CN108023881B - Application login method, device, medium and electronic equipment - Google Patents

Application login method, device, medium and electronic equipment Download PDF

Info

Publication number
CN108023881B
CN108023881B CN201711256821.1A CN201711256821A CN108023881B CN 108023881 B CN108023881 B CN 108023881B CN 201711256821 A CN201711256821 A CN 201711256821A CN 108023881 B CN108023881 B CN 108023881B
Authority
CN
China
Prior art keywords
user
application programs
information
application program
application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201711256821.1A
Other languages
Chinese (zh)
Other versions
CN108023881A (en
Inventor
张瑞庆
臧卓
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Taikang Insurance Group Co Ltd
Original Assignee
Taikang Insurance Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Taikang Insurance Group Co Ltd filed Critical Taikang Insurance Group Co Ltd
Priority to CN201711256821.1A priority Critical patent/CN108023881B/en
Publication of CN108023881A publication Critical patent/CN108023881A/en
Application granted granted Critical
Publication of CN108023881B publication Critical patent/CN108023881B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The embodiment of the invention provides a login method, a login device, a login medium and electronic equipment of application programs, which are applied to a login management system, wherein the login management system is used for managing M application programs; the M application programs are mutually independent application programs, and the method comprises the following steps: receiving authentication information input by a user; when the identity information of the user is determined to be legal, receiving an identity authentication request message sent by a server corresponding to each application program in the M application programs; and sending an authentication confirmation message to a server corresponding to each application program in the N application programs according to the M authentication request messages so as to log in the N application programs by the user. The login method, the login device, the login medium and the electronic equipment of the application program provided by the embodiment of the invention improve the efficiency of simultaneously logging in a plurality of application programs by a user.

Description

Application login method, device, medium and electronic equipment
Technical Field
The present invention relates to the field of computer technologies, and in particular, to a login method, device, medium, and electronic device for an application.
Background
In order to improve the safety of the application programs, each application program is provided with a login interface, a user carries out user authentication through the login interface, and the user can log in the application program after the user authentication passes.
In the prior art, each independent application program has a respective login interface, and each independent application program cannot share a user name and authority, so that a user needs to pass through the login interface of each application program and perform user authentication for multiple times respectively before simultaneously logging in multiple application programs. For example, when a user logs in a WeChat and a QQ, the user needs to perform user identity authentication through a login interface of the WeChat and a login interface of the QQ, so that the operation is complicated when a plurality of application programs are logged in by the user in the conventional login mode, and the efficiency of logging in the plurality of application programs by the user is low.
Disclosure of Invention
The embodiment of the invention provides a login method, a login device, a login medium and electronic equipment of an application program, and aims to improve the efficiency of simultaneously logging in a plurality of application programs by a user.
The embodiment of the invention provides a login method of an application program, which is applied to a login management system, wherein the login management system is used for managing M application programs; the M application programs are mutually independent application programs, wherein M is an integer greater than or equal to 3, and the login method of the application programs comprises the following steps:
receiving authentication information input by a user; the identity authentication information is used for determining whether user identity information is legal or not, and the identity authentication information comprises a user name and a password;
when the identity information of the user is determined to be legal, receiving an identity authentication request message sent by a server corresponding to each application program in the M application programs; the identity verification request message comprises each application program identification and token information in the M application programs; (ii) a The M application programs are mutually independent application programs, and M is an integer greater than or equal to 3;
sending an authentication confirmation message to a server corresponding to each application program in N application programs according to the M authentication request messages so as to enable the user to log in the N application programs; the N application programs are subsets of the M application programs, and N is an integer which is less than or equal to M and greater than or equal to 2.
In an embodiment of the present invention, before sending an authentication confirmation message to a server corresponding to each of N application programs according to the authentication request message, the method includes:
pre-establishing a mapping relation among the user name, the application program identification and the token information; the user name and the token information are in one-to-one correspondence;
sending an authentication confirmation message to a server corresponding to each of the N application programs according to the authentication request message, wherein the authentication confirmation message comprises:
determining that the user is a legal user of the N application programs according to the mapping relation and the M identity authentication request messages;
and sending an authentication confirmation message to a server corresponding to each of the N application programs.
In an embodiment of the present invention, the determining that the user is a valid user of the N application programs according to the mapping relationship and the M identity authentication request messages includes:
judging whether the identifier and the token information of each application program in the M application programs are matched with the mapping relation;
and if the application program identification and the token information in the N application programs are matched with the mapping relation, determining that the user is a legal user of the N application programs.
In an embodiment of the present invention, before receiving the authentication request message sent by the server corresponding to each of the M application programs, the method further includes:
determining token information corresponding to the user name according to the mapping relation;
and sending the token information to a server corresponding to each application program in the M application programs.
In an embodiment of the present invention, after sending an authentication confirmation message to a server corresponding to each of N application programs according to the authentication request message, so that the user logs in the N application programs, the method further includes:
receiving request information sent by the P servers through a preset interface; the request message is used for requesting the user information; the preset interface is used for transmitting the user information; wherein, P is an integer less than or equal to N and greater than or equal to 1;
searching the user information according to the request message;
and sending the user information to the P servers through the preset interface.
In an embodiment of the present invention, the login method of the application program may further include:
and updating the token information, and reestablishing the mapping relation among the user name, the application program identification and the updated token information.
In an embodiment of the present invention, the token information is at least one of the following or a combination of at least two of the following: numbers, letters, and symbols.
An embodiment of the present invention further provides a login device for an application program, including:
the receiving unit is used for receiving the identity authentication information input by the user; the identity authentication information is used for determining whether user identity information is legal or not, and the identity authentication information comprises a user name and a password;
the receiving unit is further configured to receive an authentication request message sent by a server corresponding to each of the M application programs when it is determined that the user identity information is valid; the identity verification request message comprises each application program identification and token information in the M application programs; the M application programs are mutually independent application programs, and M is an integer greater than or equal to 3;
a sending unit, configured to send an authentication confirmation message to a server corresponding to each of N application programs according to the authentication request message, so that the user logs in the N application programs; the N application programs are subsets of the M application programs, and N is an integer which is less than or equal to M and greater than or equal to 2.
In an embodiment of the present invention, the login device of the application program may further include an establishing unit;
the establishing unit is used for pre-establishing a mapping relation among the user name, the application program identifier and the token information; the user name and the token information are in one-to-one correspondence;
the sending unit is specifically configured to determine that the user is a valid user of the N application programs according to the mapping relationship and the M authentication request messages; and sending an authentication confirmation message to a server corresponding to each of the N applications.
In an embodiment of the present invention, the sending unit is specifically configured to determine whether each application identifier and token information in the M applications matches the mapping relationship; and if the application program identification and the token information in the N application programs are matched with the mapping relation, determining that the user is a legal user of the N application programs.
In an embodiment of the present invention, the login apparatus of the application further includes a determining unit, where the determining unit is further configured to determine token information corresponding to the user name according to the mapping relationship;
the sending unit is further configured to send the token information to a server corresponding to each of the M applications.
In an embodiment of the present invention, the login device of the application program may further include a search unit;
the receiving unit is further configured to receive request information sent by the P servers through a preset interface; the request message is used for requesting the user information; the preset interface is used for transmitting the user information; wherein, P is an integer less than or equal to N and greater than or equal to 1;
the searching unit is used for searching the user information according to the request message;
and the sending unit is used for sending the user information to the P servers through the preset interface.
In an embodiment of the present invention, the login device of the application program may further include an updating unit;
the updating unit is used for updating the token information;
the establishing unit is further configured to reestablish a mapping relationship between the user name, the application identifier, and the updated token information.
In an embodiment of the present invention, the token information is at least one of the following or a combination of at least two of the following: numbers, letters, and symbols.
An embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the method for logging in an application program according to any of the above embodiments is executed.
Embodiments of the present invention further provide an electronic device, including a processor and a memory, wherein,
the memory is to store program instructions;
the processor is configured to read the program instructions in the memory, and execute the login method of the application program according to any of the embodiments described above according to the program instructions in the memory.
According to the login method, the login device, the login medium and the electronic equipment of the application program, the identity authentication information input by a user is received; when the identity information of the user is determined to be legal, receiving an identity authentication request message sent by a server corresponding to each application program in the M application programs; and sending an authentication confirmation message to a server corresponding to each of the N application programs according to the M authentication request messages so as to log in the N application programs by the user. Therefore, according to the login method, the login device, the login medium and the electronic device of the application program provided by the embodiment of the invention, for a user, only one-time identity authentication information needs to be input, and after the login device of the application program receives the user name and the password input by the user, the N application programs corresponding to the user name can be determined, so that the user can log in the N application programs, and the efficiency of logging in a plurality of application programs by the user at the same time is improved.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure.
Fig. 1 is a schematic diagram illustrating a login method of an application according to an embodiment of the present invention;
fig. 2 is a schematic diagram of a user login interface according to an embodiment of the present invention;
FIG. 3 is a diagram illustrating a display application according to an embodiment of the present invention;
fig. 4 is a schematic diagram illustrating another login method for an application according to an embodiment of the present invention;
fig. 5 is a schematic diagram of a login device of an application according to an embodiment of the present invention;
FIG. 6 is a diagram of another login device for an application according to an embodiment of the present invention;
fig. 7 is a schematic structural diagram of an electronic device provided in the present invention.
With the foregoing drawings in mind, certain embodiments of the disclosure have been shown and described in more detail below. These drawings and written description are not intended to limit the scope of the disclosed concepts in any way, but rather to illustrate the concepts of the disclosure to those skilled in the art by reference to specific embodiments.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.
The terms "first," "second," "third," "fourth," and the like in the description and in the claims, as well as in the drawings, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are, for example, capable of operation in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
In the prior art, each independent application program cannot share a user name and authority, and if a user needs to log in a plurality of application programs, the user can log in the plurality of application programs simultaneously only after the user needs to pass a login interface of each application program and perform user identity authentication for a plurality of times. Therefore, when the existing login mode is adopted and a plurality of application programs are logged in, the operation is complicated, and the efficiency of logging in the plurality of application programs by a user is low. In order to improve the efficiency of simultaneously logging in a plurality of application programs by a user, the embodiment of the invention provides a logging-in method of the application programs, which comprises the steps of receiving identity authentication information input by the user; when the identity information of the user is determined to be legal, receiving an identity authentication request message sent by a server corresponding to each application program in the M application programs; and sending an authentication confirmation message to a server corresponding to each of the N application programs according to the M authentication request messages so as to log in the N application programs by the user. In the login process, the user only needs to input the identity authentication information once, and after the login device of the application program receives the user name and the password input by the user, the N application programs corresponding to the user name can be determined, so that the user can log in the N application programs, and the efficiency of logging in the plurality of application programs by the user at the same time is improved.
The technical solution of the present invention and how to solve the above technical problems will be described in detail with specific examples. The following specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments. Embodiments of the present invention will be described below with reference to the accompanying drawings.
Fig. 1 is a schematic diagram of a login method of an application, where the login method of the application is applied to a login management system, and the login management system is used to manage M applications; the M applications are independent applications, where M is an integer greater than or equal to 3, for example, the login method of the application may be executed by a login device of the application, and the login device of the application may be set independently or may be integrated in a processor of the login management system. Referring to fig. 1, the login method of the application program may include:
s101, receiving identity authentication information input by a user.
The identity authentication information is used for determining whether the user identity information is legal or not, and the identity authentication information comprises a user name and a password.
For example, the login management system has a uniform user login interface, and when logging in a plurality of application programs, the user only needs to input a user name and a password on the uniform user login interface, and the login management system can determine whether the user identity information is legal according to the user name and the password input by the user. Referring to fig. 2, fig. 2 is a schematic diagram of a user login interface according to an embodiment of the present invention. It should be noted that the plurality of applications in the embodiment of the present invention refer to mutually independent applications, each of the plurality of mutually independent applications has a respective login account, and the plurality of mutually independent applications may be a plurality of different applications in one unit, or a plurality of applications between different units.
And S102, when the identity information of the user is determined to be legal, determining token information corresponding to the user name according to the mapping relation.
The mapping relation refers to the relation among the user name, the application program identifier and the token information, and before identity information verification, the login management system configures the authority of the user in advance, so that the mapping relation among the user name, the application program identifier and the token information is established. Each user name can correspond to at least two application program identifications, and each user name corresponds to unique token information. Optionally, the token information is at least one or a combination of at least two of the following: numbers, letters, and symbols.
When a user name and a password input by a user are received, the user name and the password can be matched with pre-stored user identity information, if the user name and the password are matched with each other, the user identity information is legal, and then token information corresponding to the user name can be searched in a mapping relation, so that the token information corresponding to the user name is determined.
And S103, sending token information to a server corresponding to each of the M application programs.
After determining the token information corresponding to the username, the token information may be sent to the server corresponding to each of the M applications.
And S104, receiving an authentication request message sent by a server corresponding to each application program in the M application programs.
Wherein the authentication request message includes an identification of each of the M applications and token information. M application programs are mutually independent application programs, and M is an integer greater than or equal to 3;
after receiving the token identifier, the server corresponding to each of the M application programs sends authentication request information including the token identifier and the server identifier to the login device of the application program, so that the login device of the application program determines whether the user is a valid user of each of the M application programs according to the token identifier and the server identifier.
And S105, determining that the user is a legal user of the N application programs according to the mapping relation and the M identity authentication request messages.
Optionally, the step S105 of determining, according to the mapping relationship and the M authentication request messages, that the user is a valid user of the N application programs may include:
judging whether the application program identification and the token information in the M application programs are matched with the mapping relation or not; and if the application program identification and the token information in the N application programs are matched with the mapping relation, determining that the user is a legal user of the N application programs.
After receiving the M authentication request messages, matching each application identifier and token information in the M applications with the mapping relationship, and if the application identifiers and token information of the N applications in the M applications are matched with the mapping relationship, indicating that the user is a valid user of the N applications.
And S106, sending an authentication confirmation message to the server corresponding to each application program in the N application programs so as to enable the user to log in the N application programs.
The N application programs are subsets of the M application programs, and N is an integer which is less than or equal to M and greater than or equal to 2.
After determining that the user is a valid user of the N applications, an authentication confirmation message may be sent to the server corresponding to each application in the N applications, and N application identifiers are displayed on a display interface of the login management system, so that the user may log in the N applications, as shown in fig. 3, where fig. 3 is a schematic diagram of displaying applications provided in an embodiment of the present invention. For a user, only identity authentication information needs to be input once, and after a login device of an application program receives a user name and a password input by the user, N application programs corresponding to the user name can be determined, so that the user can log in the N application programs, and the efficiency of logging in the plurality of application programs by the user at the same time is improved.
It should be noted that, after the user logs in the N application programs, the login device of the application program may further update the token information, and re-establish the mapping relationship between the user name, the application program identifier, and the updated token information, so that the user can use the updated token information when logging in next time, thereby improving the security of the user logging in the application program.
According to the login method of the application program provided by the embodiment of the invention, the identity authentication information input by a user is received; when the identity information of the user is determined to be legal, receiving an identity authentication request message sent by a server corresponding to each application program in the M application programs; and sending an authentication confirmation message to a server corresponding to each of the N application programs according to the M authentication request messages so as to log in the N application programs by the user. Therefore, according to the login method of the application program provided by the embodiment of the invention, for the user, only identity authentication information needs to be input once, and after the login device of the application program receives the user name and the password input by the user, the N application programs corresponding to the user name can be determined, so that the user can log in the N application programs, and the efficiency of logging in the plurality of application programs by the user at the same time is improved.
In the actual application process, three mutually independent applications, where M is 3, are taken as an example for explanation, where the three applications are application 1, application 2, and application 3, respectively, and the login management system manages the three applications and configures in advance the authority information of user a, that is, user a has the authority to login application 1 and application 2, and user a corresponds to unique token information. When a user A logs in an application program 1 and an application program 2, a user name and a password of the user A can be input in a login interface, when the identity information of the user is determined to be legal, token information corresponding to the user A is searched in a mapping relation, so that the token information corresponding to the user A is determined to be sent to a server corresponding to each application program in 3 application programs, after the server corresponding to the application program 1 receives the token information, an identification and the token information of the application program 1 are sent to a login device of the application program, after the server corresponding to the application program 2 receives the token information, the identification and the token information of the application program 2 are sent to the login device of the application program, after the server corresponding to the application program 3 receives the token information, the identification and the token information of the application program 3 are sent to the login device of the application program, when the login device of the application program respectively receives the information sent by the 3 servers, judging whether the identifier and the token information of each application program in the 3 application programs are matched with the mapping relation; and when the identifier and the token information of the application program 1 and the information of the application program 2 and the token information are determined to be matched with the mapping relation, determining that the user A is a legal user of the application program 1 and the application program 2, and sending an authentication confirmation message to a server corresponding to the application program 1 and a server corresponding to the application program 2 so that the user can log in the application program. Therefore, according to the login method of the application program provided by the embodiment of the invention, for the user, only identity authentication information needs to be input once, and after the login device of the application program receives the user name and the password input by the user, the N application programs corresponding to the user name can be determined, so that the user can log in the N application programs, and the efficiency of logging in the plurality of application programs by the user at the same time is improved.
Based on the embodiment shown in fig. 1, please refer to fig. 4, and fig. 4 is a schematic diagram of another login method of an application according to an embodiment of the present invention. In order to obtain information of a certain user conveniently, after S106 sending an authentication confirmation message to the server corresponding to each of the N applications according to the authentication request message, so that the user logs in the N applications, the login method of the application may further include:
s401, request information sent by the P servers is received through a preset interface.
Wherein the request message is for requesting user information. The preset interface is used for transmitting user information; wherein, P is an integer less than or equal to N and greater than or equal to 1.
Optionally, the preset interface may be a user information interface, and the user information interface is used for transmitting user information. Further, the user information may include occupation, hobbies, city, etc. of the user.
S402, searching user information according to the request message.
And S403, sending the user information to the P servers through a preset interface.
In the embodiment of the present invention, through S401 to S403, the user information of a certain user may be acquired through a preset interface.
Fig. 5 is a schematic diagram of a login apparatus 50 for an application according to an embodiment of the present invention, which is applied to a login management system, where the login management system is used to manage M applications; referring to fig. 5, the login apparatus 50 of the application is provided with:
a receiving unit 501, configured to receive authentication information input by a user; the identity authentication information is used for determining whether the user identity information is legal or not, and the identity authentication information comprises a user name and a password.
The receiving unit 501 is further configured to receive, when it is determined that the user identity information is legal, an identity authentication request message sent by a server corresponding to each of the M application programs; the authentication request message includes each of the M applications identification and token information. Wherein, M application programs are mutually independent application programs, and M is an integer more than or equal to 3;
a sending unit 502, configured to send an authentication confirmation message to a server corresponding to each of the N applications according to the authentication request message, so that the user logs in the N applications; the N application programs are subsets of the M application programs, and N is an integer which is less than or equal to M and greater than or equal to 2.
Optionally, the login apparatus 50 of the application program may further include a creating unit 503, please refer to fig. 6, where fig. 6 is a schematic diagram of another login apparatus 50 of the application program according to an embodiment of the present invention.
The establishing unit 503 is configured to establish a mapping relationship between a user name, an application identifier, and token information in advance; the user name and the token information are in one-to-one correspondence.
A sending unit 502, specifically configured to determine that the user is a valid user of the N application programs according to the mapping relationship and the M authentication request messages; and sending an authentication confirmation message to a server corresponding to each of the N applications.
Optionally, the sending unit 502 is specifically configured to determine whether each application identifier and token information in the M applications are matched with the mapping relationship; and if the application program identification and the token information in the N application programs are matched with the mapping relation, determining that the user is a legal user of the N application programs.
Optionally, the login device 50 of the application further includes a determining unit 504, and the determining unit 504 is further configured to determine token information corresponding to the user name according to the mapping relationship.
The sending unit 502 is further configured to send token information to a server corresponding to each of the M applications.
Optionally, the login means 50 of the application may further comprise a lookup unit 505.
The receiving unit 501 is further configured to receive request information sent by the P servers through a preset interface; the request message is used for requesting user information; the preset interface is used for transmitting user information; wherein, P is an integer less than or equal to N and greater than or equal to 1.
A searching unit 505, configured to search for the user information according to the request message.
A sending unit 502, configured to send the user information to the P servers through a preset interface.
Optionally, the login device 50 of the application program may further include an updating unit 506.
An updating unit 506, configured to update the token information.
The establishing unit 503 is further configured to reestablish a mapping relationship between the user name, the application identifier, and the updated token information.
Optionally, the token information is at least one or a combination of at least two of the following: numbers, letters, and symbols.
The login device 50 of the application program may correspondingly execute the technical solution of the login method of the application program according to any embodiment, and the implementation principle and the technical effect are similar, which are not described herein again.
An embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the method for logging in an application program shown in any of the above embodiments is executed.
The computer-readable storage medium can correspondingly execute the technical solution of the login method of the application program according to any embodiment, and the implementation principle and the technical effect are similar, which are not described herein again.
Fig. 7 is a schematic structural diagram of an electronic device 70 provided in the present invention, please refer to fig. 7, where the electronic device 70 may include:
a processor 701 and a memory 702, wherein the memory 702 is used for storing program instructions.
The processor 701 is configured to read the program instructions in the memory 702 and execute the login method of the application program according to any embodiment of the above embodiments according to the program instructions in the memory 702.
It should be understood that the Processor 701 may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), etc. A general purpose processor may be a microprocessor or the processor 701 may be any conventional processor or the like. The steps of a method disclosed in connection with the present application may be embodied directly in a hardware processor, or in a combination of the hardware and software modules in the processor 701.
All or a portion of the steps of implementing the above-described method embodiments may be performed by hardware associated with program instructions. The aforementioned program may be stored in a readable memory. When executed, the program performs steps comprising the method embodiments described above; and the aforementioned memory (storage medium) includes: read-only memory (ROM), RAM, flash memory, hard disk, solid state disk, magnetic tape (magnetic tape), floppy disk (optical disk), and any combination thereof.
The electronic device 70 may correspondingly execute the technical solution of the login method of the application program according to any embodiment, and the implementation principle and the technical effect are similar, which are not described herein again.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It will be understood that the present disclosure is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.

Claims (9)

1. A login method of an application program is characterized in that:
receiving authentication information input by a user; the identity authentication information is used for determining whether user identity information is legal or not, and the identity authentication information comprises a user name and a password;
when the identity information of the user is determined to be legal, receiving an identity authentication request message sent by a server corresponding to each application program in the M application programs; the identity verification request message comprises each application program identification and token information in the M application programs; the M application programs are mutually independent application programs, and M is an integer greater than or equal to 3;
sending an authentication confirmation message to a server corresponding to each application program in N application programs according to the M authentication request messages so as to enable the user to log in the N application programs; the N application programs are subsets of the M application programs, and N is an integer which is less than or equal to M and greater than or equal to 2;
before sending an authentication confirmation message to a server corresponding to each of the N applications according to the authentication request message, the method includes:
pre-establishing a mapping relation among the user name, the application program identification and the token information; the user name and the token information are in one-to-one correspondence;
sending an authentication confirmation message to a server corresponding to each of the N application programs according to the authentication request message, wherein the authentication confirmation message comprises:
determining that the user is a legal user of the N application programs according to the mapping relation and the M identity authentication request messages;
and sending an authentication confirmation message to a server corresponding to each of the N application programs.
2. The method according to claim 1, wherein said determining that said user is a valid user of said N applications according to said mapping relationship and said M authentication request messages comprises:
judging whether the identifier and the token information of each application program in the M application programs are matched with the mapping relation;
and if the application program identification and the token information in the N application programs are matched with the mapping relation, determining that the user is a legal user of the N application programs.
3. The method according to claim 1, wherein before receiving the authentication request message sent by the server corresponding to each of the M applications, the method further comprises:
determining token information corresponding to the user name according to the mapping relation;
and sending the token information to a server corresponding to each application program in the M application programs.
4. The method according to any one of claims 1-3, wherein after sending an authentication confirmation message to the server corresponding to each of the N applications according to the authentication request message, so that the user logs in to the N applications, further comprising:
receiving request information sent by P servers through a preset interface; the request message is used for requesting the user information; the preset interface is used for transmitting the user information; wherein, P is an integer less than or equal to N and greater than or equal to 1;
searching the user information according to the request message;
and sending the user information to the P servers through the preset interface.
5. The method according to any one of claims 1-3, further comprising:
and updating the token information, and reestablishing the mapping relation among the user name, the application program identification and the updated token information.
6. The method according to any one of claims 1 to 3, wherein the token information is at least one of the following or a combination of at least two of the following:
numbers, letters, and symbols.
7. An apparatus for logging in an application program, comprising:
the receiving unit is used for receiving the identity authentication information input by the user; the identity authentication information is used for determining whether user identity information is legal or not, and the identity authentication information comprises a user name and a password;
the receiving unit is further configured to receive an authentication request message sent by a server corresponding to each of the M application programs when it is determined that the user identity information is valid; the identity verification request message comprises each application program identification and token information in the M application programs; the M application programs are mutually independent application programs, and M is an integer greater than or equal to 3;
a sending unit, configured to send an authentication confirmation message to a server corresponding to each of N application programs according to the authentication request message, so that the user logs in the N application programs; the N application programs are subsets of the M application programs, and N is an integer which is less than or equal to M and greater than or equal to 2;
before sending an authentication confirmation message to a server corresponding to each of the N applications according to the authentication request message, the method includes:
pre-establishing a mapping relation among the user name, the application program identification and the token information; the user name and the token information are in one-to-one correspondence;
sending an authentication confirmation message to a server corresponding to each of the N application programs according to the authentication request message, wherein the authentication confirmation message comprises:
determining that the user is a legal user of the N application programs according to the mapping relation and the M identity authentication request messages;
and sending an authentication confirmation message to a server corresponding to each of the N application programs.
8. A computer-readable storage medium, characterized in that,
the computer-readable storage medium has stored thereon a computer program which, when executed by a processor, executes the method of logging in an application program according to any one of claims 1 to 6.
9. An electronic device comprising a processor and a memory, wherein,
the memory is to store program instructions;
the processor is used for reading the program instructions in the memory and executing the login method of the application program according to any one of claims 1-6 according to the program instructions in the memory.
CN201711256821.1A 2017-12-04 2017-12-04 Application login method, device, medium and electronic equipment Active CN108023881B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711256821.1A CN108023881B (en) 2017-12-04 2017-12-04 Application login method, device, medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711256821.1A CN108023881B (en) 2017-12-04 2017-12-04 Application login method, device, medium and electronic equipment

Publications (2)

Publication Number Publication Date
CN108023881A CN108023881A (en) 2018-05-11
CN108023881B true CN108023881B (en) 2020-12-15

Family

ID=62078065

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711256821.1A Active CN108023881B (en) 2017-12-04 2017-12-04 Application login method, device, medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN108023881B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109063461B (en) * 2018-09-26 2020-09-22 苏州浪潮智能科技有限公司 Third-party password-free login method and system
CN109492374B (en) * 2018-09-26 2022-03-18 平安医疗健康管理股份有限公司 System login method, device, server and storage medium based on identity authentication
CN108900562B (en) * 2018-10-11 2021-07-20 北京京东尚科信息技术有限公司 Login state sharing method and device, electronic equipment and medium
CN111127054A (en) * 2018-10-30 2020-05-08 北京奇虎科技有限公司 Data integration method and device
CN109413096B (en) * 2018-11-30 2019-08-09 北京海泰方圆科技股份有限公司 A kind of login method and device more applied
CN110225104B (en) * 2019-05-24 2020-04-21 深圳市明源云科技有限公司 Data acquisition method and device and terminal equipment

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6401211B1 (en) * 1999-10-19 2002-06-04 Microsoft Corporation System and method of user logon in combination with user authentication for network access
CN102065082A (en) * 2010-12-07 2011-05-18 深圳市闪电通讯技术有限公司 Method for logging in multiple web application programs with one account
CN102438000A (en) * 2011-03-11 2012-05-02 奇智软件(北京)有限公司 Multi-account logon method and device
CN103065080A (en) * 2012-12-21 2013-04-24 广东欧珀移动通信有限公司 Application program login method and device
CN105045488A (en) * 2015-08-12 2015-11-11 广东欧珀移动通信有限公司 Application start control method and mobile terminal
CN105099985A (en) * 2014-04-21 2015-11-25 百度在线网络技术(北京)有限公司 Login method and device of multiple applications
CN107147644A (en) * 2017-05-10 2017-09-08 四川长虹电器股份有限公司 It is a kind of to realize the method that mobile APP user logs in single equipment

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6401211B1 (en) * 1999-10-19 2002-06-04 Microsoft Corporation System and method of user logon in combination with user authentication for network access
CN102065082A (en) * 2010-12-07 2011-05-18 深圳市闪电通讯技术有限公司 Method for logging in multiple web application programs with one account
CN102438000A (en) * 2011-03-11 2012-05-02 奇智软件(北京)有限公司 Multi-account logon method and device
CN103065080A (en) * 2012-12-21 2013-04-24 广东欧珀移动通信有限公司 Application program login method and device
CN105099985A (en) * 2014-04-21 2015-11-25 百度在线网络技术(北京)有限公司 Login method and device of multiple applications
CN105045488A (en) * 2015-08-12 2015-11-11 广东欧珀移动通信有限公司 Application start control method and mobile terminal
CN107147644A (en) * 2017-05-10 2017-09-08 四川长虹电器股份有限公司 It is a kind of to realize the method that mobile APP user logs in single equipment

Also Published As

Publication number Publication date
CN108023881A (en) 2018-05-11

Similar Documents

Publication Publication Date Title
CN108023881B (en) Application login method, device, medium and electronic equipment
CN107026832B (en) Account login method, device and server
NZ751426A (en) Iot provisioning service
EP3389295A1 (en) Multi-terminal mapping system and method for virtual sim card
CN108540433B (en) User identity verification method and device
CN109951435B (en) Equipment identifier providing method and device and risk control method and device
CN105072133A (en) Login method and device for application program
CN106464667B (en) Certificate management method, equipment and system
US20190068576A1 (en) Method, apparatus and system for remote controlling intelligent devices
ES2785048T3 (en) Automatic connection to an online service
CN105100022A (en) Cipher processing method, server and system
CN105592083B (en) Method and device for terminal to access server by using token
CN109726545B (en) Information display method, equipment, computer readable storage medium and device
CN104980420A (en) Business processing method, device, terminal and server
US10205545B2 (en) Resource creation method and apparatus
CN111541649B (en) Password resetting method and device, server and storage medium
CN103546426A (en) Information sharing method and management server
US11777742B2 (en) Network device authentication
WO2017020551A1 (en) Method and device for managing wireless access point
CN107995214B (en) Website login method and related equipment
CN113301557B (en) eSIM card state management method, device, equipment and storage medium
CN105812138A (en) Logging-in processing method, processing device, user terminal, and logging-in system
CN111092949B (en) Method and device for registering equipment
CN114554251A (en) Multimedia data request method and device, storage medium and electronic device
CN104753755A (en) System access method, system access device, application client, and IM background system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant