CN107577933A - Using login method and device, computer equipment, computer-readable recording medium - Google Patents

Using login method and device, computer equipment, computer-readable recording medium Download PDF

Info

Publication number
CN107577933A
CN107577933A CN201710726372.6A CN201710726372A CN107577933A CN 107577933 A CN107577933 A CN 107577933A CN 201710726372 A CN201710726372 A CN 201710726372A CN 107577933 A CN107577933 A CN 107577933A
Authority
CN
China
Prior art keywords
icon
certification
login
password
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710726372.6A
Other languages
Chinese (zh)
Other versions
CN107577933B (en
Inventor
曾元清
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201710726372.6A priority Critical patent/CN107577933B/en
Publication of CN107577933A publication Critical patent/CN107577933A/en
Application granted granted Critical
Publication of CN107577933B publication Critical patent/CN107577933B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • User Interface Of Digital Computer (AREA)

Abstract

The application is related to one kind and applies login method and device, computer equipment, computer-readable recording medium.Methods described includes:The Password Management instruction of receiving terminal input;Instructed according to the Password Management and obtain certification icon, and authentication interface is generated according to the certification icon;The certification icon that receiving terminal obtains according to the authentication interface;If the certification icon that terminal obtains is certification icon corresponding to the login password of destination application, the destination application is logged in.Above-mentioned application login method and device, computer equipment, computer-readable recording medium, substantial amounts of login time can be saved, improve the efficiency that application program logs in.

Description

Using login method and device, computer equipment, computer-readable recording medium
Technical field
The application is related to field of computer technology, more particularly to one kind using login method and device, computer equipment, Computer-readable recording medium.
Background technology
Intelligent terminal is realized when service is provided the user by application program.User can be in intelligence Application program is opened in terminal, then by reaching certain application purpose to the operation in application program.For example, pass through application Program realizes shopping, listens music, sees a film, playing games.When using application program, often managed by account The operation of different user, first log into the account of application program, then again by the account come preserve the operation note of user and As a result.
As long as user logs in the more new state that account can checks historical operation record and operation.However, user exists , it is necessary to input account name and corresponding password during the account of login application program, if application program is too many, user just needs to remember Recall many account passwords.If usual user forgets Password, it is necessary to is gone for by the rule of giving for change of application setting Return password, so that user takes a substantial amount of time in login process.
The content of the invention
The embodiment of the present application provides one kind and applies login method and device, computer equipment, computer-readable recording medium, Usersmanaging passwords can be facilitated, improve the login efficiency of application program.
One kind applies login method, and methods described includes:
The Password Management instruction of receiving terminal input;
Instructed according to the Password Management and obtain certification icon, and authentication interface is generated according to the certification icon;
The certification icon that receiving terminal obtains according to the authentication interface;
If the certification icon that terminal obtains is certification icon corresponding to the login password of destination application, described in login Destination application.
One kind applies entering device, and described device includes:
Command reception module, the Password Management instruction for receiving terminal input;
Interface generation module, certification icon is obtained for being instructed according to the Password Management, and according to the certification icon Generate authentication interface;
Icon receiving module, the certification icon obtained for receiving terminal according to the authentication interface;
Using login module, if being to recognize corresponding to the login password of destination application for the certification icon that terminal obtains Icon is demonstrate,proved, then logs in the destination application.
A kind of computer equipment, including memory and processor, computer-readable instruction are stored in the memory, institute When stating instruction by the computing device so that the computing device following steps:
The Password Management instruction of receiving terminal input;
Instructed according to the Password Management and obtain certification icon, and authentication interface is generated according to the certification icon;
The certification icon that receiving terminal obtains according to the authentication interface;
If the certification icon that terminal obtains is certification icon corresponding to the login password of destination application, described in login Destination application.
A kind of computer-readable recording medium, is stored thereon with computer program, it is characterised in that the computer program Following steps when being executed by processor:
The Password Management instruction of receiving terminal input;
Instructed according to the Password Management and obtain certification icon, and authentication interface is generated according to the certification icon;
The certification icon that receiving terminal obtains according to the authentication interface;
If the certification icon that terminal obtains is certification icon corresponding to the login password of destination application, described in login Destination application.
What the embodiment of the present application provided applies login method and device, computer equipment, computer-readable recording medium, when When user forgets login password, Password Management can be inputted by terminal and instructed, then terminal can be instructed according to Password Management and obtained Certification icon is taken, and generates authentication interface.User is only needed according to authentication interface input authentication icon, if certification icon is to step on Record certification icon corresponding to password, it is possible to log in destination application.So user can pass through when forgetting login password Corresponding certification icon carries out login authentication, does not just have to give rule for change to give login password for change, so by the password of complexity again Substantial amounts of login time is saved, improves the efficiency of application program login.
Brief description of the drawings
, below will be to embodiment or existing in order to illustrate more clearly of the embodiment of the present application or technical scheme of the prior art There is the required accompanying drawing used in technology description to be briefly described, it should be apparent that, drawings in the following description are only this Some embodiments of application, for those of ordinary skill in the art, on the premise of not paying creative work, can be with Other accompanying drawings are obtained according to these accompanying drawings.
Fig. 1 is the application environment schematic diagram that login method is applied in one embodiment;
Fig. 2 is the internal structure schematic diagram of electronic equipment in one embodiment;
Fig. 3 is the structural representation that login method is applied in one embodiment;
Fig. 4 is the structural representation that login method is applied in another embodiment;
Fig. 5 is the structural representation that login method is applied in another embodiment;
Fig. 6 is the displaying figure of application program login interface in one embodiment;
Fig. 7 is the displaying figure of authentication interface in one embodiment;
Fig. 8 is the structural representation that entering device is applied in one embodiment;
Fig. 9 is the structural representation that entering device is applied in another embodiment;
Figure 10 is the structural representation that entering device is applied in another embodiment;
Figure 11 is the block diagram of the part-structure of the mobile phone related to the computer equipment of the embodiment of the present application offer.
Embodiment
In order that the object, technical solution and advantage of the application are more clearly understood, it is right below in conjunction with drawings and Examples The application is further elaborated.It should be appreciated that specific embodiment described herein is only to explain the application, and It is not used in restriction the application.
It is appreciated that term " first " used in this application, " second " etc. can be used to describe various elements herein, But these elements should not be limited by these terms.These terms are only used for distinguishing first element and another element.Citing comes Say, in the case where not departing from scope of the present application, the first client can be referred to as the second client, and similarly, can incite somebody to action Second client is referred to as the first client.First client and the second client both clients, but it is not same visitor Family end.
Fig. 1 is the application environment schematic diagram that login method is applied in one embodiment.As shown in figure 1, the application environment is used Login method, including user terminal 102 and server 104 are applied in realization one kind.Wherein, user terminal 102 can be used for connecing The Password Management instruction of user's input is received, is instructed according to Password Management and obtains certification icon, and certification is generated according to certification icon Interface, the certification icon that user inputs according to authentication interface is then received, and will be logged in corresponding to the certification icon of user's input Password and logon account are sent to server 104.Server 104 receives login password and the login of the transmission of user terminal 102 After account, verified according to the login password and logon account, destination application is logged in if being verified, and will step on Successful message is recorded to send to user terminal 102.It is understood that user terminal 102 is to be in computer network outermost, It is mainly used in inputting user profile and exports the electronic equipment of result, such as can is PC, mobile terminal, individual Personal digital assistant, wearable electronic etc..Server 104 is to be used to respond service request, while provides setting for the service of calculating It is standby, such as can be one or multiple stage computers.
Fig. 2 is the internal structure schematic diagram of electronic equipment in one embodiment.As shown in Fig. 2 the electronic equipment includes leading to Cross processor, non-volatile memory medium, built-in storage and network interface display screen and the input unit of system bus connection.Its In, the non-volatile memory medium of electronic equipment is stored with operating system and computer-readable instruction.The computer-readable instruction When being executed by processor a kind of login method is applied to realize.The processor is used to provide calculating and control ability, and support is whole The operation of electronic equipment.Built-in storage in electronic equipment is the operation of the computer-readable instruction in non-volatile memory medium Environment is provided.Network interface is used to carry out network service with server, such as sends logging request to server, the reception server and returns Login result returned etc..The display screen of electronic equipment can be LCDs or electric ink display screen etc., input unit Can be button, trace ball or the Trackpad set on the touch layer or electronic equipment casing covered on display screen, Can be external keyboard, Trackpad or mouse etc..Wherein, display screen is displayed for authentication interface, and input unit can be with For user according to authentication interface input authentication icon.The electronic equipment can be that mobile phone, tablet personal computer or individual digital help Reason or Wearable etc..It will be understood by those skilled in the art that the structure shown in Fig. 2, only with application scheme phase The block diagram of the part-structure of pass, the restriction for the electronic equipment being applied thereon to application scheme is not formed, specific electricity Sub- equipment can include, than more or less parts shown in figure, either combining some parts or having different parts Arrangement.
Fig. 3 is the structural representation that login method is applied in one embodiment.As shown in figure 3, this applies login method bag Step 302 is included to step 308.Wherein:
Step 302, the Password Management instruction of receiving terminal input.
In the embodiment that the application provides, Password Management instruction refers to realize by certification icon steps on to application program Record the instruction of the management of password.It is understood that Password Management instruction can be touch control operation, the pressing behaviour of physical button Work, voice-controlled operations rock the trigger actions such as operation to mobile terminal.Touch control operation, which has, to be touched clicking operation, touches length By operation, slide, multi-point touch operation etc. are touched, wherein, it is that the touch more than preset duration presses to touch long-press operation Operation.
Specifically, Password Management instruction can be after certain event occurs terminal trigger automatically or user Inputted by terminal.For example, when the login interface of application program is logged in, if the code error of user's input Number exceedes three times, then trigger password management instructs.
Step 304, instructed according to Password Management and obtain certification icon, and authentication interface is generated according to certification icon.
In one embodiment, icon when certification icon refers to login application program for certification user identity.Certification Interface refers to the interface of user's input authentication icon during login application program.Usually, can recognize in authentication interface comprising multiple Icon is demonstrate,proved, user can select one or more certification icon according to authentication interface, if selected certification icon is default Certification icon, then the user certification success, log in destination application;If the certification icon mistake of user's input, recognizes Card failure, can not log in destination application.
Certification icon can be only corresponding with login password.That is, different application programs, as long as login password Identical, corresponding certification icon can is identical.Instructed according to Password Management and obtain certification icon, wherein Password Management refers to It can be, but not limited to include logon account mark in order.Specifically, the logon account mark in being instructed according to Password Management obtains Corresponding login password, then certification icon corresponding to login password is obtained from icon library, and except recognizing corresponding to login password Other certification icons outside icon are demonstrate,proved, authentication interface is then generated according to the certification icon of acquisition.If in login application program When, the certification icon of user's selection is certification icon corresponding to login password, then certification success;Otherwise authentification failure.
Further, certification icon can also be corresponding with the login password of application program.That is, different should With program, even if login password is identical, corresponding certification icon is also different.So, can includes answering in Password Management instruction Identified with program identification and logon account.Specifically, the destination application in being instructed according to Password Management is identified and stepped on Record account identification obtain corresponding to login password, then certification icon corresponding to login password is obtained from icon library, and except stepping on Other certification icons outside certification icon corresponding to password are recorded, authentication interface is then generated according to the certification icon of acquisition.
Step 306, the certification icon that receiving terminal obtains according to authentication interface.
In the embodiment that the application provides, authentication interface contains multiple certification icons, and user can be according to certification circle Face selects input authentication icon.Usually, user can select one or more certification icons to be authenticated according to authentication interface, It can also be authenticated by the connection gesture of input authentication icon.Wherein, the connection gesture of certification icon refers to select multiple Certification icon, and be attached this multiple certification icon by gesture.
Step 308, if the certification icon that terminal obtains is certification icon corresponding to the login password of destination application, Log in destination application.
Login password has corresponding relation with certification icon, obtains the certification icon of user's input first, if user inputs Certification icon for destination application login password corresponding to certification icon, then certification is by logging in the intended application journey Sequence.Destination application is the application program that user needs to log in.
In the certification of certification icon by the way that afterwards, terminal can obtain login password and logon account corresponding to certification icon, And the login password of acquisition and logon account are sent to server, server and mesh can be logged according to login password and logon account Application program is marked, and login result is back to terminal.
It is above-mentioned to apply login method, when user forgets login password, Password Management can be inputted by terminal and instructed, so Terminal can instruct according to Password Management and obtain certification icon afterwards, and generate authentication interface.User only needs defeated according to authentication interface Enter certification icon, if certification icon is certification icon corresponding to login password, it is possible to log in destination application.So use Family can be carried out login authentication by corresponding certification icon, just do not had to again by the password of complexity when forgetting login password Rule is given for change to give login password for change, so saves substantial amounts of login time, improves the efficiency of application program login.
Fig. 4 is the structural representation that login method is applied in another embodiment.As shown in figure 4, this applies login method Including step 402 to step 412.Wherein:
Step 402, login password is obtained, certification is generated according to the file type of the file stored in terminal and file name Icon, and establish the corresponding relation of login password and certification icon.
In one embodiment, login password refers to the password of the application program in registration terminal.Usually, can in terminal With comprising multiple application programs, and an application program can include multiple logon accounts, and application program passes through logon account Identify different users.Logon account and login password be it is one-to-one, can by logon account and corresponding login password With login application program.It is understood that the login password of different logon accounts is can be with identical.
By the one-to-one relationship of database purchase application program identification, logon account and login password, when user is defeated When entering logon account and login password login application program, logon account and login are close according to corresponding to searching application program identification Code, if all the match is successful for the logon account and login password of user's input, and the logon account and login password are corresponding relation, Then login application program success.Wherein, the one-to-one relationship of application program identification, logon account and login password can store In terminal local, can also store on the server.
The file stored in terminal refers to terminal caused file during operation application program and system task.Example Such as, the file stored in terminal can be that caused audio file or refer to is broadcast in video during music is played Caused video file etc. during putting.According to the file generated certification icon of terminal storage, different files can generate not Same certification icon.
In one of the embodiments, can be, but not limited to be file according to being stored in terminal file type and file Title generates certification icon.Formed for example, certification icon can be background colour and word, different file types correspond to different The background colour of certification icon, then file name be shown on background colour, so as to form different certification icons.In other realities To apply in example, certification icon can also be what is generated according to login password, or generated according to file store path and filename. For example, rear six generations according to login password.
The corresponding relation of login password and certification icon is established, can be that system is established automatically or user is defeated Enter.In the present embodiment, different application, different logon accounts, as long as login password is identical, corresponding certification icon is just It is identical.
In one embodiment, the corresponding relation of login password and certification icon can be established.Login account can also be established Family and the corresponding relation of certification icon, that is to say, that when being authenticated by certification icon, not only need certification to log in Certification icon corresponding to password, also certification icon corresponding to logon account is authenticated.Only logon account and login is close The certification of certification icon corresponding to code is all by ability login application program.
Step 404, the Password Management instruction of receiving terminal input.
Step 406, instructed according to Password Management and obtain certification icon, and authentication interface is generated according to certification icon.
In one embodiment, certification icon can include name authentication icon and cipher authentication icon, and according to title Certification icon and/or cipher authentication icon generation authentication interface.Instructed according to Password Management and obtain certification icon, further according to acquisition Certification icon generation authentication interface.
Specifically, can be according to the content generation Password Management instruction in the login interface of destination application.If log in Content in interface includes logon account, and logon account logon account corresponding with destination application matches, then only Need to be authenticated login password corresponding to the logon account.Login password it need to only be generated according to corresponding to the logon account Password Management instructs, and then the cipher authentication icon according to corresponding to obtaining Password Management instruction, generates authentication interface.
Step 408, the certification icon that receiving terminal obtains according to authentication interface.
In one embodiment, step 408 can specifically include:The name authentication figure that receiving terminal obtains according to authentication interface Mark and/or cipher authentication icon.Wherein, name authentication icon refers to the icon being authenticated to the logon account of application program, Cipher authentication icon refers to the icon being authenticated to the login password of application program.User can select respectively according to authentication interface Certification icon corresponding to logon account and/or login password is taken, and the certification icon of acquisition is authenticated.
Step 410, if the certification icon that terminal obtains is certification icon corresponding to the login password of destination application, Log in destination application.
Terminal is authenticated after certification icon is got according to the corresponding relation established in step 402.Login password There is corresponding relation with certification icon, after getting certification icon, login password corresponding to lookup, and by logon account and step on Record password, which is sent to server, to be verified, the result then returned according to server is logged in.
It is understood that store in the database of server in destination application the logon account of all users and Corresponding login password, after the logon account and login password of terminal transmission is received, server can be looked into database Whether look for has the logon account and login password to match.If the logon account and login password in database be present, and this is stepped on It is corresponding relation to record account and login password, then terminal Successful login destination application, and the result logined successfully is returned To terminal;Otherwise terminal logs in destination application failure, and the result of login failure is returned into terminal.
In one embodiment, step 410 can specifically include:If the name authentication icon that terminal obtains is intended application Certification icon corresponding to the logon account of program, and the cipher authentication icon of terminal acquisition is the login password of destination application Corresponding certification icon, then log in destination application.
Step 412, if the number of the certification icon authentification failure obtained according to terminal is more than preset times, receiving terminal The finger print information of input;If finger print information and preset fingerprint information matches, log in destination application.
In one embodiment, if the number that the certification icon obtained according to terminal is authenticated failure is more than default time Number, then need further to carry out fingerprint authentication.Finger print information refers to the view data formed according to the fingerprint of user.Terminal can be with The finger print information of user's input is obtained, and the finger print information of acquisition is matched with preset fingerprint information, if the match is successful, Log in destination application.
Wherein, preset fingerprint information refers to the fingerprint image data gathered in advance, the fingerprint image that will can be gathered in advance Data storage is in fingerprint database.When fingerprint authentication is carried out, the finger print information that terminal is obtained is with fingerprint database In finger print information matched, if matching degree looked into preset value, then it is assumed that the match is successful.For example, in fingerprint database, exist Finger print information of the matching degree more than 90% of the finger print information obtained with terminal, then it is assumed that be proved to be successful.
It is above-mentioned to apply login method, the relation of login password and certification icon is initially set up, when user forgets login password When, Password Management can be inputted by terminal and instructed, then terminal can instruct according to Password Management and obtain certification icon, and generate Authentication interface.User can input name authentication icon and cipher authentication icon by authentication interface, if name authentication icon Pass through with cipher authentication icon certification, it is possible to log in destination application.So user is forgetting logon account and logged in close During code, login authentication can be carried out by corresponding certification icon, does not just have to give rule for change by the password of complexity to give for change again Login password, substantial amounts of login time is so saved, improve the efficiency of application program login.
Fig. 5 is the structural representation that login method is applied in another embodiment.As shown in figure 5, this applies login method Including step 502 to step 512.Wherein:
Step 502, typing finger print information, login password and corresponding certification icon.
In the embodiment that the application provides, first according to the file generated certification icon stored in terminal.Then select Login password and certification icon, and establish the corresponding relation of login password and certification icon.Finger print information is recently entered, for leading to Cross fingerprint authentication and log in destination application.It is understood that terminal is according to several certification icons of the file generated of storage, User can select one therein or multiple establish corresponding relation with login password.
Step 504, logon account and login password, destination application login failure are inputted.
In one embodiment, user can open destination application by terminal desktop, into destination application Login interface, and logon account and login password are inputted in login interface, request logs in destination application.If target should With program login failure, then Password Management instruction can be clicked on, login authentication is carried out by certification icon.
Step 506, Password Management instruction is clicked on, opens Password Management application.
If user forgets login password, Password Management instruction can be clicked on, opens Password Management application.It is appreciated that It is that Password Management application refers to the application program of administrator password.In other embodiments, it can log in and lose in destination application After losing preset times, directly instructed by the management of terminal trigger password, and open Password Management application.
Step 508, certification icon is obtained, generates authentication interface.
After opening Password Management application, Password Management application can obtain the certification icon of predetermined number, generate authentication interface. Wherein, in the certification icon of the generation authentication interface of acquisition, comprising certification icon corresponding to login password and except login password pair Other certification icons outside icon should be authenticated.For example, 9 certification icons can be included in authentication interface, wherein 1 is login Certification icon corresponding to password, 8 are other certification icons in addition to login password corresponds to certification icon in addition.
Step 510, the certification icon of user's input is received.
After generating authentication interface, it may be displayed in the display interface of terminal.User can be selected by authentication interface Certification icon, after terminal receives the certification icon of user's input, the certification icon inputted according to user carries out login authentication.
Step 512, judge whether certification number is more than three times, if it is not, then performing step 514;If so, then perform step 516。
In one embodiment, whether the number for judging to be authenticated according to the certification icon that user inputs is more than three times, If it is not, then performing step 514, the certification icon of user's input is authenticated;If so, then need to carry out fingerprint authentication.
Step 514, judge whether certification succeeds, if it is not, then performing step 510;If so, then perform step 518.
Judge that the certification icon of user's input whether there is corresponding login password, if the certification icon of user's input is present Corresponding login password, and the login password is the login password corresponding to the logon account of user's input, then user inputs Certification icon certification success.
Step 516, fingerprint authentication is carried out according to the finger print information of input, if fingerprint authentication success, performs step 518.
If the certification icon authentification failure of user's input, and authentification failure number is more than three times, then needs user's input to refer to Line information is authenticated.The finger print information that user inputs is matched with the finger print information stored in fingerprint database, if depositing In finger print information of the matching degree more than 90%, then fingerprint authentication success.
Step 518, login password is obtained, and login password is copied in destination application.
Login password corresponding to logon account is obtained, and login password is copied in destination application.Terminal can root The logon account inputted according to user and the login password obtained, initiate the logging request of destination application.
Step 520, destination application is logged according to logon account and login password.
It is above-mentioned to apply login method, if user forgets Password, login authentication can be carried out according to certification icon, can be with Login authentication is carried out by finger print information.Substantial amounts of login time is so saved, improves the efficiency of application program login.
Fig. 6 is the displaying figure of application program login interface in one embodiment.As shown in fig. 6, the application program logs in boundary Face includes logon account input area 602, login password input area 604 and Password Management instruction input region 606.Log in Account input area 602 is used for the logon account for inputting destination application, and login password input area 604 is used to input target The login password of application program, Password Management instruction input region 606 are used to input Password Management instruction.
Fig. 7 is the displaying figure of authentication interface in one embodiment.As shown in fig. 7, the authentication interface includes certification icon 702, user can be selected according to authentication interface and input authentication icon, and clicks on " certification " button and the certification icon of input is entered Row certification.
Fig. 8 is the structural representation that entering device is applied in one embodiment.As shown in figure 8, this applies entering device 800 Including command reception module 802, interface generation module 804, icon receiving module 806 and apply login module 808.Wherein:
Command reception module 802, the Password Management instruction for receiving terminal input.
Interface generation module 804, certification icon is obtained for being instructed according to the Password Management, and according to the certification figure Mark generation authentication interface.
Icon receiving module 806, the certification icon obtained for receiving terminal according to the authentication interface.
Using login module 808, if corresponding for the login password of destination application for the certification icon that terminal obtains Certification icon, then log in the destination application.
Fig. 9 is the structural representation that entering device is applied in another embodiment.As shown in figure 9, this applies entering device 900 establish module 902, command reception module 904, interface generation module 906, icon receiving module 908, fingerprint including relation connects Receive module 910 and apply login module 912.Wherein:
Relation establishes module 902, for obtaining login password, according to the file generated certification icon stored in terminal, and Establish the corresponding relation of the login password and certification icon.
Command reception module 904, the Password Management instruction for receiving terminal input.
Interface generation module 906, certification icon is obtained for being instructed according to the Password Management, and according to the certification figure Mark generation authentication interface.
Icon receiving module 908, the certification icon obtained for receiving terminal according to the authentication interface.
Fingerprint receiving module 910, if the number of the certification icon authentification failure for being obtained according to terminal is more than default time The finger print information of number, then receiving terminal input.
Using login module 912, if for the finger print information and preset fingerprint information matches, intended application journey is logged in Sequence.
It is above-mentioned to apply entering device, when user forgets login password, Password Management can be inputted by terminal and instructed, so Terminal can instruct according to Password Management and obtain certification icon afterwards, and generate authentication interface.User only needs defeated according to authentication interface Enter certification icon, if certification icon is certification icon corresponding to login password, it is possible to log in destination application.So use Family can be carried out login authentication by corresponding certification icon, just do not had to again by the password of complexity when forgetting login password Rule is given for change to give login password for change, so saves substantial amounts of login time, improves the efficiency of application program login.
In one embodiment, relation establish module 902 be additionally operable to according to the file type of the file stored in terminal and File name generates certification icon.
In one of the embodiments, icon receiving module 904 is additionally operable to receiving terminal and obtained according to the authentication interface Name authentication icon and cipher authentication icon.
In the embodiment that the application provides, if being additionally operable to the name authentication icon of terminal acquisition using login module 912 For certification icon corresponding to the logon account of destination application, and the cipher authentication icon that terminal obtains is destination application Login password corresponding to certification icon, then log in the destination application.
In one embodiment, if using login module 912 be additionally operable to terminal acquisition certification icon be intended application journey Certification icon corresponding to the login password of sequence, then log in the destination application.
The above-mentioned division using modules in entering device is only used for for example, in other embodiments, can should Different modules is divided into as required with entering device, to complete above-mentioned all or part of function using entering device.
Figure 10 is the structural representation that entering device is applied in another embodiment.As shown in Figure 10, the application, which logs in, fills Put including Password Management application program 1000 and destination application 1100.Wherein, also wrapped in Password Management application program 1000 Include memory module 1002, icon generation module 1004, icon authentication module 1006 and fingerprint authentication module 1008.Memory module The login password of application program and the corresponding relation of certification icon are stored in 1002, the corresponding relation can be carried out by user Set.The finger print information of user is also store in memory module 1002, to the finger print information of user's input during for fingerprint authentication Carry out.Icon generation module 1004 is used for according to the file generated certification icon stored in terminal, and by the certification icon of generation Stored.When needing to be authenticated by certification icon, icon authentication module 1006 can be from icon generation module 1004 The middle certification icon for obtaining predetermined number, authentication interface is generated, and the certification icon inputted according to user is authenticated.Fingerprint inspection Demonstrate,prove the finger print information that module 1008 is used to input according to user and carry out fingerprint authentication.If icon authentication module 1006 or fingerprint authentication Being verified in module 1008, then destination application 1100 is logged according to the logon account of acquisition and login password.
The embodiment of the present application additionally provides a kind of computer-readable recording medium.One or more can perform comprising computer The non-volatile computer readable storage medium storing program for executing of instruction, when the computer executable instructions are executed by one or more processors When so that the computing device following steps:
The Password Management instruction of receiving terminal input;
Instructed according to the Password Management and obtain certification icon, and authentication interface is generated according to the certification icon;
The certification icon that receiving terminal obtains according to the authentication interface;
If the certification icon that terminal obtains is certification icon corresponding to the login password of destination application, described in login Destination application.
In one embodiment, the certification figure that the receiving terminal being executed by processor obtains according to the authentication interface Mark includes:
The name authentication icon and cipher authentication icon that receiving terminal obtains according to the authentication interface;
If the certification icon that the terminal obtains is certification icon corresponding to the login password of destination application, log in The destination application includes:
If the name authentication icon that terminal obtains is certification icon corresponding to the logon account of destination application, and terminal The cipher authentication icon of acquisition is certification icon corresponding to the login password of destination application, then logs in the intended application journey Sequence.
In one of the embodiments, the methods described being executed by processor also includes:
Login password is obtained, according to the file generated certification icon stored in terminal, and establishes the login password with recognizing Demonstrate,prove the corresponding relation of icon.
In the embodiment that the application provides, what is be executed by processor is described according to the file generated certification stored in terminal Icon includes:
According to the file type of the file stored in terminal and file name generation certification icon.
In one embodiment, the methods described being executed by processor also includes:
If the number of the certification icon authentification failure inputted according to terminal is more than preset times, the finger of receiving terminal input Line information;
If the finger print information and preset fingerprint information matches, log in destination application.
The embodiment of the present application additionally provides a kind of computer equipment.As shown in figure 11, for convenience of description, illustrate only with The related part of the embodiment of the present application, particular technique details do not disclose, refer to the embodiment of the present application method part.The calculating Machine equipment can be include mobile phone, tablet personal computer, PDA (Personal Digital Assistant, personal digital assistant), Any terminal devices such as POS (Point of Sales, point-of-sale terminal), vehicle-mounted computer, Wearable, using computer equipment as Exemplified by mobile phone:
Figure 11 is the block diagram of the part-structure of the mobile phone related to the computer equipment of the embodiment of the present application offer.Reference chart 11, mobile phone includes:Radio frequency (Radio Frequency, RF) circuit 1110, memory 1120, input block 1130, display unit 1140th, sensor 1150, voicefrequency circuit 1160, Wireless Fidelity (wireless fidelity, WiFi) module 1170, processor The part such as 1180 and power supply 1190.It will be understood by those skilled in the art that the handset structure shown in Figure 11 does not form opponent The restriction of machine, can be included than illustrating more or less parts, either combine some parts or different parts arrangement.
Wherein, RF circuits 1110 can be used for receive and send messages or communication process in, the reception and transmission of signal can be by base stations After downlink information receives, handled to processor 1180;Up data can also be sent to base station.Generally, RF circuits include But be not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier (Low Noise Amplifier, LNA), duplexer etc..In addition, RF circuits 1110 can also be communicated by radio communication with network and other equipment.It is above-mentioned wireless Communication can use any communication standard or agreement, including but not limited to global system for mobile communications (Global System of Mobile communication, GSM), general packet radio service (General Packet Radio Service, GPRS), CDMA (Code Division Multiple Access, CDMA), WCDMA (Wideband Code Division Multiple Access, WCDMA), Long Term Evolution (Long Term Evolution, LTE)), Email, Short Message Service (Short Messaging Service, SMS) etc..
Memory 1120 can be used for storage software program and module, and processor 1180 is stored in memory by operation 1120 software program and module, so as to perform the various function application of mobile phone and data processing.Memory 1120 can be led To include program storage area and data storage area, wherein, program storage area can storage program area, needed at least one function Application program (such as the application program of sound-playing function, application program of image player function etc.) etc.;Data storage area can Storage uses created data (such as voice data, address list etc.) etc. according to mobile phone.In addition, memory 1120 can wrap High-speed random access memory is included, nonvolatile memory, for example, at least disk memory, a flash memories can also be included Part or other volatile solid-state parts.
Input block 1130 can be used for the numeral or character information for receiving input, and produces and set with the user of mobile phone 1100 Put and the input of key signals that function control is relevant.Specifically, input block 1130 may include contact panel 1131 and other Input equipment 1132.Contact panel 1131, alternatively referred to as touch-screen, collect touch operation (ratio of the user on or near it Such as user is using finger, any suitable object of stylus or annex on contact panel 1131 or near contact panel 1131 Operation), and corresponding attachment means are driven according to formula set in advance.In one embodiment, contact panel 1131 can Including both touch detecting apparatus and touch controller.Wherein, the touch orientation of touch detecting apparatus detection user, and examine The signal that touch operation is brought is surveyed, transmits a signal to touch controller;Touch controller receives from touch detecting apparatus to be touched Information is touched, and is converted into contact coordinate, then gives processor 1180, and the order sent of reception processing device 1180 and can be added To perform.Furthermore, it is possible to contact panel is realized using polytypes such as resistance-type, condenser type, infrared ray and surface acoustic waves 1131.Except contact panel 1131, input block 1130 can also include other input equipments 1132.Specifically, other are inputted Equipment 1132 can include but is not limited in physical keyboard, function key (such as volume control button, switch key etc.) etc. one Kind is a variety of.
Display unit 1140 can be used for display by user input information or be supplied to user information and mobile phone it is each Kind menu.Display unit 1140 may include display panel 1141.In one embodiment, liquid crystal display can be used (Liquid Crystal Display, LCD), Organic Light Emitting Diode (Organic Light-Emitting Diode, ) etc. OLED form configures display panel 1141.In one embodiment, contact panel 1131 can cover display panel 1141, After contact panel 1131 detects the touch operation on or near it, processor 1180 is sent to determine touch event Type, it is followed by subsequent processing device 1180 and corresponding visual output is provided on display panel 1141 according to the type of touch event.Although In fig. 11, contact panel 1131 and display panel 1141 are the parts independent as two to realize the input of mobile phone and input Function, but in some embodiments it is possible to contact panel 1131 and display panel 1141 are integrated and realize the input of mobile phone And output function.
Mobile phone 1100 may also include at least one sensor 1150, such as optical sensor, motion sensor and other biographies Sensor.Specifically, optical sensor may include ambient light sensor and proximity transducer, wherein, ambient light sensor can be according to ring The light and shade of environmental light adjusts the brightness of display panel 1141, and proximity transducer can close display when mobile phone is moved in one's ear Panel 1141 and/or backlight.Motion sensor may include acceleration transducer, and all directions are can detect by acceleration transducer The size of upper acceleration, size and the direction of gravity are can detect that when static, the application available for identification mobile phone posture is (such as horizontal Portrait layout switches), Vibration identification correlation function (such as pedometer, tap) etc.;In addition, mobile phone can also configure gyroscope, barometer, Other sensors such as hygrometer, thermometer, infrared ray sensor etc..
Voicefrequency circuit 1160, loudspeaker 1161 and microphone 1162 can provide the COBBAIF between user and mobile phone.Sound Frequency circuit 1160 voice data received can be changed after electric signal, loudspeaker 1161 is transferred to, by 1161 turns of loudspeaker It is changed to voice signal output;On the other hand, the voice signal of collection is converted to electric signal by microphone 1162, by voicefrequency circuit 1160 receive after be converted to voice data, then after voice data output processor 1180 is handled, can be sent out through RF circuits 1110 Another mobile phone is given, or voice data is exported to memory 1120 so as to subsequent treatment.
WiFi belongs to short range wireless transmission technology, and mobile phone can help user's transceiver electronicses postal by WiFi module 1170 Part, browse webpage and access streaming video etc., it has provided the user wireless broadband internet and accessed.Although Figure 11 is shown WiFi module 1170, but it is understood that, it is simultaneously not belonging to must be configured into for mobile phone 1100, can save as needed Slightly.
Processor 1180 is the control centre of mobile phone, using various interfaces and the various pieces of connection whole mobile phone, By running or performing the software program and/or module that are stored in memory 1120, and call and be stored in memory 1120 Interior data, the various functions and processing data of mobile phone are performed, so as to carry out integral monitoring to mobile phone.In one embodiment, Processor 1180 may include one or more processing units.In one embodiment, processor 1180 can integrate application processor And modem processor, wherein, application processor mainly handles operating system, user interface and application program etc.;Modulatedemodulate Processor is adjusted mainly to handle radio communication.It is understood that above-mentioned modem processor can not also be integrated into processor In 1180.
Mobile phone 1100 also includes the power supply 1190 (such as battery) to all parts power supply, it is preferred that power supply can pass through Power-supply management system and processor 1180 are logically contiguous, so as to realize management charging, electric discharge, Yi Jigong by power-supply management system The functions such as consumption management.
In one embodiment, mobile phone 1100 can also include camera, bluetooth module etc..
In the embodiment of the present application, the processor 1180 included by the mobile terminal performs the calculating of storage on a memory Following steps are realized during machine program:
The embodiment of the present application additionally provides a kind of computer-readable recording medium.One or more can perform comprising computer The non-volatile computer readable storage medium storing program for executing of instruction, when the computer executable instructions are executed by one or more processors When so that the computing device following steps:
The Password Management instruction of receiving terminal input;
Instructed according to the Password Management and obtain certification icon, and authentication interface is generated according to the certification icon;
The certification icon that receiving terminal obtains according to the authentication interface;
If the certification icon that terminal obtains is certification icon corresponding to the login password of destination application, described in login Destination application.
In one embodiment, the certification figure that the receiving terminal being executed by processor obtains according to the authentication interface Mark includes:
The name authentication icon and cipher authentication icon that receiving terminal obtains according to the authentication interface;
If the certification icon that the terminal obtains is certification icon corresponding to the login password of destination application, log in The destination application includes:
If the name authentication icon that terminal obtains is certification icon corresponding to the logon account of destination application, and terminal The cipher authentication icon of acquisition is certification icon corresponding to the login password of destination application, then logs in the intended application journey Sequence.
In one of the embodiments, the methods described being executed by processor also includes:
Login password is obtained, according to the file generated certification icon stored in terminal, and establishes the login password with recognizing Demonstrate,prove the corresponding relation of icon.
In the embodiment that the application provides, what is be executed by processor is described according to the file generated certification stored in terminal Icon includes:
According to the file type of the file stored in terminal and file name generation certification icon.
In one embodiment, the methods described being executed by processor also includes:
If the number of the certification icon authentification failure inputted according to terminal is more than preset times, the finger of receiving terminal input Line information;
If the finger print information and preset fingerprint information matches, log in destination application.
One of ordinary skill in the art will appreciate that realize all or part of flow in above-described embodiment method, being can be with The hardware of correlation is instructed to complete by computer program, described program can be stored in a non-volatile computer and can be read In storage medium, the program is upon execution, it may include such as the flow of the embodiment of above-mentioned each method.Wherein, described storage is situated between Matter can be magnetic disc, CD, read-only memory (Read-Only Memory, ROM) etc..
Any reference to memory, storage, database or other media may include non-volatile as used herein And/or volatile memory.Suitable nonvolatile memory may include read-only storage (ROM), programming ROM (PROM), Electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include arbitrary access Memory (RAM), it is used as external cache.By way of illustration and not limitation, RAM is available in many forms, such as It is static RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDR SDRAM), enhanced SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM).
Embodiment described above only expresses the several embodiments of the application, and its description is more specific and detailed, but simultaneously Therefore the limitation to the application the scope of the claims can not be interpreted as.It should be pointed out that for one of ordinary skill in the art For, on the premise of the application design is not departed from, various modifications and improvements can be made, these belong to the guarantor of the application Protect scope.Therefore, the protection domain of the application patent should be determined by the appended claims.

Claims (10)

1. one kind applies login method, it is characterised in that methods described includes:
The Password Management instruction of receiving terminal input;
Instructed according to the Password Management and obtain certification icon, and authentication interface is generated according to the certification icon;
The certification icon that receiving terminal obtains according to the authentication interface;
If the certification icon that terminal obtains is certification icon corresponding to the login password of destination application, the target is logged in Application program.
2. according to claim 1 apply login method, it is characterised in that the receiving terminal is according to the authentication interface The certification icon of acquisition includes:
The name authentication icon and cipher authentication icon that receiving terminal obtains according to the authentication interface;
If the certification icon that the terminal obtains is certification icon corresponding to the login password of destination application, described in login Destination application includes:
If the name authentication icon that terminal obtains is certification icon corresponding to the logon account of destination application, and terminal obtains Cipher authentication icon for destination application login password corresponding to certification icon, then log in the destination application.
3. according to claim 1 apply login method, it is characterised in that methods described also includes:
Login password is obtained, according to the file generated certification icon stored in terminal, and establishes the login password and certification figure Target corresponding relation.
4. according to claim 3 apply login method, it is characterised in that described according to the file generated stored in terminal Certification icon includes:
According to the file type of the file stored in terminal and file name generation certification icon.
5. according to claim 1 apply login method, it is characterised in that methods described also includes:
If the number of the certification icon authentification failure inputted according to terminal is more than preset times, the fingerprint letter of receiving terminal input Breath;
If the finger print information and preset fingerprint information matches, log in the destination application.
6. one kind applies entering device, it is characterised in that described device includes:
Command reception module, the Password Management instruction for receiving terminal input;
Interface generation module, certification icon is obtained for being instructed according to the Password Management, and generated according to the certification icon Authentication interface;
Icon receiving module, the certification icon obtained for receiving terminal according to the authentication interface;
Using login module, if being certification figure corresponding to the login password of destination application for the certification icon that terminal obtains Mark, then log in the destination application.
7. according to claim 1 apply entering device, it is characterised in that described device also includes:
Relation establishes module, for obtaining login password, according to the file generated certification icon stored in terminal, and described in foundation The corresponding relation of login password and certification icon.
8. according to claim 1 apply entering device, it is characterised in that described device also includes:
Fingerprint receiving module, if the number of the certification icon authentification failure for being obtained according to terminal is more than preset times, connect Receive the finger print information of terminal input;
If the application login module is additionally operable to the finger print information and preset fingerprint information matches, the intended application is logged in Program.
9. a kind of computer equipment, including memory and processor, computer-readable instruction is stored in the memory, it is described When instruction is by the computing device so that the step of method of the computing device as any one of claim 1 to 5 Suddenly.
10. a kind of computer-readable recording medium, is stored thereon with computer program, it is characterised in that the computer program When being executed by processor the step of method as any one of claim 1 to 5.
CN201710726372.6A 2017-08-22 2017-08-22 Application login method and device, computer equipment and computer readable storage medium Active CN107577933B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710726372.6A CN107577933B (en) 2017-08-22 2017-08-22 Application login method and device, computer equipment and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710726372.6A CN107577933B (en) 2017-08-22 2017-08-22 Application login method and device, computer equipment and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN107577933A true CN107577933A (en) 2018-01-12
CN107577933B CN107577933B (en) 2020-01-10

Family

ID=61035088

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710726372.6A Active CN107577933B (en) 2017-08-22 2017-08-22 Application login method and device, computer equipment and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN107577933B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109614212A (en) * 2018-12-05 2019-04-12 北京达佳互联信息技术有限公司 Using starting method, apparatus, terminal and storage medium
CN110765431A (en) * 2018-07-27 2020-02-07 中标软件有限公司 Multi-user fingerprint or password login method and management system thereof
CN112910850A (en) * 2021-01-16 2021-06-04 浙江吉利控股集团有限公司 Safety verification method and system for controlling vehicle

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1980126A (en) * 2005-12-08 2007-06-13 上海盛大网络发展有限公司 Method for realizing picture identifying code
CN101316166A (en) * 2008-07-07 2008-12-03 张寄望 Dynamic password identity authentication method based on accidental character set
CN101499907A (en) * 2009-02-19 2009-08-05 西安电子科技大学 Shoulder surfing preventing identity authentication system and method based on dynamic image password
CN103077342A (en) * 2011-10-25 2013-05-01 成都谛听科技有限公司 Method for inputting graphic random passwords
CN103391203A (en) * 2012-05-09 2013-11-13 百度在线网络技术(北京)有限公司 Unlocking method, system and device of mobile terminal
CN104468616A (en) * 2014-12-24 2015-03-25 广州华多网络科技有限公司 Picture verification code generation method and client side
CN105450604A (en) * 2014-08-25 2016-03-30 苏宁云商集团股份有限公司 Safe verifying method and device based on graphic feature
CN106709320A (en) * 2016-11-29 2017-05-24 维沃移动通信有限公司 Identity authentication method and mobile terminal
CN106997432A (en) * 2017-05-17 2017-08-01 苏州锦佰安信息技术有限公司 Picture password authentication method and picture password authentication device
US20170345239A9 (en) * 2014-12-23 2017-11-30 Gate Labs Inc. Access management system

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1980126A (en) * 2005-12-08 2007-06-13 上海盛大网络发展有限公司 Method for realizing picture identifying code
CN101316166A (en) * 2008-07-07 2008-12-03 张寄望 Dynamic password identity authentication method based on accidental character set
CN101499907A (en) * 2009-02-19 2009-08-05 西安电子科技大学 Shoulder surfing preventing identity authentication system and method based on dynamic image password
CN103077342A (en) * 2011-10-25 2013-05-01 成都谛听科技有限公司 Method for inputting graphic random passwords
CN103391203A (en) * 2012-05-09 2013-11-13 百度在线网络技术(北京)有限公司 Unlocking method, system and device of mobile terminal
CN105450604A (en) * 2014-08-25 2016-03-30 苏宁云商集团股份有限公司 Safe verifying method and device based on graphic feature
US20170345239A9 (en) * 2014-12-23 2017-11-30 Gate Labs Inc. Access management system
CN104468616A (en) * 2014-12-24 2015-03-25 广州华多网络科技有限公司 Picture verification code generation method and client side
CN106709320A (en) * 2016-11-29 2017-05-24 维沃移动通信有限公司 Identity authentication method and mobile terminal
CN106997432A (en) * 2017-05-17 2017-08-01 苏州锦佰安信息技术有限公司 Picture password authentication method and picture password authentication device

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110765431A (en) * 2018-07-27 2020-02-07 中标软件有限公司 Multi-user fingerprint or password login method and management system thereof
CN110765431B (en) * 2018-07-27 2023-05-30 中标软件有限公司 Multi-user fingerprint or password login method and management system thereof
CN109614212A (en) * 2018-12-05 2019-04-12 北京达佳互联信息技术有限公司 Using starting method, apparatus, terminal and storage medium
CN112910850A (en) * 2021-01-16 2021-06-04 浙江吉利控股集团有限公司 Safety verification method and system for controlling vehicle

Also Published As

Publication number Publication date
CN107577933B (en) 2020-01-10

Similar Documents

Publication Publication Date Title
JP6997343B2 (en) How to quickly open an application or application function, and a terminal
US9703971B2 (en) Sensitive operation verification method, terminal device, server, and verification system
CN104468464B (en) verification method, device and system
CN106778175B (en) Interface locking method and device and terminal equipment
CN104850406B (en) A kind of method and apparatus for switching the page
CN106331370B (en) A kind of data transmission method and terminal device
CN104217172B (en) Privacy content inspection method and device
EP3640787B1 (en) Input method and electronic device
CN103501485B (en) Push the method, apparatus and terminal device of application
CN108573168A (en) Private space starts method and apparatus, storage medium, electronic equipment
CN107786569A (en) A kind of identifying code sending method, method of reseptance and relevant device
CN108834132A (en) A kind of data transmission method and equipment and related media production
CN108573169A (en) Nearest task list display methods and device, storage medium, electronic equipment
US20140359790A1 (en) Method and apparatus for visiting privacy content
CN106973168A (en) Speech playing method, device and computer equipment
CN107577933A (en) Using login method and device, computer equipment, computer-readable recording medium
CN104573437A (en) Information authentication method, device and terminal
CN107678671A (en) One kind applies startup method, terminal and computer-readable recording medium
JP6974620B2 (en) Notification message processing method and terminal
CN107102913B (en) Data back up method, device and computer equipment
CN106203015A (en) The collocation method of application program, device and terminal unit
CN107909682A (en) A kind of access control method, device and antitheft door
CN106970761A (en) Control method and device for the electronic installation with full frame fingerprint recognition
CN109309659B (en) Mobile terminal and method and device for logging in application of mobile terminal
CN106055615A (en) Method, device and system for obtaining music information

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant after: OPPO Guangdong Mobile Communications Co., Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant before: Guangdong Opel Mobile Communications Co., Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant