CN105141600A - Method for binding anonymously purchased service to user login account number and server - Google Patents

Method for binding anonymously purchased service to user login account number and server Download PDF

Info

Publication number
CN105141600A
CN105141600A CN201510504545.0A CN201510504545A CN105141600A CN 105141600 A CN105141600 A CN 105141600A CN 201510504545 A CN201510504545 A CN 201510504545A CN 105141600 A CN105141600 A CN 105141600A
Authority
CN
China
Prior art keywords
service
user
mark
login account
bought
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510504545.0A
Other languages
Chinese (zh)
Other versions
CN105141600B (en
Inventor
李平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Jingdong Century Trading Co Ltd
Beijing Jingdong Shangke Information Technology Co Ltd
Original Assignee
Beijing Jingdong Century Trading Co Ltd
Beijing Jingdong Shangke Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Jingdong Century Trading Co Ltd, Beijing Jingdong Shangke Information Technology Co Ltd filed Critical Beijing Jingdong Century Trading Co Ltd
Priority to CN201510504545.0A priority Critical patent/CN105141600B/en
Publication of CN105141600A publication Critical patent/CN105141600A/en
Application granted granted Critical
Publication of CN105141600B publication Critical patent/CN105141600B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention relates to a method for binding an anonymously purchased service to a user login account number in a server. The method comprises the following steps: inquiring a first relationship table of an identifier of the anonymously purchased service and the identifier of equipment stored in the server according to the identifier of the equipment when a user logs in the equipment so as to determine whether the anonymously purchased service exists on the equipment or not; and binding the inquired identifier of the anonymously purchased service to the user login account number, storing the relationship of the identifier of the anonymously purchased service and the user login account number in a second relationship table of the service identifier and the user login account number stored in the server, and deleting the identifier of the anonymously purchased service from the first relationship table.

Description

Service binding anonymity bought is to the method for user's login account and server
Technical field
The disclosure relates generally to the binding of service, more specifically, relates to the service binding anonymity bought to the method for user's login account and server.
Background technology
For the application of some type, as video class, journals and periodicals class, the application of books reading class etc., in order to improve the experience of user, the VIP service of watching or borrowing in this kind of application, generally all can be provided in limited time.Usually, user buys when these VIP serve needs binding account, is carried out the information of leading subscriber by this account, as viewing record, browing record etc.Therefore developer can buy before these VIP serve user and point out user to log in, and then just can go to buy these services.
But in Apple, the service of this paying belongs to virtual goods, must be bought by the IAP channel of disbursement of Apple, and user anonymity (under the state do not logged in) can have the right buying this VIP service too, if developer's force users when user buys logs in will be applied shop refusal by apple.Therefore apple is applied and must be supported that anonymous is bought this VIP and served, and conveniently user manages the VIP service oneself bought better simultaneously, needs to be designed for the function of the VIP service binding of anonymity purchase to user's login account.Just design this function for smooth Card Reader (a kind of service of borrowing) in limited time below.
On apple equipment, the service binding of the such as smooth Card Reader utilizing following technology anonymity to be bought etc. is to user's login account: use medium-and-large-sized database, as Oracle, DB2, mysql etc. store data; With the interface of java, PHP or other language development server end; And there is in IAP with objective-c language development the application purchasing function.Particularly, existing binding scheme comprises: set up account information table for storage information; After user anonymity buys the success of smooth Card Reader, program will generate a random account automatically, and smooth Card Reader user just bought is tied to this account.
But there is following defect in existing binding scheme: the account of stochastic generation compares and is difficult to memory; After forgetting account, the anonymous smooth Card Reader bought exists looks for the risk of not returning; User is anonymous on multiple equipment can generate multiple random account when buying, and user cannot merge smooth Card Reader in these accounts and browing record.
Summary of the invention
Given this, the present invention propose for service binding that anonymity the is bought method and apparatus to user's login account.
In one aspect of the invention, propose a kind of for anonymity being bought the method for service binding to user's login account at server place, described method comprises:
When user logs on equipment, the first relation table of service identifiers and device identification is bought in the anonymity stored in server according to the identified query of described equipment, to determine that whether described equipment existing anonymous purchase serves; And
The mark that service is bought in the anonymity inquired is tied to user's login account, in second relation table of the service identifiers that the relational storage between the mark of serve described anonymity purchase and described user's login account stores in described server and user's login account, and from described first relation table, delete the mark that service is bought in described anonymity.
Preferably, when user logs on equipment, point out described user whether anonymity to be bought service binding to user's login account, if user selects anonymity not to be bought service binding to user's login account according to prompting, then do not carry out bindings.
Preferably, before user logs on equipment, described method also comprises:
When described user buys service under anonymous state, the mark of service is bought in automatic generation anonymity, the mark that service is bought in described anonymity is tied to the mark of described equipment, and the relational storage described anonymity bought between the mark of service and the mark of described equipment is in described first relation table.
Preferably, before user logs on equipment, described method also comprises:
When described user buys service under logging status, automatic generation logs in the mark of the service of purchase, the described mark logging in the service of purchase is tied to described user's login account, and the relational storage described login bought between the mark of service and described user's login account is in described second relation table.
Preferably, described method also comprises:
When described user is under anonymous state during access object, the first relation table according to the identified query of described equipment, to determine whether there is the service with described match objects; And
The mark of described object is tied to the mark of the service inquired.
Preferably, described method also comprises:
When described user during access object, inquires about described second relation table, to determine whether there is the service with described match objects according to described user's login account under logging status; And
The mark of described object is tied to the mark of the service inquired.
Preferably, described method also comprises:
The second relation table according to the identified query of the service inquired, to determine whether there is the user's login account matched; And
The mark of described object is tied to the user's login account matched.
Preferably, described to liking books, and be smooth Card Reader with the service of described match objects.
Preferably, described method also comprises:
If there is no with the service of described match objects, then there are not access rights to user's prompting.
In another aspect of the present invention, propose a kind of server, comprising:
Memory, is configured to store and anonymously buys service identifiers and the first relation table of device identification and the second relation table of service identifiers and user's login account; And
Processor, is configured to when user logs on equipment, and according to the identified query of described equipment, the first relation table is to determine that whether described equipment existing anonymous purchase serves; And the mark anonymity inquired being bought service is tied to user's login account, by the relational storage between the mark of described anonymity purchase service and described user's login account in described second relation table, and from described first relation table, delete the mark that service is bought in described anonymity.
Preferably, described processor is further configured to: when user logs on equipment, point out described user whether anonymity to be bought service binding to user's login account, if user selects anonymity not to be bought service binding to user's login account according to prompting, then do not carry out bindings.
Preferably, described processor is further configured to:
Before user logs on equipment, when described user buys service under anonymous state, the mark of service is bought in automatic generation anonymity, the mark that service is bought in described anonymity is tied to the mark of described equipment, and the relational storage described anonymity bought between the mark of service and the mark of described equipment is in described first relation table.
Preferably, described processor is further configured to:
Before user logs on equipment, when described user buys service under logging status, automatic generation logs in the mark of the service of purchase, the described mark logging in the service of purchase is tied to described user's login account, and the relational storage described login bought between the mark of service and described user's login account is in described second relation table.
Preferably, described processor is further configured to:
When described user is under anonymous state during access object, the first relation table according to the identified query of described equipment, to determine whether there is the service with described match objects; And
The mark of described object is tied to the mark of the service inquired.
Preferably, described processor is further configured to:
When described user during access object, inquires about described second relation table, to determine whether there is the service with described match objects according to described user's login account under logging status; And
The mark of described object is tied to the mark of the service inquired.
Preferably, described processor is further configured to:
The second relation table according to the identified query of the service inquired, to determine whether there is the user's login account matched; And
The mark of described object is tied to the user's login account matched.
Preferably, described to liking books, and be smooth Card Reader with the service of described match objects.
Preferably, described processor is further configured to:
If there is no with the service of described match objects, then there are not access rights to user's prompting.
In the scheme that the present invention proposes, the service bought (such as, smooth Card Reader) and access object (such as, browing record) can be synchronized to the account that user specifies during user anonymity; The account of phone number registration facilitates user to remember and gives password for change, makes the information of user safer; User can to merge on multiple equipment the anonymous service bought and object in same account, facilitates the unified management of user profile; And when logining successfully, if this equipment exists do not bind the anonymous data of any account, user will be pointed out whether anonymous data will to be tied in current account, prevent user from losing anonymous data on the device.
Accompanying drawing explanation
According in conjunction with the following description of exemplary drawings to exemplary embodiment, other details of the present disclosure, aspect and advantage will become apparent, in the accompanying drawings:
Fig. 1 schematically illustrates the schematic diagram being tied to the method for same account according to embodiments of the invention for the service anonymity bought and access object; And
Fig. 2 schematically illustrates the schematic diagram being tied to the server of same account according to embodiments of the invention for the service anonymity bought and access object.
Accompanying drawing does not show all circuit of embodiment or structure.The Reference numeral running through institute's drawings attached identical represents same or analogous parts or feature.
Embodiment
The method being used for the service of anonymity purchase and access object to be tied to according to embodiments of the invention same account is described below with reference to Fig. 1.
First, in step S101, before user logs on equipment, when user buys service (hereinafter referred to " anonymous purchase is served ") under anonymous state, the mark of service is bought in automatic generation anonymity, mark anonymity being bought service is tied to the mark of equipment, and relational storage anonymity bought between the mark of service and the mark of equipment is in the first relation table.Alternatively, when user buys service (hereinafter referred to " logging in the service of purchase ") under logging status, automatic generation logs in the mark of the service of purchase, the mark logging in the service of purchase is tied to user's login account, and relational storage login bought between the mark of service and user's login account is in the second relation table.
Then, in step S102, when user logs on equipment, the first relation table of service identifiers and device identification is bought in the anonymity stored in server according to the identified query of described equipment, to determine that whether described equipment existing anonymous purchase serves.Alternatively, when user logs on equipment, whether prompting user buys service binding to user's login account by anonymity, if user selects anonymity not to be bought service binding to user's login account according to prompting, then do not carry out bindings, the method terminates.
Assuming that user selects anonymity to be bought service binding to user's logon account, then following, in step S103, the mark that service is bought in the anonymity inquired is tied to user's login account, in second relation table of the service identifiers that the relational storage between the mark of serve anonymity purchase and user's login account stores in server and user's login account, and the mark that the anonymous purchase of deletion is served from the first relation table.
Then, in step S104, when user is under anonymous state time access object (such as, books), according to identified query first relation table of equipment, to determine whether there is and the service of match objects (such as, smooth Card Reader); And if exist and the service of match objects, then the mark of object is tied to the mark of the service inquired, if there is no with the service of described match objects, then there are not access rights to user's prompting.Alternatively, when user during access object, inquires about the second relation table according to user's login account under logging status, to determine whether there is the service with match objects; And if exist and the service of match objects, then the mark of object is tied to the mark of the service inquired, if there is no with the service of described match objects, then there are not access rights to user's prompting.
In step S105, according to identified query second relation table of the service inquired, to determine whether there is the user's login account matched; And if there is user's login account of matching, then the mark of object is tied to the user's login account matched.
To be smooth Card Reader for service below and to liking books, method be above described.
First, the form storing data is created at corporate server end.This form comprises the relation table READCARD_UUID of the relation table READCARD_USER of user account information table USER, smooth Card Reader and account, smooth Card Reader and equipment and the relation table BOOKID_READCARD of browing record and smooth Card Reader.
When buying the success of smooth Card Reader, service end will generate smooth Card Reader card number automatically, and then according to the parameter that client sends, service end judges whether the current state of client is logging status.If the current state of client is logging status, then the account of current login and the smooth Card Reader number that generates above are bound, and stored in READCARD_USER table.If the current state of client is anonymous state, then the unique identification of current device and the smooth Card Reader number that generates above are bound, and stored in READCARD_UUID table.
When user logins successfully on equipment, service end inquires about the data in READCARD_UUID table according to the unique identification of current device, judges whether this equipment exists anonymous data.If there is not anonymous data, be then left intact.If there is anonymous data, then whether the smooth Card Reader that anonymity is bought to be tied in the account of current login by Client-Prompt user.If user selects to cancel, then do not carry out any process.If user selects to determine, then service end inquires about the data in READCARD_UUID table according to the unique identification of current device, and these data and current account is bound one by one, and stored in READCARD_USER table.Delete these data in READCARD_UUID table simultaneously.
When smooth read book (that is, access object), according to the parameter that client sends, service end judges whether the current state of client is logging status.If logging status, then go data in inquiry READCARD_USER table according to the account of current login.If anonymous state, then when inquiring about data in READCARD_UUID table according to the unique identification of front equipment.The every bar data checked out in above circulation, to judge whether there is effective smooth Card Reader.If there is not effective smooth Card Reader, then notify that Client-Prompt user does not have smooth read right.If there is effective smooth Card Reader, then by current books mark (ID) and this smooth Card Reader card number binding, and stored in BOOKID_READCARD table.Then, according to smooth Card Reader card number inquiry READCARD_USER, to determine whether there is the login account matched, and books ID is tied to the login account matched.
The server being used for the service of anonymity purchase and access object to be tied to according to embodiments of the invention same account is described below with reference to Fig. 2.
Server 200 comprises processor 210, such as, and digital signal processor (DSP).Processor 210 can be the individual unit of different actions for performing process described herein or multiple unit.Server 200 can also comprise I/O (I/O) unit 230, for sending signal from other entity Received signal strength or to other entities.Processor 210 is configured to when user logs on equipment, and according to the identified query of described equipment, the first relation table is to determine that whether described equipment existing anonymous purchase serves (such as, smooth Card Reader); And the mark anonymity inquired being bought service is tied to user's login account, by the relational storage between the mark of described anonymity purchase service and described user's login account in described second relation table, and from described first relation table, delete the mark that service is bought in described anonymity.Described processor 210 is further configured to: when user logs on equipment, described user is pointed out whether anonymity to be bought service binding to user's login account, if user selects anonymity not to be bought service binding to user's login account according to prompting, then do not carry out bindings.Described processor 210 is further configured to: before user logs on equipment, when described user buys service under anonymous state, the mark of service is bought in automatic generation anonymity, the mark that service is bought in described anonymity is tied to the mark of described equipment, and the relational storage described anonymity bought between the mark of service and the mark of described equipment is in described first relation table.Described processor 210 is further configured to: before user logs on equipment, when described user buys service under logging status, automatic generation logs in the mark of the service of purchase, the described mark logging in the service of purchase is tied to described user's login account, and the relational storage described login bought between the mark of service and described user's login account is in described second relation table.Described processor 210 is further configured to: when described user is under anonymous state time access object (such as, books), the first relation table according to the identified query of described equipment, to determine whether there is the service with described match objects; And the mark of described object is tied to the mark of the service inquired.Described processor 210 is further configured to: when described user during access object, inquires about described second relation table, to determine whether there is the service with described match objects according to described user's login account under logging status; And the mark of described object is tied to the mark of the service inquired.Described processor 210 is further configured to: the second relation table according to the identified query of the service inquired, to determine whether there is the user's login account matched; And the mark of described object is tied to the user's login account matched.Described processor 210 is further configured to: if there is no with the service of described match objects, then there are not access rights to user's prompting.
In addition, server 200 comprises memory 220, and this memory 220 can have following form: non-volatile or volatile memory, such as, and Electrically Erasable Read Only Memory (EEPROM), flash memory etc.Memory 220 stores computer-readable instruction, and when processor 210 performs this computer-readable instruction, this computer-readable instruction makes processor perform action as herein described.Memory 220 also stores anonymous buys service identifiers and the first relation table of device identification and the second relation table of service identifiers and user's login account.
Above detailed description, by using schematic diagram, flow chart and/or example, has set forth numerous embodiments of inspection method and system.When this schematic diagram, flow chart and/or example comprise one or more function and/or operation, it will be understood by those skilled in the art that each function in this schematic diagram, flow chart or example and/or operation can by various structure, hardware, software, firmware or in fact their combination in any come to realize separately and/or jointly.In one embodiment, some parts of theme described in embodiments of the invention can be realized by application-specific integrated circuit (ASIC) (ASIC), field programmable gate array (FPGA), digital signal processor (DSP) or other integrated forms.But, those skilled in the art will recognize that, some aspects of embodiment disclosed herein can realize in integrated circuits on the whole or partly equally, be embodied as one or more computer programs of running on one or more computer (such as, be embodied as the one or more programs run in one or more computer system), be embodied as one or more programs of running on the one or more processors (such as, be embodied as the one or more programs run on one or more microprocessor), be embodied as firmware, or be embodied as in fact the combination in any of aforesaid way, and those skilled in the art are according to the disclosure, the ability of design circuit and/or write software and/or firmware code will be possessed.In addition, those skilled in the art will recognize that, the mechanism of theme described in the disclosure can be distributed as the program product of various ways, and regardless of the actual particular type of signal bearing medium being used for performing distribution, the exemplary embodiment of theme described in the disclosure is all applicable.The example of signal bearing medium includes but not limited to: recordable-type media, as floppy disk, hard disk drive, compact-disc (CD), digital universal disc (DVD), digital magnetic tape, computer storage etc.; And transmission type media, as numeral and/or analog communication medium (such as, optical fiber cable, waveguide, wired communications links, wireless communication link etc.).
Although exemplary embodiment describe the present invention with reference to several, should be appreciated that term used illustrates and exemplary and nonrestrictive term.Spirit or the essence of invention is not departed from because the present invention can specifically implement in a variety of forms, so be to be understood that, above-described embodiment is not limited to any aforesaid details, and explain widely in the spirit and scope that should limit in claim of enclosing, therefore fall into whole change in claim or its equivalent scope and remodeling and all should be claim of enclosing and contained.

Claims (18)

1., for anonymity being bought the method for service binding to user's login account at server place, described method comprises:
When user logs on equipment, the first relation table of service identifiers and device identification is bought in the anonymity stored in server according to the identified query of described equipment, to determine that whether described equipment existing anonymous purchase serves; And
The mark that service is bought in the anonymity inquired is tied to user's login account, in second relation table of the service identifiers that the relational storage between the mark of serve described anonymity purchase and described user's login account stores in described server and user's login account, and from described first relation table, delete the mark that service is bought in described anonymity.
2. method according to claim 1, wherein, when user logs on equipment, described user is pointed out whether anonymity to be bought service binding to user's login account, if user selects anonymity not to be bought service binding to user's login account according to prompting, then do not carry out bindings.
3. method according to claim 1, wherein, before user logs on equipment, described method also comprises:
When described user buys service under anonymous state, the mark of service is bought in automatic generation anonymity, the mark that service is bought in described anonymity is tied to the mark of described equipment, and the relational storage described anonymity bought between the mark of service and the mark of described equipment is in described first relation table.
4. method according to claim 1, wherein, before user logs on equipment, described method also comprises:
When described user buys service under logging status, automatic generation logs in the mark of the service of purchase, the described mark logging in the service of purchase is tied to described user's login account, and the relational storage described login bought between the mark of service and described user's login account is in described second relation table.
5. method according to claim 1, also comprises:
When described user is under anonymous state during access object, the first relation table according to the identified query of described equipment, to determine whether there is the service with described match objects; And
The mark of described object is tied to the mark of the service inquired.
6. method according to claim 1, also comprises:
When described user during access object, inquires about described second relation table, to determine whether there is the service with described match objects according to described user's login account under logging status; And
The mark of described object is tied to the mark of the service inquired.
7. the method according to claim 5 or 6, also comprises:
The second relation table according to the identified query of the service inquired, to determine whether there is the user's login account matched; And
The mark of described object is tied to the user's login account matched.
8. the method according to claim 5 or 6, wherein, described to liking books, and be smooth Card Reader with the service of described match objects.
9. the method according to claim 5 or 6, also comprises:
If there is no with the service of described match objects, then there are not access rights to user's prompting.
10. a server, comprising:
Memory, is configured to store and anonymously buys service identifiers and the first relation table of device identification and the second relation table of service identifiers and user's login account; And
Processor, is configured to when user logs on equipment, and according to the identified query of described equipment, the first relation table is to determine that whether described equipment existing anonymous purchase serves; And the mark anonymity inquired being bought service is tied to user's login account, by the relational storage between the mark of described anonymity purchase service and described user's login account in described second relation table, and from described first relation table, delete the mark that service is bought in described anonymity.
11. servers according to claim 10, wherein, described processor is further configured to: when user logs on equipment, described user is pointed out whether anonymity to be bought service binding to user's login account, if user selects anonymity not to be bought service binding to user's login account according to prompting, then do not carry out bindings.
12. servers according to claim 10, wherein, described processor is further configured to:
Before user logs on equipment, when described user buys service under anonymous state, the mark of service is bought in automatic generation anonymity, the mark that service is bought in described anonymity is tied to the mark of described equipment, and the relational storage described anonymity bought between the mark of service and the mark of described equipment is in described first relation table.
13. servers according to claim 10, wherein, described processor is further configured to:
Before user logs on equipment, when described user buys service under logging status, automatic generation logs in the mark of the service of purchase, the described mark logging in the service of purchase is tied to described user's login account, and the relational storage described login bought between the mark of service and described user's login account is in described second relation table.
14. servers according to claim 10, wherein, described processor is further configured to:
When described user is under anonymous state during access object, the first relation table according to the identified query of described equipment, to determine whether there is the service with described match objects; And
The mark of described object is tied to the mark of the service inquired.
15. servers according to claim 10, wherein, described processor is further configured to:
When described user during access object, inquires about described second relation table, to determine whether there is the service with described match objects according to described user's login account under logging status; And
The mark of described object is tied to the mark of the service inquired.
16. servers according to claims 14 or 15, wherein, described processor is further configured to:
The second relation table according to the identified query of the service inquired, to determine whether there is the user's login account matched; And
The mark of described object is tied to the user's login account matched.
17. servers according to claims 14 or 15, wherein, described to as if books, and be smooth Card Reader with the service of described match objects.
18. servers according to claims 14 or 15, wherein, described processor is further configured to:
If there is no with the service of described match objects, then there are not access rights to user's prompting.
CN201510504545.0A 2015-08-17 2015-08-17 By the method and server of the service binding of anonymity purchase to user's login account Active CN105141600B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510504545.0A CN105141600B (en) 2015-08-17 2015-08-17 By the method and server of the service binding of anonymity purchase to user's login account

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510504545.0A CN105141600B (en) 2015-08-17 2015-08-17 By the method and server of the service binding of anonymity purchase to user's login account

Publications (2)

Publication Number Publication Date
CN105141600A true CN105141600A (en) 2015-12-09
CN105141600B CN105141600B (en) 2018-04-20

Family

ID=54726808

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510504545.0A Active CN105141600B (en) 2015-08-17 2015-08-17 By the method and server of the service binding of anonymity purchase to user's login account

Country Status (1)

Country Link
CN (1) CN105141600B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105450655A (en) * 2015-12-14 2016-03-30 小米科技有限责任公司 Device binding methods and apparatuses
CN108156273A (en) * 2017-12-14 2018-06-12 北京奇艺世纪科技有限公司 A kind of anonymous ID generation methods, device and electronic equipment
CN111709055A (en) * 2020-06-16 2020-09-25 四川虹微技术有限公司 User information acquisition method and device, electronic equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102497424A (en) * 2011-12-12 2012-06-13 创新科存储技术(深圳)有限公司 Method for achieving cloud storage through mobile storage device
CN103209168A (en) * 2013-01-30 2013-07-17 广东欧珀移动通信有限公司 Method and system for achieving single sign-on
CN103631957A (en) * 2013-12-13 2014-03-12 北京国双科技有限公司 Statistical method and device for visitor behavior data
CN104780155A (en) * 2015-03-16 2015-07-15 小米科技有限责任公司 Method and device for binding equipment
CN104796436A (en) * 2015-05-20 2015-07-22 郑州悉知信息技术有限公司 User login method and system, first platform server and related platform server

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102497424A (en) * 2011-12-12 2012-06-13 创新科存储技术(深圳)有限公司 Method for achieving cloud storage through mobile storage device
CN103209168A (en) * 2013-01-30 2013-07-17 广东欧珀移动通信有限公司 Method and system for achieving single sign-on
CN103631957A (en) * 2013-12-13 2014-03-12 北京国双科技有限公司 Statistical method and device for visitor behavior data
CN104780155A (en) * 2015-03-16 2015-07-15 小米科技有限责任公司 Method and device for binding equipment
CN104796436A (en) * 2015-05-20 2015-07-22 郑州悉知信息技术有限公司 User login method and system, first platform server and related platform server

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
《URL:HTTP://WWW.ECSHOP119.COM/ARTICL》: "《ECSHOP购物车商品根据cookie长久保存商品插件URL:http://www.ecshop119.com/article.php?id=923》", 《ECSHOP购物车商品根据COOKIE长久保存商品插件URL:HTTP://WWW.ECSHOP119.COM/ARTICLE.PHP?ID=923》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105450655A (en) * 2015-12-14 2016-03-30 小米科技有限责任公司 Device binding methods and apparatuses
WO2017101517A1 (en) * 2015-12-14 2017-06-22 小米科技有限责任公司 Method and device for device binding
US10104599B2 (en) 2015-12-14 2018-10-16 Xiaomi Inc. Device binding methods and apparatuses
CN105450655B (en) * 2015-12-14 2019-05-28 小米科技有限责任公司 Apparatus bound method and apparatus
CN108156273A (en) * 2017-12-14 2018-06-12 北京奇艺世纪科技有限公司 A kind of anonymous ID generation methods, device and electronic equipment
CN111709055A (en) * 2020-06-16 2020-09-25 四川虹微技术有限公司 User information acquisition method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN105141600B (en) 2018-04-20

Similar Documents

Publication Publication Date Title
US8204794B1 (en) Processing orders for wireless service
JP5626537B2 (en) Request offline profile data for online use in confidentiality
CN105262588B (en) Login method, account management server based on dynamic password and mobile terminal
JP5952304B2 (en) System and method for transmitting and filtering instant messaging information
CN111127078A (en) Block chain-based point transaction method and system and electronic equipment
CN105141600A (en) Method for binding anonymously purchased service to user login account number and server
US10387630B2 (en) System and method for automatic digital copy for physical media purchase
Chou et al. Newsvendor pricing problem in a two‐sided market
CN103246946A (en) Method for performing order management operation among multiple terminals
CN105208560A (en) WiFi certification-free log-in method, device and system
CN104036406A (en) Method and device for improving safety of ordering information
CN105991610B (en) Log in the method and device of application server
CN105187399A (en) Resource processing method and device
CN105528701B (en) Method and equipment for realizing product extraction based on face recognition
CN110841297B (en) Data processing method and device and machine readable medium
CN111612577A (en) Order processing method and device, electronic equipment and storage medium
CN105871982A (en) Content pushing method, device and system
CN104123637B (en) A kind of to processing method, system and the equipment that object processes
CN106912118A (en) A kind of method for creating service number, equipment and system
JP6976372B2 (en) Generator, generation method and generation program
CN106600176B (en) Information input processing method and device
CN104463661A (en) Method and system for processing transaction data
CN112907322A (en) Order information processing method, device, platform, medium and program product
CN115659306A (en) Article acquisition permission sharing method and device, storage medium and electronic equipment
CN109961277B (en) Payment flow determination method and device and electronic equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant