CN109522695A - Application program login method, computer end, mobile terminal, system and storage medium - Google Patents
Application program login method, computer end, mobile terminal, system and storage medium Download PDFInfo
- Publication number
- CN109522695A CN109522695A CN201811458034.XA CN201811458034A CN109522695A CN 109522695 A CN109522695 A CN 109522695A CN 201811458034 A CN201811458034 A CN 201811458034A CN 109522695 A CN109522695 A CN 109522695A
- Authority
- CN
- China
- Prior art keywords
- application program
- mobile terminal
- user
- login
- login account
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 55
- 238000003860 storage Methods 0.000 title claims abstract description 22
- 238000012795 verification Methods 0.000 claims abstract description 39
- 230000004044 response Effects 0.000 claims abstract description 34
- 238000001514 detection method Methods 0.000 claims abstract description 13
- 230000002159 abnormal effect Effects 0.000 claims abstract description 11
- 230000015654 memory Effects 0.000 claims description 26
- 230000005540 biological transmission Effects 0.000 claims description 24
- 230000005611 electricity Effects 0.000 claims description 4
- 210000004556 brain Anatomy 0.000 claims description 2
- 230000006870 function Effects 0.000 description 15
- 230000006854 communication Effects 0.000 description 12
- 238000004891 communication Methods 0.000 description 11
- 238000012545 processing Methods 0.000 description 11
- 238000010586 diagram Methods 0.000 description 7
- 230000033001 locomotion Effects 0.000 description 4
- 230000008569 process Effects 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 3
- 238000010295 mobile communication Methods 0.000 description 3
- 238000000605 extraction Methods 0.000 description 2
- 230000005764 inhibitory process Effects 0.000 description 2
- 239000004973 liquid crystal related substance Substances 0.000 description 2
- 230000007774 longterm Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 210000001747 pupil Anatomy 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 230000001133 acceleration Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000005314 correlation function Methods 0.000 description 1
- 238000005336 cracking Methods 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 230000008030 elimination Effects 0.000 description 1
- 238000003379 elimination reaction Methods 0.000 description 1
- 230000005484 gravity Effects 0.000 description 1
- 238000005286 illumination Methods 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 239000000203 mixture Substances 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 238000010606 normalization Methods 0.000 description 1
- 230000000149 penetrating effect Effects 0.000 description 1
- 238000009527 percussion Methods 0.000 description 1
- 230000011664 signaling Effects 0.000 description 1
- 230000005236 sound signal Effects 0.000 description 1
- 238000010897 surface acoustic wave method Methods 0.000 description 1
- 238000013519 translation Methods 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
- 238000005303 weighing Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2133—Verifying human interaction, e.g., Captcha
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Telephone Function (AREA)
Abstract
The invention discloses a kind of application program login method, computer end, mobile terminal, system and readable storage medium storing program for executing, this method comprises: the login account password of detection user's input is with the presence or absence of abnormal when the computer end receives application program logging request;If there is no exceptions for the login account password, iris recognition verification tip is sent to the mobile terminal bound with the login account;After receiving the response message that the iris recognition that the mobile terminal is sent is verified, the application program is logged in.By password authentification and iris verification double verification, identity and login safety to user authenticate the present invention, to improve login safety coefficient, ensure that the information security of user.
Description
Technical field
The present invention relates to Information Authentication technical field more particularly to a kind of application program login method, computer end, movements eventually
End, system and readable storage medium storing program for executing.
Background technique
With the high speed development of computer and Internet technology, the application program of more and more mobile terminals starts to release
It can be used for PC (PersonalComputer, personal computer) version of traditional computer, meanwhile, more and more traditional calculations
Machine program also starts to release APP (Application, the application program) version that can be used for mobile terminal.
User can log in simultaneously the APP version and PC version of same application in different terminals in many cases.But
User is to input account by user in most of the mode that the different terminals of same application are logged in the prior art
Number password carries out verifying login.This verification mode safety coefficient is lower, when user accidentally by account number cipher leakage or
When cracking acquisition by other people, other users can be obtained the personal information of user, be given by the account of other terminal login users
User causes greatly information security hidden danger.
Summary of the invention
The main purpose of the present invention is to provide a kind of application program login method, computer end, mobile terminal, systems and can
Read storage medium, it is intended to solve the not high enough technical problem of conventional application program login mode safety.
To achieve the above object, the embodiment of the present invention provides a kind of application program login method, and the application program logs in
Method is applied to computer end, and the application program login method includes:
When the computer end receives application program logging request, whether the login account password of detection user's input is deposited
In exception;
If there is no exceptions for the login account password, iris is sent to the mobile terminal bound with the login account
Identify verification tip;
After receiving the response message that the iris recognition that the mobile terminal is sent is verified, log in described using journey
Sequence.
Optionally, if there is no exceptions for the login account password, to the movement bound with the login account
Include: before the step of terminal transmission iris recognition verification tip
If the login account password judges active user's mode for guest mode or private mode there is no exception;
If active user's mode is private mode, then follow the steps: to the mobile terminal hair bound with the login account
Send iris recognition verification tip;
If active user's mode is guest mode, the first dynamic is sent to the mobile terminal bound with the login account
Password logs in institute when the second dynamic password for detecting user's input is consistent with first dynamic password with guest mode
State application program.
Optionally, described the step of sending iris recognition verification tip to the mobile terminal bound with the login account it
After include:
When receiving the iris recognition unsanctioned response message of verifying that the mobile terminal is sent, iris recognition is exported
Verify unsanctioned prompt information;
If the number that the iris recognition for receiving the mobile terminal transmission verifies unsanctioned response message reaches default
When frequency threshold value, then the login account is locked, and start timer;
After the timer reaches preset duration, the login account is unlocked.
Optionally, described when the computer end receives application program logging request, the login account of detection user's input
Number password includes: with the presence or absence of abnormal step
Judge whether the login account of user's input is corresponding with password;
If the login account of user's input is corresponding with password, it is different to determine that the login account password of user's input is not present
Often;
If user input login account it is not corresponding with password, determine user input login account password there are different
Often.
The embodiment of the present invention provides a kind of application program login method, and the application program login method is applied to mobile whole
The login account of end, the mobile terminal and application program is bound, and the application program login method includes:
It is mentioned in the iris recognition verifying for logging in the application program that the mobile terminal receives computer end transmission
When showing, iris recognition verifying is carried out to active user;
If iris recognition is verified, the response message that iris recognition is verified is sent to the computer end, is allowed
Computer end logs in the application program.
Optionally, the iris for being used to log in the application program that computer end transmission is received in the mobile terminal
When identifying verification tip, include: to the step of active user's progress iris recognition verifying
It is mentioned in the iris recognition verifying for logging in the application program that the mobile terminal receives computer end transmission
When showing, the presented iris characteristic of active user is acquired;
By the default rainbow of the presented iris characteristic and preset configuration in the mobile terminal or Cloud Server
Film characteristic is compared;
If comparison result is consistent, determine that iris recognition is verified;
If comparison result is inconsistent, determine that iris recognition verifying does not pass through.
The present invention also provides a kind of computer end, the computer end includes: memory, processor and is stored in the memory
Application program logging program that is upper and can running on the processor, the application program logging program are held by the processor
It realizes when row such as the step of above-mentioned application program login method.
The present invention also provides a kind of mobile terminal, the mobile terminal includes: memory, processor and is stored in described deposit
On reservoir and the application program logging program that can run on the processor, the application program logging program is by the processing
It realizes when device executes such as the step of above-mentioned application program login method.
The present invention also provides a kind of storage medium, application program logging program is stored on the storage medium, it is described to answer
It realizes when being executed by processor with program logging program such as the step of above-mentioned application program login method.
The present invention also provides a kind of application program login systems, which is characterized in that the application program login system includes
At least one is such as above-mentioned computer end, at least such as above-mentioned mobile terminal.
The present invention passes through the login account that when the computer end receives application program logging request, detection user is inputted
Password is with the presence or absence of abnormal;If there is no exceptions for the login account password, to the mobile end bound with the login account
End sends iris recognition verification tip;In the response message that the iris recognition for receiving the mobile terminal transmission is verified
Afterwards, the application program is logged in.Identity and login peace of the present invention by password authentification and iris verification double verification, to user
It is authenticated entirely, to improve login safety coefficient, ensure that the information security of user.
Detailed description of the invention
Fig. 1 is the hardware structural diagram of the embodiment of the present invention one optional mobile terminal;
Fig. 2 is the wireless communication device schematic diagram of mobile terminal in Fig. 1;
Fig. 3 is the flow diagram of application program login method first embodiment of the present invention;
Fig. 4 is the schematic diagram of a scenario that iris recognition of the present invention does not pass through pattern.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
In subsequent description, it is only using the suffix for indicating such as " module ", " component " or " unit " of element
Be conducive to explanation of the invention, itself there is no a specific meaning.Therefore, " module ", " component " or " unit " can mix
Ground uses.
Terminal can be implemented in a variety of manners.For example, terminal described in the present invention may include such as mobile phone, plate
Computer, laptop, palm PC, personal digital assistant (PersonalDigital Assistant, PDA), portable matchmaker
Body player (Portable Media Player, PMP), navigation device, wearable device, Intelligent bracelet, pedometer etc. are mobile
The computer ends such as terminal, and number TV, desktop computer.
It will be illustrated by taking mobile terminal as an example in subsequent descriptions, it will be appreciated by those skilled in the art that in addition to special
Except element for moving purpose, the construction of embodiment according to the present invention can also apply to the terminal of fixed type.
Referring to Fig. 1, a kind of hardware structural diagram of its mobile terminal of each embodiment to realize the present invention, the shifting
Dynamic terminal 100 may include: RF (Radio Frequency, radio frequency) unit 101, WiFi module 102, audio output unit
103, A/V (audio/video) input unit 104, sensor 105, display unit 106, user input unit 107, interface unit
108, the components such as memory 109, processor 110 and power supply 111.It will be understood by those skilled in the art that shown in Fig. 1
Mobile terminal structure does not constitute the restriction to mobile terminal, and mobile terminal may include components more more or fewer than diagram,
Perhaps certain components or different component layouts are combined.
It is specifically introduced below with reference to all parts of the Fig. 1 to mobile terminal:
Radio frequency unit 101 can be used for receiving and sending messages or communication process in, signal sends and receivees, specifically, by base station
Downlink information receive after, to processor 110 handle;In addition, the data of uplink are sent to base station.In general, radio frequency unit 101
Including but not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier, duplexer etc..In addition, penetrating
Frequency unit 101 can also be communicated with network and other equipment by wireless communication.Any communication can be used in above-mentioned wireless communication
Standard or agreement, including but not limited to GSM (Global System of Mobile communication, global system for mobile telecommunications
System), GPRS (General Packet Radio Service, general packet radio service), CDMA2000 (Code
Division Multiple Access 2000, CDMA 2000), WCDMA (Wideband Code Division
Multiple Access, wideband code division multiple access), TD-SCDMA (Time Division-Synchronous Code
Division Multiple Access, TD SDMA), FDD-LTE (Frequency Division
Duplexing-Long Term Evolution, frequency division duplex long term evolution) and TDD-LTE (Time Division
Duplexing-Long Term Evolution, time division duplex long term evolution) etc..
WiFi belongs to short range wireless transmission technology, and mobile terminal can help user to receive and dispatch electricity by WiFi module 102
Sub- mail, browsing webpage and access streaming video etc., it provides wireless broadband internet access for user.Although Fig. 1 shows
Go out WiFi module 102, but it is understood that, and it is not belonging to must be configured into for mobile terminal, it completely can be according to need
It to omit within the scope of not changing the essence of the invention.
Audio output unit 103 can be in call signal reception pattern, call mode, record mould in mobile terminal 100
When under the isotypes such as formula, speech recognition mode, broadcast reception mode, by radio frequency unit 101 or WiFi module 102 it is received or
The audio data stored in memory 109 is converted into audio signal and exports to be sound.Moreover, audio output unit 103
Audio output relevant to the specific function that mobile terminal 100 executes can also be provided (for example, call signal receives sound, disappears
Breath receives sound etc.).Audio output unit 103 may include loudspeaker, buzzer etc..
A/V input unit 104 is for receiving audio or video signal.A/V input unit 104 may include graphics processor
(Graphics Processing Unit, GPU) 1041 and microphone 1042, graphics processor 1041 is in video acquisition mode
Or the image data of the static images or video obtained in image capture mode by image capture apparatus (such as camera) carries out
Reason.Treated, and picture frame may be displayed on display unit 106.Through graphics processor 1041, treated that picture frame can be deposited
Storage is sent in memory 109 (or other storage mediums) or via radio frequency unit 101 or WiFi module 102.Mike
Wind 1042 can connect in telephone calling model, logging mode, speech recognition mode etc. operational mode via microphone 1042
Quiet down sound (audio data), and can be audio data by such acoustic processing.Audio that treated (voice) data can
To be converted to the format output that can be sent to mobile communication base station via radio frequency unit 101 in the case where telephone calling model.
