CN108900559B - Login certificate management method and device, computer equipment and storage medium - Google Patents

Login certificate management method and device, computer equipment and storage medium Download PDF

Info

Publication number
CN108900559B
CN108900559B CN201811124257.2A CN201811124257A CN108900559B CN 108900559 B CN108900559 B CN 108900559B CN 201811124257 A CN201811124257 A CN 201811124257A CN 108900559 B CN108900559 B CN 108900559B
Authority
CN
China
Prior art keywords
login
server
application program
renewal
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811124257.2A
Other languages
Chinese (zh)
Other versions
CN108900559A (en
Inventor
周鹏
胡御宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Puhui Enterprise Management Co Ltd
Original Assignee
Ping An Puhui Enterprise Management Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Puhui Enterprise Management Co Ltd filed Critical Ping An Puhui Enterprise Management Co Ltd
Priority to CN201811124257.2A priority Critical patent/CN108900559B/en
Publication of CN108900559A publication Critical patent/CN108900559A/en
Application granted granted Critical
Publication of CN108900559B publication Critical patent/CN108900559B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The embodiment of the application discloses a method and a device for managing login credentials, computer equipment and a storage medium, wherein the method comprises the following steps: acquiring login information corresponding to a login application program, and sending the login information to a server so that the server verifies the login information and generates a login credential after the verification is passed; receiving a login certificate sent by the server, wherein the login certificate comprises aging duration; detecting whether a network request is sent to the server within the aging time length; if the network request is not sent to the server within the aging time, judging whether the operation parameters of the application program meet preset operation conditions; and if the operating parameters of the application program meet the preset operating conditions, sending a renewal request to the server to complete the renewal of the login credentials. The method can avoid the trouble that the login certificate is out of date and needs to be operated again, thereby improving the experience degree of the user.

