CN107577933A - Using login method and device, computer equipment, computer-readable recording medium - Google Patents
Using login method and device, computer equipment, computer-readable recording medium Download PDFInfo
- Publication number
- CN107577933A CN107577933A CN201710726372.6A CN201710726372A CN107577933A CN 107577933 A CN107577933 A CN 107577933A CN 201710726372 A CN201710726372 A CN 201710726372A CN 107577933 A CN107577933 A CN 107577933A
- Authority
- CN
- China
- Prior art keywords
- icon
- certification
- login
- password
- terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Landscapes
- User Interface Of Digital Computer (AREA)
Abstract
The application is related to one kind and applies login method and device, computer equipment, computer-readable recording medium.Methods described includes:The Password Management instruction of receiving terminal input;Instructed according to the Password Management and obtain certification icon, and authentication interface is generated according to the certification icon;The certification icon that receiving terminal obtains according to the authentication interface;If the certification icon that terminal obtains is certification icon corresponding to the login password of destination application, the destination application is logged in.Above-mentioned application login method and device, computer equipment, computer-readable recording medium, substantial amounts of login time can be saved, improve the efficiency that application program logs in.
Description
Technical field
The application is related to field of computer technology, more particularly to one kind using login method and device, computer equipment,
Computer-readable recording medium.
Background technology
Intelligent terminal is realized when service is provided the user by application program.User can be in intelligence
Application program is opened in terminal, then by reaching certain application purpose to the operation in application program.For example, pass through application
Program realizes shopping, listens music, sees a film, playing games.When using application program, often managed by account
The operation of different user, first log into the account of application program, then again by the account come preserve the operation note of user and
As a result.
As long as user logs in the more new state that account can checks historical operation record and operation.However, user exists
, it is necessary to input account name and corresponding password during the account of login application program, if application program is too many, user just needs to remember
Recall many account passwords.If usual user forgets Password, it is necessary to is gone for by the rule of giving for change of application setting
Return password, so that user takes a substantial amount of time in login process.
The content of the invention
The embodiment of the present application provides one kind and applies login method and device, computer equipment, computer-readable recording medium,
Usersmanaging passwords can be facilitated, improve the login efficiency of application program.
One kind applies login method, and methods described includes:
The Password Management instruction of receiving terminal input;
Instructed according to the Password Management and obtain certification icon, and authentication interface is generated according to the certification icon;
The certification icon that receiving terminal obtains according to the authentication interface;
If the certification icon that terminal obtains is certification icon corresponding to the login password of destination application, described in login
Destination application.
One kind applies entering device, and described device includes:
Command reception module, the Password Management instruction for receiving terminal input;
Interface generation module, certification icon is obtained for being instructed according to the Password Management, and according to the certification icon
Generate authentication interface;
Icon receiving module, the certification icon obtained for receiving terminal according to the authentication interface;
Using login module, if being to recognize corresponding to the login password of destination application for the certification icon that terminal obtains
Icon is demonstrate,proved, then logs in the destination application.
A kind of computer equipment, including memory and processor, computer-readable instruction are stored in the memory, institute
When stating instruction by the computing device so that the computing device following steps:
The Password Management instruction of receiving terminal input;
Instructed according to the Password Management and obtain certification icon, and authentication interface is generated according to the certification icon;
The certification icon that receiving terminal obtains according to the authentication interface;
If the certification icon that terminal obtains is certification icon corresponding to the login password of destination application, described in login
Destination application.
A kind of computer-readable recording medium, is stored thereon with computer program, it is characterised in that the computer program
Following steps when being executed by processor:
The Password Management instruction of receiving terminal input;
Instructed according to the Password Management and obtain certification icon, and authentication interface is generated according to the certification icon;
The certification icon that receiving terminal obtains according to the authentication interface;
If the certification icon that terminal obtains is certification icon corresponding to the login password of destination application, described in login
Destination application.
What the embodiment of the present application provided applies login method and device, computer equipment, computer-readable recording medium, when
When user forgets login password, Password Management can be inputted by terminal and instructed, then terminal can be instructed according to Password Management and obtained
Certification icon is taken, and generates authentication interface.User is only needed according to authentication interface input authentication icon, if certification icon is to step on
Record certification icon corresponding to password, it is possible to log in destination application.So user can pass through when forgetting login password
Corresponding certification icon carries out login authentication, does not just have to give rule for change to give login password for change, so by the password of complexity again
Substantial amounts of login time is saved, improves the efficiency of application program login.
Brief description of the drawings
, below will be to embodiment or existing in order to illustrate more clearly of the embodiment of the present application or technical scheme of the prior art
There is the required accompanying drawing used in technology description to be briefly described, it should be apparent that, drawings in the following description are only this
Some embodiments of application, for those of ordinary skill in the art, on the premise of not paying creative work, can be with
Other accompanying drawings are obtained according to these accompanying drawings.
Fig. 1 is the application environment schematic diagram that login method is applied in one embodiment;
Fig. 2 is the internal structure schematic diagram of electronic equipment in one embodiment;
Fig. 3 is the structural representation that login method is applied in one embodiment;
Fig. 4 is the structural representation that login method is applied in another embodiment;
Fig. 5 is the structural representation that login method is applied in another embodiment;
Fig. 6 is the displaying figure of application program login interface in one embodiment;
Fig. 7 is the displaying figure of authentication interface in one embodiment;
Fig. 8 is the structural representation that entering device is applied in one embodiment;
Fig. 9 is the structural representation that entering device is applied in another embodiment;
Figure 10 is the structural representation that entering device is applied in another embodiment;
Figure 11 is the block diagram of the part-structure of the mobile phone related to the computer equipment of the embodiment of the present application offer.
Embodiment
In order that the object, technical solution and advantage of the application are more clearly understood, it is right below in conjunction with drawings and Examples
The application is further elaborated.It should be appreciated that specific embodiment described herein is only to explain the application, and
It is not used in restriction the application.
It is appreciated that term " first " used in this application, " second " etc. can be used to describe various elements herein,
But these elements should not be limited by these terms.These terms are only used for distinguishing first element and another element.Citing comes
Say, in the case where not departing from scope of the present application, the first client can be referred to as the second client, and similarly, can incite somebody to action
Second client is referred to as the first client.First client and the second client both clients, but it is not same visitor
Family end.
Fig. 1 is the application environment schematic diagram that login method is applied in one embodiment.As shown in figure 1, the application environment is used
Login method, including user terminal 102 and server 104 are applied in realization one kind.Wherein, user terminal 102 can be used for connecing
The Password Management instruction of user's input is received, is instructed according to Password Management and obtains certification icon, and certification is generated according to certification icon
Interface, the certification icon that user inputs according to authentication interface is then received, and will be logged in corresponding to the certification icon of user's input
Password and logon account are sent to server 104.Server 104 receives login password and the login of the transmission of user terminal 102
After account, verified according to the login password and logon account, destination application is logged in if being verified, and will step on
Successful message is recorded to send to user terminal 102.It is understood that user terminal 102 is to be in computer network outermost,
It is mainly used in inputting user profile and exports the electronic equipment of result, such as can is PC, mobile terminal, individual
Personal digital assistant, wearable electronic etc..Server 104 is to be used to respond service request, while provides setting for the service of calculating
It is standby, such as can be one or multiple stage computers.
Fig. 2 is the internal structure schematic diagram of electronic equipment in one embodiment.As shown in Fig. 2 the electronic equipment includes leading to
Cross processor, non-volatile memory medium, built-in storage and network interface display screen and the input unit of system bus connection.Its
In, the non-volatile memory medium of electronic equipment is stored with operating system and computer-readable instruction.The computer-readable instruction
When being executed by processor a kind of login method is applied to realize.The processor is used to provide calculating and control ability, and support is whole
The operation of electronic equipment.Built-in storage in electronic equipment is the operation of the computer-readable instruction in non-volatile memory medium
Environment is provided.Network interface is used to carry out network service with server, such as sends logging request to server, the reception server and returns
Login result returned etc..The display screen of electronic equipment can be LCDs or electric ink display screen etc., input unit
Can be button, trace ball or the Trackpad set on the touch layer or electronic equipment casing covered on display screen,
Can be external keyboard, Trackpad or mouse etc..Wherein, display screen is displayed for authentication interface, and input unit can be with
For user according to authentication interface input authentication icon.The electronic equipment can be that mobile phone, tablet personal computer or individual digital help
Reason or Wearable etc..It will be understood by those skilled in the art that the structure shown in Fig. 2, only with application scheme phase
The block diagram of the part-structure of pass, the restriction for the electronic equipment being applied thereon to application scheme is not formed, specific electricity
Sub- equipment can include, than more or less parts shown in figure, either combining some parts or having different parts
Arrangement.
Fig. 3 is the structural representation that login method is applied in one embodiment.As shown in figure 3, this applies login method bag
Step 302 is included to step 308.Wherein:
Step 302, the Password Management instruction of receiving terminal input.
In the embodiment that the application provides, Password Management instruction refers to realize by certification icon steps on to application program
Record the instruction of the management of password.It is understood that Password Management instruction can be touch control operation, the pressing behaviour of physical button
Work, voice-controlled operations rock the trigger actions such as operation to mobile terminal.Touch control operation, which has, to be touched clicking operation, touches length
By operation, slide, multi-point touch operation etc. are touched, wherein, it is that the touch more than preset duration presses to touch long-press operation
Operation.
Specifically, Password Management instruction can be after certain event occurs terminal trigger automatically or user
Inputted by terminal.For example, when the login interface of application program is logged in, if the code error of user's input
Number exceedes three times, then trigger password management instructs.
Step 304, instructed according to Password Management and obtain certification icon, and authentication interface is generated according to certification icon.
In one embodiment, icon when certification icon refers to login application program for certification user identity.Certification
Interface refers to the interface of user's input authentication icon during login application program.Usually, can recognize in authentication interface comprising multiple
Icon is demonstrate,proved, user can select one or more certification icon according to authentication interface, if selected certification icon is default
Certification icon, then the user certification success, log in destination application;If the certification icon mistake of user's input, recognizes
Card failure, can not log in destination application.
Certification icon can be only corresponding with login password.That is, different application programs, as long as login password
Identical, corresponding certification icon can is identical.Instructed according to Password Management and obtain certification icon, wherein Password Management refers to
It can be, but not limited to include logon account mark in order.Specifically, the logon account mark in being instructed according to Password Management obtains
Corresponding login password, then certification icon corresponding to login password is obtained from icon library, and except recognizing corresponding to login password
Other certification icons outside icon are demonstrate,proved, authentication interface is then generated according to the certification icon of acquisition.If in login application program
When, the certification icon of user's selection is certification icon corresponding to login password, then certification success;Otherwise authentification failure.
Further, certification icon can also be corresponding with the login password of application program.That is, different should
With program, even if login password is identical, corresponding certification icon is also different.So, can includes answering in Password Management instruction
Identified with program identification and logon account.Specifically, the destination application in being instructed according to Password Management is identified and stepped on
Record account identification obtain corresponding to login password, then certification icon corresponding to login password is obtained from icon library, and except stepping on
Other certification icons outside certification icon corresponding to password are recorded, authentication interface is then generated according to the certification icon of acquisition.
Step 306, the certification icon that receiving terminal obtains according to authentication interface.
In the embodiment that the application provides, authentication interface contains multiple certification icons, and user can be according to certification circle
Face selects input authentication icon.Usually, user can select one or more certification icons to be authenticated according to authentication interface,
It can also be authenticated by the connection gesture of input authentication icon.Wherein, the connection gesture of certification icon refers to select multiple
Certification icon, and be attached this multiple certification icon by gesture.
Step 308, if the certification icon that terminal obtains is certification icon corresponding to the login password of destination application,
Log in destination application.
Login password has corresponding relation with certification icon, obtains the certification icon of user's input first, if user inputs
Certification icon for destination application login password corresponding to certification icon, then certification is by logging in the intended application journey
Sequence.Destination application is the application program that user needs to log in.
In the certification of certification icon by the way that afterwards, terminal can obtain login password and logon account corresponding to certification icon,
And the login password of acquisition and logon account are sent to server, server and mesh can be logged according to login password and logon account
Application program is marked, and login result is back to terminal.
It is above-mentioned to apply login method, when user forgets login password, Password Management can be inputted by terminal and instructed, so
Terminal can instruct according to Password Management and obtain certification icon afterwards, and generate authentication interface.User only needs defeated according to authentication interface
Enter certification icon, if certification icon is certification icon corresponding to login password, it is possible to log in destination application.So use
Family can be carried out login authentication by corresponding certification icon, just do not had to again by the password of complexity when forgetting login password
Rule is given for change to give login password for change, so saves substantial amounts of login time, improves the efficiency of application program login.
Fig. 4 is the structural representation that login method is applied in another embodiment.As shown in figure 4, this applies login method
Including step 402 to step 412.Wherein:
Step 402, login password is obtained, certification is generated according to the file type of the file stored in terminal and file name
Icon, and establish the corresponding relation of login password and certification icon.
In one embodiment, login password refers to the password of the application program in registration terminal.Usually, can in terminal
With comprising multiple application programs, and an application program can include multiple logon accounts, and application program passes through logon account
Identify different users.Logon account and login password be it is one-to-one, can by logon account and corresponding login password
With login application program.It is understood that the login password of different logon accounts is can be with identical.
By the one-to-one relationship of database purchase application program identification, logon account and login password, when user is defeated
When entering logon account and login password login application program, logon account and login are close according to corresponding to searching application program identification
Code, if all the match is successful for the logon account and login password of user's input, and the logon account and login password are corresponding relation,
Then login application program success.Wherein, the one-to-one relationship of application program identification, logon account and login password can store
In terminal local, can also store on the server.
The file stored in terminal refers to terminal caused file during operation application program and system task.Example
Such as, the file stored in terminal can be that caused audio file or refer to is broadcast in video during music is played
Caused video file etc. during putting.According to the file generated certification icon of terminal storage, different files can generate not
Same certification icon.
In one of the embodiments, can be, but not limited to be file according to being stored in terminal file type and file
Title generates certification icon.Formed for example, certification icon can be background colour and word, different file types correspond to different
The background colour of certification icon, then file name be shown on background colour, so as to form different certification icons.In other realities
To apply in example, certification icon can also be what is generated according to login password, or generated according to file store path and filename.
For example, rear six generations according to login password.
The corresponding relation of login password and certification icon is established, can be that system is established automatically or user is defeated
Enter.In the present embodiment, different application, different logon accounts, as long as login password is identical, corresponding certification icon is just
It is identical.
In one embodiment, the corresponding relation of login password and certification icon can be established.Login account can also be established
Family and the corresponding relation of certification icon, that is to say, that when being authenticated by certification icon, not only need certification to log in
Certification icon corresponding to password, also certification icon corresponding to logon account is authenticated.Only logon account and login is close
The certification of certification icon corresponding to code is all by ability login application program.
Step 404, the Password Management instruction of receiving terminal input.
Step 406, instructed according to Password Management and obtain certification icon, and authentication interface is generated according to certification icon.
In one embodiment, certification icon can include name authentication icon and cipher authentication icon, and according to title
Certification icon and/or cipher authentication icon generation authentication interface.Instructed according to Password Management and obtain certification icon, further according to acquisition
Certification icon generation authentication interface.
Specifically, can be according to the content generation Password Management instruction in the login interface of destination application.If log in
Content in interface includes logon account, and logon account logon account corresponding with destination application matches, then only
Need to be authenticated login password corresponding to the logon account.Login password it need to only be generated according to corresponding to the logon account
Password Management instructs, and then the cipher authentication icon according to corresponding to obtaining Password Management instruction, generates authentication interface.
Step 408, the certification icon that receiving terminal obtains according to authentication interface.
In one embodiment, step 408 can specifically include:The name authentication figure that receiving terminal obtains according to authentication interface
Mark and/or cipher authentication icon.Wherein, name authentication icon refers to the icon being authenticated to the logon account of application program,
Cipher authentication icon refers to the icon being authenticated to the login password of application program.User can select respectively according to authentication interface
Certification icon corresponding to logon account and/or login password is taken, and the certification icon of acquisition is authenticated.
Step 410, if the certification icon that terminal obtains is certification icon corresponding to the login password of destination application,
Log in destination application.
Terminal is authenticated after certification icon is got according to the corresponding relation established in step 402.Login password
There is corresponding relation with certification icon, after getting certification icon, login password corresponding to lookup, and by logon account and step on
Record password, which is sent to server, to be verified, the result then returned according to server is logged in.
It is understood that store in the database of server in destination application the logon account of all users and
Corresponding login password, after the logon account and login password of terminal transmission is received, server can be looked into database
Whether look for has the logon account and login password to match.If the logon account and login password in database be present, and this is stepped on
It is corresponding relation to record account and login password, then terminal Successful login destination application, and the result logined successfully is returned
To terminal;Otherwise terminal logs in destination application failure, and the result of login failure is returned into terminal.
In one embodiment, step 410 can specifically include:If the name authentication icon that terminal obtains is intended application
Certification icon corresponding to the logon account of program, and the cipher authentication icon of terminal acquisition is the login password of destination application
Corresponding certification icon, then log in destination application.
Step 412, if the number of the certification icon authentification failure obtained according to terminal is more than preset times, receiving terminal
The finger print information of input;If finger print information and preset fingerprint information matches, log in destination application.
In one embodiment, if the number that the certification icon obtained according to terminal is authenticated failure is more than default time
Number, then need further to carry out fingerprint authentication.Finger print information refers to the view data formed according to the fingerprint of user.Terminal can be with
The finger print information of user's input is obtained, and the finger print information of acquisition is matched with preset fingerprint information, if the match is successful,
Log in destination application.
Wherein, preset fingerprint information refers to the fingerprint image data gathered in advance, the fingerprint image that will can be gathered in advance
Data storage is in fingerprint database.When fingerprint authentication is carried out, the finger print information that terminal is obtained is with fingerprint database
In finger print information matched, if matching degree looked into preset value, then it is assumed that the match is successful.For example, in fingerprint database, exist
Finger print information of the matching degree more than 90% of the finger print information obtained with terminal, then it is assumed that be proved to be successful.
It is above-mentioned to apply login method, the relation of login password and certification icon is initially set up, when user forgets login password
When, Password Management can be inputted by terminal and instructed, then terminal can instruct according to Password Management and obtain certification icon, and generate
Authentication interface.User can input name authentication icon and cipher authentication icon by authentication interface, if name authentication icon
Pass through with cipher authentication icon certification, it is possible to log in destination application.So user is forgetting logon account and logged in close
During code, login authentication can be carried out by corresponding certification icon, does not just have to give rule for change by the password of complexity to give for change again
Login password, substantial amounts of login time is so saved, improve the efficiency of application program login.
Fig. 5 is the structural representation that login method is applied in another embodiment.As shown in figure 5, this applies login method
Including step 502 to step 512.Wherein:
Step 502, typing finger print information, login password and corresponding certification icon.
In the embodiment that the application provides, first according to the file generated certification icon stored in terminal.Then select
Login password and certification icon, and establish the corresponding relation of login password and certification icon.Finger print information is recently entered, for leading to
Cross fingerprint authentication and log in destination application.It is understood that terminal is according to several certification icons of the file generated of storage,
User can select one therein or multiple establish corresponding relation with login password.
Step 504, logon account and login password, destination application login failure are inputted.
In one embodiment, user can open destination application by terminal desktop, into destination application
Login interface, and logon account and login password are inputted in login interface, request logs in destination application.If target should
With program login failure, then Password Management instruction can be clicked on, login authentication is carried out by certification icon.
Step 506, Password Management instruction is clicked on, opens Password Management application.
If user forgets login password, Password Management instruction can be clicked on, opens Password Management application.It is appreciated that
It is that Password Management application refers to the application program of administrator password.In other embodiments, it can log in and lose in destination application
After losing preset times, directly instructed by the management of terminal trigger password, and open Password Management application.
Step 508, certification icon is obtained, generates authentication interface.
After opening Password Management application, Password Management application can obtain the certification icon of predetermined number, generate authentication interface.
Wherein, in the certification icon of the generation authentication interface of acquisition, comprising certification icon corresponding to login password and except login password pair
Other certification icons outside icon should be authenticated.For example, 9 certification icons can be included in authentication interface, wherein 1 is login
Certification icon corresponding to password, 8 are other certification icons in addition to login password corresponds to certification icon in addition.
Step 510, the certification icon of user's input is received.
After generating authentication interface, it may be displayed in the display interface of terminal.User can be selected by authentication interface
Certification icon, after terminal receives the certification icon of user's input, the certification icon inputted according to user carries out login authentication.
Step 512, judge whether certification number is more than three times, if it is not, then performing step 514;If so, then perform step
516。
In one embodiment, whether the number for judging to be authenticated according to the certification icon that user inputs is more than three times,
If it is not, then performing step 514, the certification icon of user's input is authenticated;If so, then need to carry out fingerprint authentication.
Step 514, judge whether certification succeeds, if it is not, then performing step 510;If so, then perform step 518.
Judge that the certification icon of user's input whether there is corresponding login password, if the certification icon of user's input is present
Corresponding login password, and the login password is the login password corresponding to the logon account of user's input, then user inputs
Certification icon certification success.
Step 516, fingerprint authentication is carried out according to the finger print information of input, if fingerprint authentication success, performs step 518.
If the certification icon authentification failure of user's input, and authentification failure number is more than three times, then needs user's input to refer to
Line information is authenticated.The finger print information that user inputs is matched with the finger print information stored in fingerprint database, if depositing
In finger print information of the matching degree more than 90%, then fingerprint authentication success.
Step 518, login password is obtained, and login password is copied in destination application.
Login password corresponding to logon account is obtained, and login password is copied in destination application.Terminal can root
The logon account inputted according to user and the login password obtained, initiate the logging request of destination application.
Step 520, destination application is logged according to logon account and login password.
It is above-mentioned to apply login method, if user forgets Password, login authentication can be carried out according to certification icon, can be with
Login authentication is carried out by finger print information.Substantial amounts of login time is so saved, improves the efficiency of application program login.
Fig. 6 is the displaying figure of application program login interface in one embodiment.As shown in fig. 6, the application program logs in boundary
Face includes logon account input area 602, login password input area 604 and Password Management instruction input region 606.Log in
Account input area 602 is used for the logon account for inputting destination application, and login password input area 604 is used to input target
The login password of application program, Password Management instruction input region 606 are used to input Password Management instruction.
Fig. 7 is the displaying figure of authentication interface in one embodiment.As shown in fig. 7, the authentication interface includes certification icon
702, user can be selected according to authentication interface and input authentication icon, and clicks on " certification " button and the certification icon of input is entered
Row certification.
Fig. 8 is the structural representation that entering device is applied in one embodiment.As shown in figure 8, this applies entering device 800
Including command reception module 802, interface generation module 804, icon receiving module 806 and apply login module 808.Wherein:
Command reception module 802, the Password Management instruction for receiving terminal input.
Interface generation module 804, certification icon is obtained for being instructed according to the Password Management, and according to the certification figure
Mark generation authentication interface.
Icon receiving module 806, the certification icon obtained for receiving terminal according to the authentication interface.
Using login module 808, if corresponding for the login password of destination application for the certification icon that terminal obtains
Certification icon, then log in the destination application.
Fig. 9 is the structural representation that entering device is applied in another embodiment.As shown in figure 9, this applies entering device
900 establish module 902, command reception module 904, interface generation module 906, icon receiving module 908, fingerprint including relation connects
Receive module 910 and apply login module 912.Wherein:
Relation establishes module 902, for obtaining login password, according to the file generated certification icon stored in terminal, and
Establish the corresponding relation of the login password and certification icon.
Command reception module 904, the Password Management instruction for receiving terminal input.
Interface generation module 906, certification icon is obtained for being instructed according to the Password Management, and according to the certification figure
Mark generation authentication interface.
Icon receiving module 908, the certification icon obtained for receiving terminal according to the authentication interface.
Fingerprint receiving module 910, if the number of the certification icon authentification failure for being obtained according to terminal is more than default time
The finger print information of number, then receiving terminal input.
Using login module 912, if for the finger print information and preset fingerprint information matches, intended application journey is logged in
Sequence.
It is above-mentioned to apply entering device, when user forgets login password, Password Management can be inputted by terminal and instructed, so
Terminal can instruct according to Password Management and obtain certification icon afterwards, and generate authentication interface.User only needs defeated according to authentication interface
Enter certification icon, if certification icon is certification icon corresponding to login password, it is possible to log in destination application.So use
Family can be carried out login authentication by corresponding certification icon, just do not had to again by the password of complexity when forgetting login password
Rule is given for change to give login password for change, so saves substantial amounts of login time, improves the efficiency of application program login.
In one embodiment, relation establish module 902 be additionally operable to according to the file type of the file stored in terminal and
File name generates certification icon.
In one of the embodiments, icon receiving module 904 is additionally operable to receiving terminal and obtained according to the authentication interface
Name authentication icon and cipher authentication icon.
In the embodiment that the application provides, if being additionally operable to the name authentication icon of terminal acquisition using login module 912
For certification icon corresponding to the logon account of destination application, and the cipher authentication icon that terminal obtains is destination application
Login password corresponding to certification icon, then log in the destination application.
In one embodiment, if using login module 912 be additionally operable to terminal acquisition certification icon be intended application journey
Certification icon corresponding to the login password of sequence, then log in the destination application.
The above-mentioned division using modules in entering device is only used for for example, in other embodiments, can should
Different modules is divided into as required with entering device, to complete above-mentioned all or part of function using entering device.
Figure 10 is the structural representation that entering device is applied in another embodiment.As shown in Figure 10, the application, which logs in, fills
Put including Password Management application program 1000 and destination application 1100.Wherein, also wrapped in Password Management application program 1000
Include memory module 1002, icon generation module 1004, icon authentication module 1006 and fingerprint authentication module 1008.Memory module
The login password of application program and the corresponding relation of certification icon are stored in 1002, the corresponding relation can be carried out by user
Set.The finger print information of user is also store in memory module 1002, to the finger print information of user's input during for fingerprint authentication
Carry out.Icon generation module 1004 is used for according to the file generated certification icon stored in terminal, and by the certification icon of generation
Stored.When needing to be authenticated by certification icon, icon authentication module 1006 can be from icon generation module 1004
The middle certification icon for obtaining predetermined number, authentication interface is generated, and the certification icon inputted according to user is authenticated.Fingerprint inspection
Demonstrate,prove the finger print information that module 1008 is used to input according to user and carry out fingerprint authentication.If icon authentication module 1006 or fingerprint authentication
Being verified in module 1008, then destination application 1100 is logged according to the logon account of acquisition and login password.
The embodiment of the present application additionally provides a kind of computer-readable recording medium.One or more can perform comprising computer
The non-volatile computer readable storage medium storing program for executing of instruction, when the computer executable instructions are executed by one or more processors
When so that the computing device following steps:
The Password Management instruction of receiving terminal input;
Instructed according to the Password Management and obtain certification icon, and authentication interface is generated according to the certification icon;
The certification icon that receiving terminal obtains according to the authentication interface;
If the certification icon that terminal obtains is certification icon corresponding to the login password of destination application, described in login
Destination application.
In one embodiment, the certification figure that the receiving terminal being executed by processor obtains according to the authentication interface
Mark includes:
The name authentication icon and cipher authentication icon that receiving terminal obtains according to the authentication interface;
If the certification icon that the terminal obtains is certification icon corresponding to the login password of destination application, log in
The destination application includes:
If the name authentication icon that terminal obtains is certification icon corresponding to the logon account of destination application, and terminal
The cipher authentication icon of acquisition is certification icon corresponding to the login password of destination application, then logs in the intended application journey
Sequence.
In one of the embodiments, the methods described being executed by processor also includes:
Login password is obtained, according to the file generated certification icon stored in terminal, and establishes the login password with recognizing
Demonstrate,prove the corresponding relation of icon.
In the embodiment that the application provides, what is be executed by processor is described according to the file generated certification stored in terminal
Icon includes:
According to the file type of the file stored in terminal and file name generation certification icon.
In one embodiment, the methods described being executed by processor also includes:
If the number of the certification icon authentification failure inputted according to terminal is more than preset times, the finger of receiving terminal input
Line information;
If the finger print information and preset fingerprint information matches, log in destination application.
The embodiment of the present application additionally provides a kind of computer equipment.As shown in figure 11, for convenience of description, illustrate only with
The related part of the embodiment of the present application, particular technique details do not disclose, refer to the embodiment of the present application method part.The calculating
Machine equipment can be include mobile phone, tablet personal computer, PDA (Personal Digital Assistant, personal digital assistant),
Any terminal devices such as POS (Point of Sales, point-of-sale terminal), vehicle-mounted computer, Wearable, using computer equipment as
Exemplified by mobile phone:
Figure 11 is the block diagram of the part-structure of the mobile phone related to the computer equipment of the embodiment of the present application offer.Reference chart
11, mobile phone includes:Radio frequency (Radio Frequency, RF) circuit 1110, memory 1120, input block 1130, display unit
1140th, sensor 1150, voicefrequency circuit 1160, Wireless Fidelity (wireless fidelity, WiFi) module 1170, processor
The part such as 1180 and power supply 1190.It will be understood by those skilled in the art that the handset structure shown in Figure 11 does not form opponent
The restriction of machine, can be included than illustrating more or less parts, either combine some parts or different parts arrangement.
Wherein, RF circuits 1110 can be used for receive and send messages or communication process in, the reception and transmission of signal can be by base stations
After downlink information receives, handled to processor 1180;Up data can also be sent to base station.Generally, RF circuits include
But be not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier (Low Noise Amplifier,
LNA), duplexer etc..In addition, RF circuits 1110 can also be communicated by radio communication with network and other equipment.It is above-mentioned wireless
Communication can use any communication standard or agreement, including but not limited to global system for mobile communications (Global System of
Mobile communication, GSM), general packet radio service (General Packet Radio Service,
GPRS), CDMA (Code Division Multiple Access, CDMA), WCDMA (Wideband Code
Division Multiple Access, WCDMA), Long Term Evolution (Long Term Evolution, LTE)), Email,
Short Message Service (Short Messaging Service, SMS) etc..
Memory 1120 can be used for storage software program and module, and processor 1180 is stored in memory by operation
1120 software program and module, so as to perform the various function application of mobile phone and data processing.Memory 1120 can be led
To include program storage area and data storage area, wherein, program storage area can storage program area, needed at least one function
Application program (such as the application program of sound-playing function, application program of image player function etc.) etc.;Data storage area can
Storage uses created data (such as voice data, address list etc.) etc. according to mobile phone.In addition, memory 1120 can wrap
High-speed random access memory is included, nonvolatile memory, for example, at least disk memory, a flash memories can also be included
Part or other volatile solid-state parts.
Input block 1130 can be used for the numeral or character information for receiving input, and produces and set with the user of mobile phone 1100
Put and the input of key signals that function control is relevant.Specifically, input block 1130 may include contact panel 1131 and other
Input equipment 1132.Contact panel 1131, alternatively referred to as touch-screen, collect touch operation (ratio of the user on or near it
Such as user is using finger, any suitable object of stylus or annex on contact panel 1131 or near contact panel 1131
Operation), and corresponding attachment means are driven according to formula set in advance.In one embodiment, contact panel 1131 can
Including both touch detecting apparatus and touch controller.Wherein, the touch orientation of touch detecting apparatus detection user, and examine
The signal that touch operation is brought is surveyed, transmits a signal to touch controller;Touch controller receives from touch detecting apparatus to be touched
Information is touched, and is converted into contact coordinate, then gives processor 1180, and the order sent of reception processing device 1180 and can be added
To perform.Furthermore, it is possible to contact panel is realized using polytypes such as resistance-type, condenser type, infrared ray and surface acoustic waves
1131.Except contact panel 1131, input block 1130 can also include other input equipments 1132.Specifically, other are inputted
Equipment 1132 can include but is not limited in physical keyboard, function key (such as volume control button, switch key etc.) etc. one
Kind is a variety of.
Display unit 1140 can be used for display by user input information or be supplied to user information and mobile phone it is each
Kind menu.Display unit 1140 may include display panel 1141.In one embodiment, liquid crystal display can be used
(Liquid Crystal Display, LCD), Organic Light Emitting Diode (Organic Light-Emitting Diode,
) etc. OLED form configures display panel 1141.In one embodiment, contact panel 1131 can cover display panel 1141,
After contact panel 1131 detects the touch operation on or near it, processor 1180 is sent to determine touch event
Type, it is followed by subsequent processing device 1180 and corresponding visual output is provided on display panel 1141 according to the type of touch event.Although
In fig. 11, contact panel 1131 and display panel 1141 are the parts independent as two to realize the input of mobile phone and input
Function, but in some embodiments it is possible to contact panel 1131 and display panel 1141 are integrated and realize the input of mobile phone
And output function.
Mobile phone 1100 may also include at least one sensor 1150, such as optical sensor, motion sensor and other biographies
Sensor.Specifically, optical sensor may include ambient light sensor and proximity transducer, wherein, ambient light sensor can be according to ring
The light and shade of environmental light adjusts the brightness of display panel 1141, and proximity transducer can close display when mobile phone is moved in one's ear
Panel 1141 and/or backlight.Motion sensor may include acceleration transducer, and all directions are can detect by acceleration transducer
The size of upper acceleration, size and the direction of gravity are can detect that when static, the application available for identification mobile phone posture is (such as horizontal
Portrait layout switches), Vibration identification correlation function (such as pedometer, tap) etc.;In addition, mobile phone can also configure gyroscope, barometer,
Other sensors such as hygrometer, thermometer, infrared ray sensor etc..
Voicefrequency circuit 1160, loudspeaker 1161 and microphone 1162 can provide the COBBAIF between user and mobile phone.Sound
Frequency circuit 1160 voice data received can be changed after electric signal, loudspeaker 1161 is transferred to, by 1161 turns of loudspeaker
It is changed to voice signal output;On the other hand, the voice signal of collection is converted to electric signal by microphone 1162, by voicefrequency circuit
1160 receive after be converted to voice data, then after voice data output processor 1180 is handled, can be sent out through RF circuits 1110
Another mobile phone is given, or voice data is exported to memory 1120 so as to subsequent treatment.
WiFi belongs to short range wireless transmission technology, and mobile phone can help user's transceiver electronicses postal by WiFi module 1170
Part, browse webpage and access streaming video etc., it has provided the user wireless broadband internet and accessed.Although Figure 11 is shown
WiFi module 1170, but it is understood that, it is simultaneously not belonging to must be configured into for mobile phone 1100, can save as needed
Slightly.
Processor 1180 is the control centre of mobile phone, using various interfaces and the various pieces of connection whole mobile phone,
By running or performing the software program and/or module that are stored in memory 1120, and call and be stored in memory 1120
Interior data, the various functions and processing data of mobile phone are performed, so as to carry out integral monitoring to mobile phone.In one embodiment,
Processor 1180 may include one or more processing units.In one embodiment, processor 1180 can integrate application processor
And modem processor, wherein, application processor mainly handles operating system, user interface and application program etc.;Modulatedemodulate
Processor is adjusted mainly to handle radio communication.It is understood that above-mentioned modem processor can not also be integrated into processor
In 1180.
Mobile phone 1100 also includes the power supply 1190 (such as battery) to all parts power supply, it is preferred that power supply can pass through
Power-supply management system and processor 1180 are logically contiguous, so as to realize management charging, electric discharge, Yi Jigong by power-supply management system
The functions such as consumption management.
In one embodiment, mobile phone 1100 can also include camera, bluetooth module etc..
In the embodiment of the present application, the processor 1180 included by the mobile terminal performs the calculating of storage on a memory
Following steps are realized during machine program:
The embodiment of the present application additionally provides a kind of computer-readable recording medium.One or more can perform comprising computer
The non-volatile computer readable storage medium storing program for executing of instruction, when the computer executable instructions are executed by one or more processors
When so that the computing device following steps:
The Password Management instruction of receiving terminal input;
Instructed according to the Password Management and obtain certification icon, and authentication interface is generated according to the certification icon;
The certification icon that receiving terminal obtains according to the authentication interface;
If the certification icon that terminal obtains is certification icon corresponding to the login password of destination application, described in login
Destination application.
In one embodiment, the certification figure that the receiving terminal being executed by processor obtains according to the authentication interface
Mark includes:
The name authentication icon and cipher authentication icon that receiving terminal obtains according to the authentication interface;
If the certification icon that the terminal obtains is certification icon corresponding to the login password of destination application, log in
The destination application includes:
If the name authentication icon that terminal obtains is certification icon corresponding to the logon account of destination application, and terminal
The cipher authentication icon of acquisition is certification icon corresponding to the login password of destination application, then logs in the intended application journey
Sequence.
In one of the embodiments, the methods described being executed by processor also includes:
Login password is obtained, according to the file generated certification icon stored in terminal, and establishes the login password with recognizing
Demonstrate,prove the corresponding relation of icon.
In the embodiment that the application provides, what is be executed by processor is described according to the file generated certification stored in terminal
Icon includes:
According to the file type of the file stored in terminal and file name generation certification icon.
In one embodiment, the methods described being executed by processor also includes:
If the number of the certification icon authentification failure inputted according to terminal is more than preset times, the finger of receiving terminal input
Line information;
If the finger print information and preset fingerprint information matches, log in destination application.
One of ordinary skill in the art will appreciate that realize all or part of flow in above-described embodiment method, being can be with
The hardware of correlation is instructed to complete by computer program, described program can be stored in a non-volatile computer and can be read
In storage medium, the program is upon execution, it may include such as the flow of the embodiment of above-mentioned each method.Wherein, described storage is situated between
Matter can be magnetic disc, CD, read-only memory (Read-Only Memory, ROM) etc..
Any reference to memory, storage, database or other media may include non-volatile as used herein
And/or volatile memory.Suitable nonvolatile memory may include read-only storage (ROM), programming ROM (PROM),
Electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include arbitrary access
Memory (RAM), it is used as external cache.By way of illustration and not limitation, RAM is available in many forms, such as
It is static RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDR SDRAM), enhanced
SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM
(RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM).
Embodiment described above only expresses the several embodiments of the application, and its description is more specific and detailed, but simultaneously
Therefore the limitation to the application the scope of the claims can not be interpreted as.It should be pointed out that for one of ordinary skill in the art
For, on the premise of the application design is not departed from, various modifications and improvements can be made, these belong to the guarantor of the application
Protect scope.Therefore, the protection domain of the application patent should be determined by the appended claims.
Claims (10)
1. one kind applies login method, it is characterised in that methods described includes:
The Password Management instruction of receiving terminal input;
Instructed according to the Password Management and obtain certification icon, and authentication interface is generated according to the certification icon;
The certification icon that receiving terminal obtains according to the authentication interface;
If the certification icon that terminal obtains is certification icon corresponding to the login password of destination application, the target is logged in
Application program.
2. according to claim 1 apply login method, it is characterised in that the receiving terminal is according to the authentication interface
The certification icon of acquisition includes:
The name authentication icon and cipher authentication icon that receiving terminal obtains according to the authentication interface;
If the certification icon that the terminal obtains is certification icon corresponding to the login password of destination application, described in login
Destination application includes:
If the name authentication icon that terminal obtains is certification icon corresponding to the logon account of destination application, and terminal obtains
Cipher authentication icon for destination application login password corresponding to certification icon, then log in the destination application.
3. according to claim 1 apply login method, it is characterised in that methods described also includes:
Login password is obtained, according to the file generated certification icon stored in terminal, and establishes the login password and certification figure
Target corresponding relation.
4. according to claim 3 apply login method, it is characterised in that described according to the file generated stored in terminal
Certification icon includes:
According to the file type of the file stored in terminal and file name generation certification icon.
5. according to claim 1 apply login method, it is characterised in that methods described also includes:
If the number of the certification icon authentification failure inputted according to terminal is more than preset times, the fingerprint letter of receiving terminal input
Breath;
If the finger print information and preset fingerprint information matches, log in the destination application.
6. one kind applies entering device, it is characterised in that described device includes:
Command reception module, the Password Management instruction for receiving terminal input;
Interface generation module, certification icon is obtained for being instructed according to the Password Management, and generated according to the certification icon
Authentication interface;
Icon receiving module, the certification icon obtained for receiving terminal according to the authentication interface;
Using login module, if being certification figure corresponding to the login password of destination application for the certification icon that terminal obtains
Mark, then log in the destination application.
7. according to claim 1 apply entering device, it is characterised in that described device also includes:
Relation establishes module, for obtaining login password, according to the file generated certification icon stored in terminal, and described in foundation
The corresponding relation of login password and certification icon.
8. according to claim 1 apply entering device, it is characterised in that described device also includes:
Fingerprint receiving module, if the number of the certification icon authentification failure for being obtained according to terminal is more than preset times, connect
Receive the finger print information of terminal input;
If the application login module is additionally operable to the finger print information and preset fingerprint information matches, the intended application is logged in
Program.
9. a kind of computer equipment, including memory and processor, computer-readable instruction is stored in the memory, it is described
When instruction is by the computing device so that the step of method of the computing device as any one of claim 1 to 5
Suddenly.
10. a kind of computer-readable recording medium, is stored thereon with computer program, it is characterised in that the computer program
When being executed by processor the step of method as any one of claim 1 to 5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710726372.6A CN107577933B (en) | 2017-08-22 | 2017-08-22 | Application login method and device, computer equipment and computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710726372.6A CN107577933B (en) | 2017-08-22 | 2017-08-22 | Application login method and device, computer equipment and computer readable storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107577933A true CN107577933A (en) | 2018-01-12 |
CN107577933B CN107577933B (en) | 2020-01-10 |
Family
ID=61035088
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710726372.6A Active CN107577933B (en) | 2017-08-22 | 2017-08-22 | Application login method and device, computer equipment and computer readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107577933B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109614212A (en) * | 2018-12-05 | 2019-04-12 | 北京达佳互联信息技术有限公司 | Using starting method, apparatus, terminal and storage medium |
CN110765431A (en) * | 2018-07-27 | 2020-02-07 | 中标软件有限公司 | Multi-user fingerprint or password login method and management system thereof |
CN112910850A (en) * | 2021-01-16 | 2021-06-04 | 浙江吉利控股集团有限公司 | Safety verification method and system for controlling vehicle |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1980126A (en) * | 2005-12-08 | 2007-06-13 | 上海盛大网络发展有限公司 | Method for realizing picture identifying code |
CN101316166A (en) * | 2008-07-07 | 2008-12-03 | 张寄望 | Dynamic password identity authentication method based on accidental character set |
CN101499907A (en) * | 2009-02-19 | 2009-08-05 | 西安电子科技大学 | Shoulder surfing preventing identity authentication system and method based on dynamic image password |
CN103077342A (en) * | 2011-10-25 | 2013-05-01 | 成都谛听科技有限公司 | Method for inputting graphic random passwords |
CN103391203A (en) * | 2012-05-09 | 2013-11-13 | 百度在线网络技术(北京)有限公司 | Unlocking method, system and device of mobile terminal |
CN104468616A (en) * | 2014-12-24 | 2015-03-25 | 广州华多网络科技有限公司 | Picture verification code generation method and client side |
CN105450604A (en) * | 2014-08-25 | 2016-03-30 | 苏宁云商集团股份有限公司 | Safe verifying method and device based on graphic feature |
CN106709320A (en) * | 2016-11-29 | 2017-05-24 | 维沃移动通信有限公司 | Identity authentication method and mobile terminal |
CN106997432A (en) * | 2017-05-17 | 2017-08-01 | 苏州锦佰安信息技术有限公司 | Picture password authentication method and picture password authentication device |
US20170345239A9 (en) * | 2014-12-23 | 2017-11-30 | Gate Labs Inc. | Access management system |
-
2017
- 2017-08-22 CN CN201710726372.6A patent/CN107577933B/en active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1980126A (en) * | 2005-12-08 | 2007-06-13 | 上海盛大网络发展有限公司 | Method for realizing picture identifying code |
CN101316166A (en) * | 2008-07-07 | 2008-12-03 | 张寄望 | Dynamic password identity authentication method based on accidental character set |
CN101499907A (en) * | 2009-02-19 | 2009-08-05 | 西安电子科技大学 | Shoulder surfing preventing identity authentication system and method based on dynamic image password |
CN103077342A (en) * | 2011-10-25 | 2013-05-01 | 成都谛听科技有限公司 | Method for inputting graphic random passwords |
CN103391203A (en) * | 2012-05-09 | 2013-11-13 | 百度在线网络技术(北京)有限公司 | Unlocking method, system and device of mobile terminal |
CN105450604A (en) * | 2014-08-25 | 2016-03-30 | 苏宁云商集团股份有限公司 | Safe verifying method and device based on graphic feature |
US20170345239A9 (en) * | 2014-12-23 | 2017-11-30 | Gate Labs Inc. | Access management system |
CN104468616A (en) * | 2014-12-24 | 2015-03-25 | 广州华多网络科技有限公司 | Picture verification code generation method and client side |
CN106709320A (en) * | 2016-11-29 | 2017-05-24 | 维沃移动通信有限公司 | Identity authentication method and mobile terminal |
CN106997432A (en) * | 2017-05-17 | 2017-08-01 | 苏州锦佰安信息技术有限公司 | Picture password authentication method and picture password authentication device |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110765431A (en) * | 2018-07-27 | 2020-02-07 | 中标软件有限公司 | Multi-user fingerprint or password login method and management system thereof |
CN110765431B (en) * | 2018-07-27 | 2023-05-30 | 中标软件有限公司 | Multi-user fingerprint or password login method and management system thereof |
CN109614212A (en) * | 2018-12-05 | 2019-04-12 | 北京达佳互联信息技术有限公司 | Using starting method, apparatus, terminal and storage medium |
CN112910850A (en) * | 2021-01-16 | 2021-06-04 | 浙江吉利控股集团有限公司 | Safety verification method and system for controlling vehicle |
Also Published As
Publication number | Publication date |
---|---|
CN107577933B (en) | 2020-01-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6997343B2 (en) | How to quickly open an application or application function, and a terminal | |
US9703971B2 (en) | Sensitive operation verification method, terminal device, server, and verification system | |
CN104468464B (en) | verification method, device and system | |
CN106778175B (en) | Interface locking method and device and terminal equipment | |
CN104850406B (en) | A kind of method and apparatus for switching the page | |
CN106331370B (en) | A kind of data transmission method and terminal device | |
CN104217172B (en) | Privacy content inspection method and device | |
EP3640787B1 (en) | Input method and electronic device | |
CN103501485B (en) | Push the method, apparatus and terminal device of application | |
CN108573168A (en) | Private space starts method and apparatus, storage medium, electronic equipment | |
CN107786569A (en) | A kind of identifying code sending method, method of reseptance and relevant device | |
CN108834132A (en) | A kind of data transmission method and equipment and related media production | |
CN108573169A (en) | Nearest task list display methods and device, storage medium, electronic equipment | |
US20140359790A1 (en) | Method and apparatus for visiting privacy content | |
CN106973168A (en) | Speech playing method, device and computer equipment | |
CN107577933A (en) | Using login method and device, computer equipment, computer-readable recording medium | |
CN104573437A (en) | Information authentication method, device and terminal | |
CN107678671A (en) | One kind applies startup method, terminal and computer-readable recording medium | |
JP6974620B2 (en) | Notification message processing method and terminal | |
CN107102913B (en) | Data back up method, device and computer equipment | |
CN106203015A (en) | The collocation method of application program, device and terminal unit | |
CN107909682A (en) | A kind of access control method, device and antitheft door | |
CN106970761A (en) | Control method and device for the electronic installation with full frame fingerprint recognition | |
CN109309659B (en) | Mobile terminal and method and device for logging in application of mobile terminal | |
CN106055615A (en) | Method, device and system for obtaining music information |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18 Applicant after: OPPO Guangdong Mobile Communications Co., Ltd. Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18 Applicant before: Guangdong Opel Mobile Communications Co., Ltd. |
|
CB02 | Change of applicant information | ||
GR01 | Patent grant | ||
GR01 | Patent grant |