Microphone 1042 can be implemented various types of noises elimination (or inhibition) algorithms and send and receive sound to eliminate (or inhibition)
The noise generated during frequency signal or interference.
Mobile terminal 100 further includes at least one sensor 105, such as optical sensor, motion sensor and other biographies
Sensor.Specifically, optical sensor includes ambient light sensor and proximity sensor, wherein ambient light sensor can be according to environment
The light and shade of light adjusts the brightness of display panel 1061, and proximity sensor can close when mobile terminal 100 is moved in one's ear
Display panel 1061 and/or backlight.As a kind of motion sensor, accelerometer sensor can detect in all directions (general
For three axis) size of acceleration, it can detect that size and the direction of gravity when static, can be used to identify the application of mobile phone posture
(such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, percussion) etc.;
The iris sensor that can also configure as mobile phone, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer,
The other sensors such as hygrometer, thermometer, infrared sensor, details are not described herein.
Display unit 106 is for showing information input by user or being supplied to the information of user.Display unit 106 can wrap
Display panel 1061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode can be used
Forms such as (Organic Light-Emitting Diode, OLED) configure display panel 1061.
User input unit 107 can be used for receiving the number or character information of input, and generate the use with mobile terminal
Family setting and the related key signals input of function control.Specifically, user input unit 107 may include touch panel 1071 with
And other input equipments 1072.Touch panel 1071, also referred to as touch screen collect the touch operation of user on it or nearby
(for example user uses any suitable objects or attachment such as finger, stylus on touch panel 1071 or in touch panel 1071
Neighbouring operation), and corresponding attachment device is driven according to preset formula.Touch panel 1071 may include touch detection
Two parts of device and touch controller.Wherein, the touch orientation of touch detecting apparatus detection user, and detect touch operation band
The signal come, transmits a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and by it
It is converted into contact coordinate, then gives processor 110, and order that processor 110 is sent can be received and executed.In addition, can
To realize touch panel 1071 using multiple types such as resistance-type, condenser type, infrared ray and surface acoustic waves.In addition to touch panel
1071, user input unit 107 can also include other input equipments 1072.Specifically, other input equipments 1072 can wrap
It includes but is not limited in physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse, operating stick etc.
It is one or more, specifically herein without limitation.
Further, touch panel 1071 can cover display panel 1061, when touch panel 1071 detect on it or
After neighbouring touch operation, processor 110 is sent to determine the type of touch event, is followed by subsequent processing device 110 according to touch thing
The type of part provides corresponding visual output on display panel 1061.Although in Fig. 1, touch panel 1071 and display panel
1061 be the function that outputs and inputs of realizing mobile terminal as two independent components, but in certain embodiments, it can
The function that outputs and inputs of mobile terminal is realized so that touch panel 1071 and display panel 1061 is integrated, is not done herein specifically
It limits.
Interface unit 108 be used as at least one external device (ED) connect with mobile terminal 100 can by interface.For example,
External device (ED) may include wired or wireless headphone port, external power supply (or battery charger) port, wired or nothing
Line data port, memory card port, the port for connecting the device with identification module, audio input/output (I/O) end
Mouth, video i/o port, ear port etc..Interface unit 108 can be used for receiving the input from external device (ED) (for example, number
It is believed that breath, electric power etc.) and the input received is transferred to one or more elements in mobile terminal 100 or can be with
For transmitting data between mobile terminal 100 and external device (ED).
Memory 109 can be used for storing software program and various data, and memory 109 can be situated between for a kind of storage of computer
Matter, the memory 109 are stored with prompting message program of the present invention.Memory 109 can mainly include storing program area and storage number
According to area, wherein storing program area can application program needed for storage program area, at least one function (for example sound plays function
Energy, image player function etc.) etc.;Storage data area can store according to mobile phone use created data (such as audio data,
Phone directory etc.) etc..In addition, memory 109 may include high-speed random access memory, it can also include non-volatile memories
Device, for example, at least a disk memory, flush memory device or other volatile solid-state parts.
Processor 110 is the control centre of mobile terminal, utilizes each of various interfaces and the entire mobile terminal of connection
A part by running or execute the software program and/or module that are stored in memory 109, and calls and is stored in storage
Data in device 109 execute the various functions and processing data of mobile terminal, to carry out integral monitoring to mobile terminal.Such as
Processor 110 executes the prompting message program in memory 109, to realize the step of each embodiment of message prompt method of the present invention
Suddenly.
Processor 110 may include one or more processing units;Optionally, processor 110 can integrate application processor and
Modem processor, wherein the main processing operation system of application processor, user interface and application program etc., modulation /demodulation
Processor mainly handles wireless communication.It is understood that above-mentioned modem processor can not also be integrated into processor 110
In.
Mobile terminal 100 can also include the power supply 111 (such as battery) powered to all parts, optionally, power supply 111
Can be logically contiguous by power-supply management system and processor 110, to realize management charging by power-supply management system, put
The functions such as electricity and power managed.
Although Fig. 1 is not shown, mobile terminal 100 can also be including bluetooth module etc., and details are not described herein.
Embodiment to facilitate the understanding of the present invention, the communications network system that mobile terminal of the invention is based below into
Row description.
Referring to Fig. 2, Fig. 2 is a kind of communications network system architecture diagram provided in an embodiment of the present invention, the communication network system
System is the LTE system of universal mobile communications technology, which includes UE (User Equipment, the use of successively communication connection
Family equipment) (the land Evolved UMTS Terrestrial Radio Access Network, evolved UMTS 201, E-UTRAN
Ground wireless access network) 202, EPC (Evolved Packet Core, evolved packet-based core networks) 203 and operator IP operation
204。
Specifically, UE201 can be above-mentioned terminal 100, and details are not described herein again.
E-UTRAN202 includes eNodeB2021 and other eNodeB2022 etc..Wherein, eNodeB2021 can be by returning
Journey (backhaul) (such as X2 interface) is connect with other eNodeB2022, and eNodeB2021 is connected to EPC203,
ENodeB2021 can provide the access of UE201 to EPC203.
EPC203 may include MME (Mobility Management Entity, mobility management entity) 2031, HSS
(Home Subscriber Server, home subscriber server) 2032, other MME2033, SGW (Serving Gate Way,
Gateway) 2034, PGW (PDN Gate Way, grouped data network gateway) 2035 and PCRF (Policy and
Charging Rules Function, policy and rate functional entity) 2036 etc..Wherein, MME2031 be processing UE201 and
The control node of signaling, provides carrying and connection management between EPC203.HSS2032 is all to manage for providing some registers
Such as the function of home location register (not shown) etc, and preserves some related service features, data rates etc. and use
The dedicated information in family.All customer data can be sent by SGW2034, and PGW2035 can provide the IP of UE 201
Address distribution and other functions, PCRF2036 are strategy and the charging control strategic decision-making of business data flow and IP bearing resource
Point, it selects and provides available strategy and charging control decision with charge execution function unit (not shown) for strategy.
IP operation 204 may include internet, Intranet, IMS (IP Multimedia Subsystem, IP multimedia
System) or other IP operations etc..
Although above-mentioned be described by taking LTE system as an example, those skilled in the art should know the present invention is not only
Suitable for LTE system, be readily applicable to other wireless communication systems, such as GSM, CDMA2000, WCDMA, TD-SCDMA with
And the following new network system etc., herein without limitation.
Based on above-mentioned mobile terminal hardware configuration and communications network system, each embodiment of the method for the present invention is proposed.
The present invention provides a kind of application program login method, in application program login method first embodiment, the application
Program login method is applied in computer end, and referring to Fig. 3, application program login method includes:
Step S1, when the computer end receives application program logging request, the login account of detection user's input is close
Code is with the presence or absence of abnormal;
In the present embodiment, application program logging request clicks login button by user or voice control triggers.Working as
When user triggers application program logging request, computer end obtains the login account and password of user's input first, then will obtain
The account and password got are matched, and judge whether the password got is the corresponding password of the login account.In addition, may be used also
During further detecting the login account, to input the not corresponding number of password.
It is abnormal not to determining that the login account exists when corresponding in the login account and password of input;Alternatively, logging in the account
During number, when the password of input number not corresponding with login account reaches preset times, determine that the login account is deposited
In exception.
Step S2, if there is no exceptions for the login account password, to the mobile terminal bound with the login account
Send iris recognition verification tip;
In the login account password that computer end determines user's input there is no when exception, user is prompted to enter guest mode also
It is private mode, judges that the user mode of active user's selection is guest mode or private mode depending on the user's operation.
If the user mode of user's selection is guest mode, dynamic is sent to the mobile terminal bound with the login account
Password prompts user to carry out verifying dynamic password;If user selection user mode be private mode, to the login account
The mobile terminal of binding sends iris recognition verification tip, and prompting mobile terminal carries out iris recognition verifying.
In mobile terminal side, the iris characteristic data of user can be acquired by the iris identification device on mobile terminal,
The current iris characteristic data is carried out with the default iris characteristic data being preset in the mobile terminal or Cloud Server again
It compares.
If the iris characteristic data of the user is consistent with default iris characteristic data, determine that iris recognition is verified,
Mobile terminal sends the response message that iris recognition is verified to computer end;If the iris characteristic data of the user and default rainbow
Film characteristic is inconsistent, then determines that iris recognition verifying does not pass through, mobile terminal sends iris recognition verifying not to computer end
By response message.
Wherein, which can be user for the first time when registering or logging in the application program,
By iris identification device typing, the login account and password that this presets iris characteristic data and user inputs in mobile terminal
Correspondence is stored in the mobile terminal or Cloud Server.
Wherein, the iris identification device on mobile terminal can be the built-in camera of mobile terminal.
Step S3 logs in institute after receiving the response message that the iris recognition that the mobile terminal is sent is verified
State application program.
Determine that presented iris characteristic is consistent with default iris characteristic data in mobile terminal, iris recognition verifying is logical
It crosses, sends the response message that iris recognition is verified to computer end, computer end is receiving the rainbow sent by the mobile terminal
After the response message that film identification is verified, which is logged according to the login account.
In the present embodiment, when computer end receives application program logging request, the login account of detection user's input
Password is with the presence or absence of abnormal;If there is no exceptions for login account password, rainbow is sent to the mobile terminal bound with login account
Film identifies verification tip;After the response message that the iris recognition for receiving mobile terminal transmission is verified, logs in and apply journey
Sequence.By password authentification and iris verification double verification, identity and login safety to user are authenticated, and are stepped on to improve
Safety coefficient is recorded, ensure that the information security of user.
Further, in application program login method second embodiment of the present invention, step S1 includes:
Step S11 judges whether the login account of user's input is corresponding with password;
In the present embodiment, application program logging request clicks login button by user or voice control triggers.Working as
When user triggers application program logging request, computer end obtains the login account and password of user's input first, then will obtain
The account and password got are matched, and judge whether the password got is the corresponding password of the login account.In addition, may be used also
During further detecting the login account, to input the not corresponding number of password.
Step S12 determines the login account password of user's input not if the login account of user's input is corresponding with password
There are exceptions;
Step S13 determines the login account password of user's input if the login account of user's input is not corresponding with password
There are exceptions.
It is abnormal not to determining that the login account exists when corresponding in the login account and password of input;Alternatively, logging in the account
During number, when the password of input number not corresponding with login account reaches preset times, determine that the login account is deposited
In exception, the prompt information of the exportable account of computer end or Password Input mistake.
Determine that the login account there is no exception, can carry out iris recognition when the login account and password of input are to correspondence
Step.
Further, include: before above-mentioned steps S2
Step S21 judges active user's mode for guest mode or private if there is no exceptions for the login account password
People's mode;
In the present embodiment, when computer end detects that the login account password of user's input is not present abnormal, computer
End enters user mode selection interface, at this time user mode selection interface show the option button of guest mode and private mode with
For user select, after the button is triggered, computer end be can determine whether active user selection user mode be guest mode also
It is private mode.
Step S22 is thened follow the steps: if active user's mode is private mode to the shifting bound with the login account
Dynamic terminal sends iris recognition verification tip;
Step S23 is sent if active user's mode is guest mode to the mobile terminal bound with the login account
First dynamic password, when the second dynamic password for detecting user's input is consistent with first dynamic password, with visitor's mould
Formula logs in the application program.
If active user's mode is private mode, computer end sends iris to the mobile terminal bound with the login account
Identify verification tip, after the iris recognition to active user is verified, computer end logs in this using journey with private mode
Sequence.
Under private mode, user can be used the application program and carry out relevant operation, which is stored in
The information of the privacy such as history access information, chat record, payment record in the application program, the user are also visible.
If being currently guest mode with mode, computer end sends dynamic mouth to the mobile terminal bound with the login account
It enables, i.e. the first dynamic password, later when the second dynamic password for detecting user's input is consistent with first dynamic password, electricity
Brain end logs in the application program with guest mode.
Under guest mode, the application program is can be used in user, and carries out relevant operation, but for the login account
It is stored in the information of the privacy such as history access information, chat record, payment record in the application program, it will be to the user not
It can be seen that.Guest mode be in order to know the application program of mobile phone account number cipher as user (such as household of owner), and want using
When the mobile phone, for the ease of know the user of password using the application program, but do not invade the owner of the mobile phone privacy and
It is arranged.
Further, include: after above-mentioned steps S2
Step S201, it is defeated when receiving the iris recognition unsanctioned response message of verifying that the mobile terminal is sent
Iris recognition verifies unsanctioned prompt information out.
In the present embodiment, computer end verifies unsanctioned response message in the iris recognition for receiving mobile terminal transmission
When, output iris recognition verifies unsanctioned prompt information, prompts user.For example, the prompting message can be, " iris recognition is tested
Card does not pass through, please retry ".
Step S202, if receiving the number that the iris recognition that the mobile terminal is sent verifies unsanctioned response message
When reaching preset times threshold value, then the login account is locked, and start timer;
Reach pre- in the number that the iris recognition that computer end receives mobile terminal transmission verifies unsanctioned response message
If when frequency threshold value, computer end locks the login account, and starts timer, freeze the login account in preset duration, prohibits
Only log in.
Wherein, which is the natural number less than 10.An angle is changed to say, it is complete for the same user
Entirely after 10 iris informations to be measured of input, if the iris information to be measured inputted every time is all inconsistent with default iris information,
It then can determine that the unlawful practice that this is other users, at this point it is possible to select to stop operation, or limit within a certain period of time
It is operated again, by the setting of the threshold value, increases the safety of userspersonal information.In addition, not limiting preset duration
System.
Step S203 unlocks the login account after the timer reaches preset duration.
The login account is locked from computer end, it is limited and has operated beginning timing again, reach preset duration in timer
Afterwards, the login account is unlocked, user can carry out register again after unlock.
In the present embodiment, in the present embodiment, it is different to detect that the login account password of user's input is not present for computer end
When normal, computer end enters user mode selection interface, and user mode selection interface shows guest mode and private mould at this time
For selection by the user, when the user mode that user selects is private mode, computer end passes through mobile terminal to the option button of formula
Iris verification is carried out to active user, is disappeared in the unsanctioned response of iris recognition verifying that computer end receives mobile terminal transmission
When the number of breath reaches preset times threshold value, computer end locks the login account, and starts timer, freezes in preset duration
The login account is forbidden logging in.By the setting of iris detection frequency threshold value, to realize computer end in illegal user more
Automatically the login account is locked when secondary authentication failed, the login account is avoided illegally to be logged in by illegal user, improves login
Safety coefficient ensure that the information security of user.Know in addition, the setting of multiple user modes lends mobile terminal
The people of account number cipher uses, but does not reveal the individual privacy of user.
Further, in application program login method 3rd embodiment of the present invention, application program login method is applied to
The login account of mobile terminal, the mobile terminal and application program is bound, and application program login method includes:
Step C1 receives the iris recognition for being used to log in the application program of computer end transmission in the mobile terminal
When verification tip, iris recognition verifying is carried out to active user;
Step C2 sends the response that iris recognition is verified to the computer end and disappears if iris recognition is verified
Breath allows computer end to log in the application program.
In the present embodiment, determine that exception, and user mode is not present in the login account password of user's input in computer end
When for private mode, then iris recognition verification tip, prompting mobile terminal are sent to the mobile terminal bound with the login account
Carry out iris recognition verifying.
Mobile terminal can pass through the iris on mobile terminal when receiving the iris recognition verification tip that computer end is sent
Identification device acquire user presented iris characteristic, then by presented iris characteristic and be preset at the mobile terminal or
Default iris characteristic data in Cloud Server is compared.If presented iris characteristic and default iris characteristic data one
It causes, then determines that iris recognition is verified, mobile terminal sends the response message that iris recognition is verified to computer end;If working as
Preceding iris characteristic data and default iris characteristic data are inconsistent, then determine that iris recognition is verified, and mobile terminal is to computer
End sends iris recognition and verifies unsanctioned response message.
Further, above-mentioned steps C1 includes:
Step C11 knows in the iris for logging in the application program that the mobile terminal receives computer end transmission
When other verification tip, the presented iris characteristic of active user is acquired;
Step C12, by the presented iris characteristic and preset configuration in the mobile terminal or Cloud Server
Default iris characteristic data be compared;
Step C13 determines that iris recognition is verified if comparison result is consistent;
Step C14 determines that iris recognition verifying does not pass through if comparison result is inconsistent.
In the present embodiment, when mobile terminal receives the iris recognition verification tip that computer end is sent, mobile terminal is logical
The presented iris characteristic for crossing iris identification device (such as camera built in mobile terminal) acquisition active user, to current
The presented iris characteristic of user is scanned and carries out image procossing, then by presented iris characteristic with preset
Judgement is compared in default iris characteristic data in the mobile terminal or Cloud Server.
Specifically, mobile terminal shoots human eye, and pre-processes to the image taken, first progress iris
The positioning to iris is realized in positioning by the inner boundary and outer boundary that extract iris.Wherein, the extraction of inner boundary is to pass through calculating
The grey level histogram of whole picture iris image out, since there are two major peaks for grey level histogram, corresponding first peak value is pupil
The range that bore region gray scale is concentrated, it is range that iris region gray scale is concentrated that second peak value be corresponding, therefore, at first peak
It the right side of value chooses a binarization threshold and iris image is carried out in binary conversion treatment may separate out pupil to extract
Round edge circle.The method that Hough transform can be used in the extraction on outer circle boundary.Side is carried out to iris image using Canny operator first
Edge extract, then use can detecte the Hough transform with shaped objects undetermined determine the fringing coefficient of iris with extract outside
Round edge circle.Determine the position that can determine behind inside and outside circle boundary where annular iris.Normalizing then is carried out to the iris after positioning
Change and image enhancement processing.Wherein, normalized is to convert fixed size for various sizes of iris texture by mapping
Region, to eliminate the influence of translation, rotation, scaling to iris recognition.Image enhancement processing is equal by local histogram
Weighing apparatusization, i.e., be converted to the annular iris image after positioning by point processing has the output of same pixel point in each gray level
Image, so as to improve as uneven illumination it is even caused by normalize after the low problem of picture contrast.Then by specific
Algorithm characteristic point needed for extracting iris recognition in the image after normalization, and it is encoded, as iris spy
Levy data.Finally by the presented iris characteristic of active user and preset configuration in the mobile terminal or Cloud Server
Default iris characteristic data matched, identical iris is judged whether it is, to achieve the purpose that identification.
If the iris information to be verified is consistent with default iris information, determine that iris recognition is verified, mobile terminal
The response message that iris recognition is verified is sent to computer end;If the iris information to be verified and default iris information are different
It causes, then determines that iris recognition is verified, mobile terminal sends iris recognition to computer end and verifies unsanctioned response message.
It further, can also include that the iris that mobile terminal acquires active user in advance is special before above-mentioned steps C12
Data are levied, as default iris characteristic data, and are stored in mobile terminal or Cloud Server.
The default iris characteristic data can be user's first time when registering or logging in the application program, pass through rainbow
Film identification device typing, the corresponding guarantor of the login account and password that the default iris characteristic data and user inputs in mobile terminal
There are in the mobile terminal or Cloud Server.
In the present embodiment, when mobile terminal receives the iris recognition verification tip that computer end is sent, current use is acquired
The presented iris characteristic at family;By presented iris characteristic and preset configuration in the mobile terminal or Cloud Server
Default iris characteristic data be compared;If comparison result is consistent, determine that iris recognition is verified;If comparison result is not
Unanimously, then determine that iris recognition verifying does not pass through.By password authentification and iris verification double verification, identity to user and step on
Record safety is authenticated, to improve login safety coefficient, ensure that the information security of user.
In addition, the embodiment of the present invention also proposes that a kind of computer end, the computer end include: memory, processor and storage
On a memory and the application program logging program that can run on a processor, when application program logging program is executed by processor
Realize following operation:
When the computer end receives application program logging request, whether the login account password of detection user's input is deposited
In exception;
If there is no exceptions for the login account password, iris is sent to the mobile terminal bound with the login account
Identify verification tip;
After receiving the response message that the iris recognition that the mobile terminal is sent is verified, log in described using journey
Sequence.
Further, processor can call the application program logging program stored in memory, also execute following operation:
If the login account password judges active user's mode for guest mode or private mode there is no exception;
If active user's mode is private mode, then follow the steps: to the mobile terminal hair bound with the login account
Send iris recognition verification tip;
If active user's mode is guest mode, the first dynamic is sent to the mobile terminal bound with the login account
Password logs in institute when the second dynamic password for detecting user's input is consistent with first dynamic password with guest mode
State application program.
Further, processor can call the application program logging program stored in memory, also execute following operation:
When receiving the iris recognition unsanctioned response message of verifying that the mobile terminal is sent, iris recognition is exported
Verify unsanctioned prompt information;
If the number that the iris recognition for receiving the mobile terminal transmission verifies unsanctioned response message reaches default
When frequency threshold value, then the login account is locked, and start timer;
After the timer reaches preset duration, the login account is unlocked.
Further, processor can call the application program logging program stored in memory, also execute following operation:
Judge whether the login account of user's input is corresponding with password;
If the login account of user's input is corresponding with password, it is different to determine that the login account password of user's input is not present
Often;
If user input login account it is not corresponding with password, determine user input login account password there are different
Often.
Computer end specific embodiment of the present invention and above-mentioned each embodiment of application program login method are essentially identical, herein not
It repeats again.
In addition, the embodiment of the present invention also proposes that a kind of mobile terminal, mobile terminal include memory, processor and be stored in
It is real when application program logging program is executed by processor on memory and the application program logging program that can run on a processor
Now following operation:
It is mentioned in the iris recognition verifying for logging in the application program that the mobile terminal receives computer end transmission
When showing, iris recognition verifying is carried out to active user;
If iris recognition is verified, the response message that iris recognition is verified is sent to the computer end, is allowed
The computer end logs in the application program.
Further, processor can call the application program logging program stored in memory, also execute following operation:
It is mentioned in the iris recognition verifying for logging in the application program that the mobile terminal receives computer end transmission
When showing, the presented iris characteristic of active user is acquired;
By the default rainbow of the presented iris characteristic and preset configuration in the mobile terminal or Cloud Server
Film characteristic is compared;
If comparison result is consistent, determine that iris recognition is verified;
If comparison result is inconsistent, determine that iris recognition verifying does not pass through.
Mobile terminal specific embodiment of the present invention and above-mentioned each embodiment of application program login method are essentially identical, herein
It repeats no more.
In addition, the embodiment of the present invention also provides a kind of application program login system, the application program login system includes
At least one computer end as described above, at least one cloud mobile terminal as described above.
Computer end, when for receiving application program logging request, whether the login account password of detection user's input is deposited
In exception;
If there is no exceptions for the login account password, iris is sent to the mobile terminal bound with the login account
Identify verification tip;
After receiving the response message that the iris recognition that the mobile terminal is sent is verified, log in described using journey
Sequence.
Further, the computer end is also used to:
If the login account password judges active user's mode for guest mode or private mode there is no exception;
If active user's mode is private mode, then follow the steps: to the mobile terminal hair bound with the login account
Send iris recognition verification tip;
If active user's mode is guest mode, the first dynamic is sent to the mobile terminal bound with the login account
Password logs in institute when the second dynamic password for detecting user's input is consistent with first dynamic password with guest mode
State application program.
Further, the computer end is also used to:
When receiving the iris recognition unsanctioned response message of verifying that the mobile terminal is sent, iris recognition is exported
Verify unsanctioned prompt information;
If the number that the iris recognition for receiving the mobile terminal transmission verifies unsanctioned response message reaches default
When frequency threshold value, then the login account is locked, and start timer;
After the timer reaches preset duration, the login account is unlocked.
Further, the computer end is also used to:
Judge whether the login account of user's input is corresponding with password;
If the login account of user's input is corresponding with password, it is different to determine that the login account password of user's input is not present
Often;
If user input login account it is not corresponding with password, determine user input login account password there are different
Often.
Further, the mobile terminal is used for:
It is mentioned in the iris recognition verifying for logging in the application program that the mobile terminal receives computer end transmission
When showing, iris recognition verifying is carried out to active user;
If iris recognition is verified, the response message that iris recognition is verified is sent to the computer end, is allowed
Computer end logs in the application program.
Further, the mobile terminal is also used to:
It is mentioned in the iris recognition verifying for logging in the application program that the mobile terminal receives computer end transmission
When showing, the presented iris characteristic of active user is acquired;
By the default rainbow of the presented iris characteristic and preset configuration in the mobile terminal or Cloud Server
Film characteristic is compared;
If comparison result is consistent, determine that iris recognition is verified;
If comparison result is inconsistent, determine that iris recognition verifying does not pass through.
The specific embodiment of application program login system of the present invention and each embodiment base of above-mentioned application program login method
This is identical, and this will not be repeated here.
In addition, the storage medium is stored with one or more than one is answered the present invention also provides a kind of storage medium
With program logging program, the one or more application program logging program can also be by one or more than one place
Manage the step of device is executed with embodiment each for realizing above-mentioned application program login method.
The expansion content of the specific embodiment of storage medium (i.e. computer readable storage medium) of the present invention is answered with above-mentioned
Essentially identical with each embodiment of program login method, this will not be repeated here.
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row
His property includes, so that the process, method, article or the device that include a series of elements not only include those elements, and
And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do
There is also other identical elements in the process, method of element, article or device.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art
The part contributed out can be embodied in the form of software products, which is stored in a storage medium
In (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal (can be mobile phone, computer, service
Device, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited to above-mentioned specific
Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art
Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much
Form, all of these belong to the protection of the present invention.
Claims (10)
1. a kind of application program login method, which is characterized in that the application program login method is applied to computer end, described to answer
Include: with program login method
When the computer end receives application program logging request, the login account password of detection user's input is with the presence or absence of different
Often;
If there is no exceptions for the login account password, iris recognition is sent to the mobile terminal bound with the login account
Verification tip;
After receiving the response message that the iris recognition that the mobile terminal is sent is verified, the application program is logged in.
2. application program login method as described in claim 1, which is characterized in that if the login account password is not deposited
In exception, then include: before to the step of mobile terminal transmission iris recognition verification tip bound with the login account
If the login account password judges active user's mode for guest mode or private mode there is no exception;
If active user's mode is private mode, then follow the steps: sending rainbow to the mobile terminal bound with the login account
Film identifies verification tip;
If active user's mode is guest mode, the first dynamic mouth is sent to the mobile terminal bound with the login account
Enable, when the second dynamic password for detecting user's input is consistent with first dynamic password, logged in guest mode described in
Application program.
3. application program login method as claimed in claim 2, which is characterized in that described to binding with the login account
Include: after the step of mobile terminal transmission iris recognition verification tip
When receiving the iris recognition unsanctioned response message of verifying that the mobile terminal is sent, output iris recognition verifying
Unsanctioned prompt information;
If the number that the iris recognition for receiving the mobile terminal transmission verifies unsanctioned response message reaches preset times
When threshold value, then the login account is locked, and start timer;
After the timer reaches preset duration, the login account is unlocked.
4. application program login method as described in claim 1, which is characterized in that described to receive application in the computer end
When program logging request, the login account password of detection user's input includes: with the presence or absence of abnormal step
Judge whether the login account of user's input is corresponding with password;
If the login account of user's input is corresponding with password, it is abnormal to determine that the login account password of user's input is not present;
If the login account of user's input is not corresponding with password, it is abnormal to determine that the login account password of user's input exists.
5. a kind of application program login method, which is characterized in that the application program login method is applied to mobile terminal, described
Mobile terminal and the login account of application program are bound, and the application program login method includes:
When the mobile terminal receives the iris recognition verification tip for being used to log in the application program of computer end transmission,
Iris recognition verifying is carried out to active user;
If iris recognition is verified, the response message that is verified of iris recognition is sent to the computer end, described in permission
Computer end logs in the application program.
6. application program login method as claimed in claim 5, which is characterized in that described to receive electricity in the mobile terminal
When the iris recognition verification tip for being used to log in the application program that brain end is sent, iris recognition verifying is carried out to active user
The step of include:
When the mobile terminal receives the iris recognition verification tip for being used to log in the application program of computer end transmission,
Acquire the presented iris characteristic of active user;
The default iris of the presented iris characteristic and preset configuration in the mobile terminal or Cloud Server is special
Sign data are compared;
If comparison result is consistent, determine that iris recognition is verified;
If comparison result is inconsistent, determine that iris recognition verifying does not pass through.
7. a kind of computer end, which is characterized in that the mobile terminal includes: memory, processor and is stored in the memory
Application program logging program that is upper and can running on the processor, the application program logging program are held by the processor
The step of application program login method according to any one of claims 1 to 4 is realized when row.
8. a kind of mobile terminal, which is characterized in that the mobile terminal includes: memory, processor and is stored in the storage
On device and the application program logging program that can run on the processor, the application program logging program is by the processor
The step of application program login method as described in any one of claim 5 to 6 is realized when execution.
9. a kind of application program login system, which is characterized in that the application program login system includes that at least one right is wanted
Computer end described in asking 7, at least one mobile terminal according to any one of claims 8.
10. a kind of storage medium, which is characterized in that be stored with application program logging program, the application on the storage medium
It realizes when program logging program is executed by processor such as application program login method described in any one of claims 1 to 6
Step.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811458034.XA CN109522695A (en) | 2018-11-30 | 2018-11-30 | Application program login method, computer end, mobile terminal, system and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811458034.XA CN109522695A (en) | 2018-11-30 | 2018-11-30 | Application program login method, computer end, mobile terminal, system and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109522695A true CN109522695A (en) | 2019-03-26 |
Family
ID=65794098
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811458034.XA Pending CN109522695A (en) | 2018-11-30 | 2018-11-30 | Application program login method, computer end, mobile terminal, system and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109522695A (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110516429A (en) * | 2019-09-04 | 2019-11-29 | 贵阳动视云科技有限公司 | A kind of cloud computer control method, managing device and storage medium |
CN111330285A (en) * | 2020-03-08 | 2020-06-26 | 北京智明星通科技股份有限公司 | Safe selling method and device for virtual equipment in game and mobile terminal |
CN111680279A (en) * | 2020-06-04 | 2020-09-18 | 上海东普信息科技有限公司 | Login verification method, device and system |
CN112287307A (en) * | 2019-07-24 | 2021-01-29 | 柯尼卡美能达株式会社 | Authentication system, support server, and recording medium |
CN113660254A (en) * | 2021-08-12 | 2021-11-16 | 上海酷栈科技有限公司 | Cloud desktop distributed network terminal security access strategy, device and system |
CN113935008A (en) * | 2021-12-15 | 2022-01-14 | 深圳竹云科技有限公司 | User authentication method, device, electronic equipment and computer readable storage medium |
CN114928483A (en) * | 2022-05-16 | 2022-08-19 | 中国银行股份有限公司 | Method and device for changing login password |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101997824A (en) * | 2009-08-20 | 2011-03-30 | 中国移动通信集团公司 | Identity authentication method based on mobile terminal as well as device and system thereof |
CN103888265A (en) * | 2014-04-11 | 2014-06-25 | 上海博路信息技术有限公司 | Login system and method based on mobile terminal |
CN104065823A (en) * | 2014-06-30 | 2014-09-24 | 惠州Tcl移动通信有限公司 | User mode control method and user mode control system based on iris recognition technology for mobile terminal |
US20170161750A1 (en) * | 2014-08-26 | 2017-06-08 | Tencent Technology (Shenzhen) Company Limited | Identity Authentication Method, Terminal Device And System |
CN107517217A (en) * | 2017-09-13 | 2017-12-26 | 北京理工大学 | A kind of multiple-factor wireless key fill system based on fingerprint recognition |
-
2018
- 2018-11-30 CN CN201811458034.XA patent/CN109522695A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101997824A (en) * | 2009-08-20 | 2011-03-30 | 中国移动通信集团公司 | Identity authentication method based on mobile terminal as well as device and system thereof |
CN103888265A (en) * | 2014-04-11 | 2014-06-25 | 上海博路信息技术有限公司 | Login system and method based on mobile terminal |
CN104065823A (en) * | 2014-06-30 | 2014-09-24 | 惠州Tcl移动通信有限公司 | User mode control method and user mode control system based on iris recognition technology for mobile terminal |
US20160366588A1 (en) * | 2014-06-30 | 2016-12-15 | Huizhou Tcl Mobile Communication Co., Ltd | User mode control method and system based on iris recognition technology for mobile terminal |
US20170161750A1 (en) * | 2014-08-26 | 2017-06-08 | Tencent Technology (Shenzhen) Company Limited | Identity Authentication Method, Terminal Device And System |
CN107517217A (en) * | 2017-09-13 | 2017-12-26 | 北京理工大学 | A kind of multiple-factor wireless key fill system based on fingerprint recognition |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112287307A (en) * | 2019-07-24 | 2021-01-29 | 柯尼卡美能达株式会社 | Authentication system, support server, and recording medium |
CN110516429A (en) * | 2019-09-04 | 2019-11-29 | 贵阳动视云科技有限公司 | A kind of cloud computer control method, managing device and storage medium |
CN111330285A (en) * | 2020-03-08 | 2020-06-26 | 北京智明星通科技股份有限公司 | Safe selling method and device for virtual equipment in game and mobile terminal |
CN111680279A (en) * | 2020-06-04 | 2020-09-18 | 上海东普信息科技有限公司 | Login verification method, device and system |
CN111680279B (en) * | 2020-06-04 | 2023-06-09 | 上海东普信息科技有限公司 | Login verification method, device and system |
CN113660254A (en) * | 2021-08-12 | 2021-11-16 | 上海酷栈科技有限公司 | Cloud desktop distributed network terminal security access strategy, device and system |
CN113935008A (en) * | 2021-12-15 | 2022-01-14 | 深圳竹云科技有限公司 | User authentication method, device, electronic equipment and computer readable storage medium |
CN113935008B (en) * | 2021-12-15 | 2022-03-11 | 深圳竹云科技有限公司 | User authentication method, device, electronic equipment and computer readable storage medium |
CN114928483A (en) * | 2022-05-16 | 2022-08-19 | 中国银行股份有限公司 | Method and device for changing login password |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109522695A (en) | Application program login method, computer end, mobile terminal, system and storage medium | |
CN109558718A (en) | Application program login method, computer end, mobile terminal, system and storage medium | |
CN108289141A (en) | A kind of the screen locking unlocking method and mobile terminal of mobile terminal | |
CN108171037A (en) | Using startup method, terminal and computer storage media | |
CN109033779A (en) | A kind of unlock authentication method, wearable device and computer readable storage medium | |
CN110069229A (en) | Screen sharing method, mobile terminal and computer readable storage medium | |
CN109151169A (en) | Camera right management method, mobile terminal and computer readable storage medium | |
CN107395850A (en) | A kind of social communication information guard method, device and computer-readable recording medium | |
CN108989322A (en) | data transmission method, mobile terminal and computer readable storage medium | |
CN108989534A (en) | Message prompt method, mobile terminal and computer readable storage medium | |
CN109600740A (en) | Document down loading method, device and computer readable storage medium | |
CN108062489A (en) | A kind of glance prevention method, terminal and computer readable storage medium | |
CN107122817A (en) | Processing method and Quick Response Code terminal based on Quick Response Code | |
CN107862196A (en) | Fingerprint verification method, mobile terminal and computer-readable recording medium | |
CN109743696A (en) | Identifying code encryption method, system and readable storage medium storing program for executing | |
CN109086582A (en) | A kind of fingerprint verification method, terminal and computer readable storage medium | |
CN108196762A (en) | A kind of terminal control method, terminal and computer readable storage medium | |
CN109670287A (en) | Intelligent terminal unlocking method, intelligent terminal and computer readable storage medium | |
CN109255620A (en) | Encrypting payment method, mobile terminal and computer readable storage medium | |
CN108961489A (en) | A kind of equipment wearing control method, terminal and computer readable storage medium | |
CN108206892A (en) | Guard method, device, mobile terminal and the storage medium of contact person's privacy | |
CN108376239A (en) | A kind of face identification method, mobile terminal and storage medium | |
CN108920917A (en) | Log in end switching method, mobile terminal and computer readable storage medium | |
CN108540458A (en) | A kind of method of client checks, equipment, server and storage medium | |
CN110096320A (en) | The display methods and device of authentication window |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190326 |