CN109660487B - Authorization method based on H5 webpage, storage medium, electronic device and system - Google Patents
Authorization method based on H5 webpage, storage medium, electronic device and system Download PDFInfo
- Publication number
- CN109660487B CN109660487B CN201710935284.7A CN201710935284A CN109660487B CN 109660487 B CN109660487 B CN 109660487B CN 201710935284 A CN201710935284 A CN 201710935284A CN 109660487 B CN109660487 B CN 109660487B
- Authority
- CN
- China
- Prior art keywords
- authorization
- token
- server
- authorization token
- user information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/41—User authentication where a single sign-on provides access to a plurality of computers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/108—Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
- H04L9/3213—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
Abstract
The invention discloses an authorization method, a storage medium, electronic equipment and a system based on an H5 webpage, and relates to the field of application program authorization. The method comprises the following steps: after user information of an application program A input by a user is acquired on a page H5, the user information is sent to a server A of the application program A; the server A generates an authorization token according to the user information and returns to the H5 page, and the H5 page stores the authorization token and then sends the authorization token information to the server B of the application program B; the server B generates a login token according to the authorization token information and then sends the login token to the server A; after obtaining the authorization token corresponding to the login token, the server A returns the authorization token and the user information to the server B, and the server B issues the user information to the client B. According to the invention, when the user needs the application program A to authorize the application program B, the authorization of the application program A can be completed through the H5 webpage, the application range is very wide, and the user experience is obviously improved.
Description
Technical Field
The invention relates to the field of application program authorization, in particular to an authorization method, a storage medium, electronic equipment and a system based on an H5 webpage.
Background
With the development of networks, network applications are more and more, account information (user name and password) needs to be input when each network application is used generally, and in order to simplify the process of inputting the account information by a user, an application direct authorization method is provided in the industry, that is, 2 applications (for example, an application a and an application B) are authorized to run in an associated manner, so that the application B is directly authorized through the application a without inputting the account information by the user, the working efficiency is improved, and the application with the authorized associated running is popularized. For example: the online game (the application program A) is logged in through the account information of the live fish fighting platform (the application program B), the online game is directly authorized after the client of the live fish fighting platform on the terminal (such as a PC, a tablet computer, a mobile phone and the like) is operated, and the user can directly operate the client of the online game after the authorization.
However, when the application program is run in the authorization association, the following defects exist:
as can be seen from the foregoing, the user must authorize other applications to run through the client of the application B, and when the client of the application B does not exist on the user terminal, the application B must be downloaded, which not only complicates the operation process, but also increases the use cost (network traffic required for downloading). Meanwhile, when the user cannot download or run the application program B due to external factors (for example, the network is not smooth or the terminal is not compatible with the application program B), direct authorization of other application programs cannot be realized, so that the application range for authorizing the running of other application programs through the application program B is narrow, and the application program B has great limitation.
Disclosure of Invention
Aiming at the defects in the prior art, the invention solves the technical problems that: how to complete the authorization of the application program A through the H5 webpage when the user needs the application program A to authorize the application program B is very wide in application range, and therefore user experience is remarkably improved.
In order to achieve the above object, the authorization method based on the H5 webpage provided by the invention comprises the following steps:
the method comprises the following steps: after the user information of the application program A input by the user is obtained on the H5 page, the user information is sent to the server A of the application program A, and the step II is carried out;
step two: after judging that the received user information is correct, the server A generates a unique authorization token with an expiration date according to the user information, returns the authorization token to the H5 page, stores the authorization token in the H5 page, sends the authorization token information to the server B of the application program B, and goes to the third step;
step three: the server B generates a unique login token corresponding to the authorization token according to the authorization token information, and then sends the login token to the server A; after the server A acquires the authorization token corresponding to the login token, returning the authorization token and the user information corresponding to the authorization token to the server B, storing the authorization token and the user information by the server B, marking the authorization token to be associated with the client B of the application program B, and turning to the fourth step;
step four: and the server B sends the user information to the client B.