Description

Login certificate management method and device, computer equipment and storage medium
Technical Field
The present application relates to the field of communications technologies, and in particular, to a method and an apparatus for managing login credentials, a computer device, and a storage medium.
Background
At present, when logging in an application program, a user is required to input an account and a password and send the account and the password to a back-end server of the application program for verification, the server returns a specific login token (login certificate) to the user after the verification is successful, and the token is required to be taken to identify the identity of the user when a subsequent user sends a network request. Currently, the log-in token is fixed in the industry for more than ten minutes without initiating a request, and the token automatically fails. However, in a particularly complex and time-consuming scenario, for example, a user is required to fill in a large amount of data at a time, if the operation duration of the user exceeds ten minutes, an error is reported when the user sends a network request again (i.e., token fails), and the user needs to log in again for verification, thereby resulting in poor user experience.
Disclosure of Invention
The application provides a login credential management method and device, a computer device and a storage medium, aiming at improving the experience degree of a user.
The application provides a login credential management method, which comprises the following steps:
acquiring login information corresponding to a login application program, and sending the login information to a server so that the server verifies the login information and generates a login credential after the verification is passed;
receiving a login certificate sent by the server, wherein the login certificate comprises aging duration;
detecting whether a network request is sent to the server within the aging time length;
if the network request is not sent to the server within the aging time, judging whether the operation parameters of the application program meet preset operation conditions;
and if the operating parameters of the application program meet the preset operating conditions, sending a renewal request to the server to complete the renewal of the login credentials.
The application provides a management device of login credentials, which comprises:
the acquisition and sending unit is used for acquiring login information corresponding to a login application program, sending the login information to a server so that the server verifies the login information and generates a login credential after the verification is passed;
the certificate receiving unit is used for receiving login certificates sent by the server, and the login certificates comprise time duration;
the request detection unit is used for detecting whether a network request is sent to the server within the aging duration;
the condition judgment unit is used for judging whether the operation parameters of the application program meet preset operation conditions or not if the network request is not sent to the server within the aging duration;
and the request sending unit is used for sending a renewal request to the server to complete the renewal of the login credentials if the operation parameters of the application program meet the preset operation conditions.
The application also provides a computer device, which comprises a memory, a processor and a computer program stored on the memory and capable of running on the processor, wherein the processor executes the program to realize the steps of the login credential management method provided by any item in the application.
The present application further provides a computer storage medium, wherein the computer storage medium stores a computer program, and when the computer program is executed by a processor, the processor executes the steps of the method for managing login credentials according to any embodiment provided in the present application.
The embodiment of the application provides a management method and device of login credentials, computer equipment and a storage medium, wherein the login information corresponding to a login application program is acquired and sent to a server so that the login information of the server is verified and the login credentials are generated after the verification is passed; receiving a login credential sent by the server, wherein the login credential comprises an aging duration; when detecting that the network request is not sent within the time-efficiency duration of the login certificate, judging whether the operation parameters of the application program meet preset operation conditions; and if the operation parameters of the application program meet the preset operation conditions, completing the renewal of the login credentials according to preset renewal rules corresponding to the preset operation conditions. Therefore, the trouble that the login certificate needs to be operated again due to expiration is avoided, and the experience degree of the user is improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
FIG. 1 is a schematic flow chart diagram illustrating a method for managing login credentials according to an embodiment of the present application;
FIG. 2 is a schematic flow chart diagram providing steps for determining that an operating condition is satisfied according to an embodiment of the present application;
FIG. 3 is a schematic flow chart diagram illustrating steps for sending a renewal request according to one embodiment of the present application;
FIG. 4 is a schematic flow chart diagram illustrating steps provided in another embodiment of the present application for determining that an operating condition is satisfied;
FIG. 5 is a schematic flow chart diagram illustrating the steps for sending a renewal request as provided in another embodiment of the present application;
FIG. 6 is a schematic block diagram of a device for managing login credentials according to another embodiment of the present application;
fig. 7 is a schematic block diagram of a computer device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all, embodiments of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It will be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It is also to be understood that the terminology used in the description of the present application herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in the specification of the present application and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be further understood that the term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items.
Referring to fig. 1, fig. 1 is a schematic flowchart illustrating a method for managing login credentials according to an embodiment of the present application. The management method is applied to a terminal, and the terminal can be an electronic device such as a smart phone, a tablet computer, a notebook computer, a desktop computer, a personal digital assistant and a wearable device. As shown in fig. 1, the management method includes steps S101 to S105.
S101, obtaining login information corresponding to a login application program, sending the login information to a server to enable the server to verify the login information and generate a login credential after the login information passes verification.
Specifically, a terminal acquires login information input by a user when the user logs in an application program, wherein the login information comprises: and the login account and the login password are input by the user and submitted to the server corresponding to the application program.
The server verifies the login account and the login password, generates a login certificate (token value) if the login account and the login password pass the verification, stores the login certificate in a database, and simultaneously returns the login certificate to the terminal. After receiving the returned token value, the client (client of the application program) in the terminal can store the token value in a local memory as a common parameter, that is, the token value is carried by the client (client of the application program) every time the server is requested, and the token value is submitted to the server so that the server can verify the token value.
After receiving the network request, the server extracts the token value from the network request and compares and checks the token value with the token value stored in the database. If the two token values are the same, the user logs in successfully and is in a login state currently, and at the moment, data is returned normally, so that the application program displays the data. If the two token values are inconsistent, the original login is invalid, and an error state code is returned at the moment to prompt the user to jump to the login interface to log in again.
S102, receiving a login credential sent by the server, wherein the login credential comprises aging duration.
Specifically, the server verifies the login information, and generates a login credential according to the login information after the verification is passed, where the login credential includes an aging duration, the aging duration refers to an effective duration of the login credential, for example, the aging duration is 10 minutes, and if a network request is still not sent to the server after the terminal receives the login credential 10 minutes, the login credential is automatically aged.
S103, detecting whether a network request is sent to the server within the aging time length.
Specifically, the terminal detects whether a network request is sent to the server within the aging time period, wherein the network request comprises a login credential. If the network request is detected to be sent within the aging duration, continuing to repeatedly execute the step S103; if it is detected that the network request is not sent within the aging duration, step S104 is executed.
And S104, judging whether the operation parameters of the application program meet preset operation conditions.
Specifically, if a network request is not sent to the server within the aging time period, whether the operation parameters of the application program meet preset operation conditions is judged. Step S104 includes a step of determining that the operating condition is satisfied, and as shown in fig. 2, the step specifically includes the following steps:
s104a, detecting whether the application program is in a foreground running state of the terminal; s104b, if the application program is in the foreground running state of the terminal, detecting whether an operation action occurs on a program interface of the application program; s104c, if the operation action occurs on the program interface of the application program, judging that the operation parameters of the application program meet the preset operation conditions.
Specifically, when a program interface of the opened application program is displayed on a screen of the terminal, the application program is judged to be in a foreground running state of the terminal. When detecting that a user operates the program interface, such as inputting text information, sliding operation or clicking operation, the operation parameters of the application program are judged to meet the preset operation conditions.
S105, if the operation parameters of the application program meet the preset operation conditions, sending a renewal request to the server to complete the renewal of the login credentials.
Specifically, if the operation parameters of the application program meet the preset operation conditions, a renewal request is sent to the server to complete the renewal of the login credentials according to the renewal request.
Step S105 includes a step of sending a renewal request, as shown in fig. 3, which specifically includes the following steps: s1051, determining a preset sending period according to the aging duration; s1052, sending a renewal request to the server according to the sending period to complete the renewal of the login credentials.
Specifically, the sending period corresponding to the aging duration in the login credential may be determined according to a preset correspondence between the aging duration and the sending period, where the duration corresponding to the sending period is smaller than the aging duration, for example, the aging duration is 10 minutes, and the sending period is 8 minutes. And automatically sending a renewal request to the server according to the determined sending period, wherein the renewal request can be a common network request, the network request comprises the login credential, and the server completes the renewal of the login credential according to the renewal request.
In this embodiment, the management method obtains login information corresponding to a login application program, and sends the login information to a server so that the server verifies the login information and generates a login credential after the verification passes; receiving a login certificate sent by the server, wherein the login certificate comprises aging duration; when the network request is not sent within the time-efficiency duration of the login credential, judging whether the operation parameters of the application program meet preset operation conditions or not; and if the operation parameters of the application program meet the preset operation conditions, completing the renewal of the login credentials according to preset renewal rules corresponding to the preset operation conditions. Therefore, the trouble that the login certificate needs to be operated again due to expiration is avoided, and the experience degree of the user is improved.
In an embodiment, step S104 includes another step of determining that the operating condition is satisfied, as shown in fig. 4, the step specifically includes the following steps:
s1041, detecting whether the application program is in a foreground running state of the terminal; s1042, detecting whether an operation action occurs on a program interface of the application program; s1043, detecting whether the current task of the application program is completed; s1044, judging that the operating parameters of the application program meet the preset operating conditions; s1045, judging that the operation parameters of the application program meet the preset operation conditions; and S1045, judging that the operation parameters of the application program do not meet the preset operation conditions.
Detecting whether the application program is in a foreground running state of the terminal; if the application program is in a foreground running state of the terminal, detecting whether an operation action occurs on a program interface of the application program; if the application program is in the background running state of the terminal, detecting whether the current task of the application program is finished; if an operation action occurs on a program interface of the application program, judging that the operation parameters of the application program meet the preset operation conditions; if the current task of the application program is not finished, judging that the operation parameters of the application program meet the preset operation conditions; if no operation action occurs on the program interface of the application program, judging that the operation parameters of the application program do not meet the preset operation conditions; and if the current task of the application program is finished, judging that the operation parameters of the application program do not meet the preset operation conditions.
Specifically, when a program interface of the opened application program is displayed on a screen of the terminal, the application program is judged to be in a foreground running state of the terminal. When detecting that the user operates the program interface, such as inputting text information, sliding operation or clicking operation, the operation parameters of the application program are judged to meet the preset operation conditions. And when the corresponding thread of the application program still exists in a task stack of a terminal system and a program interface of the application program is not displayed on a screen of the terminal, judging that the application program is in a background running state of the terminal. If the application program is in a background running state of the terminal, detecting whether the current task of the application program is completed, for example, whether a registration information is filled in and whether a confirmation operation is clicked or not, and if the confirmation operation is not clicked, indicating that the current task of the application program is not completed; and if the current task of the application program is not finished, judging that the operation parameters of the application program meet the preset operation conditions. Thereby further enhancing the user experience.
In an embodiment, step S105 includes another step of sending a renewal request, as shown in fig. 5, which specifically includes the following steps: s105, 105a, generating a renewal request according to the login credential; s105b, calling a preset interface to send the renewal request to the server so that the server can prolong the aging time of the login credentials according to the renewal request.
Specifically, a renewal request is generated according to the login credentials, and a renewal duration can be included in the renewal request. A preset API interface may be set in the background of the application program, where the preset API interface is configured to send a renewal request to the server, send a renewal request to the server by calling the preset API interface, so that the server completes the renewal of the login credentials after the login credentials in the renewal request are verified and according to the duration, and return to perform step S103. Repeated sending of renewal requests to the server can thereby be avoided.
In addition, after receiving the login credential sent by the server, the method further includes: acquiring a host identity of the server; encrypting the login certificate according to the host identity based on a preset encryption rule; and storing the encrypted login credentials in a local memory of the terminal. The information security of the user can be improved, and illegal verification is avoided. Meanwhile, when a renewal request is generated according to the login credentials, specifically, the renewal request is generated according to the encrypted login credentials and a preset decryption rule, wherein the preset decryption rule corresponds to the preset encryption rule; sending the renewal request to the server so that the server completes the renewal of the login credentials according to the renewal request. Therefore, the login certificate can be prevented from being illegally tampered without being practical for a long time, and the experience degree of a user is improved.
Fig. 6 is a schematic block diagram of a login credential management apparatus according to an embodiment of the present application. As shown in fig. 6, the present application also provides a management apparatus of login credentials corresponding to the above management method of login credentials. The management apparatus of the login credential includes a unit for executing the above-described management method of the login credential, and the apparatus may be configured in a terminal. As shown in fig. 6, the login credential management apparatus 500 includes: an acquisition transmitting unit 501, a credential receiving unit 502, a request detecting unit 503, a condition judging unit 504, and a request transmitting unit 505.
An obtaining and sending unit 501, configured to obtain login information corresponding to a login application, send the login information to a server, so that the server verifies the login information and generates a login credential after the verification is passed;
a credential receiving unit 502, configured to receive a login credential sent by the server, where the login credential includes an aging duration.
Wherein, the credential receiving unit 502 is further configured to: acquiring a host identity of the server; encrypting the login certificate according to the host identity based on a preset encryption rule; and storing the encrypted login credentials in a local memory of the terminal.
A request detecting unit 503, configured to detect whether a network request is sent to the server within the aging duration.
A condition determining unit 504, configured to determine whether an operating parameter of the application satisfies a preset operating condition if a network request is not sent to the server within the aging duration.
The condition determining unit 504 includes: state detection sub-unit 5041, action detection sub-unit 5042, and condition determination sub-unit 5043. Specifically, the state detection subunit 5041 is configured to detect whether the application is in a foreground running state of the terminal; an action detection subunit 5042, configured to detect whether an operation action occurs on a program interface of the application program if the application program is in a foreground running state of the terminal; a condition determining subunit 5043, configured to determine that the running parameter of the application satisfies the preset running condition if an operation occurs on a program interface of the application.
A request sending unit 505, configured to send a renewal request to the server to complete a renewal of the login credential if the operation parameter of the application satisfies the preset operation condition.
The request sending unit 505 includes: a period determination sub-unit 5051 and a request-sending sub-unit 5052. Specifically, the period determination subunit 5051 is configured to determine a preset sending period according to the aging duration; a request sending sub-unit 5052, configured to send a renewal request to the server according to the sending period to complete the renewal of the login credential.
The request sending unit 505 is further configured to: generating a renewal request according to the encrypted login credentials and a preset decryption rule, wherein the preset decryption rule corresponds to the preset encryption rule; sending the renewal request to the server so that the server completes the renewal of the login credentials according to the renewal request.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the management apparatus and unit for login credentials described above may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
The above-described apparatus may be implemented in the form of a computer program which is executable on a computer device as shown in fig. 7.
Referring to fig. 7, fig. 7 is a schematic block diagram of a computer device according to an embodiment of the present application. The computer device 700 may be a terminal.
Referring to fig. 7, the computer device 700 includes a processor 720, a memory, which may include a non-volatile storage medium 730 and an internal memory 740, and a network interface 750, which are connected by a system bus 710.
The non-volatile storage medium 730 may store an operating system 731 and computer programs 732. The computer programs 732, when executed, enable the processor 720 to perform any of a variety of methods for managing login credentials.
The processor 720 is used to provide computing and control capabilities, supporting the operation of the overall computer device 700.
The internal memory 740 provides an environment for the execution of the computer program 732 in the non-volatile storage medium 730, and when the computer program 732 is executed by the processor 720, the processor 720 can be caused to perform any one of the methods for managing login credentials.
The network interface 750 is used for network communication such as sending assigned tasks and the like. Those skilled in the art will appreciate that the architecture shown in fig. 7 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing device 700 to which the disclosed aspects apply, as a particular computing device 700 may include more or less components than those shown, or may combine certain components, or have a different arrangement of components. Wherein the processor 720 is configured to execute the program code stored in the memory to perform the following steps:
acquiring login information corresponding to a login application program, and sending the login information to a server so that the server verifies the login information and generates a login credential after the verification is passed; receiving a login certificate sent by the server, wherein the login certificate comprises aging duration; detecting whether a network request is sent to the server within the aging time length; if the network request is not sent to the server within the aging time, judging whether the operation parameters of the application program meet preset operation conditions; and if the operating parameters of the application program meet the preset operating conditions, sending a renewal request to the server to complete the renewal of the login credentials.
In an embodiment, the processor 720 is configured to execute the program code stored in the memory to implement the following steps when determining whether the operation parameter of the application program meets the preset operation condition:
detecting whether the application program is in a foreground running state of the terminal; if the application program is in a foreground running state of the terminal, detecting whether an operation action occurs on a program interface of the application program; and if the operation action occurs on the program interface of the application program, judging that the operation parameters of the application program meet the preset operation conditions.
In an embodiment, the processor 720 is configured to execute the program code stored in the memory to implement the following steps after detecting whether the application program is in the foreground operating state of the terminal:
if the application program is in the background running state of the terminal, detecting whether the current task of the application program is finished; and if the current task of the application program is not finished, judging that the operation parameters of the application program meet the preset operation conditions.
In an embodiment, the processor 720 is configured to execute the program code stored in the memory to implement the following steps when the sending of the renewal request to the server is completed to renew the login credential:
determining a preset sending period according to the aging duration; sending a renewal request to the server according to the sending period to complete the renewal of the login credentials
In an embodiment, the processor 720 is configured to execute the program code stored in the memory to implement the following steps when the sending of the renewal request to the server is completed to renew the login credential:
generating a renewal request according to the login certificate; and calling a preset interface to send the renewal request to the server so that the server prolongs the aging time of the login credentials according to the renewal request.
In one embodiment, the processor 720 is configured to execute the program code stored in the memory to implement the following steps after detecting whether to send a network request to the server within the aging duration:
if the network request is detected to be sent in the aging duration, the step of detecting whether the network request is sent to the server in the aging duration is continuously and repeatedly executed.
In an embodiment, the processor 720 is configured to execute the program code stored in the memory to implement the following steps after receiving the login credential sent by the server:
acquiring a host identity of the server; encrypting the login certificate according to the host identity based on a preset encryption rule; and storing the encrypted login credentials in a local memory of the terminal.
It should be understood that, in the embodiment of the present Application, the Processor 720 may be a Central Processing Unit (CPU), and the Processor 720 may also be other general-purpose processors, Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components, and the like. Wherein a general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
Those skilled in the art will appreciate that the configuration of computer device 700 depicted in FIG. 7 is not intended to be limiting of computer device 700 and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
It will be understood by those skilled in the art that all or part of the processes in the methods of the above embodiments may be implemented by hardware related to instructions of a computer program, and the computer program may be stored in a storage medium, which is a computer-readable storage medium. In the embodiment of the present invention, the computer program may be stored in a storage medium of a computer system and executed by at least one processor in the computer system to implement the flow steps of the embodiments including the methods as described above.
The computer readable storage medium may be a magnetic disk, an optical disk, a usb disk, a removable hard disk, a Read-Only Memory (ROM), a magnetic disk or an optical disk, etc. which can store program codes.
Those of ordinary skill in the art will appreciate that the elements and algorithm steps of the examples described in connection with the embodiments disclosed herein may be embodied in electronic hardware, computer software, or combinations of both, and that the components and steps of the examples have been described in a functional general in the foregoing description for the purpose of illustrating clearly the interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the several embodiments provided in the present application, it should be understood that the disclosed device and method for managing login credentials may be implemented in other ways. For example, the above-described embodiments of a management apparatus for login credentials are merely illustrative. For example, the division of each unit is only one logic function division, and there may be another division manner in actual implementation. For example, various elements or components may be combined or may be integrated into another system, or some features may be omitted, or not implemented.
The steps in the method of the embodiment of the application can be sequentially adjusted, combined and deleted according to actual needs.
The units in the device of the embodiment of the application can be combined, divided and deleted according to actual needs.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be substantially or partially implemented in the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, a terminal, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application.
While the invention has been described with reference to specific embodiments, the scope of the invention is not limited thereto, and those skilled in the art can easily conceive various equivalent modifications or substitutions within the technical scope of the invention. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (8)

1. A method for managing login credentials, comprising:
acquiring login information corresponding to a login application program, and sending the login information to a server so that the server verifies the login information and generates a login credential after the verification is passed;
receiving a login certificate sent by the server, wherein the login certificate comprises aging duration;
detecting whether a network request is sent to the server within the aging time length;
if the network request is not sent to the server within the aging time, detecting whether the application program is in a foreground running state of the terminal;
if the application program is in a foreground running state of the terminal, detecting whether an operation action occurs on a program interface of the application program;
if the program interface of the application program has operation action, sending a renewal request to the server to complete the renewal of the login certificate;
if the application program is in the background running state of the terminal, detecting whether the current task of the application program is finished;
if the current task of the application program is not finished, the step of sending a renewal request to the server to finish the renewal of the login credentials is executed.
2. The method for managing login credentials according to claim 1, wherein said sending a renewal request to said server for completing the renewal of said login credentials comprises:
determining a preset sending period according to the aging duration;
and sending a renewal request to the server according to the sending period so as to complete the renewal of the login credentials.
3. The method for managing login credentials according to claim 1, wherein said sending a renewal request to said server for completing the renewal of said login credentials comprises:
generating a renewal request according to the login certificate;
and calling a preset interface to send the renewal request to the server so that the server prolongs the aging time of the login credentials according to the renewal request.
4. The method for managing login credentials according to claim 1, further comprising, after receiving the login credentials sent by the server:
acquiring a host identity of the server;
encrypting the login certificate according to the host identity based on a preset encryption rule;
and storing the encrypted login credentials in a local memory of the terminal.
5. The method for managing login credentials according to claim 1, wherein said detecting whether to send a network request to said server within said aging duration further comprises:
if the network request is detected to be sent in the aging duration, the step of detecting whether the network request is sent to the server in the aging duration is continuously and repeatedly executed.
6. A login credential management apparatus, comprising:
the acquisition and sending unit is used for acquiring login information corresponding to a login application program, sending the login information to a server so that the server verifies the login information and generates a login credential after the verification is passed;
the certificate receiving unit is used for receiving a login certificate sent by the server, and the login certificate comprises aging duration;
the request detection unit is used for detecting whether a network request is sent to the server within the aging duration;
a state detection subunit, configured to detect whether the application program is in a foreground operating state of the terminal if a network request is not sent to the server within the aging duration;
the action detection subunit is used for detecting whether an operation action occurs on a program interface of the application program if the application program is in a foreground running state of the terminal; or detecting whether the current task of the application program is finished or not if the application program is in the background running state of the terminal;
a request sending unit, configured to send a renewal request to the server to complete a renewal of the login credential if an operation occurs on a program interface of the application; or if the current task of the application program is not completed, executing the step of sending a renewal request to the server to complete the renewal of the login credentials.
7. Computer arrangement comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the steps of the method according to any one of claims 1 to 5 when executing the computer program.
8. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer program which, when executed by a processor, causes the processor to carry out the steps of the method according to any one of claims 1 to 5.
CN201811124257.2A 2018-09-26 2018-09-26 Login certificate management method and device, computer equipment and storage medium Active CN108900559B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811124257.2A CN108900559B (en) 2018-09-26 2018-09-26 Login certificate management method and device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811124257.2A CN108900559B (en) 2018-09-26 2018-09-26 Login certificate management method and device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN108900559A CN108900559A (en) 2018-11-27
CN108900559B true CN108900559B (en) 2022-08-05

Family

ID=64360345

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811124257.2A Active CN108900559B (en) 2018-09-26 2018-09-26 Login certificate management method and device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN108900559B (en)

Families Citing this family (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110166529A (en) * 2019-04-16 2019-08-23 平安普惠企业管理有限公司 It keeps logging in state method, apparatus, equipment and storage medium
CN110298162A (en) * 2019-05-22 2019-10-01 深圳壹账通智能科技有限公司 Application client login method, device, computer equipment and storage medium
CN110166563A (en) * 2019-05-27 2019-08-23 杭州迪普科技股份有限公司 A kind of page login-timeout method for updating time and device
CN110445615B (en) * 2019-07-12 2021-08-31 平安普惠企业管理有限公司 Network request security verification method, device, medium and electronic equipment
CN110381078B (en) * 2019-07-29 2021-10-26 迈普通信技术股份有限公司 Method and device for determining token duration, electronic equipment and storage medium
CN111258602B (en) * 2020-01-10 2023-06-30 百度在线网络技术(北京)有限公司 Information updating method and device
CN111460411B (en) * 2020-04-17 2023-08-04 支付宝(杭州)信息技术有限公司 Method and system for keeping login state
CN111756738A (en) * 2020-06-24 2020-10-09 昆明东电科技有限公司 System framework for quickly constructing Web application, data processing method and system
CN112910876B (en) * 2021-01-27 2023-04-28 北京水滴科技集团有限公司 Login method and device and electronic equipment
CN113568543A (en) * 2021-06-30 2021-10-29 北京达佳互联信息技术有限公司 Information processing method, information processing device, electronic equipment and storage medium
CN113542256B (en) * 2021-07-12 2023-08-22 苏州达家迎信息技术有限公司 Method, device, equipment and storage medium for updating login credentials in client
CN113391858A (en) * 2021-07-12 2021-09-14 苏州达家迎信息技术有限公司 Page loading method and device in client, computer equipment and medium
CN113422784B (en) * 2021-07-12 2023-03-24 苏州达家迎信息技术有限公司 Login certificate updating method and device, computer equipment and storage medium
CN114124382B (en) * 2021-12-01 2024-04-09 深圳市闪剪智能科技有限公司 Credential updating method, system, device and storage medium
CN115396277B (en) * 2022-08-24 2024-01-02 数字广东网络建设有限公司 Login state management method, device, equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106372922A (en) * 2015-07-21 2017-02-01 深圳市银信网银科技有限公司 Method and system for segmented modification of validity periods of all stages of electronic certificate
CN107135218A (en) * 2017-05-04 2017-09-05 腾讯科技(深圳)有限公司 Log in state acquisition, sending method, voucher collocation method, client and server
CN108322461A (en) * 2018-01-31 2018-07-24 百度在线网络技术(北京)有限公司 Method, system, device, equipment and the medium of application program automated log on

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104580074B (en) * 2013-10-14 2018-08-24 阿里巴巴集团控股有限公司 The login method of client application and its corresponding server

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106372922A (en) * 2015-07-21 2017-02-01 深圳市银信网银科技有限公司 Method and system for segmented modification of validity periods of all stages of electronic certificate
CN107135218A (en) * 2017-05-04 2017-09-05 腾讯科技(深圳)有限公司 Log in state acquisition, sending method, voucher collocation method, client and server
CN108322461A (en) * 2018-01-31 2018-07-24 百度在线网络技术(北京)有限公司 Method, system, device, equipment and the medium of application program automated log on

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于Kerberos的Web应用系统的认证系统设计与实现;齐辰雄;《中国优秀硕士学位论文全文数据库 信息科技辑》;20150315;全文 *

Also Published As

Publication number Publication date
CN108900559A (en) 2018-11-27

Similar Documents

Publication Publication Date Title
CN108900559B (en) Login certificate management method and device, computer equipment and storage medium
US11431501B2 (en) Coordinating access authorization across multiple systems at different mutual trust levels
US9607147B2 (en) Method and device for detecting software-tampering
CN111917773B (en) Service data processing method and device and server
JP6859512B2 (en) Methods and devices for authenticated login
US11258784B2 (en) Ownership maintenance in a multi-tenant environment
TW201802731A (en) Electronic payment service processing and electronic payment method and device
CN107211030B (en) Use the method for intelligent image anti-phishing, system, mobile device and medium
CN110708335A (en) Access authentication method and device and terminal equipment
CN109842616B (en) Account binding method and device and server
CN106452774B (en) Method and device for controlling access authority based on single sign-on protocol
CN111585954A (en) Authentication method, authentication device, computer equipment and storage medium
US20180004934A1 (en) Systems and methods to enable automatic password management in a proximity based authentication
CN111294337A (en) Token-based authentication method and device
CN113761498A (en) Third party login information hosting method, system, equipment and storage medium
US10783238B2 (en) Automating password change management
CN110677423A (en) Data acquisition method and device based on client agent side and computer equipment
CN111259368A (en) Method and equipment for logging in system
CN108259456B (en) Method, device, equipment and computer storage medium for realizing user login-free
CN109241728B (en) Method and device for acquiring password information, computer equipment and storage medium
US20150326577A1 (en) Accelerated application authentication and content delivery
CN113849801A (en) Single sign-on method and device, computer equipment and storage medium
JP2018147444A (en) Computer system for executing analysis program and method for monitoring execution of analysis program
CN108768973B (en) Trusted application operation request auditing method and trusted application management server
US10846395B2 (en) Detecting suspicious application overlays on a device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant