CN105119931A - Application logging method and application logging system - Google Patents

Application logging method and application logging system Download PDF

Info

Publication number
CN105119931A
CN105119931A CN201510574694.4A CN201510574694A CN105119931A CN 105119931 A CN105119931 A CN 105119931A CN 201510574694 A CN201510574694 A CN 201510574694A CN 105119931 A CN105119931 A CN 105119931A
Authority
CN
China
Prior art keywords
login
application
graphic code
module
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510574694.4A
Other languages
Chinese (zh)
Inventor
邵宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yaluete Biological Identification Science And Technology Co Ltd Shenzhen City
Original Assignee
Yaluete Biological Identification Science And Technology Co Ltd Shenzhen City
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yaluete Biological Identification Science And Technology Co Ltd Shenzhen City filed Critical Yaluete Biological Identification Science And Technology Co Ltd Shenzhen City
Priority to CN201510574694.4A priority Critical patent/CN105119931A/en
Publication of CN105119931A publication Critical patent/CN105119931A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses an application logging method. The application logging method comprises the following steps that: a first terminal logs in a login graphic code generated and displayed by an application; the login graphic code comprises an application login account number; a second terminal application scans the login graphic code to obtain the application login account number; the second terminal application acquires fingerprint characteristics, generates an authorization login message and sends the authorization login message to an application server; the authorization login message comprises the application login account number and the fingerprint characteristics; the application server verifies the authorization login message and sends authorization information to the second terminal application after passing authorization; and the second terminal application logs in the application according to the authorization information. Correspondingly, the invention further discloses an application logging system. By means of the technical scheme provided by the invention, the convenience and the safety for application login are improved; and the user experience for application login is improved.

Description

Application login method and system
Technical field
The present invention relates to mobile Internet field, particularly relating to a kind of application login method and system based on logging in application terminal.
Background technology
Along with the high speed development of computer and development of Mobile Internet technology, increasing emerging Mobile solution APP starts to release the PC version for traditional computer, increasing mainstream computer program also starts to release the APP version for intelligent mobile terminal simultaneously, and in a lot of situation, user can log in APP version and the PC version of same application simultaneously at different terminals.Such as user often can log in the mobile phone A PP version of immediate communication tool QQ simultaneously and log in the computer program of QQ at PC end on mobile phone now, and two terminals carry out instant messaging simultaneously.
But under existing application login mode, the login of the different terminals version of same application is carried out all separately, all need input application account and password separately to carry out checking and log in.Such as user will could carry out the login of mobile phone QQ at mobile phone terminal separately through No. QQ, input and QQ password, if think to log in QQ software or webpage QQ at PC end simultaneously, also need again to input account and password could log in, this login mode again manually inputting account password is more loaded down with trivial details, consuming time, the experience that user logs in application is not good, and the account number cipher of repeatedly manually input is easily stolen a glance at and is cracked, the information security of impact application.
Summary of the invention
Given this, the invention provides a kind of application login method and system, improve convenience and the fail safe of application login, promote the Consumer's Experience that application logs in.
According to one embodiment of present invention, provide a kind of application login method, comprising: first terminal logs in application and generates and the login graphic code shown, described login graphic code comprises login application account; Second terminal applies scans described login graphic code, obtains and logs in application account; Second terminal applies gathers fingerprint characteristic, and generation is authorized and logged in message and send to application server, and wherein said mandate login message comprises logging in applies account and described fingerprint characteristic; The described mandate of described application server checking logs in message, sends authorization message after being verified to described second terminal applies; And described second terminal applies logs in application according to described authorization message.
Preferably, described terminal applies is the application of PC application program, PC web application or mobile terminal.
Preferably, described login graphic code also comprises identifying code, and described login graphic code generation step comprises: obtain and log in the graphic code rise time and log in application account; Identifying code is generated according to described login graphic code rise time and the default term of validity; And by logging in application account and identifying code generation login graphic code.
Preferably, described mandate logs in message and also comprises described identifying code, and the described step logging in message of authorizing of described application server checking comprises: described identifying code of decoding obtains described login graphic code rise time and the default term of validity; Verify described login graphic code whether in the described default term of validity; When verifying that described login graphic code is in the described default term of validity, described fingerprint characteristic is applied account and registered corresponding fingerprint template with described login and compare; When described fingerprint characteristic comparison is passed through, described mandate logs in message by checking.
Preferably, described login graphic code generation step comprises: generate and log in graphic code; Detect the duration after the generation of described login graphic code; And when detecting that the described duration regenerates new login graphic code when reaching Preset Time.
According to another embodiment of the present invention, a kind of application login system is correspondingly provided, comprise first terminal, second terminal and application server, described first terminal and the second terminal are provided with application, described first terminal application comprises for generating the login graphic code generation module logging in graphic code, described second terminal applies comprises the login module for logging in described second terminal applies, for scanning the camera model logging in graphic code, for gathering the fingerprint module of user fingerprints feature, the mandate logging in message is authorized to log in message generation module and for the communication module with described application server communication for generating, described application server comprises for verifying described authentication module of authorizing login message, for generating the authorization module of authorization message and the control module for sending authorization message after being verified to described second terminal applies.
Preferably, described terminal applies is the application of PC application program, PC web application or mobile terminal.
Preferably, described login graphic code also comprises identifying code, described login graphic code generation module comprise for obtain the described login graphic code rise time and log in application account acquisition module, for generate according to described login graphic code rise time and the default term of validity identifying code identifying code generation module and for by logging in application account and identifying code generates the graphic code generation module logging in graphic code.
Preferably, described mandate logs in message and also comprises described identifying code, the authentication module of described application server checking comprises the decoder module obtaining described login graphic code rise time and the default term of validity for described identifying code of decoding, for verifying the validity verification module of described login graphic code whether in the described default term of validity, for described fingerprint characteristic is applied account and is registered with described login the fingerprint comparison module and control module that corresponding fingerprint template compares, described control module be used for when log in described in described validity verification module verification graphic code before the deadline time control described fingerprint comparison module and carry out fingerprint authentication.
Preferably, described login graphic code generation module comprises: for generate log in graphic code graphic code generation module, for detect described login graphic code generation after the duration time detecting module and for detecting that when described time detecting module the described duration controls the control module that described graphic code generation module regenerates new login graphic code when reaching Preset Time.
Application login method provided by the invention and system, log in application by first terminal and generate login graphic code, second terminal applies scans described login graphic code and obtains the application account logging in application, and gather fingerprint characteristic to generate mandate login message, application server checking is authorized the second terminal applies to carry out application and is logged in after authorizing and logging in message, do not need again manually to input application account and password, improve the convenience that application logs in, second terminal applies gathers fingerprint and generates to authorize and logs in message and the Fingerprint Identity in server authentication application account simultaneously, improve the safety and reliability that application logs in, promote the Consumer's Experience that application logs in.
Accompanying drawing explanation
In order to be illustrated more clearly in the technical scheme in the embodiment of the present invention, below the accompanying drawing used required in describing embodiment is briefly described.Apparently, the accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, can also obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is the schematic flow sheet of the application login method of first embodiment of the invention.
Fig. 2 is the schematic flow sheet of the generation logging request graphic code applying login method in first embodiment of the invention.
Fig. 3 is the schematic flow sheet of the application login method of second embodiment of the invention.
Fig. 4 is the structural representation of the application login system of third embodiment of the invention.
Fig. 5 is the structural representation of the login graphic code generation module applying login system in third embodiment of the invention.
Fig. 6 is the structural representation of the login graphic code generation module applying login system in fourth embodiment of the invention.
Fig. 7 is the structural representation of the authentication module applying login system in fourth embodiment of the invention.
Embodiment
Below in conjunction with the drawings and specific embodiments, more detailed description is further done to technical scheme of the present invention.Obviously, described embodiment is only a part of embodiment of the present invention, instead of whole embodiments.Based on the embodiment in the present invention, the every other embodiment that those of ordinary skill in the art obtain under the prerequisite of not making creative work, all should belong to the scope of protection of the invention.
In describing the invention, it is to be appreciated that term " first ", " second " etc. are only for describing object, and instruction or hint relative importance can not be interpreted as.In describing the invention, it should be noted that, unless otherwise clearly defined and limited, term " is connected ", " connection " should be interpreted broadly, such as, can be fixedly connected with, also can be removably connect, or connect integratedly; Can be mechanical connection, also can be electrical connection; Can be directly be connected, also indirectly can be connected by intermediary.For the ordinary skill in the art, concrete condition above-mentioned term concrete meaning in the present invention can be understood.In addition, in describing the invention, except as otherwise noted, the implication of " multiple " is two or more.
Describe and can be understood in flow chart or in this any process otherwise described or method, represent and comprise one or more for realizing the module of the code of the executable instruction of the step of specific logical function or process, fragment or part, and the scope of the preferred embodiment of the present invention comprises other realization, wherein can not according to order that is shown or that discuss, comprise according to involved function by the mode while of basic or by contrary order, carry out n-back test, this should understand by embodiments of the invention person of ordinary skill in the field.
Fig. 1 is the schematic flow sheet of the application login method of first embodiment of the invention.Refer to Fig. 1, the one application login method that first embodiment of the invention provides, can be applicable to the login of PC application program, PC web application or mobile terminal application, concrete comprises step S11 to step S15.
Step S11: first terminal logs in application and generates and the login graphic code shown, described login graphic code comprises logging in applies account.
Wherein, described first terminal and the second terminal are anyly have the electric terminal that intelligent operating system can install various software program or application, such as desktop computer, portable computer, smart mobile phone, panel computer, intelligent glasses or other mobile terminals.Described terminal built-in operating system is also configured with display unit or display screen, described operating system can be installed various software program or apply APP to realize corresponding function, such as installs function and other QQ network services that QQ software program realizes instant message.In embodiments of the present invention, described first terminal is applied as the computer applied algorithm client of PC version, described second is applied as the application of mobile phone version, user PC version program and the application of mobile phone version can simultaneously by network and remote application server communication to register and to log in, obtain corresponding application service.Certainly, in other embodiments of the present invention, described first terminal application, the second terminal applies can be the application of PC application program, PC web application or mobile terminal, can be logged in by application account and password in corresponding terminal.
Described first terminal application can submit logging request to by the mode of the traditional user account of input and password, can also verify first terminal application described in application account identity logs by other means, corresponding application server receives and verifies described logging request and authorize described first terminal to apply and carries out application login.
When needing to carry out application login based on the application account of described first terminal login application on other-end, first terminal logs in application and ejects heterodoxy login management window according to the corresponding virtual option key command of user, and the heterodoxy that login graphic code mode can be selected in this window to carry out applying logs in.After selection logs in graphic code mode, described first terminal application obtains the application account and the associated login information that have logged in application, then described application account and associated login information is carried out coding generation according to the login graphic code encryption algorithm preset and logs in graphic code.Described logging request graphic code can be the standard code of the pattern identification such as bar code or Quick Response Code.Preferably, select QR(QuickResponse in embodiments of the present invention, fast reaction) Quick Response Code generates described logging request graphic code.After QR code generates, the heterodoxy login management window applied by described first terminal shows described QR code.
Fig. 2 is the schematic flow sheet of the generation logging request graphic code applying login method in first embodiment of the invention.As shown in the figure, described login graphic code generation step also comprises step S21 to step S23.
Step S21: generate and log in graphic code.
Step S22: detect the duration after the generation of described login graphic code.
Step S23: when detecting that the described duration regenerates new login graphic code when reaching Preset Time.
In the present embodiment, require that carrying out scanning in the effective time after described logging request graphic code generates logs in, new login graphic code is regenerated every Preset Time, so described logging request graphic code is not fixing but according to logging status dynamic change, improves the ageing and fail safe that application logs in.
Step S12: the second terminal applies scans described login graphic code, obtains and logs in application account.
After described first terminal application generates and shows login graphic code, described second terminal applies just can carry out the login of mobile phone application by the log-on message in described login graphic code.Concrete, select to log in graphic code login mode at the login interface of described second terminal applies, starting hand-set camera scans the image that described login graphic code obtains described login graphic code, then to be decoded described login graphic code by the decoding algorithm of described application, finally obtain the application account that described first terminal logs in application.
Step S13: the second terminal applies gathers fingerprint characteristic, and generation is authorized and logged in message and send to application server, and wherein said mandate login message comprises logging in applies account and described fingerprint characteristic.
Concrete, described second terminal applies gathers fingerprint log-in interface display reminding user.User can by the finger fingertip during registration of described employing fingerprint by being pressed on finger print acquisition module that described second terminal carries, and described finger print acquisition module can collect the fingerprint image of user, and extracts the fingerprint characteristic of user according to fingerprint algorithm.Certainly, described finger print acquisition module also can be by external fingerprint instrument or the finger print acquisition module for gathering fingerprint of USB data line, or external other have the electronic equipment of expansion fingerprint function.
Step S14: the described mandate of described application server checking logs in message, sends authorization message after being verified to described second terminal applies.
Concrete, described application server receives described mandate and logs in message, obtain described first terminal and log in the user account of application and described fingerprint characteristic, the fingerprint template that described first terminal logs in the user account binding of application transferred by described application server from customer data base, described fingerprint characteristic and fingerprint template are compared, if both exceed predetermined threshold value at similarity, judge that user fingerprints authentication is passed through, otherwise judge that the finger print identification verification of user does not pass through.
Wherein, described application server only just can send authorization message to described second terminal applies response at finger print identification verification by rear, and described authorization message comprises application account and the authorization code that first terminal logs in application.
Step S15: described second terminal applies logs in application according to described authorization message.
Wherein, described second terminal applies receives described authorization message, and logs in the application account of application according to described first terminal and authorization code logs in described application server.
In embodiments of the present invention, log in application by first terminal and generate login graphic code, second terminal applies scans described login graphic code and obtains the application account logging in application, and gather fingerprint characteristic to generate mandate login message, application server checking is authorized the second terminal applies to carry out application and is logged in after authorizing and logging in message, do not need again manually to input application account and password, improve the convenience that application logs in, second terminal applies gathers fingerprint and generates to authorize and logs in message and the Fingerprint Identity in server authentication application account simultaneously, improve the safety and reliability that application logs in, promote the Consumer's Experience that application logs in.
Fig. 3 is the schematic flow sheet of the application login method of second embodiment of the invention.As shown in the figure, described application login method comprises step S301 to step S310.
Step S301: first terminal application obtains and logs in the graphic code rise time and log in application account.
Wherein, when needing to carry out application login based on the application account of described first terminal login application on other-end, first terminal logs in application and ejects heterodoxy login management window according to the corresponding virtual option key command of user, the heterodoxy that login graphic code mode can be selected in this window to carry out applying logs in, log in graphic code to generate in very short time, select the time logging in graphic code mode namely as the described image code rise time so described, described first terminal application obtains the application account and the associated login information that have logged in application.
Step S302: generate identifying code according to described login graphic code rise time and the default term of validity.
Wherein, described identifying code can according to the pre-configured generate rule of described application.Such as, can the form of pre-configured identifying code be " described login graphic code rise time-term of validity time ", when acquisition the described login graphic code rise time be 22: 4: 35 on the 9th September in 2015, and application presets the term of validity time when being 120 seconds, described identifying code can be generated as 20150909220435-120 according to coded format.Certainly, described identifying code also can adopt other coded format or algorithm to generate, can be such as that the decimal value of described login graphic code rise time and term of validity time does the computing of addition subtraction multiplication and division algorithm, add random number do arithmetical operation, be converted into binary system do and or, the logical operation such as non-generates.It is easily understood that described identifying code is after the generation configuration rule generation by presetting obtains, also must can calculate that decoding obtains described login graphic code rise time and the default term of validity conversely.
Step S303: by logging in application account and identifying code generation login graphic code.
Concrete, according to the login graphic code encryption algorithm preset, described application account and associated login information are carried out coding and generate login graphic code.Described logging request graphic code can be the standard code of the pattern identification such as bar code or Quick Response Code.Select QR Quick Response Code to generate described logging request graphic code in the embodiment of the present invention, and show on described first terminal application interface.
Step S304: the second terminal applies is opened camera and is scanned described login graphic code, obtains and logs in application account and identifying code.
After described first terminal application generates and shows login graphic code, described second terminal applies just can carry out the login of mobile phone application by the log-on message in described login graphic code.Concrete, select to log in graphic code login mode at the login interface of described second terminal applies, starting hand-set camera scans the image that described login graphic code obtains described login graphic code, then to be decoded described login graphic code and identifying code by the decoding algorithm of described application, finally obtain application account and identifying code that described first terminal logs in application.
Step S305: the second terminal applies gathers fingerprint characteristic by fingerprint module, generates to authorize log in message and send to application server, and wherein said mandate logs in message and comprises login application account, described fingerprint characteristic and described identifying code.
Concrete, described second terminal applies gathers fingerprint log-in interface display reminding user.User can by the finger fingertip during registration of described employing fingerprint by being pressed on finger print acquisition module that described second terminal carries, and described finger print acquisition module can collect the fingerprint image of user, and extracts the fingerprint characteristic of user according to fingerprint algorithm.Certainly, described finger print acquisition module also can be by external fingerprint instrument or the finger print acquisition module for gathering fingerprint of USB data line, or external other have the electronic equipment of expansion fingerprint function.
Step S306: described application server described identifying code of decoding obtains described login graphic code rise time and the default term of validity.
Wherein, after described application server obtains described login application account, described fingerprint characteristic and described identifying code of authorizing in login message, by the identifying code coding and decoding rule preset, reverse decoding is carried out to described identifying code, obtain described login graphic code rise time and the default term of validity further.
Step S307: verify described login graphic code whether in the described default term of validity.
Concrete, authorize the time of reception logging in message described in described application server record, and according to described login graphic code rise time and described default effective time, verify described login graphic code whether before the deadline.If exceed the term of validity, then described application server feeds back described login graphic code to described second terminal applies and exceedes the term of validity, needs again to log in application at described first terminal to regenerate new figure Quick Response Code according to previous step.
Step S308: when verifying that described login graphic code is in the described default term of validity, applies account by described fingerprint characteristic and registers corresponding fingerprint template with described login and compare.
Concrete, after the described login graphic code checking term of validity, described application server obtains transfers the fingerprint template that described first terminal logs in the user account binding of application from customer data base, described fingerprint characteristic and fingerprint template are compared, if both exceed predetermined threshold value at similarity, judge that user fingerprints authentication is passed through, otherwise judge that the finger print identification verification of user does not pass through.When finger print identification verification is obstructed out-of-date, described application server feeds back described fingerprint characteristic authentication failed to described second terminal applies, requires user to re-enter fingerprint characteristic and regenerate to authorize login message again to verify to described application server to report and submit.
Step S309: when described fingerprint characteristic comparison is passed through, described mandate logs in message by checking, and described application server sends authorization message to described second terminal applies.
Wherein, only after the described login graphic code term of validity and finger print identification verification are all passed through, described application server just can send authorization message to described second terminal applies, and described authorization message comprises the application account and authorization code that log in application.
Step S310: described second terminal applies logs in application according to described authorization message.
In embodiments of the present invention, the term of validity of described login graphic code is verified further at application server, guarantee that the checking that described login graphic code can be used for the second terminal applies afterwards in time in generation logs in, avoid described login graphic code easily by the illegal situation scanning, intercept or illegally crack, improve the fail safe of application login, ageing and reliability.
On the basis of said method embodiment, correspondingly, third embodiment of the invention also provides application login system.Fig. 4 is the structural representation of the application login system of third embodiment of the invention, as shown in the figure, it comprises first terminal, the second terminal and application server 30, and described first terminal and the second terminal are separately installed with first terminal application 10 and the second terminal applies 20.Described first terminal application 10 comprises for generating the login graphic code generation module 101 logging in graphic code, described second terminal applies 20 comprises the login module 201 for logging in described second terminal applies 20, for scanning the camera model 202 logging in graphic code, for gathering the fingerprint module 203 of user fingerprints feature, the mandate logging in message is authorized to log in message generation module 204 and for the communication module 205 with described application server communication for generating, described application server 30 comprises for verifying described authentication module 301 of authorizing login message, for generating the authorization module 302 of authorization message and the control module 303 for sending authorization message after being verified to described second terminal applies.
Wherein, described first terminal and the second terminal are anyly have the electric terminal that intelligent operating system can install various software program or application, such as desktop computer, portable computer, smart mobile phone, panel computer, intelligent glasses or other mobile terminals.Described terminal built-in operating system is also configured with display unit or display screen, described operating system can be installed various software program or apply APP to realize corresponding function, such as installs function and other QQ network services that QQ software program realizes instant message.In embodiments of the present invention, described first terminal application 10 and the second terminal applies 20 can be the application of PC application program, PC web application or mobile terminal, user all by PC version program, PC browser application webpage, mobile phone version APP apply simultaneously by network and remote application server communication to register and to log in, obtain corresponding application service.
Described first terminal application 10 can submit logging request to by the mode of the traditional user account of input and password, can also verify first terminal application 10 described in application account identity logs by other means, corresponding application server 30 receives and verifies described logging request and authorize described first terminal to apply 10 and carries out application login.
When needing to log on other-end such as the second terminal applies 20 based on the application account of described first terminal login application 10, first terminal logs in application 10 and ejects heterodoxy login management window according to the corresponding virtual option key command of user, and the heterodoxy that login graphic code mode can be selected in this window to carry out applying logs in.After selection logs in graphic code mode, described first terminal application 10 obtains the application account and the associated login information that have logged in application, then according to the login graphic code encryption algorithm preset, described application account and associated login information is carried out coding by described login graphic code generation module 101 and generates login graphic code.Described logging request graphic code can be the standard code of the pattern identification such as bar code or Quick Response Code.Preferably, select QR(QuickResponse in embodiments of the present invention, fast reaction) Quick Response Code generates described logging request graphic code.After QR code generates, by the heterodoxy login management window of described first terminal application 10 shows described QR code.
After the described login graphic code generation module 101 of described first terminal application 10 generates and shows login graphic code, described second terminal applies 20 just can carry out the login of applying by the log-on message in described login graphic code.Concrete, select to log in graphic code login mode at login module 201 login interface of described second terminal applies 20, open described camera model 201 and scan the image that described login graphic code obtains described login graphic code, then to be decoded described login graphic code by the decoding algorithm of described application, finally obtain the application account that described first terminal logs in application 10.
After described camera model 202 scans and described login graphic code of decoding obtains the application account of described first terminal login application 10, described second terminal applies gathers fingerprint described login module 201 log-in interface display reminding user.User can by the finger fingertip during registration of described employing fingerprint by being pressed on fingerprint module 203 that described second terminal carries, and described fingerprint module 203 can collect the fingerprint image of user, and extracts the fingerprint characteristic of user according to fingerprint algorithm.Certainly, described fingerprint module 203 also can be by external fingerprint instrument or the finger print acquisition module for gathering fingerprint of USB data line, or external other have the electronic equipment of expansion fingerprint function.
Described mandate logs in message module 204 and generates mandate login message according to described application account and described fingerprint characteristic, and sends to described application server by described communication module.
Described application server 30 receives described mandate and logs in message, obtain described first terminal and log in the user account of application and described fingerprint characteristic, the fingerprint template that described first terminal logs in the user account binding of application 10 transferred by described application server 30 from customer data base, described fingerprint characteristic and fingerprint template are compared, if both exceed predetermined threshold value at similarity, judge that user fingerprints authentication is passed through, otherwise judge that the finger print identification verification of user does not pass through.
In embodiments of the present invention, described application server only has described fingerprint module 203 finger print identification verification to send authorization message by rear just can response to described second terminal applies 20, and described authorization message comprises application account and the authorization code that first terminal logs in application 10.Described second terminal applies 10 logs in application according to described authorization message.Wherein, described second terminal applies 20 receives described authorization message, and logs in the application account of application 10 according to described first terminal and authorization code logs in described application server 30.
In embodiments of the present invention, the login graphic code generation module 101 being logged in application 10 by first terminal generates login graphic code, the camera model 202 of the second terminal applies 20 scans described login graphic code and obtains the application account logging in application, and gather fingerprint characteristic by fingerprint module 203 and authorize login message generation module 204 generation mandate to log in message, the authentication module 301 of application server 30 verify authorize log in message after control module 303 control authorization module 302 and authorize the second terminal applies 20 to carry out application login, do not need again manually to input application account and password, improve the convenience that application logs in, second terminal applies 20 gathers fingerprint and generates the Fingerprint Identity of authorizing and logging in message and verifying application account at server 30 simultaneously, improve the safety and reliability that application logs in, promote the Consumer's Experience that application logs in.
Fig. 5 is the structural representation of the login graphic code generation module 101 applying login system in third embodiment of the invention.As shown in the figure, described login graphic code generation module 101 comprise further for generate log in graphic code graphic code generation module 10103, for detect described login graphic code generation after the duration time detecting module 10104 and for detecting that when described time detecting module 10104 the described duration controls the control module 10105 that described graphic code generation module 10103 regenerates new login graphic code when reaching Preset Time.
In the present embodiment, described login graphic code generation module 101 requires that carrying out scanning in the effective time after described logging request graphic code generates logs in, new login graphic code is regenerated every Preset Time, so described logging request graphic code is not fixing but according to logging status dynamic change, improves the ageing and fail safe that application logs in.
Fig. 6 is the structural representation of the login graphic code generation module 101 applying login system in fourth embodiment of the invention, described login graphic code generation module 101 comprise for obtain the described login graphic code rise time and log in application account acquisition module 10101, for generate according to described login graphic code rise time and the default term of validity identifying code identifying code generation module 10102 and for by logging in application account and identifying code generates the graphic code generation module 10103 logging in graphic code.
In the present embodiment, described login graphic code comprises login application account and identifying code.Described identifying code generation module 10102 can according to the pre-configured generate rule of described application identifying code.Such as, can the form of pre-configured identifying code be " described login graphic code rise time-term of validity time ", when acquisition the described login graphic code rise time be 22: 4: 35 on the 9th September in 2015, and application presets the term of validity time when being 120 seconds, described identifying code can be generated as 20150909220435-120 according to coded format.Certainly, described identifying code also can adopt other coded format or algorithm to generate, can be such as that the decimal value of described login graphic code rise time and term of validity time does the computing of addition subtraction multiplication and division algorithm, add random number do arithmetical operation, be converted into binary system do and or, the logical operation such as non-generates.
Fig. 7 is the structural representation of the authentication module 301 applying login system in fourth embodiment of the invention, the authentication module 301 of described application server checking comprises the decoder module 30101 obtaining described login graphic code rise time and the default term of validity for described identifying code of decoding, for verifying the validity verification module 30102 of described login graphic code whether in the described default term of validity, for described fingerprint characteristic is applied account and is registered with described login the fingerprint comparison module 30103 and control module 30104 that corresponding fingerprint template compares, control described fingerprint comparison module 30103 when described control module 30104 is for verifying that described login graphic code before the deadline when described validity verification module 30102, and carry out fingerprint authentication.
In the present embodiment, described authentication module 301 also obtains described login graphic code rise time and the default term of validity further by described decoder module 30101 decoding, and verifies the term of validity of described identifying code by described validity verification module 30102.It is easily understood that, described identifying code is that the generation configuration rule generation preset by described identifying code generation module 10102 is obtained, and described decoder module 30101 is inevitable also can calculate that decoding obtains described login graphic code rise time and the default term of validity conversely.Described application server 30 records described mandate and logs in the time of reception of message, and according to described login graphic code rise time and described default effective time, verify described login graphic code whether before the deadline.If exceed the term of validity, then described application server 30 feeds back described login graphic code to described second terminal applies 20 and exceedes the term of validity, needs again to log in application 10 at described first terminal to regenerate new figure Quick Response Code according to previous step.
After described validity verification module 30102 verifies the described login graphic code term of validity, the fingerprint template that described first terminal logs in the user account binding of application 10 transferred by described application server 30 from customer data base, by fingerprint comparison module 30103, described fingerprint characteristic and fingerprint template are compared, if both exceed predetermined threshold value at similarity, judge that user fingerprints authentication is passed through, otherwise judge that the finger print identification verification of user does not pass through.When finger print identification verification is obstructed out-of-date, described application server 30 feeds back described fingerprint characteristic authentication failed to described second terminal applies 20, and described control module 30104 requires user to re-enter fingerprint characteristic in described second terminal applies 20 and regenerate to authorize login message again to verify to described application server 30 to report and submit.
In embodiments of the present invention, the term of validity of described login graphic code is verified further at application server, guarantee that the checking that described login graphic code can be used for the second terminal applies afterwards in time in generation logs in, avoid described login graphic code easily by the illegal situation scanning, intercept or illegally crack, improve the fail safe of application login, ageing and reliability.
Should be appreciated that each several part of the present invention can realize with hardware, software, firmware or their combination.In the above-described embodiment, multiple step or method can with to store in memory and the software performed by suitable instruction execution system or firmware realize.Such as, if realized with hardware, the same in another embodiment, can realize by any one in following technology well known in the art or their combination: the discrete logic with the logic gates for realizing logic function to data-signal, there is the application-specific integrated circuit (ASIC) of suitable combinational logic gate circuit, programmable gate array (PGA), field programmable gate array (FPGA) etc.
In the description of this specification, specific features, structure, material or feature that the description of reference term " embodiment ", " some embodiments ", " example ", " concrete example " or " some examples " etc. means to describe in conjunction with this embodiment or example are contained at least one embodiment of the present invention or example.In this manual, identical embodiment or example are not necessarily referred to the schematic representation of above-mentioned term.And the specific features of description, structure, material or feature can combine in an appropriate manner in any one or more embodiment or example.
Although illustrate and describe embodiments of the invention, those having ordinary skill in the art will appreciate that: can carry out multiple change, amendment, replacement and modification to these embodiments when not departing from principle of the present invention and aim, scope of the present invention is by claim and equivalents thereof.

Claims (10)

1. apply a login method, it is characterized in that, comprising:
First terminal logs in application and generates and the login graphic code shown, and described login graphic code comprises logging in applies account;
Second terminal applies scans described login graphic code, obtains and logs in application account;
Second terminal applies gathers fingerprint characteristic, and generation is authorized and logged in message and send to application server, and wherein said mandate login message comprises logging in applies account and described fingerprint characteristic;
The described mandate of described application server checking logs in message, sends authorization message after being verified to described second terminal applies; And
Described second terminal applies logs in application according to described authorization message.
2. apply login method as claimed in claim 1, it is characterized in that, described terminal applies is the application of PC application program, PC web application or mobile terminal.
3. apply login method as claimed in claim 1 or 2, it is characterized in that, described login graphic code also comprises identifying code, and described login graphic code generation step comprises: obtain and log in the graphic code rise time and log in application account; Identifying code is generated according to described login graphic code rise time and the default term of validity; And by logging in application account and identifying code generation login graphic code.
4. apply login method as claimed in claim 3, it is characterized in that, described mandate logs in message and also comprises described identifying code, and the described step logging in message of authorizing of described application server checking comprises: described identifying code of decoding obtains described login graphic code rise time and the default term of validity; Verify described login graphic code whether in the described default term of validity; When verifying that described login graphic code is in the described default term of validity, described fingerprint characteristic is applied account and registered corresponding fingerprint template with described login and compare; When described fingerprint characteristic comparison is passed through, described mandate logs in message by checking.
5. apply login method as claimed in claim 1, it is characterized in that, described login graphic code generation step comprises: generate and log in graphic code; Detect the duration after the generation of described login graphic code; And when detecting that the described duration regenerates new login graphic code when reaching Preset Time.
6. an application login system, comprise first terminal, second terminal and application server, described first terminal and the second terminal are provided with application, it is characterized in that, described first terminal application comprises for generating the login graphic code generation module logging in graphic code, described second terminal applies comprises the login module for logging in described second terminal applies, for scanning the camera model logging in graphic code, for gathering the fingerprint module of user fingerprints feature, the mandate logging in message is authorized to log in message generation module and for the communication module with described application server communication for generating, described application server comprises for verifying described authentication module of authorizing login message, for generating the authorization module of authorization message and the control module for sending authorization message after being verified to described second terminal applies.
7. apply login system as claimed in claim 6, it is characterized in that, described terminal applies is the application of PC application program, PC web application or mobile terminal.
8. application login system as claimed in claims 6 or 7, it is characterized in that, described login graphic code also comprises identifying code, described login graphic code generation module comprise for obtain the described login graphic code rise time and log in application account acquisition module, for generate according to described login graphic code rise time and the default term of validity identifying code identifying code generation module and for by logging in application account and identifying code generates the graphic code generation module logging in graphic code.
9. apply login system as claimed in claim 8, it is characterized in that, described mandate logs in message and also comprises described identifying code, the authentication module of described application server checking comprises the decoder module obtaining described login graphic code rise time and the default term of validity for described identifying code of decoding, for verifying the validity verification module of described login graphic code whether in the described default term of validity, for described fingerprint characteristic is applied account and is registered with described login the fingerprint comparison module and control module that corresponding fingerprint template compares, described control module be used for when log in described in described validity verification module verification graphic code before the deadline time control described fingerprint comparison module and carry out fingerprint authentication.
10. apply login system as claimed in claim 6, it is characterized in that, described login graphic code generation module comprises: for generate log in graphic code graphic code generation module, for detect described login graphic code generation after the duration time detecting module and for detecting that when described time detecting module the described duration controls the control module that described graphic code generation module regenerates new login graphic code when reaching Preset Time.
CN201510574694.4A 2015-09-11 2015-09-11 Application logging method and application logging system Pending CN105119931A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510574694.4A CN105119931A (en) 2015-09-11 2015-09-11 Application logging method and application logging system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510574694.4A CN105119931A (en) 2015-09-11 2015-09-11 Application logging method and application logging system

Publications (1)

Publication Number Publication Date
CN105119931A true CN105119931A (en) 2015-12-02

Family

ID=54667819

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510574694.4A Pending CN105119931A (en) 2015-09-11 2015-09-11 Application logging method and application logging system

Country Status (1)

Country Link
CN (1) CN105119931A (en)

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105516135A (en) * 2015-12-08 2016-04-20 腾讯科技(深圳)有限公司 Method and device used for account login
CN105933348A (en) * 2016-06-30 2016-09-07 广州云移信息科技有限公司 Login method based on biological characteristics, terminal and system
CN106101122A (en) * 2016-06-30 2016-11-09 乐视控股(北京)有限公司 A kind of login method and device
CN107302649A (en) * 2016-04-15 2017-10-27 罗伯特·博世有限公司 Camera system for the perimeter of building
CN107438004A (en) * 2016-05-06 2017-12-05 黑莓有限公司 System and method for dual factor anthentication
CN107465512A (en) * 2017-07-13 2017-12-12 广东欧珀移动通信有限公司 Authorization processing method and Related product
CN107509192A (en) * 2016-06-14 2017-12-22 中国移动通信集团公司 A kind of authentication method and system
CN108200040A (en) * 2017-12-28 2018-06-22 北京奇虎科技有限公司 Mobile client exempts from method, system, browser and the mobile terminal of close login
CN108616499A (en) * 2018-03-02 2018-10-02 努比亚技术有限公司 A kind of method for authenticating of application program, terminal and computer readable storage medium
CN109753784A (en) * 2018-12-24 2019-05-14 维沃移动通信有限公司 A kind of authorization method based on multidimensional code, mobile terminal and server
TWI709097B (en) * 2018-12-14 2020-11-01 兆豐國際商業銀行股份有限公司 Online banking login system and method thereof
CN112149100A (en) * 2020-09-01 2020-12-29 长沙市到家悠享网络科技有限公司 Verification method, verification device, electronic equipment and storage medium
CN112650997A (en) * 2020-12-21 2021-04-13 浪潮云信息技术股份公司 Unified identity authentication method based on mobile equipment
CN112822170A (en) * 2020-12-30 2021-05-18 安徽鸿程光电有限公司 Application program login method, device, equipment and medium
CN114157437A (en) * 2020-08-18 2022-03-08 腾讯科技(深圳)有限公司 Target application login method and device, computer equipment and storage medium
WO2022053069A1 (en) * 2020-09-14 2022-03-17 Oppo广东移动通信有限公司 Account binding method and apparatus, terminal, and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103237034A (en) * 2013-04-28 2013-08-07 北京小米科技有限责任公司 Login method and device
CN103634109A (en) * 2013-10-31 2014-03-12 小米科技有限责任公司 Operation right authentication method and device
CN103763327A (en) * 2014-01-28 2014-04-30 宇龙计算机通信科技(深圳)有限公司 Account number logging-in method and system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103237034A (en) * 2013-04-28 2013-08-07 北京小米科技有限责任公司 Login method and device
CN103634109A (en) * 2013-10-31 2014-03-12 小米科技有限责任公司 Operation right authentication method and device
CN103763327A (en) * 2014-01-28 2014-04-30 宇龙计算机通信科技(深圳)有限公司 Account number logging-in method and system

Cited By (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105516135B (en) * 2015-12-08 2020-02-21 腾讯科技(深圳)有限公司 Method and device for account login
US10812483B2 (en) 2015-12-08 2020-10-20 Tencent Technology (Shenzhen) Company Limited Account login method and apparatus
CN105516135A (en) * 2015-12-08 2016-04-20 腾讯科技(深圳)有限公司 Method and device used for account login
US11062145B2 (en) 2016-04-15 2021-07-13 Robert Bosch Gmbh Camera device for the exterior region of a building
CN107302649A (en) * 2016-04-15 2017-10-27 罗伯特·博世有限公司 Camera system for the perimeter of building
CN107438004B (en) * 2016-05-06 2022-03-08 黑莓有限公司 System and method for multi-factor authentication
CN107438004A (en) * 2016-05-06 2017-12-05 黑莓有限公司 System and method for dual factor anthentication
CN107509192A (en) * 2016-06-14 2017-12-22 中国移动通信集团公司 A kind of authentication method and system
CN107509192B (en) * 2016-06-14 2021-03-16 中移动信息技术有限公司 Authentication method and system
CN105933348A (en) * 2016-06-30 2016-09-07 广州云移信息科技有限公司 Login method based on biological characteristics, terminal and system
CN106101122A (en) * 2016-06-30 2016-11-09 乐视控股(北京)有限公司 A kind of login method and device
CN107465512A (en) * 2017-07-13 2017-12-12 广东欧珀移动通信有限公司 Authorization processing method and Related product
CN107465512B (en) * 2017-07-13 2020-01-14 Oppo广东移动通信有限公司 Authorization processing method and related product
CN108200040A (en) * 2017-12-28 2018-06-22 北京奇虎科技有限公司 Mobile client exempts from method, system, browser and the mobile terminal of close login
CN108616499B (en) * 2018-03-02 2021-01-26 努比亚技术有限公司 Authentication method of application program, terminal and computer readable storage medium
CN108616499A (en) * 2018-03-02 2018-10-02 努比亚技术有限公司 A kind of method for authenticating of application program, terminal and computer readable storage medium
TWI709097B (en) * 2018-12-14 2020-11-01 兆豐國際商業銀行股份有限公司 Online banking login system and method thereof
CN109753784A (en) * 2018-12-24 2019-05-14 维沃移动通信有限公司 A kind of authorization method based on multidimensional code, mobile terminal and server
CN109753784B (en) * 2018-12-24 2021-07-30 维沃移动通信有限公司 Authorization method based on multi-dimensional code, mobile terminal and server
CN114157437A (en) * 2020-08-18 2022-03-08 腾讯科技(深圳)有限公司 Target application login method and device, computer equipment and storage medium
CN114157437B (en) * 2020-08-18 2023-05-30 腾讯科技(深圳)有限公司 Login method and device of target application, computer equipment and storage medium
CN112149100A (en) * 2020-09-01 2020-12-29 长沙市到家悠享网络科技有限公司 Verification method, verification device, electronic equipment and storage medium
WO2022053069A1 (en) * 2020-09-14 2022-03-17 Oppo广东移动通信有限公司 Account binding method and apparatus, terminal, and storage medium
CN112650997A (en) * 2020-12-21 2021-04-13 浪潮云信息技术股份公司 Unified identity authentication method based on mobile equipment
CN112822170A (en) * 2020-12-30 2021-05-18 安徽鸿程光电有限公司 Application program login method, device, equipment and medium

Similar Documents

Publication Publication Date Title
CN105119931A (en) Application logging method and application logging system
CN106330850B (en) Security verification method based on biological characteristics, client and server
CN103118032B (en) Method, terminal and server that a kind of terminal login account is synchronous
CN105827600B (en) Method and device for logging in client
CN113302894B (en) Secure account access
US20110185181A1 (en) Network authentication method and device for implementing the same
CN105100123A (en) Application registration method and system
KR101569753B1 (en) System, Method and Apparatus for Secure Login
US9667626B2 (en) Network authentication method and device for implementing the same
CN103269271B (en) A kind of back up the method and system of private key in electronic signature token
CN110930147B (en) Offline payment method and device, electronic equipment and computer-readable storage medium
CN101447010A (en) Login system and method for logging in
CN103888255A (en) Identity authentication method, device and system
CN101795263B (en) Secure broadband access method, authentication method, device and system
CN112528257A (en) Security debugging method and device, electronic equipment and storage medium
CN111376865A (en) Vehicle digital key activation method, system and storage medium
CN109190343B (en) Identity verification safety authentication system based on fingerprint identification
CN107480513B (en) Authentication implementation method and device, computer device and readable storage medium
CN111901303A (en) Device authentication method and apparatus, storage medium, and electronic apparatus
CN103592927A (en) Method for binding product server and service function through license
CN114760070A (en) Digital certificate issuing method, digital certificate issuing center and readable storage medium
CN112351043A (en) Vehicle navigation factory setting password management method and system
EP3410332B1 (en) A system and method for transferring data to an authentication device
KR20150097059A (en) Payment method via fingerprint authentication, user terminal and payment relay server
CN103281188A (en) Method and system for backing up private key in electronic signature token

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20151202

WD01 Invention patent application deemed withdrawn after publication