On the basis of the technical scheme, the first step further comprises the following steps: when monitoring that the user needs the application program A to authorize the application program B, the client B sends an authorization request to the server B; and after receiving the authorization request, the server B judges whether an unexpired authorization token associated with the client B exists, if so, the step IV is carried out, and if not, the step I is carried out.
On the basis of the above technical solution, the process of sending the authorization token information to the server B in the second step includes: the H5 page sends the authorization token information to the client B, and the client B sends the authorization token information to the server B.
On the basis of the above technical solution, the authorization token information in the second step is an authorization code converted according to the authorization token.
The storage medium provided by the invention is stored with a computer program, and the computer program realizes the authorization method based on the H5 webpage when being executed by a processor.
The electronic device provided by the invention comprises a memory and a processor, wherein the memory is stored with a computer program running on the processor, and the processor executes the computer program to realize the authorization method based on the H5 webpage.
The authorization system based on the H5 webpage comprises an H5 webpage information transmission module arranged on a client B, an authorization token generation module and a user information authorization module arranged on a server A, and a login token generation module and a user information issuing module arranged on the server B;
the H5 page information transfer module is used for: after user information of an application program A input by a user is obtained on a page H5, the user information is sent to an authorization token generation module of a server A; after receiving the authorization token returned by the authorization token generation module, storing the authorization token and sending the authorization token information to a login token generation module of the server B;
the authorization token generation module is to: after receiving the user information and judging that the user information is correct, generating a unique authorization token with an expiration date according to the user information, and returning the authorization token to the H5 page information transmission module;
the login token generation module is used for: after receiving the authorization token information, generating a unique login token corresponding to the authorization token according to the authorization token information, and sending the login token to a user information authorization module of the server A; after receiving the authorization token and the user information returned by the user information authorization module, storing the authorization token and the user information, marking the authorization token to be associated with the client B of the application program B, and sending a user information issuing signal to a user information issuing module of the server B;
the user information authorization module is used for: after receiving the login token, acquiring an authorization token corresponding to the login token, and returning the authorization token and user information corresponding to the authorization token to a login token generation module of the server B;
the user information issuing module is used for: and after receiving the user information issuing signal, issuing the user information to the client B.
On the basis of the above technical solution, the system further includes an authorization monitoring module disposed on the client B, and configured to: when monitoring that the application program A is required to authorize the application program B, sending an authorization request to a login token generation module of a server side B; and after receiving the authorization request, the login token generation module judges whether an unexpired authorization token associated with the client B exists, if so, sends a user information issuing signal to the user information issuing module, and otherwise, sends a working signal to the H5 page information transmission module.
On the basis of the technical scheme, the process that the H5 page information transmission module sends the authorization token information to the login token generation module of the server B comprises the following steps: the H5 page information transfer module sends the authorization token information to the client B, and the client B sends the authorization token information to the login token generation module of the server B.
On the basis of the technical scheme, the authorization token information in the H5 page information transmission module is an authorization code converted according to the authorization token.
Compared with the prior art, the invention has the advantages that:
(1) as can be seen from the first to fourth steps of the present invention, when the user needs the application a to authorize the application B, the authorization of the application a is completed through the H5 webpage, and compared with the prior art in which the authorization is completed through the client, the H5 webpage does not need to be downloaded, and the problem of incompatibility with the terminal does not exist basically, so that the application range of the present invention is very wide, and the user experience is further improved significantly.
(2) According to the invention, when the user needs the application program A to authorize the application program B, if the server B has an unexpired authorization token associated with the client B (namely the method is not used for the first time and is in the validity period), the steps one to three can be skipped, and the step four is directly executed, so that the working process is obviously simplified, the working efficiency is greatly improved, the user can log in the client B quickly, and the user experience is improved.
(3) According to the second step of the invention, the authorization token is converted into the authorization code and then sent to the server B, and the authorization token is converted into the authorization code, so that the difficulty of cracking the authorization token can be increased, and the network security performance can be improved. Meanwhile, the H5 page of the invention firstly sends the authorization token information to the client B, and then the client B sends the authorization token information to the server B. Because there may be a plurality of other applications that need authorization of the application a, that is, the server a may send information to a plurality of servers B at the same time, the load of the server a is large (overhead required for sending information, address of the server B is recorded, etc.); according to the invention, the transmission of the authorization code is completed through the H5 page corresponding to each server B and the client B, so that the overhead required by the transmission of the authorization code is borne by the background (the server B) of the initiator, thereby realizing the overhead required by different initiators for respective information transmission, and not only is the setting reasonable, but also the load of the server A is obviously reduced.
Drawings
FIG. 1 is a flowchart of an H5 web-based authorization method according to an embodiment of the present invention;
fig. 2 is a connection block diagram of an electronic device in an embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and examples.
Referring to fig. 1, the authorization method based on the H5 webpage in the embodiment of the present invention includes the following steps:
s1: when a user needs the application program A to authorize the application program B (namely when the application program B is used, the authorization of the application program A is needed), the client B of the application program B sends an authorization request to the server B of the application program B; and after receiving the authorization request, the server B judges whether an unexpired authorization token associated with the client B exists, if so, the S6 is carried out, and if not, the S2 is carried out.
Referring to S1, if the server B has an unexpired authorized token associated with the client B (i.e., the method is not used for the first time and is within the validity period), S2 to S5 may be skipped and S6 may be directly executed, thereby significantly simplifying the work flow, greatly improving the work efficiency, and improving the user experience because the user logs in the client B quickly.
S2: the client B jumps to a preset H5 page, and the user inputs user information (an account and a password) of the application A on the H5 page; after the H5 page obtains the user information input by the user, the user information is sent to the server a of the application a, and the process goes to S3.
S3: after the server A judges that the received user information is correct (if the received user information is incorrect, the user information is directly returned to have an input error, and the user information is required to be input again), a unique authorization token with an expiration date is generated according to the user information, the authorization token is returned to the H5 page, and the S4 is turned.
S4: the H5 page caches the authorization token (thus, the process of obtaining the authorization token again when the authorization token is reused in the caching period is omitted), the authorization token is converted into an authorization code, the authorization code is sent to the server B, the authorization token is converted into the authorization code, the difficulty of cracking the authorization token can be increased, the network security performance is improved, and the process goes to S5.
The specific process of sending the authorization code to the server B in S4 is as follows: the H5 page sends the authorization code to the client B, which sends the authorization code to the server B, with the benefits of: if the server a directly sends information to the server B, because there may be a plurality of other application programs that need authorization of the application program a, that is, the server a may send information to a plurality of servers B at the same time, the load of the server a is large (overhead required for sending information, address of the server B is recorded, etc.); in the embodiment of the invention, the transmission of the authorization code is completed through the H5 page corresponding to each server B and the client B, so that the overhead required by the transmission of the authorization code is borne by the background (the server B) of the initiator, thereby realizing the overhead required by different initiators for respective information transmission, and not only setting is reasonable, but also the load of the server A is obviously reduced.
S5: the server B generates a unique login token corresponding to the authorization token according to the authorization code, and then sends the login token to the server A; after the server A obtains the authorization token corresponding to the login token, returning the authorization token and the user information corresponding to the authorization token to the server B; the server B stores the authorization token and the user information, associates the authorization token with the user information and the client B, respectively (it can be seen that if the authorization token exists in S1, the associated user information inevitably exists), and proceeds to S6.
S6: the server B issues the user information (the user information is the user information of the authorization token associated with the client B) to the client B, and the client B prompts that the authorization login is successful, namely the client can be used normally.
As can be seen from S1 to S6, in the embodiment of the present invention, when a user needs the application a to authorize the application B, the authorization of the application a is completed through the H5 webpage, and compared with the prior art in which authorization is completed through a client, the H5 webpage does not need to be downloaded, and there is substantially no problem of incompatibility with a terminal, so that the application range of the embodiment of the present invention is very wide, and user experience is significantly improved.
The embodiment of the invention also provides a storage medium, wherein a computer program is stored on the storage medium, and when being executed by a processor, the computer program realizes the authorization method based on the H5 webpage. The storage medium includes various media capable of storing program codes, such as a usb disk, a removable hard disk, a ROM (Read-Only Memory), a RAM (Random Access Memory), a magnetic disk, or an optical disk.
Referring to fig. 2, an embodiment of the present invention further provides an electronic device, which includes a memory and a processor, where the memory stores a computer program running on the processor, and the processor executes the computer program to implement the aforementioned authorization method based on the H5 webpage.
The authorization system based on the H5 webpage in the embodiment of the invention comprises an authorization monitoring module and an H5 webpage information transmission module which are arranged on a client B, an authorization token generation module and a user information authorization module which are arranged on a server A, and a login token generation module and a user information issuing module which are arranged on the server B.
The authorization monitoring module is to: when monitoring that the application program A is required to authorize the application program B, sending an authorization request to a login token generation module of a server side B; and after receiving the authorization request, the login token generation module judges whether an authorization token which is associated with the client B and is not overdue exists, if so, sends a user information issuing signal to the user information issuing module, and otherwise, sends a working signal to the H5 page information transmission module.
The H5 page information transfer module is used for: after receiving the working signal, displaying an H5 page, and after acquiring user information of the application program A input by a user on the H5 page, sending the user information to an authorization token generation module of the server A; after receiving the authorization token returned by the authorization token generation module, storing the authorization token, and sending the authorization token information (according to the authorization code converted by the authorization token) to the login token generation module of the server B (H5 page information transmission module sends the authorization token information to the client B, and the client B sends the authorization token information to the login token generation module of the server B).
The authorization token generation module is to: and after receiving the user information and judging that the user information is correct, generating a unique authorization token with an expiration date according to the user information, and returning the authorization token to the H5 page information transmission module.
The login token generation module is used for: after receiving the authorization token information, generating a unique login token corresponding to the authorization token according to the authorization token information, and sending the login token to a user information authorization module of the server A; and after receiving the authorization token and the user information returned by the user information authorization module, storing the authorization token and the user information, marking the authorization token to be associated with the client B of the application program B, and sending a user information issuing signal to a user information issuing module of the server B.
The user information authorization module is used for: and after receiving the login token, acquiring an authorization token corresponding to the login token, and returning the authorization token and the user information corresponding to the authorization token to a login token generation module of the server B.
The user information issuing module is used for: and after receiving the user information issuing signal, issuing the user information to the client B.
It should be noted that: in the system provided in the embodiment of the present invention, when performing inter-module communication, only the division of each functional module is illustrated, and in practical applications, the above function distribution may be completed by different functional modules as needed, that is, the internal structure of the system is divided into different functional modules to complete all or part of the above described functions.
Further, the present invention is not limited to the above-mentioned embodiments, and it will be apparent to those skilled in the art that various modifications and improvements can be made without departing from the principle of the present invention, and these modifications and improvements are also considered to be within the scope of the present invention. Those not described in detail in this specification are within the skill of the art.
Claims (6)
1. An authorization method based on H5 webpage is characterized by comprising the following steps:
the method comprises the following steps: after the user information of the application program A input by the user is obtained on the H5 page, the user information is sent to the server A of the application program A, and the step II is carried out;
step two: after judging that the received user information is correct, the server A generates a unique authorization token with an expiration date according to the user information, returns the authorization token to the H5 page, stores the authorization token in the H5 page, sends the authorization token information to the server B of the application program B, and goes to the third step;
step three: the server B generates a unique login token corresponding to the authorization token according to the authorization token information, and then sends the login token to the server A; after the server A acquires the authorization token corresponding to the login token, returning the authorization token and the user information corresponding to the authorization token to the server B, storing the authorization token and the user information by the server B, marking the authorization token to be associated with the client B of the application program B, and turning to the fourth step;
step four: the server B sends the user information to the client B;
wherein, the first step also comprises the following steps: when monitoring that the user needs the application program A to authorize the application program B, the client B sends an authorization request to the server B; after receiving the authorization request, the server B judges whether an unexpired authorization token associated with the client B exists, if so, the step goes to a step four, and if not, the step one is gone to;
the method comprises the following steps of sending authorization token information to a server B of an application program B, specifically: the H5 page sends the authorization token information to the client B, and the client B sends the authorization token information to the server B.
2. The H5 web-based authorization method of claim 1, wherein: and in the second step, the authorization token information is an authorization code converted according to the authorization token.
3. A storage medium having a computer program stored thereon, characterized in that: the computer program, when executed by a processor, implements the method of any of claims 1 to 2.
4. An electronic device comprising a memory and a processor, the memory having stored thereon a computer program that runs on the processor, characterized in that: the processor, when executing the computer program, implements the method of any of claims 1 to 2.
5. An authorization system based on an H5 webpage is characterized by comprising an H5 webpage information transmission module arranged on a client B, an authorization token generation module and a user information authorization module arranged on a server A, and a login token generation module and a user information issuing module arranged on the server B;
the H5 page information transfer module is used for: after user information of an application program A input by a user is obtained on a page H5, the user information is sent to an authorization token generation module of a server A; after receiving the authorization token returned by the authorization token generation module, storing the authorization token and sending the authorization token information to a login token generation module of the server B;
the authorization token generation module is to: after receiving the user information and judging that the user information is correct, generating a unique authorization token with an expiration date according to the user information, and returning the authorization token to the H5 page information transmission module;
the login token generation module is used for: after receiving the authorization token information, generating a unique login token corresponding to the authorization token according to the authorization token information, and sending the login token to a user information authorization module of the server A; after receiving the authorization token and the user information returned by the user information authorization module, storing the authorization token and the user information, marking the authorization token to be associated with the client B of the application program B, and sending a user information issuing signal to a user information issuing module of the server B;
the user information authorization module is used for: after receiving the login token, acquiring an authorization token corresponding to the login token, and returning the authorization token and user information corresponding to the authorization token to a login token generation module of the server B;
the user information issuing module is used for: after receiving the user information issuing signal, issuing the user information to the client B;
wherein, the system also comprises an authorization monitoring module arranged on the client B, and is used for: when monitoring that the application program A is required to authorize the application program B, sending an authorization request to a login token generation module of a server side B; after receiving the authorization request, the login token generation module judges whether an authorization token which is associated with the client B and is not overdue exists, if so, a user information issuing signal is sent to the user information issuing module, and if not, a working signal is sent to the H5 page information transmission module;
the process that the H5 page information transfer module sends the authorization token information to the login token generation module of the server B comprises the following steps: the H5 page information transfer module sends the authorization token information to the client B, and the client B sends the authorization token information to the login token generation module of the server B.
6. The H5 web-based authorization system according to claim 5, wherein: the authorization token information in the H5 page information transmission module is an authorization code converted according to the authorization token.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710935284.7A CN109660487B (en) | 2017-10-10 | 2017-10-10 | Authorization method based on H5 webpage, storage medium, electronic device and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710935284.7A CN109660487B (en) | 2017-10-10 | 2017-10-10 | Authorization method based on H5 webpage, storage medium, electronic device and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109660487A CN109660487A (en) | 2019-04-19 |
CN109660487B true CN109660487B (en) | 2021-11-09 |
Family
ID=66109523
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710935284.7A Active CN109660487B (en) | 2017-10-10 | 2017-10-10 | Authorization method based on H5 webpage, storage medium, electronic device and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109660487B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110493184B (en) * | 2019-07-09 | 2022-10-14 | 深圳壹账通智能科技有限公司 | Method and device for processing login page in client and electronic device |
CN110933078B (en) * | 2019-11-29 | 2022-04-05 | 交通银行股份有限公司 | H5 unregistered user session tracking method |
CN111556060B (en) * | 2020-04-29 | 2022-09-02 | 上海中通吉网络技术有限公司 | Method, device, equipment and storage medium for embedding target software into external H5 page |
CN114416195B (en) * | 2021-12-24 | 2023-08-18 | 青岛海尔科技有限公司 | H5 page loading method and device, intelligent terminal and server |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103888451A (en) * | 2014-03-10 | 2014-06-25 | 百度在线网络技术(北京)有限公司 | Method, device and system for certification authorization |
CN104113533A (en) * | 2014-07-02 | 2014-10-22 | 百度在线网络技术(北京)有限公司 | Login authorization method and device |
CN104902028A (en) * | 2015-06-19 | 2015-09-09 | 赛肯(北京)科技有限公司 | Onekey registration authentication method, device and system |
CN106131604A (en) * | 2016-06-24 | 2016-11-16 | 腾讯科技(深圳)有限公司 | The transmission method of a kind of multimedia messages and device |
CN106453303A (en) * | 2016-10-09 | 2017-02-22 | 武汉斗鱼网络科技有限公司 | Method and system for storing user login status for IOS client |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040073617A1 (en) * | 2000-06-19 | 2004-04-15 | Milliken Walter Clark | Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail |
CN105897668A (en) * | 2015-10-22 | 2016-08-24 | 乐视致新电子科技(天津)有限公司 | Third party account authorization method, device, server and system |
-
2017
- 2017-10-10 CN CN201710935284.7A patent/CN109660487B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103888451A (en) * | 2014-03-10 | 2014-06-25 | 百度在线网络技术(北京)有限公司 | Method, device and system for certification authorization |
CN104113533A (en) * | 2014-07-02 | 2014-10-22 | 百度在线网络技术(北京)有限公司 | Login authorization method and device |
CN104902028A (en) * | 2015-06-19 | 2015-09-09 | 赛肯(北京)科技有限公司 | Onekey registration authentication method, device and system |
CN106131604A (en) * | 2016-06-24 | 2016-11-16 | 腾讯科技(深圳)有限公司 | The transmission method of a kind of multimedia messages and device |
CN106453303A (en) * | 2016-10-09 | 2017-02-22 | 武汉斗鱼网络科技有限公司 | Method and system for storing user login status for IOS client |
Also Published As
Publication number | Publication date |
---|---|
CN109660487A (en) | 2019-04-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109660487B (en) | Authorization method based on H5 webpage, storage medium, electronic device and system | |
CN108734028B (en) | Data management method based on block chain, block chain link point and storage medium | |
CN105282126B (en) | Login authentication method, terminal and server | |
CN111478967B (en) | Request processing method and device | |
CN104144419A (en) | Identity authentication method, device and system | |
CN105450691A (en) | Service-processing method and device, and server | |
CN104717261A (en) | Login method and desktop management device | |
CN109005159B (en) | Data processing method for terminal access system server and authentication server | |
CN105072112A (en) | Identity authentication method and identity authentication device | |
CN108900479A (en) | Short message verification code acquisition methods and device | |
CN104917766A (en) | Security authentication method for two-dimension code | |
CN103685554A (en) | Upgrading method, device and system | |
CN107820702B (en) | Management and control method, device and electronic equipment | |
CN104601582A (en) | File transfer method, device and system | |
JP2020187746A (en) | Iot device, authentication method therefor, cloud server, processing device and readable medium | |
CN104917794A (en) | Data sharing method, device and system | |
CN106453349A (en) | An account number login method and apparatus | |
CN105991610B (en) | Log in the method and device of application server | |
CN105450592A (en) | Safety verification method and device, server and terminal | |
CN104468486A (en) | Information processing method and system and electronic device | |
CN104065674A (en) | Terminal device and information processing method | |
CN109150981B (en) | Block chain network networking method, device, equipment and computer readable storage medium | |
CN104778389A (en) | Numerical value transferring method, terminal, server and system | |
CN105141624A (en) | Login method, account management server and client system | |
CN103559430A (en) | Application account management method and device based on android system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |