CN105141600A - Method for binding anonymously purchased service to user login account number and server - Google Patents
Method for binding anonymously purchased service to user login account number and server Download PDFInfo
- Publication number
- CN105141600A CN105141600A CN201510504545.0A CN201510504545A CN105141600A CN 105141600 A CN105141600 A CN 105141600A CN 201510504545 A CN201510504545 A CN 201510504545A CN 105141600 A CN105141600 A CN 105141600A
- Authority
- CN
- China
- Prior art keywords
- service
- user
- mark
- login account
- bought
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention relates to a method for binding an anonymously purchased service to a user login account number in a server. The method comprises the following steps: inquiring a first relationship table of an identifier of the anonymously purchased service and the identifier of equipment stored in the server according to the identifier of the equipment when a user logs in the equipment so as to determine whether the anonymously purchased service exists on the equipment or not; and binding the inquired identifier of the anonymously purchased service to the user login account number, storing the relationship of the identifier of the anonymously purchased service and the user login account number in a second relationship table of the service identifier and the user login account number stored in the server, and deleting the identifier of the anonymously purchased service from the first relationship table.
Description
Technical field
The disclosure relates generally to the binding of service, more specifically, relates to the service binding anonymity bought to the method for user's login account and server.
Background technology
For the application of some type, as video class, journals and periodicals class, the application of books reading class etc., in order to improve the experience of user, the VIP service of watching or borrowing in this kind of application, generally all can be provided in limited time.Usually, user buys when these VIP serve needs binding account, is carried out the information of leading subscriber by this account, as viewing record, browing record etc.Therefore developer can buy before these VIP serve user and point out user to log in, and then just can go to buy these services.
But in Apple, the service of this paying belongs to virtual goods, must be bought by the IAP channel of disbursement of Apple, and user anonymity (under the state do not logged in) can have the right buying this VIP service too, if developer's force users when user buys logs in will be applied shop refusal by apple.Therefore apple is applied and must be supported that anonymous is bought this VIP and served, and conveniently user manages the VIP service oneself bought better simultaneously, needs to be designed for the function of the VIP service binding of anonymity purchase to user's login account.Just design this function for smooth Card Reader (a kind of service of borrowing) in limited time below.
On apple equipment, the service binding of the such as smooth Card Reader utilizing following technology anonymity to be bought etc. is to user's login account: use medium-and-large-sized database, as Oracle, DB2, mysql etc. store data; With the interface of java, PHP or other language development server end; And there is in IAP with objective-c language development the application purchasing function.Particularly, existing binding scheme comprises: set up account information table for storage information; After user anonymity buys the success of smooth Card Reader, program will generate a random account automatically, and smooth Card Reader user just bought is tied to this account.
But there is following defect in existing binding scheme: the account of stochastic generation compares and is difficult to memory; After forgetting account, the anonymous smooth Card Reader bought exists looks for the risk of not returning; User is anonymous on multiple equipment can generate multiple random account when buying, and user cannot merge smooth Card Reader in these accounts and browing record.
Summary of the invention
Given this, the present invention propose for service binding that anonymity the is bought method and apparatus to user's login account.
In one aspect of the invention, propose a kind of for anonymity being bought the method for service binding to user's login account at server place, described method comprises:
When user logs on equipment, the first relation table of service identifiers and device identification is bought in the anonymity stored in server according to the identified query of described equipment, to determine that whether described equipment existing anonymous purchase serves; And
The mark that service is bought in the anonymity inquired is tied to user's login account, in second relation table of the service identifiers that the relational storage between the mark of serve described anonymity purchase and described user's login account stores in described server and user's login account, and from described first relation table, delete the mark that service is bought in described anonymity.
Preferably, when user logs on equipment, point out described user whether anonymity to be bought service binding to user's login account, if user selects anonymity not to be bought service binding to user's login account according to prompting, then do not carry out bindings.
