification.
Background technology
At present, the development speed of mobile phone makes rapid progress.According to incomplete statistics, the whole world at least three/one resident holds at least one mobile phone or similar mobile device.Because it is wide that mobile phone is popularized face, causes each producer constantly to research and develop in field of mobile phones for commercial interest, thereby promote the fast development of mobile phone technique.Mobile phone also enters into digital Age from the simulation epoch, and after getting into digital Age, the intellectuality of mobile phone improves day by day, and the user can carry out various operations based on wireless Internet through mobile phone, such as online, microblogging, shopping, digital map navigation, chat or the like.
Carry out in the process based on wireless Internet application through smart mobile phone, essential ground need be verified the user's that uses smart mobile phone identity, to confirm this user's identity.In this process; Prior art still adopts traditional means to carry out subscriber authentication; Be that the user inputs user name and password; Username and password is sent to background server, the matching relationship of username and password is judged, thereby determine whether to be correct login mode by background server.For example, present popular instant messenger MSN and QQ adopt similar mode.
In above-mentioned proof procedure, the user must manual input password.Even the user remembers password through " remembeing password " or the similar option system that makes; Thereby make the user need only disposable input password when initial log; But technically, this remains the subscriber authentication mode that needs the input password and the matching of username and password is judged.Use such technology, the user must be remembered that user name, also must be remembered that password.In case user name is lost, perhaps password loss all can bring certain puzzlement to the user; Simultaneously, in theory, in fact the user need input user name and password at every turn; This is also inconvenient in the extreme; Especially for smart mobile phone or similar mobile processing device, its process of inputing user name or password is slow relatively, is unfavorable for the application of smart mobile phone.
Moreover, according to traditional login authentication way, each user also must registered in advance registration a user name, for example employed QQ number among the instant messenger QQ, perhaps employed Email address or the like among the MSN.This also is the place of an inconvenience.
Summary of the invention
To the defective of verifying through username and password in the prior art, especially must import the defective that password is verified, the purpose of this invention is to provide a kind of automatic login system and control method based on smart mobile phone.
According to an aspect of the present invention, the automatic log-in control method based on smart mobile phone is provided, comprise step: a. sends landing request information to background server; B. receive first identifying code from said background server, wherein, said first identifying code is generated according to said landing request information by said background server, and by said background server said first identifying code is sent to said smart mobile phone; C. obtain said first identifying code, and generate the checking solicited message, and said checking solicited message is sent to said background server based on said first identifying code; D. receive the checking result from said background server, wherein, said background server is verified said checking solicited message.
According to another aspect of the present invention, the automatic login control device based on smart mobile phone is provided also, comprises first dispensing device, it is used for sending landing request information to background server; First receiving device; It is used to receive first identifying code from said background server; Wherein, said first identifying code is generated according to said landing request information by said background server, and by said background server said first identifying code is sent to said smart mobile phone; First deriving means, it is used to obtain said first identifying code, and generates the checking solicited message based on said first identifying code, and said checking solicited message is sent to said background server; And second receiving system, it is used to receive the checking result from said background server, and wherein, said background server is verified said checking solicited message.
According to a further aspect of the invention, the automatic login system based on smart mobile phone is provided also, comprises: a plurality of smart mobile phones are equipped with in each smart mobile phone according to each described control device in the aforesaid right requirement 9 to 11; At least one background server is used to receive the landing request information from said smart mobile phone at least; Wireless communication networks, said a plurality of smart mobile phones are respectively through said wireless communication networks and the mutual communication of said at least one background server.
The present invention sends landing request information through the client that is installed in the smart mobile phone; Need not submit essential key element in traditional verification modes such as password to; Automatically login system has avoided in mobile device, inputing repeatedly in the login process complicated processes of user name password.
Description of drawings
Through reading the detailed description of non-limiting example being done with reference to following accompanying drawing, it is more obvious that other features, objects and advantages of the present invention will become:
Fig. 1 illustrates according to an embodiment of the present invention, based on the flow chart of the automatic log-in control method of smart mobile phone;
Fig. 2 illustrates according to the first embodiment of the present invention, based on the sequential chart of the automatic log-in control method of smart mobile phone;
Fig. 3 illustrates according to a second embodiment of the present invention, based on the sketch map of the automatic log-in control method of smart mobile phone;
Fig. 4 illustrates according to the first embodiment of the present invention, the network topology sketch map of the automatic login system based on smart mobile phone provided by the invention; And
Fig. 5 illustrates according to the first embodiment of the present invention, the structural representation of the control device of login automatically that is used for based on smart mobile phone provided by the invention.
Embodiment
According to the foregoing invention content, it will be appreciated by those skilled in the art that a kind of brand-new control system and control corresponding method that smart mobile phone is logined automatically of passing through that the object of the present invention is to provide.Through automatic login system provided by the invention, the user need not submit essential key element in traditional verification modes such as password in login process, and only sends landing request information and get final product through being installed on client in the smart mobile phone.
Particularly, Fig. 1 illustrates according to an embodiment of the present invention, based on the flow chart of the automatic log-in control method of smart mobile phone.At first execution in step S201 sends landing request information to background server.It will be apparent to those skilled in the art that; Preferably; The client (control device 4 for example shown in Figure 5) that is installed in the smart mobile phone is sent said landing request information to said background server, and such process is pressed " login " or " affirmation " button through the user usually and begun, receive this operation after; Said client executing sequence of operations is closed and sent landing request information to said background server, and is specific as follows said.And visibly differently with prior art be; In this process, the user need not provide any password, and password need not provided by the user in this login process; But through technological means directly by realizing proof procedure alternately between background server and the client, specific as follows said.
Get into step S202 then, receive first identifying code from said background server.In conjunction with Fig. 3, it will be understood by those skilled in the art that said first identifying code is generated according to said landing request information by said background server, and said first identifying code is sent to said smart mobile phone by said background server.Promptly after above-mentioned steps S201, said background server receives said landing request information, then according to said first identifying code in this landing request information market, and correspondingly through wireless communication networks this first identifying code is sent to said smart mobile phone.
Next execution in step S203 obtains said first identifying code, and generates the checking solicited message based on said first identifying code, and said checking solicited message is sent to said background server.Preferably, this step is still accomplished by above-mentioned client.Particularly, received said first identifying code through said step S202 after, said client reads said first identifying code through various technological means, perhaps obtains said first identifying code through other means.Further, said client generates a checking solicited message according to said first identifying code, should verify then that solicited message sent to said background server.Based on this checking solicited message, said client requires background server that its logging request is verified.
Get into step S204 at last, receive checking result from said background server.After it will be appreciated by those skilled in the art that said background server receives said checking solicited message, said checking solicited message is verified, and will be verified that the result correspondingly returns to said smart mobile phone.It will be appreciated by those skilled in the art that preferably said checking result is still received by said client and carries out subsequent treatment.
Further, it will be appreciated by those skilled in the art that if the checking result among the said step S204 is " checking is passed through "; Then in subsequent operation; Said background server allows said smart mobile phone to login to background server, correspondingly carries out subsequent operation, for example logins to an instant chat system; Perhaps sign in to a Web2.0 system, perhaps sign in to shopping website or the like.Concrete subsequent operation Fig. 2 specific as follows, shown in Figure 3 does not repeat them here.
Further, it will be appreciated by those skilled in the art that preferably, be connected through wireless communication networks between said background server and the said smart mobile phone, promptly realize mutual communication through wireless communication networks, what for example embodiment as shown in Figure 4 set forth.And said wireless communication networks can be various wireless networks, for example Wifi, Wimax etc., and this does not influence flesh and blood of the present invention, does not repeat them here.Further, those skilled in the art can not repeat them here with reference to connected mode, the communication modes of said each part of realization embodiment illustrated in fig. 4.
Further, Fig. 2 illustrates according to the first embodiment of the present invention, based on the sequential chart of the automatic log-in control method of smart mobile phone.It will be appreciated by those skilled in the art that present embodiment gives refinement to execution mode shown in Figure 1.Particularly, at first execution in step 1, and the smart mobile phone application program is initiated logging request to background information server (being a preferred embodiment of background server shown in Figure 1), and this step and step S201 shown in Figure 1 are similar.Preferably, said smart mobile phone application program can be any application program that meets content of the present invention, thereby this application program constitutes the described client of above-mentioned Fig. 1.This smart mobile phone application program is preferably obtained the corresponding telephone number of said smart mobile phone, then said telephone number is sent to said background information server as the main information of said landing request information.Preferably; It will be apparent to those skilled in the art that; This landing request information can include only said telephone number, and further in a variant, said landing request information can comprise said telephone number and the time of sending this landing request information; And in another variant; Said landing request information can comprise said telephone number, send the time of this landing request information and machine master information of said smart mobile phone correspondence or the like, and this does not influence flesh and blood of the present invention, does not repeat them here.Further, it will be appreciated by those skilled in the art that in needs that said client is provided with information through the mobile phone that reads said smart mobile phone can obtain above-mentioned machine master information, does not repeat them here.
Get into step 2 then, server sends identifying code through short message.Similarly, this step is similar with step S202 shown in Figure 1.In the present embodiment; After said background information server is received above-mentioned landing request information; The telephone number that extracts wherein (is 11 item sign indicating numbers at the corresponding telephone number of the mobile phone of CHINESE REGION for example: 139XXXXXXXX); Generate an identifying code based on this telephone number then, and correspondingly send to said smart mobile phone through wireless communication networks.Further, it will be appreciated by those skilled in the art that the process based on telephone number generation identifying code can for example can realize through any hash algorithm based on existing techniques in realizing, do not repeat them here.Further, those skilled in the art also understand, and can said identifying code be sent to said smart mobile phone through wireless networks such as Wifi, Wimax.
Next execution in step 3, and smart mobile phone application program (or client) is obtained the identifying code in the short message automatically, and sends it back server, verifies for background server.Particularly, it will be appreciated by those skilled in the art that said client can obtain identifying code through the mode that directly reads said content of short message.Preferably, it will be appreciated by those skilled in the art that after said client is installed on said smart mobile phone; Then said client is reliable for said smart mobile phone; It can directly read the short message that is stored in this smart mobile phone, and this belongs to prior art, does not repeat them here.Further, in above-mentioned steps 2, can have specific title from the short message in the background server, for example " from the identifying code of server A " therefore, can find needed short message based on the said client of this title exactly.Perhaps in a variant, said client can also be searched a up-to-date short message relevant with content of the present invention through the transmitting time of short message, thereby accurately locatees, and does not repeat them here.
After having obtained above-mentioned short message, through with above-mentioned steps 1, the corresponding wireless communication networks of step 2, said identifying code is sent out to said background server once more.Carry out said step 4 at last, said background server verifies that to this identifying code if identifying code is consistent, user's logging request passes, and returns a token and gives said client, supplies to use in the subsequent communications.It will be apparent to those skilled in the art that; In above-mentioned steps 2; Said background server has produced an identifying code, and the smart mobile phone in this identifying code (for convenience's sake, we are referred to as identifying code A) and the step 1 adapts; Preferably, its unique correspondence and temporarily being stored in the said smart mobile phone.And in step 4; Said background server has obtained from another identifying code of said step 3 (for convenience's sake further; We are referred to as identifying code B), thus said background server verifies to above-mentioned identifying code A and above-mentioned identifying code B and relatively whether it is consistent; Such comparison procedure belongs to prior art, does not repeat them here.If both are consistent, show that then checking passes through, the landing request information of submitting in the promptly said step 1 is allowed to, thereby can realize said logging request.And preferably; In the present embodiment; Said background server to shown in client send a token, and use as the sign of the said client of sign in this token communication process afterwards, thereby make background server accept the information of sending with this token clients corresponding.
Like this, through above-mentioned steps 1 ~ step 4, complete login, a proof procedure are implemented.
In above-mentioned steps 2 and above-mentioned step S202 shown in Figure 1, said background server can send to said smart mobile phone with said identifying code in several ways.For example can send this identifying code through the mode of short message (SMS), the short message processing apparatus in the then said smart mobile phone will show this identifying code, for example " ABCDEFG ".And in a variant, said identifying code is sent to said smart mobile phone by the mode through multimedia short message (MMS), and for example the mode with a two-dimension code is shown in the said smart mobile phone.In another variant, in the Email email address that mode is sent to the corresponding telephone number of said smart mobile phone is bound mutually of said identifying code quilt through Email, thereby make this identifying code be present among the said Email.
Further; It will be apparent to those skilled in the art that; When sending said identifying code through the mode of short message or multimedia short message; Preferably, said short message or the multimedia short message that comprises above-mentioned identifying code will send through the third party system that short message or multimedia short message service are provided, for example the mobile communcations system that provides of China Mobile.And when sending said identifying code through Email, the said Email that comprises above-mentioned identifying code sends through an Email server or a plurality of Email server.Those skilled in the art combine prior art can realize such process of transmitting, do not repeat them here.
Further; It will be apparent to those skilled in the art that; Preferably; When sending said identifying code through the mode of short message or multimedia short message, the client (perhaps application program) that is installed in the said smart mobile phone is obtained the identifying code that is contained in said short message or the multimedia short message through the mode that reads above-mentioned short message or multimedia short message, does not repeat them here.When sending said identifying code through Email, the said client (perhaps application program) that is installed in the said smart mobile phone is obtained the identifying code that is contained in this Email through the visit Email server corresponding with above-mentioned Email address.Further, it will be appreciated by those skilled in the art that preferably that the mode of sending identifying code can be accomplished in several ways, and various mode can realize through being provided with of application system relevant with content of the present invention.For example; In setting up procedure; The user who holds smart mobile phone A selects the mode of short message; The user who holds smart mobile phone B then possibly select the mode of Email, thereby when background server sends identifying code, can select for use different modes to send said identifying code according to user's difference setting.Further; Said background server also can select different modes to send said identifying code according to the needs of background server; And when sending identifying code to shown in client in the smart mobile phone send an instruction; This instruction has comprised mode, the approach that transmits said identifying code, thereby said client can be obtained said identifying code through corresponding approach, does not repeat them here.Again further; When adopting the Email mode to send said identifying code; Email account and corresponding password that said client can use respective user to provide when the said Email server of visit; This needs the user initiatively to offer said client usually, can completion be set through disposable particularly; Perhaps said client also can with the said Email server relation of breaking the wall of mistrust; During content when obtain the Email of printed words that title is " identifying code " or " verification code " from the requirement of said client in; Said Email server allows said client to obtain the content among this Email, i.e. identifying code.These different implementations can realize through the combination of various prior art means, not repeat them here.
Fig. 3 illustrates according to a second embodiment of the present invention, based on the sketch map of the automatic log-in control method of smart mobile phone.Through this sketch map, by the processing procedure of smart mobile phone completion, and very clear by the processing procedure of said background server completion.At first " send phone number ", promptly directly send phone number and give said background server to server in smart mobile phone side execution in step, the process of submission landing request information that Here it is, this phone number itself is just understood as landing request information.Then, " send identifying code to this phone number ", preferably send the short message that comprises this identifying code and arrive corresponding above-mentioned phone number through GSM through short message in said background information server one side execution in step.After said short message was received by said smart mobile phone, said client was automatically obtained above-mentioned identifying code from this short message, thereby can this identifying code be used for subsequent step.Promptly at first, execution in step " judge identifying code obtain success or not ", if unsuccessful, login failure then, client can be provided with in advance according to automatic login or the user that (or the N time) for the second time carried out in user's selection and carry out secondary automatic login then.Otherwise, if obtain the identifying code success, then " identifying code is beamed back server " in said smart mobile phone side execution in step, such process still can be accomplished through wireless communication networks, does not repeat them here.Next " judge whether identifying code is consistent " in said background information server one side execution in step; If it is inconsistent with the identifying code that initial this background information server is directed against this smart mobile phone generation from the identifying code that said smart mobile phone sends; Then confirm login failure; The information that said background information server sends login failure to said smart mobile phone, client can be provided with in advance according to automatic login or the user that (or the N time) for the second time carried out in user's selection and carry out secondary automatic login then.Otherwise,, then " token is sent to client " in said background information server one side execution in step if the identifying code that sends from said smart mobile phone is consistent with the identifying code that initial this background information server is directed against this smart mobile phone generation.Preferably, it will be appreciated by those skilled in the art that said background information server at first generates a unique token, and then this token is sent to said client through wireless communication networks.Simultaneously, said client can be confirmed this and logins successfully after receiving said token.
With reference to above-mentioned Fig. 1 ~ Fig. 3, it will be appreciated by those skilled in the art that employed means of communication in above-mentioned step S202 shown in Figure 1 and all the other steps (for example step S201, S203, S204), preferably, there are differences.For example step S202 carries out communication through SMS or the MMS passage that mobile communcations system provides, this can be understood that one independently, distinctive communication modes; In all the other steps, then can adopt the mode of public network to carry out communication, for example, perhaps also can carry out communication through the Internet through wireless 3G technology.It will be appreciated by those skilled in the art that in different embodiments, can take different communication modes, thereby make the enforcement of this programme more flexible, practical, do not repeat them here according to the enforcement needs.Similarly, corresponding step also can be adopted in the same way and is achieved in Fig. 2 or Fig. 3, does not repeat them here.
Further; With reference to above-mentioned Fig. 1 ~ Fig. 3; It will be appreciated by those skilled in the art that in a variant said step S104 shown in Figure 1 or step 4 shown in Figure 2 or " logining successfully " shown in Figure 3 can also comprise the steps: the said token of said client storage afterwards.Through this step, said token is preserved by said client, thereby when submitting landing request information to, can send said token in the lump next time.Through such variant, then do not need all to adopt in each login process the proof procedure of Fig. 1 to Fig. 3, make login process quick and easy.It will be appreciated by those skilled in the art that because this token is generated by said background server,, do not repeat them here so the city can be guaranteed under the enough perfect situation of the AES of background server for its confidentiality, fail safe.
Further, it will be appreciated by those skilled in the art that in Fig. 1 ~ embodiment illustrated in fig. 3 that each login back is said to be obtained token by client and is not preserved, this token can not be used to login process next time.Correspondingly, in login process next time, still carry out above-mentioned Fig. 1 ~ step shown in Figure 3, do not repeat them here.Further; It will be apparent to those skilled in the art that; Even be not all to preserve token at every turn,, but automatically accomplish login process by the client that is installed in the smart mobile phone because technology contents provided by the invention does not require that the user inputs information such as user name and password; So it compared with prior art still has quick, easy advantage, does not repeat them here.
 
More particularly, Fig. 4 illustrates according to the first embodiment of the present invention, the network topology sketch map of the automatic login system based on smart mobile phone provided by the invention.In technical scheme provided by the invention, said automatic login system comprises at least one background server 5, several clients.Wherein, said background server 5 is used for the background information of related application is safeguarded, managed, and the logging request of client is handled to flow process shown in Figure 3 according to above-mentioned Fig. 1.Said client quilt is used for sending landing request information to said background server 5 respectively according in smart mobile phone 31 ~ 33, and after logining successfully, carries out alternately with the operation corresponding application program with said background server 5.It will be appreciated by those skilled in the art that in the said background server 5 and can move a plurality of application programs simultaneously, for example instant chat system, microblogging system, or the like, this need confirm according to the carrying capacity and the business demand of background server 5.Further; In a preferred embodiment, said background server 5 can also be distributed to other servers with its partial function and accomplish, and data server, application program access server etc. for example are set specially; This does not influence flesh and blood of the present invention, does not repeat them here.
Further, in the present embodiment, said automatic login system also comprises at least one third party system 6, and it is used for cooperating with said background server 5, to realize that above-mentioned Fig. 1 is to flow process shown in Figure 3.Particularly, said third party system 6 sends to said smart mobile phone 31 ~ 33 through means of communications such as wireless communication networks with identifying code, thereby makes the said client that is positioned at it can realize extremely flow process shown in Figure 3 of above-mentioned Fig. 1.Further, it will be appreciated by those skilled in the art that in variant; Said third party system 6 can exist a plurality of; And this a plurality of third party system can accomplish same function or accomplish different functions, and for example a third party system is the Email server, and another third party system is a short message servers; This confirms according to different enforcement needs equally, does not repeat them here.
Fig. 5 illustrates according to the first embodiment of the present invention, the structural representation of the control device of login automatically that is used for based on smart mobile phone provided by the invention.In the present embodiment, said automatic login control device 2 comprises first dispensing device 21; First receiving device 22, the first deriving means, 23, the second receiving systems 24 and background server 4; Wherein, 21 said being used for of first dispensing device are sent landing request information to background server; First receiving device 22 is used to receive first identifying code from said background server; Wherein, Said first identifying code is generated according to said landing request information by said background server 4, and by said background server 4 said first identifying code is sent to said smart mobile phone; Said first deriving means 23 is used to obtain said first identifying code, and generates the checking solicited message based on said first identifying code, and said checking solicited message is sent to said background server 4; Said second receiving system 24 is used to receive the checking result from said background server 4, and wherein, 4 pairs of said checking solicited messages of said background server are verified.Further; Said checking solicited message can comprise said first identifying code itself; Can also comprise the telephone number that said first identifying code and said smart mobile phone are corresponding; The corresponding telephone number of said first identifying code and said smart mobile phone, checking request time can also be comprised, said first identifying code and checking request time can also be comprised.It will be appreciated by those skilled in the art that the telephone number that comprises at least in the said landing request information that said smart mobile phone is corresponding.
More specifically, in the present embodiment, at first said first dispensing device 21 sends landing request information to background server 4.It will be apparent to those skilled in the art that; Preferably, said first dispensing device 21 is for to be installed on the client in the smart mobile phone, and it sends said landing request information to said background server; Such process is pressed " login " or " affirmation " button through the user usually and is begun; After receiving this operation, said client executing sequence of operations is closed and sent landing request information to said background server 4, and is specific as follows said.And visibly differently with prior art be; In this process, the user need not provide any password, and password need not provided by the user in this login process; But through technological means directly by realizing proof procedure alternately between background server and the client, specific as follows said.
Said then first receiving device 22 receives first identifying code from said background server 4.In conjunction with Fig. 3, it will be understood by those skilled in the art that said first identifying code is generated according to said landing request information by said background server 4, and said first identifying code is sent to said first receiving device 22 by said background server 4.Promptly at said first dispensing device 21 after background server 4 sends landing request information; Said background server 4 receives said landing request information; Then according to said first identifying code in this landing request information market, and correspondingly this first identifying code is sent to said smart mobile phone through wireless communication networks.
Connect down first deriving means 23 and obtain said first identifying code, and generate the checking solicited message, and said checking solicited message is sent to said background server 4 based on said first identifying code.Preferably, this step is still accomplished by above-mentioned client.Particularly, received said first identifying code through said first receiving device 22 after, said client reads said first identifying code through various technological means, perhaps obtains said first identifying code through other means.Further, said client generates a checking solicited message according to said first identifying code, should verify then that solicited message sent to said background server.Based on this checking solicited message, said client requires background server 4 that its logging request is verified.
The checking result that the second last receiving system 24 receives from said background server 4.After it will be appreciated by those skilled in the art that said background server 4 receives said checking solicited message, said checking solicited message is verified, and will be verified that the result correspondingly returns to said smart mobile phone.It will be appreciated by those skilled in the art that preferably said checking result is still received by said client and carries out subsequent treatment.
Further, it will be appreciated by those skilled in the art that if the checking result of said second receiving system 24 is " checking is passed through "; Then in subsequent operation; Said background server 4 allows said smart mobile phone to login to background server, correspondingly carries out subsequent operation, for example logins to an instant chat system; Perhaps sign in to a Web2.0 system, perhaps sign in to shopping website or the like.Concrete subsequent operation Fig. 2 specific as follows, shown in Figure 3 does not repeat them here.
Further, it will be appreciated by those skilled in the art that preferably, be connected through wireless communication networks between said background server 4 and the said control device 3, promptly realize mutual communication through wireless communication networks, what for example embodiment as shown in Figure 4 set forth.And said wireless communication networks can be various wireless networks, for example Wifi, Wimax etc., and this does not influence flesh and blood of the present invention, does not repeat them here.Further, those skilled in the art can not repeat them here with reference to connected mode, the communication modes of said each part of realization embodiment illustrated in fig. 4.
Comprehensive above-mentioned Fig. 1 to Fig. 5 it will be appreciated by those skilled in the art that to the present invention relates to the smart mobile phone application, and a kind of method of logining the background information system based on smart mobile phone automatically is provided.Preferably, said method comprising the steps of:
A. smart mobile phone is used and is sent this hand set number to the background information system server;
B. server returns identifying code through short message;
C. mobile phone application is obtained the identifying code in the short message automatically, and sends to server authentication;
D. after server is confirmed identifying code, return token and give mobile phone, use for subsequent communications.
Use this method, the user need not to register or use the manual login of mode of usemame/password, and is convenient and swift, simultaneously safe and reliable again, can be widely used in the smart mobile phone application of medium safety requirements.
Implementing in the system nature of this technical scheme is a kind of system of user terminal/server framework.Client is the application program that operates on the smart mobile phone, and server is to use the background system that service is provided for smart mobile phone.Server must have the ability to send SMS message to mobile phone.The difficult point of this scheme is how to verify that the mobile phone that sends to server is exactly the mobile phone at client place.
Specific embodiments is following:
Client is obtained this hand set number, and through certain agreement this number is sent to server.Server produces an identifying code at random behind the phone number of receiving the client place, send to this mobile phone through short message.The form of content of short message is by the client and server consult to decide.After mobile phone was received short message, client was extracted identifying code automatically from short message, and sends it back server.The identifying code that server acknowledges receipt of is consistent with the identifying code that sends before, and the phone number that the request of sending is described is copied.After the checking, server produces a communication token at random, and sends to client.In communication subsequently, client must use this token to come transmission information as identify label.
In general, identifying code is the one group of text message that is produced by server with the token of communicating by letter.Different according to character of using and requirement, the complexity of identifying code and the token of communicate by letter maybe be different, and the agreement of client and server signal post employing and cipher mode be the possibility difference also.The present invention does not limit this, and application system oneself decision is arranged fully.
After adopting the present invention, client need not on server, to register, and can login through the phone number that oneself belongs to, and has both reduced the maintenance cost of server, has also avoided the user to remember the worry of complicated user name and password.In other words, the instant messenger that provides with prior art etc. is compared, and the present technique scheme is if be applied to the login process of instant messenger; Then the user need not register on the one hand; Need not apply for a user name through red tape, on the other hand, the user need not input user name and password or other information; As long as and press " login " button, just can realize login automatically to content shown in Figure 5 according to above-mentioned Fig. 1.And the prior art of comparing, fail safe of the present invention is enough to be used in application such as instant messenger, has boundless technical application prospect.
More than specific embodiment of the present invention is described.It will be appreciated that the present invention is not limited to above-mentioned specific implementations, those skilled in the art can make various distortion or modification within the scope of the claims, and this does not influence flesh and blood of the present invention.

Claims (20)

1. the automatic log-in control method based on smart mobile phone is characterized in that, comprises the steps:
A. send landing request information to background server;
B. receive first identifying code from said background server, wherein, said first identifying code is generated according to said landing request information by said background server, and by said background server said first identifying code is sent to said smart mobile phone;
C. obtain said first identifying code, and generate the checking solicited message, and said checking solicited message is sent to said background server based on said first identifying code;
D. receive the checking result from said background server, wherein, said background server is verified said checking solicited message.
2. control method according to claim 1 is characterized in that, said checking solicited message comprises any in the following information:
Said first identifying code itself;
The telephone number that said first identifying code and said smart mobile phone are corresponding;
The telephone number that said first identifying code and said smart mobile phone are corresponding, checking request time; Perhaps
Said first identifying code and checking request time.
3. control method according to claim 1 and 2 is characterized in that, the step that the said background server in the said steps d is verified said checking solicited message comprises the steps:
D1. said background server extracts said first identifying code from said checking solicited message;
D2. said background server judges whether said first identifying code and its send to first identifying code of said client consistent;
D3. if both are consistent, then definite above-mentioned checking is passed through.
4. according to each described control method in the claim 1 to 3, wherein, the said background server among the said step b comprises the steps: the step that said first identifying code sends to said smart mobile phone
B1. through a third party system said first identifying code is sent to said smart mobile phone.
5. control method according to claim 4 is characterized in that, said third party system comprises mobile communication service system.
6. control method according to claim 5 is characterized in that, any during said step b1 comprises the steps:
Through said mobile communication service system said first identifying code is sent to said smart mobile phone with the mode of short message; Perhaps
Through said mobile communication service system said first identifying code is sent to said smart mobile phone with the mode of multimedia short message.
7. control method according to claim 4 is characterized in that, said third party system comprises electronic mail service system, and said step b1 comprises the steps:
Through said electronic mail service system the mode of said first identifying code with Email is sent in the Email receiver address, wherein, the telephone number that said Email receiver address is corresponding with said smart mobile phone is unique corresponding.
8. according to each described method in the claim 1 to 7, it is characterized in that, comprise the telephone number that said smart mobile phone is corresponding in the said landing request information at least.
9. the automatic login control device based on smart mobile phone is characterized in that, comprises the steps:
First dispensing device, it is used for sending landing request information to background server;
First receiving device; It is used to receive first identifying code from said background server; Wherein, said first identifying code is generated according to said landing request information by said background server, and by said background server said first identifying code is sent to said smart mobile phone;
First deriving means, it is used to obtain said first identifying code, and generates the checking solicited message based on said first identifying code, and said checking solicited message is sent to said background server; And
Second receiving system, it is used to receive the checking result from said background server, and wherein, said background server is verified said checking solicited message.
10. control device according to claim 9 is characterized in that, said checking solicited message comprises any in the following information:
Said first identifying code itself;
The telephone number that said first identifying code and said smart mobile phone are corresponding;
The telephone number that said first identifying code and said smart mobile phone are corresponding, checking request time; Perhaps
Said first identifying code and checking request time.
11. according to claim 9 or 10 described control device, it is characterized in that, comprise the telephone number that said smart mobile phone is corresponding in the said landing request information at least.
12. the automatic login system based on smart mobile phone comprises:
A plurality of smart mobile phones are equipped with in each smart mobile phone according to each described control device in the aforesaid right requirement 9 to 11;
At least one background server is used to receive the landing request information from said smart mobile phone at least;
Wireless communication networks, said a plurality of smart mobile phones are respectively through said wireless communication networks and the mutual communication of said at least one background server;
It is characterized in that said automatic login system is accomplished the deterministic process that whether allows based on said logging request login to said background server through following steps:
A. said control device sends landing request information to said background server;
B. background server generates first identifying code according to said landing request information, and said first identifying code is sent to said control device;
C. said control device obtains said first identifying code automatically, and generates the checking solicited message based on said first identifying code, and said checking solicited message is sent to said background server;
D. said background server is verified said checking solicited message;
E. if above-mentioned checking is passed through, then allow said control device login.
13. automatic login system according to claim 12 is characterized in that, said checking solicited message comprises any in the following information:
Said first identifying code itself;
The telephone number that said first identifying code and said smart mobile phone are corresponding;
The telephone number that said first identifying code and said smart mobile phone are corresponding, checking request time; Perhaps
Said first identifying code and checking request time.
14., it is characterized in that said step D comprises the steps: according to claim 12 or 16 described automatic login systems
D1. said background server extracts said first identifying code from said checking solicited message;
D2. said background server judges whether said first identifying code and its send to first identifying code of said control device consistent;
D3. if both are consistent, then definite above-mentioned checking is passed through.
15. according to each described automatic login system in the claim 12 to 14, wherein, the step that said first identifying code is sent to said control device among the said step B comprises the steps:
B1. through a third party system said first identifying code is sent to said control device.
16. automatic login system according to claim 15 is characterized in that, said third party system comprises mobile communication service system.
17. automatic login system according to claim 16 is characterized in that, any during said step B1 comprises the steps:
Through said mobile communication service system said first identifying code is sent to said control device with the mode of short message; Perhaps
Through said mobile communication service system said first identifying code is sent to said control device with the mode of multimedia short message.
18. automatic login system according to claim 15 is characterized in that, said third party system comprises electronic mail service system, and said step B1 comprises the steps:
Through said electronic mail service system the mode of said first identifying code with Email is sent in the Email receiver address; Wherein, said Email receiver address is corresponding with said smart mobile phone telephone number or said control device are unique corresponding.
19. according to each described automatic login system in the claim 12 to 18, it is characterized in that, comprise the telephone number that said smart mobile phone is corresponding in the said landing request information at least.
20. a smart mobile phone is characterized in that, comprises at least according to each described control device in the claim 9 to 11.
CN2010106071587A 2010-12-27 2010-12-27 Automatic login system based on smart phone and control method Pending CN102546914A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2010106071587A CN102546914A (en) 2010-12-27 2010-12-27 Automatic login system based on smart phone and control method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2010106071587A CN102546914A (en) 2010-12-27 2010-12-27 Automatic login system based on smart phone and control method

Publications (1)

Publication Number Publication Date
CN102546914A true CN102546914A (en) 2012-07-04

Family

ID=46352853

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010106071587A Pending CN102546914A (en) 2010-12-27 2010-12-27 Automatic login system based on smart phone and control method

Country Status (1)

Country Link
CN (1) CN102546914A (en)

Cited By (42)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102868696A (en) * 2012-09-18 2013-01-09 广州市动景计算机科技有限公司 Method and system for communication and information synchronization among equipments
CN102958022A (en) * 2012-11-23 2013-03-06 深圳市朗科科技股份有限公司 Short message verification method, device and system
CN102984261A (en) * 2012-12-04 2013-03-20 中国联合网络通信集团有限公司 Network service login method, equipment and system based on mobile telephone terminal
CN103067373A (en) * 2012-12-20 2013-04-24 天津书生投资有限公司 User registration method
CN103259795A (en) * 2013-05-14 2013-08-21 百度在线网络技术(北京)有限公司 Method for executing automatic register and login, mobile terminal and server
CN103401880A (en) * 2013-08-15 2013-11-20 西南大学 Automatic login industrial control system and control method
CN103401685A (en) * 2013-07-24 2013-11-20 惠州Tcl移动通信有限公司 Mobile terminal and information processing method thereof
CN103546877A (en) * 2013-10-30 2014-01-29 上海斐讯数据通信技术有限公司 Method and system for obtaining and inputting content code and mobile terminal
CN103596021A (en) * 2013-11-22 2014-02-19 乐视致新电子科技(天津)有限公司 Account login method, device and system of intelligent television
CN103841130A (en) * 2012-11-21 2014-06-04 深圳市腾讯计算机系统有限公司 Verification information pushing method and device, and identity authentication method and device
CN103942508A (en) * 2014-05-12 2014-07-23 湖南工业大学 Login-free information submitting and identity identification method
CN104010085A (en) * 2014-06-12 2014-08-27 北京奇虎科技有限公司 Message processing method and device
CN104093141A (en) * 2014-06-27 2014-10-08 北京奇虎科技有限公司 Terminal application log-in method, device, client and electronic device
CN104168261A (en) * 2014-07-02 2014-11-26 百度在线网络技术(北京)有限公司 Method and device for dynamic cipher login
CN104426904A (en) * 2013-09-08 2015-03-18 王正伟 Automatic login method
CN104703151A (en) * 2013-12-09 2015-06-10 浙江融创信息产业有限公司 Client dynamic password authentication method, device and terminal
CN104734922A (en) * 2013-12-18 2015-06-24 深圳市豪恩安全科技有限公司 Alarm receiver access and control method and access and control device
CN104767614A (en) * 2014-01-03 2015-07-08 中国移动通信集团浙江有限公司 Information authentication method and device
CN104883341A (en) * 2014-02-28 2015-09-02 宇龙计算机通信科技(深圳)有限公司 Application management device, terminal and application management method
CN104954383A (en) * 2015-06-24 2015-09-30 深圳市兰丁科技有限公司 Application program login method and system
CN105208013A (en) * 2015-08-31 2015-12-30 张方华 Cross-device high-security non-password login method
CN105227556A (en) * 2015-10-10 2016-01-06 罗子聪 Server and terminal anti-counterfeit authentication method, system
CN105554136A (en) * 2015-12-23 2016-05-04 北京奇虎科技有限公司 Backup data restoration method, device and system
CN105828329A (en) * 2015-11-16 2016-08-03 广东亿迅科技有限公司 Authentication management method for mobile terminals
CN106790267A (en) * 2017-02-13 2017-05-31 郑州云海信息技术有限公司 A kind of method and apparatus of access server operating system
CN106790199A (en) * 2016-12-31 2017-05-31 中国移动通信集团江苏有限公司 Identifying code processing method and processing device
CN106850635A (en) * 2017-02-13 2017-06-13 郑州云海信息技术有限公司 A kind of method and apparatus for accessing single-set operation system
CN106851602A (en) * 2017-03-31 2017-06-13 武汉票据交易中心有限公司 A kind of transaction system short-message verification method and system
CN104052757B (en) * 2014-07-02 2017-09-01 上海携程商务有限公司 Identification system and method based on the client application in mobile phone
CN107241362A (en) * 2017-08-10 2017-10-10 青岛网信信息科技有限公司 Recognize the method and apparatus that identifying code inputs user identity
CN107241329A (en) * 2017-06-07 2017-10-10 北京奇艺世纪科技有限公司 Account login process method and device
WO2018023394A1 (en) * 2016-08-02 2018-02-08 张阳 Method for automatically extracting verification code from short message, and mobile phone
CN108111533A (en) * 2018-01-08 2018-06-01 苏州达家迎信息技术有限公司 The registration login method and system of APP
CN108377236A (en) * 2018-01-31 2018-08-07 维沃移动通信有限公司 Verification method and mobile terminal
CN108650276A (en) * 2018-05-21 2018-10-12 北京五八信息技术有限公司 A kind of login method, device, electronic equipment and storage medium
CN108769059A (en) * 2018-06-21 2018-11-06 网易宝有限公司 Method of calibration, device, medium and computing device
CN109889663A (en) * 2019-02-06 2019-06-14 刘兴丹 A kind of method, apparatus for the input handset number that dials
WO2019134234A1 (en) * 2018-01-08 2019-07-11 平安科技(深圳)有限公司 Rooting-prevention log-in method, device, terminal apparatus, and storage medium
WO2019232825A1 (en) * 2018-06-06 2019-12-12 平安科技(深圳)有限公司 Information customization transmission method, device, computer device and storage medium
WO2020155767A1 (en) * 2019-01-31 2020-08-06 平安科技(深圳)有限公司 Mobile terminal-based passwordless login method and apparatus, device, and storage medium
CN111787154A (en) * 2015-02-15 2020-10-16 联想(北京)有限公司 Information processing method and electronic equipment
CN112235177A (en) * 2020-08-29 2021-01-15 上海量明科技发展有限公司 Method, device and system for sending authentication information through instant messaging

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101079931A (en) * 2006-09-22 2007-11-28 腾讯科技(深圳)有限公司 A number verification system and its method
CN101155324A (en) * 2006-09-28 2008-04-02 赵建文 Instant communication method and system based on or containing mobile phone book
CN101242404A (en) * 2007-02-08 2008-08-13 联想(北京)有限公司 A validation method and system based on heterogeneous network

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101079931A (en) * 2006-09-22 2007-11-28 腾讯科技(深圳)有限公司 A number verification system and its method
CN101155324A (en) * 2006-09-28 2008-04-02 赵建文 Instant communication method and system based on or containing mobile phone book
CN101242404A (en) * 2007-02-08 2008-08-13 联想(北京)有限公司 A validation method and system based on heterogeneous network

Cited By (60)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102868696B (en) * 2012-09-18 2015-10-07 广州市动景计算机科技有限公司 The communication of many equipment rooms and information synchronization method and system
CN102868696A (en) * 2012-09-18 2013-01-09 广州市动景计算机科技有限公司 Method and system for communication and information synchronization among equipments
CN103841130A (en) * 2012-11-21 2014-06-04 深圳市腾讯计算机系统有限公司 Verification information pushing method and device, and identity authentication method and device
CN102958022A (en) * 2012-11-23 2013-03-06 深圳市朗科科技股份有限公司 Short message verification method, device and system
CN102984261A (en) * 2012-12-04 2013-03-20 中国联合网络通信集团有限公司 Network service login method, equipment and system based on mobile telephone terminal
CN102984261B (en) * 2012-12-04 2015-07-08 中国联合网络通信集团有限公司 Network service login method, equipment and system based on mobile telephone terminal
CN103067373A (en) * 2012-12-20 2013-04-24 天津书生投资有限公司 User registration method
CN103259795A (en) * 2013-05-14 2013-08-21 百度在线网络技术(北京)有限公司 Method for executing automatic register and login, mobile terminal and server
CN103259795B (en) * 2013-05-14 2016-12-28 百度在线网络技术(北京)有限公司 Perform registration logs in automatically method, mobile terminal and server
CN103401685A (en) * 2013-07-24 2013-11-20 惠州Tcl移动通信有限公司 Mobile terminal and information processing method thereof
CN103401880A (en) * 2013-08-15 2013-11-20 西南大学 Automatic login industrial control system and control method
CN103401880B (en) * 2013-08-15 2016-03-23 西南大学 The system and method that a kind of industrial control network logs in automatically
CN104426904A (en) * 2013-09-08 2015-03-18 王正伟 Automatic login method
CN103546877B (en) * 2013-10-30 2018-10-12 上海斐讯数据通信技术有限公司 A kind of method, system and mobile terminal obtaining simultaneously input content code
CN103546877A (en) * 2013-10-30 2014-01-29 上海斐讯数据通信技术有限公司 Method and system for obtaining and inputting content code and mobile terminal
CN103596021A (en) * 2013-11-22 2014-02-19 乐视致新电子科技(天津)有限公司 Account login method, device and system of intelligent television
CN104703151A (en) * 2013-12-09 2015-06-10 浙江融创信息产业有限公司 Client dynamic password authentication method, device and terminal
CN104734922A (en) * 2013-12-18 2015-06-24 深圳市豪恩安全科技有限公司 Alarm receiver access and control method and access and control device
CN104767614A (en) * 2014-01-03 2015-07-08 中国移动通信集团浙江有限公司 Information authentication method and device
CN104767614B (en) * 2014-01-03 2019-03-05 中国移动通信集团浙江有限公司 A kind of information authentication method and device
CN104883341B (en) * 2014-02-28 2019-01-25 宇龙计算机通信科技(深圳)有限公司 Application management device, terminal and application management method
CN104883341A (en) * 2014-02-28 2015-09-02 宇龙计算机通信科技(深圳)有限公司 Application management device, terminal and application management method
CN103942508B (en) * 2014-05-12 2016-10-12 湖南工业大学 A kind of formula that logs in of exempting from submits information the method verifying identity to
CN103942508A (en) * 2014-05-12 2014-07-23 湖南工业大学 Login-free information submitting and identity identification method
WO2015188739A1 (en) * 2014-06-12 2015-12-17 北京奇虎科技有限公司 Message processing method and apparatus
CN104010085A (en) * 2014-06-12 2014-08-27 北京奇虎科技有限公司 Message processing method and device
CN104010085B (en) * 2014-06-12 2016-04-20 北京奇虎科技有限公司 Message treatment method and device
CN104093141B (en) * 2014-06-27 2016-09-28 北京奇虎科技有限公司 The login method of terminal applies, device, client and electronic equipment
CN104093141A (en) * 2014-06-27 2014-10-08 北京奇虎科技有限公司 Terminal application log-in method, device, client and electronic device
CN104168261B (en) * 2014-07-02 2018-09-07 百度在线网络技术(北京)有限公司 Dynamic password login method and device
CN104168261A (en) * 2014-07-02 2014-11-26 百度在线网络技术(北京)有限公司 Method and device for dynamic cipher login
CN104052757B (en) * 2014-07-02 2017-09-01 上海携程商务有限公司 Identification system and method based on the client application in mobile phone
CN111787154A (en) * 2015-02-15 2020-10-16 联想(北京)有限公司 Information processing method and electronic equipment
CN104954383A (en) * 2015-06-24 2015-09-30 深圳市兰丁科技有限公司 Application program login method and system
CN105208013A (en) * 2015-08-31 2015-12-30 张方华 Cross-device high-security non-password login method
CN105227556A (en) * 2015-10-10 2016-01-06 罗子聪 Server and terminal anti-counterfeit authentication method, system
CN105828329A (en) * 2015-11-16 2016-08-03 广东亿迅科技有限公司 Authentication management method for mobile terminals
CN105828329B (en) * 2015-11-16 2019-07-30 广东亿迅科技有限公司 Mobile terminal authentication management method
CN105554136A (en) * 2015-12-23 2016-05-04 北京奇虎科技有限公司 Backup data restoration method, device and system
CN105554136B (en) * 2015-12-23 2019-07-02 北京奇虎科技有限公司 Backup Data restoring method, apparatus and system
WO2018023394A1 (en) * 2016-08-02 2018-02-08 张阳 Method for automatically extracting verification code from short message, and mobile phone
CN106790199A (en) * 2016-12-31 2017-05-31 中国移动通信集团江苏有限公司 Identifying code processing method and processing device
CN106790199B (en) * 2016-12-31 2020-03-06 中国移动通信集团江苏有限公司 Verification code processing method and device
CN106850635A (en) * 2017-02-13 2017-06-13 郑州云海信息技术有限公司 A kind of method and apparatus for accessing single-set operation system
CN106790267A (en) * 2017-02-13 2017-05-31 郑州云海信息技术有限公司 A kind of method and apparatus of access server operating system
CN106851602A (en) * 2017-03-31 2017-06-13 武汉票据交易中心有限公司 A kind of transaction system short-message verification method and system
CN107241329B (en) * 2017-06-07 2020-04-21 北京奇艺世纪科技有限公司 Account login processing method and device
CN107241329A (en) * 2017-06-07 2017-10-10 北京奇艺世纪科技有限公司 Account login process method and device
CN107241362A (en) * 2017-08-10 2017-10-10 青岛网信信息科技有限公司 Recognize the method and apparatus that identifying code inputs user identity
CN108111533A (en) * 2018-01-08 2018-06-01 苏州达家迎信息技术有限公司 The registration login method and system of APP
WO2019134234A1 (en) * 2018-01-08 2019-07-11 平安科技(深圳)有限公司 Rooting-prevention log-in method, device, terminal apparatus, and storage medium
CN108377236A (en) * 2018-01-31 2018-08-07 维沃移动通信有限公司 Verification method and mobile terminal
CN108650276A (en) * 2018-05-21 2018-10-12 北京五八信息技术有限公司 A kind of login method, device, electronic equipment and storage medium
WO2019232825A1 (en) * 2018-06-06 2019-12-12 平安科技(深圳)有限公司 Information customization transmission method, device, computer device and storage medium
CN108769059A (en) * 2018-06-21 2018-11-06 网易宝有限公司 Method of calibration, device, medium and computing device
CN108769059B (en) * 2018-06-21 2021-11-23 网易宝有限公司 Verification method, device, medium and computing equipment
WO2020155767A1 (en) * 2019-01-31 2020-08-06 平安科技(深圳)有限公司 Mobile terminal-based passwordless login method and apparatus, device, and storage medium
CN109889663A (en) * 2019-02-06 2019-06-14 刘兴丹 A kind of method, apparatus for the input handset number that dials
CN112235177A (en) * 2020-08-29 2021-01-15 上海量明科技发展有限公司 Method, device and system for sending authentication information through instant messaging
WO2022041179A1 (en) * 2020-08-29 2022-03-03 深圳市永兴元科技股份有限公司 Method, device and system for sending authentication information by means of instant messaging

Similar Documents

Publication Publication Date Title
CN102546914A (en) Automatic login system based on smart phone and control method
US11373181B2 (en) System and method for verifying identity information using a social networking application
CN104468531B (en) The authorization method of sensitive data, device and system
CN103179098B (en) A kind of password method for retrieving of network account and device
CN105554037B (en) Authentication processing method and service platform
CN103618794B (en) Method, terminal and the server of automated log on
CN104618315B (en) A kind of method, apparatus and system of verification information push and Information Authentication
CN105357110B (en) E-mail sending method, apparatus and system
WO2018018697A1 (en) Method and system for identifying spam message from false base station
TWI632798B (en) Server, mobile terminal, and network real-name authentication system and method
CN105392136A (en) Method and device for access to router based on two-dimensional code
US10742650B2 (en) Communication system and computer readable storage medium
US20160321667A1 (en) Computerized system and method for offline identity authentication of a user cross-reference to related applications
WO2017206524A1 (en) Electronic device control method, terminal and control system
CN104104657A (en) Information validation method, server, terminal and system
CN104301875A (en) Short message processing method and device
CN103973652A (en) Login method and login system
CN104113556A (en) Network logon authentication method and system, mobile terminal and application server
CN105516054B (en) A kind of method and device of subscriber authentication
CN105024814A (en) Verifying method, server and system
CN201557173U (en) Set-top box applied to IPTV system
CN104936177B (en) A kind of access authentication method and access authentication system
CN103152401A (en) Mobile terminal, login method and system through mobile terminal, and cloud server
KR20130077682A (en) Recording medium, method and system for log-in confirmation use of smart phone
CN109327475B (en) Multi-layer identity authentication method, device, equipment and storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20120704