Preferably, before user logs on equipment, described method also comprises:
When described user buys service under anonymous state, the mark of service is bought in automatic generation anonymity, the mark that service is bought in described anonymity is tied to the mark of described equipment, and the relational storage described anonymity bought between the mark of service and the mark of described equipment is in described first relation table.
Preferably, before user logs on equipment, described method also comprises:
When described user buys service under logging status, automatic generation logs in the mark of the service of purchase, the described mark logging in the service of purchase is tied to described user's login account, and the relational storage described login bought between the mark of service and described user's login account is in described second relation table.
Preferably, described method also comprises:
When described user is under anonymous state during access object, the first relation table according to the identified query of described equipment, to determine whether there is the service with described match objects; And
The mark of described object is tied to the mark of the service inquired.
Preferably, described method also comprises:
When described user during access object, inquires about described second relation table, to determine whether there is the service with described match objects according to described user's login account under logging status; And
The mark of described object is tied to the mark of the service inquired.
Preferably, described method also comprises:
The second relation table according to the identified query of the service inquired, to determine whether there is the user's login account matched; And
The mark of described object is tied to the user's login account matched.
Preferably, described to liking books, and be smooth Card Reader with the service of described match objects.
Preferably, described method also comprises:
If there is no with the service of described match objects, then there are not access rights to user's prompting.
In another aspect of the present invention, propose a kind of server, comprising:
Memory, is configured to store and anonymously buys service identifiers and the first relation table of device identification and the second relation table of service identifiers and user's login account; And
Processor, is configured to when user logs on equipment, and according to the identified query of described equipment, the first relation table is to determine that whether described equipment existing anonymous purchase serves; And the mark anonymity inquired being bought service is tied to user's login account, by the relational storage between the mark of described anonymity purchase service and described user's login account in described second relation table, and from described first relation table, delete the mark that service is bought in described anonymity.
Preferably, described processor is further configured to: when user logs on equipment, point out described user whether anonymity to be bought service binding to user's login account, if user selects anonymity not to be bought service binding to user's login account according to prompting, then do not carry out bindings.
Preferably, described processor is further configured to:
Before user logs on equipment, when described user buys service under anonymous state, the mark of service is bought in automatic generation anonymity, the mark that service is bought in described anonymity is tied to the mark of described equipment, and the relational storage described anonymity bought between the mark of service and the mark of described equipment is in described first relation table.
Preferably, described processor is further configured to:
Before user logs on equipment, when described user buys service under logging status, automatic generation logs in the mark of the service of purchase, the described mark logging in the service of purchase is tied to described user's login account, and the relational storage described login bought between the mark of service and described user's login account is in described second relation table.
Preferably, described processor is further configured to:
When described user is under anonymous state during access object, the first relation table according to the identified query of described equipment, to determine whether there is the service with described match objects; And
The mark of described object is tied to the mark of the service inquired.
Preferably, described processor is further configured to:
When described user during access object, inquires about described second relation table, to determine whether there is the service with described match objects according to described user's login account under logging status; And
The mark of described object is tied to the mark of the service inquired.
Preferably, described processor is further configured to:
The second relation table according to the identified query of the service inquired, to determine whether there is the user's login account matched; And
The mark of described object is tied to the user's login account matched.
Preferably, described to liking books, and be smooth Card Reader with the service of described match objects.
Preferably, described processor is further configured to:
If there is no with the service of described match objects, then there are not access rights to user's prompting.
In the scheme that the present invention proposes, the service bought (such as, smooth Card Reader) and access object (such as, browing record) can be synchronized to the account that user specifies during user anonymity; The account of phone number registration facilitates user to remember and gives password for change, makes the information of user safer; User can to merge on multiple equipment the anonymous service bought and object in same account, facilitates the unified management of user profile; And when logining successfully, if this equipment exists do not bind the anonymous data of any account, user will be pointed out whether anonymous data will to be tied in current account, prevent user from losing anonymous data on the device.
Accompanying drawing explanation
According in conjunction with the following description of exemplary drawings to exemplary embodiment, other details of the present disclosure, aspect and advantage will become apparent, in the accompanying drawings:
Fig. 1 schematically illustrates the schematic diagram being tied to the method for same account according to embodiments of the invention for the service anonymity bought and access object; And
Fig. 2 schematically illustrates the schematic diagram being tied to the server of same account according to embodiments of the invention for the service anonymity bought and access object.
Accompanying drawing does not show all circuit of embodiment or structure.The Reference numeral running through institute's drawings attached identical represents same or analogous parts or feature.
Embodiment
The method being used for the service of anonymity purchase and access object to be tied to according to embodiments of the invention same account is described below with reference to Fig. 1.
First, in step S101, before user logs on equipment, when user buys service (hereinafter referred to " anonymous purchase is served ") under anonymous state, the mark of service is bought in automatic generation anonymity, mark anonymity being bought service is tied to the mark of equipment, and relational storage anonymity bought between the mark of service and the mark of equipment is in the first relation table.Alternatively, when user buys service (hereinafter referred to " logging in the service of purchase ") under logging status, automatic generation logs in the mark of the service of purchase, the mark logging in the service of purchase is tied to user's login account, and relational storage login bought between the mark of service and user's login account is in the second relation table.
Then, in step S102, when user logs on equipment, the first relation table of service identifiers and device identification is bought in the anonymity stored in server according to the identified query of described equipment, to determine that whether described equipment existing anonymous purchase serves.Alternatively, when user logs on equipment, whether prompting user buys service binding to user's login account by anonymity, if user selects anonymity not to be bought service binding to user's login account according to prompting, then do not carry out bindings, the method terminates.
Assuming that user selects anonymity to be bought service binding to user's logon account, then following, in step S103, the mark that service is bought in the anonymity inquired is tied to user's login account, in second relation table of the service identifiers that the relational storage between the mark of serve anonymity purchase and user's login account stores in server and user's login account, and the mark that the anonymous purchase of deletion is served from the first relation table.
Then, in step S104, when user is under anonymous state time access object (such as, books), according to identified query first relation table of equipment, to determine whether there is and the service of match objects (such as, smooth Card Reader); And if exist and the service of match objects, then the mark of object is tied to the mark of the service inquired, if there is no with the service of described match objects, then there are not access rights to user's prompting.Alternatively, when user during access object, inquires about the second relation table according to user's login account under logging status, to determine whether there is the service with match objects; And if exist and the service of match objects, then the mark of object is tied to the mark of the service inquired, if there is no with the service of described match objects, then there are not access rights to user's prompting.
In step S105, according to identified query second relation table of the service inquired, to determine whether there is the user's login account matched; And if there is user's login account of matching, then the mark of object is tied to the user's login account matched.
To be smooth Card Reader for service below and to liking books, method be above described.
First, the form storing data is created at corporate server end.This form comprises the relation table READCARD_UUID of the relation table READCARD_USER of user account information table USER, smooth Card Reader and account, smooth Card Reader and equipment and the relation table BOOKID_READCARD of browing record and smooth Card Reader.
When buying the success of smooth Card Reader, service end will generate smooth Card Reader card number automatically, and then according to the parameter that client sends, service end judges whether the current state of client is logging status.If the current state of client is logging status, then the account of current login and the smooth Card Reader number that generates above are bound, and stored in READCARD_USER table.If the current state of client is anonymous state, then the unique identification of current device and the smooth Card Reader number that generates above are bound, and stored in READCARD_UUID table.
When user logins successfully on equipment, service end inquires about the data in READCARD_UUID table according to the unique identification of current device, judges whether this equipment exists anonymous data.If there is not anonymous data, be then left intact.If there is anonymous data, then whether the smooth Card Reader that anonymity is bought to be tied in the account of current login by Client-Prompt user.If user selects to cancel, then do not carry out any process.If user selects to determine, then service end inquires about the data in READCARD_UUID table according to the unique identification of current device, and these data and current account is bound one by one, and stored in READCARD_USER table.Delete these data in READCARD_UUID table simultaneously.
When smooth read book (that is, access object), according to the parameter that client sends, service end judges whether the current state of client is logging status.If logging status, then go data in inquiry READCARD_USER table according to the account of current login.If anonymous state, then when inquiring about data in READCARD_UUID table according to the unique identification of front equipment.The every bar data checked out in above circulation, to judge whether there is effective smooth Card Reader.If there is not effective smooth Card Reader, then notify that Client-Prompt user does not have smooth read right.If there is effective smooth Card Reader, then by current books mark (ID) and this smooth Card Reader card number binding, and stored in BOOKID_READCARD table.Then, according to smooth Card Reader card number inquiry READCARD_USER, to determine whether there is the login account matched, and books ID is tied to the login account matched.
The server being used for the service of anonymity purchase and access object to be tied to according to embodiments of the invention same account is described below with reference to Fig. 2.
Server 200 comprises processor 210, such as, and digital signal processor (DSP).Processor 210 can be the individual unit of different actions for performing process described herein or multiple unit.Server 200 can also comprise I/O (I/O) unit 230, for sending signal from other entity Received signal strength or to other entities.Processor 210 is configured to when user logs on equipment, and according to the identified query of described equipment, the first relation table is to determine that whether described equipment existing anonymous purchase serves (such as, smooth Card Reader); And the mark anonymity inquired being bought service is tied to user's login account, by the relational storage between the mark of described anonymity purchase service and described user's login account in described second relation table, and from described first relation table, delete the mark that service is bought in described anonymity.Described processor 210 is further configured to: when user logs on equipment, described user is pointed out whether anonymity to be bought service binding to user's login account, if user selects anonymity not to be bought service binding to user's login account according to prompting, then do not carry out bindings.Described processor 210 is further configured to: before user logs on equipment, when described user buys service under anonymous state, the mark of service is bought in automatic generation anonymity, the mark that service is bought in described anonymity is tied to the mark of described equipment, and the relational storage described anonymity bought between the mark of service and the mark of described equipment is in described first relation table.Described processor 210 is further configured to: before user logs on equipment, when described user buys service under logging status, automatic generation logs in the mark of the service of purchase, the described mark logging in the service of purchase is tied to described user's login account, and the relational storage described login bought between the mark of service and described user's login account is in described second relation table.Described processor 210 is further configured to: when described user is under anonymous state time access object (such as, books), the first relation table according to the identified query of described equipment, to determine whether there is the service with described match objects; And the mark of described object is tied to the mark of the service inquired.Described processor 210 is further configured to: when described user during access object, inquires about described second relation table, to determine whether there is the service with described match objects according to described user's login account under logging status; And the mark of described object is tied to the mark of the service inquired.Described processor 210 is further configured to: the second relation table according to the identified query of the service inquired, to determine whether there is the user's login account matched; And the mark of described object is tied to the user's login account matched.Described processor 210 is further configured to: if there is no with the service of described match objects, then there are not access rights to user's prompting.
In addition, server 200 comprises memory 220, and this memory 220 can have following form: non-volatile or volatile memory, such as, and Electrically Erasable Read Only Memory (EEPROM), flash memory etc.Memory 220 stores computer-readable instruction, and when processor 210 performs this computer-readable instruction, this computer-readable instruction makes processor perform action as herein described.Memory 220 also stores anonymous buys service identifiers and the first relation table of device identification and the second relation table of service identifiers and user's login account.
Above detailed description, by using schematic diagram, flow chart and/or example, has set forth numerous embodiments of inspection method and system.When this schematic diagram, flow chart and/or example comprise one or more function and/or operation, it will be understood by those skilled in the art that each function in this schematic diagram, flow chart or example and/or operation can by various structure, hardware, software, firmware or in fact their combination in any come to realize separately and/or jointly.In one embodiment, some parts of theme described in embodiments of the invention can be realized by application-specific integrated circuit (ASIC) (ASIC), field programmable gate array (FPGA), digital signal processor (DSP) or other integrated forms.But, those skilled in the art will recognize that, some aspects of embodiment disclosed herein can realize in integrated circuits on the whole or partly equally, be embodied as one or more computer programs of running on one or more computer (such as, be embodied as the one or more programs run in one or more computer system), be embodied as one or more programs of running on the one or more processors (such as, be embodied as the one or more programs run on one or more microprocessor), be embodied as firmware, or be embodied as in fact the combination in any of aforesaid way, and those skilled in the art are according to the disclosure, the ability of design circuit and/or write software and/or firmware code will be possessed.In addition, those skilled in the art will recognize that, the mechanism of theme described in the disclosure can be distributed as the program product of various ways, and regardless of the actual particular type of signal bearing medium being used for performing distribution, the exemplary embodiment of theme described in the disclosure is all applicable.The example of signal bearing medium includes but not limited to: recordable-type media, as floppy disk, hard disk drive, compact-disc (CD), digital universal disc (DVD), digital magnetic tape, computer storage etc.; And transmission type media, as numeral and/or analog communication medium (such as, optical fiber cable, waveguide, wired communications links, wireless communication link etc.).
Although exemplary embodiment describe the present invention with reference to several, should be appreciated that term used illustrates and exemplary and nonrestrictive term.Spirit or the essence of invention is not departed from because the present invention can specifically implement in a variety of forms, so be to be understood that, above-described embodiment is not limited to any aforesaid details, and explain widely in the spirit and scope that should limit in claim of enclosing, therefore fall into whole change in claim or its equivalent scope and remodeling and all should be claim of enclosing and contained.
Claims (18)
1., for anonymity being bought the method for service binding to user's login account at server place, described method comprises:
When user logs on equipment, the first relation table of service identifiers and device identification is bought in the anonymity stored in server according to the identified query of described equipment, to determine that whether described equipment existing anonymous purchase serves; And
The mark that service is bought in the anonymity inquired is tied to user's login account, in second relation table of the service identifiers that the relational storage between the mark of serve described anonymity purchase and described user's login account stores in described server and user's login account, and from described first relation table, delete the mark that service is bought in described anonymity.
2. method according to claim 1, wherein, when user logs on equipment, described user is pointed out whether anonymity to be bought service binding to user's login account, if user selects anonymity not to be bought service binding to user's login account according to prompting, then do not carry out bindings.
3. method according to claim 1, wherein, before user logs on equipment, described method also comprises:
When described user buys service under anonymous state, the mark of service is bought in automatic generation anonymity, the mark that service is bought in described anonymity is tied to the mark of described equipment, and the relational storage described anonymity bought between the mark of service and the mark of described equipment is in described first relation table.
4. method according to claim 1, wherein, before user logs on equipment, described method also comprises:
When described user buys service under logging status, automatic generation logs in the mark of the service of purchase, the described mark logging in the service of purchase is tied to described user's login account, and the relational storage described login bought between the mark of service and described user's login account is in described second relation table.
5. method according to claim 1, also comprises:
When described user is under anonymous state during access object, the first relation table according to the identified query of described equipment, to determine whether there is the service with described match objects; And
The mark of described object is tied to the mark of the service inquired.
6. method according to claim 1, also comprises:
When described user during access object, inquires about described second relation table, to determine whether there is the service with described match objects according to described user's login account under logging status; And
The mark of described object is tied to the mark of the service inquired.
7. the method according to claim 5 or 6, also comprises:
The second relation table according to the identified query of the service inquired, to determine whether there is the user's login account matched; And
The mark of described object is tied to the user's login account matched.
8. the method according to claim 5 or 6, wherein, described to liking books, and be smooth Card Reader with the service of described match objects.
9. the method according to claim 5 or 6, also comprises:
If there is no with the service of described match objects, then there are not access rights to user's prompting.
10. a server, comprising:
Memory, is configured to store and anonymously buys service identifiers and the first relation table of device identification and the second relation table of service identifiers and user's login account; And
Processor, is configured to when user logs on equipment, and according to the identified query of described equipment, the first relation table is to determine that whether described equipment existing anonymous purchase serves; And the mark anonymity inquired being bought service is tied to user's login account, by the relational storage between the mark of described anonymity purchase service and described user's login account in described second relation table, and from described first relation table, delete the mark that service is bought in described anonymity.
11. servers according to claim 10, wherein, described processor is further configured to: when user logs on equipment, described user is pointed out whether anonymity to be bought service binding to user's login account, if user selects anonymity not to be bought service binding to user's login account according to prompting, then do not carry out bindings.
12. servers according to claim 10, wherein, described processor is further configured to:
Before user logs on equipment, when described user buys service under anonymous state, the mark of service is bought in automatic generation anonymity, the mark that service is bought in described anonymity is tied to the mark of described equipment, and the relational storage described anonymity bought between the mark of service and the mark of described equipment is in described first relation table.
13. servers according to claim 10, wherein, described processor is further configured to:
Before user logs on equipment, when described user buys service under logging status, automatic generation logs in the mark of the service of purchase, the described mark logging in the service of purchase is tied to described user's login account, and the relational storage described login bought between the mark of service and described user's login account is in described second relation table.
14. servers according to claim 10, wherein, described processor is further configured to:
When described user is under anonymous state during access object, the first relation table according to the identified query of described equipment, to determine whether there is the service with described match objects; And
The mark of described object is tied to the mark of the service inquired.
15. servers according to claim 10, wherein, described processor is further configured to:
When described user during access object, inquires about described second relation table, to determine whether there is the service with described match objects according to described user's login account under logging status; And
The mark of described object is tied to the mark of the service inquired.
16. servers according to claims 14 or 15, wherein, described processor is further configured to:
The second relation table according to the identified query of the service inquired, to determine whether there is the user's login account matched; And
The mark of described object is tied to the user's login account matched.
17. servers according to claims 14 or 15, wherein, described to as if books, and be smooth Card Reader with the service of described match objects.
18. servers according to claims 14 or 15, wherein, described processor is further configured to:
If there is no with the service of described match objects, then there are not access rights to user's prompting.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510504545.0A CN105141600B (en) | 2015-08-17 | 2015-08-17 | By the method and server of the service binding of anonymity purchase to user's login account |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510504545.0A CN105141600B (en) | 2015-08-17 | 2015-08-17 | By the method and server of the service binding of anonymity purchase to user's login account |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105141600A true CN105141600A (en) | 2015-12-09 |
CN105141600B CN105141600B (en) | 2018-04-20 |
Family
ID=54726808
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510504545.0A Active CN105141600B (en) | 2015-08-17 | 2015-08-17 | By the method and server of the service binding of anonymity purchase to user's login account |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105141600B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105450655A (en) * | 2015-12-14 | 2016-03-30 | 小米科技有限责任公司 | Device binding methods and apparatuses |
CN108156273A (en) * | 2017-12-14 | 2018-06-12 | 北京奇艺世纪科技有限公司 | A kind of anonymous ID generation methods, device and electronic equipment |
CN111709055A (en) * | 2020-06-16 | 2020-09-25 | 四川虹微技术有限公司 | User information acquisition method and device, electronic equipment and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102497424A (en) * | 2011-12-12 | 2012-06-13 | 创新科存储技术(深圳)有限公司 | Method for achieving cloud storage through mobile storage device |
CN103209168A (en) * | 2013-01-30 | 2013-07-17 | 广东欧珀移动通信有限公司 | Method and system for achieving single sign-on |
CN103631957A (en) * | 2013-12-13 | 2014-03-12 | 北京国双科技有限公司 | Statistical method and device for visitor behavior data |
CN104780155A (en) * | 2015-03-16 | 2015-07-15 | 小米科技有限责任公司 | Method and device for binding equipment |
CN104796436A (en) * | 2015-05-20 | 2015-07-22 | 郑州悉知信息技术有限公司 | User login method and system, first platform server and related platform server |
-
2015
- 2015-08-17 CN CN201510504545.0A patent/CN105141600B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102497424A (en) * | 2011-12-12 | 2012-06-13 | 创新科存储技术(深圳)有限公司 | Method for achieving cloud storage through mobile storage device |
CN103209168A (en) * | 2013-01-30 | 2013-07-17 | 广东欧珀移动通信有限公司 | Method and system for achieving single sign-on |
CN103631957A (en) * | 2013-12-13 | 2014-03-12 | 北京国双科技有限公司 | Statistical method and device for visitor behavior data |
CN104780155A (en) * | 2015-03-16 | 2015-07-15 | 小米科技有限责任公司 | Method and device for binding equipment |
CN104796436A (en) * | 2015-05-20 | 2015-07-22 | 郑州悉知信息技术有限公司 | User login method and system, first platform server and related platform server |
Non-Patent Citations (1)
Title |
---|
《URL:HTTP://WWW.ECSHOP119.COM/ARTICL》: "《ECSHOP购物车商品根据cookie长久保存商品插件URL:http://www.ecshop119.com/article.php?id=923》", 《ECSHOP购物车商品根据COOKIE长久保存商品插件URL:HTTP://WWW.ECSHOP119.COM/ARTICLE.PHP?ID=923》 * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105450655A (en) * | 2015-12-14 | 2016-03-30 | 小米科技有限责任公司 | Device binding methods and apparatuses |
WO2017101517A1 (en) * | 2015-12-14 | 2017-06-22 | 小米科技有限责任公司 | Method and device for device binding |
US10104599B2 (en) | 2015-12-14 | 2018-10-16 | Xiaomi Inc. | Device binding methods and apparatuses |
CN105450655B (en) * | 2015-12-14 | 2019-05-28 | 小米科技有限责任公司 | Apparatus bound method and apparatus |
CN108156273A (en) * | 2017-12-14 | 2018-06-12 | 北京奇艺世纪科技有限公司 | A kind of anonymous ID generation methods, device and electronic equipment |
CN111709055A (en) * | 2020-06-16 | 2020-09-25 | 四川虹微技术有限公司 | User information acquisition method and device, electronic equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN105141600B (en) | 2018-04-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8204794B1 (en) | Processing orders for wireless service | |
JP5626537B2 (en) | Request offline profile data for online use in confidentiality | |
CN105262588B (en) | Login method, account management server based on dynamic password and mobile terminal | |
JP5952304B2 (en) | System and method for transmitting and filtering instant messaging information | |
CN111127078A (en) | Block chain-based point transaction method and system and electronic equipment | |
CN105141600A (en) | Method for binding anonymously purchased service to user login account number and server | |
US10387630B2 (en) | System and method for automatic digital copy for physical media purchase | |
Chou et al. | Newsvendor pricing problem in a two‐sided market | |
CN103246946A (en) | Method for performing order management operation among multiple terminals | |
CN105208560A (en) | WiFi certification-free log-in method, device and system | |
CN104036406A (en) | Method and device for improving safety of ordering information | |
CN105991610B (en) | Log in the method and device of application server | |
CN105187399A (en) | Resource processing method and device | |
CN105528701B (en) | Method and equipment for realizing product extraction based on face recognition | |
CN110841297B (en) | Data processing method and device and machine readable medium | |
CN111612577A (en) | Order processing method and device, electronic equipment and storage medium | |
CN105871982A (en) | Content pushing method, device and system | |
CN104123637B (en) | A kind of to processing method, system and the equipment that object processes | |
CN106912118A (en) | A kind of method for creating service number, equipment and system | |
JP6976372B2 (en) | Generator, generation method and generation program | |
CN106600176B (en) | Information input processing method and device | |
CN104463661A (en) | Method and system for processing transaction data | |
CN112907322A (en) | Order information processing method, device, platform, medium and program product | |
CN115659306A (en) | Article acquisition permission sharing method and device, storage medium and electronic equipment | |
CN109961277B (en) | Payment flow determination method and device and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |