CN110688632A - Application program login method, device, equipment and storage medium - Google Patents

Application program login method, device, equipment and storage medium Download PDF

Info

Publication number
CN110688632A
CN110688632A CN201910843691.4A CN201910843691A CN110688632A CN 110688632 A CN110688632 A CN 110688632A CN 201910843691 A CN201910843691 A CN 201910843691A CN 110688632 A CN110688632 A CN 110688632A
Authority
CN
China
Prior art keywords
login
key
information
application program
preset
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910843691.4A
Other languages
Chinese (zh)
Inventor
田祥博
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Property and Casualty Insurance Company of China Ltd
Original Assignee
Ping An Property and Casualty Insurance Company of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Property and Casualty Insurance Company of China Ltd filed Critical Ping An Property and Casualty Insurance Company of China Ltd
Priority to CN201910843691.4A priority Critical patent/CN110688632A/en
Publication of CN110688632A publication Critical patent/CN110688632A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The application relates to the technical field of passwords, and discloses a login method, a login device, login equipment and a storage medium for an application program, wherein the method comprises the following steps: when the starting of an application program is monitored, a preset key interception program is operated to intercept a key triggering event; when the intercepted keyboard trigger event comprises a preset combination key, calling login information corresponding to the preset combination key, wherein the login information comprises a user name and a login password; displaying a user name and a login password in a login interface of an application program; outputting prompt information for prompting a user to input a preset confirmation key, and intercepting a confirmation key triggering event input by the user according to the prompt information through a key interception program to obtain a login confirmation key corresponding to the confirmation key triggering event; and when the login confirmation key is matched with the preset confirmation key, the user name and the login password are verified to automatically login the application program. The method and the device realize quick login of the application program and simultaneously ensure the information safety of the user.

Description

Application program login method, device, equipment and storage medium
Technical Field
The present application relates to the field of internet technologies, and in particular, to a login method, device, apparatus, and storage medium for an application.
Background
At present, more and more applications with various functions are used, and in order to better use the functions of the applications, a user is generally required to register an account of the user.
Due to the consideration of information security, the password of the account is usually set to be complicated, and the same user may have different accounts when using different applications, so that a large number of accounts are easy to confuse. And part of application programs are provided with account number protection mechanisms, namely, when account numbers are wrongly input for a certain number of times, login cannot be carried out. This causes that the application program cannot log in easily if the account number is mistaken or the password is forgotten when the application program logs in. Although some existing application programs can automatically store user names and passwords, the information security is low, and losses are easily caused to users.
Therefore, how to rapidly log in the application program while ensuring the information security of the user becomes an urgent problem to be solved.
Disclosure of Invention
The application provides a login method, a login device, login equipment and a login storage medium of an application program, so that the application program can be quickly logged in, and meanwhile, the information security of a user is guaranteed.
In a first aspect, the present application provides a login method for an application program, where the method includes:
when the starting of an application program is monitored, a preset key interception program is operated to intercept a key triggering event;
when the intercepted keyboard trigger event comprises a preset combination key, calling login information corresponding to the preset combination key, wherein the login information comprises a user name and a login password;
displaying a user name and a login password in a login interface of the application program;
outputting prompt information for prompting a user to input a preset confirmation key, and intercepting a confirmation key triggering event input by the user according to the prompt information through the key interception program to obtain a login confirmation key corresponding to the confirmation key triggering event;
and when the login confirmation key is matched with the preset confirmation key, verifying the user name and the login password to automatically log in the application program.
In a second aspect, the present application further provides a login device for an application, the device including:
the event interception module is used for operating a preset key interception program to intercept a key triggering event when the starting of the application program is monitored;
the information calling module is used for calling login information corresponding to a preset combination key when the intercepted keyboard trigger event comprises the preset combination key, wherein the login information comprises a user name and a login password;
the information display module is used for displaying a user name and a login password in a login interface of the application program;
the confirmation prompting module is used for outputting prompting information for prompting a user to input a preset confirmation key, and intercepting a confirmation key triggering event input by the user according to the prompting information through the key intercepting program so as to obtain a login confirmation key corresponding to the confirmation key triggering event;
and the verification login module is used for verifying the user name and the login password to automatically log in the application program when the login confirmation key is matched with the preset confirmation key.
In a third aspect, the present application further provides a computer device comprising a memory and a processor; the memory is used for storing a computer program; the processor is configured to execute the computer program and implement the login method of the application program when executing the computer program.
In a fourth aspect, the present application further provides a computer-readable storage medium storing a computer program, which when executed by a processor causes the processor to implement the login method of the application program as described above.
The application discloses a login method, a device, equipment and a storage medium of an application program, wherein when the application program is monitored to be started, a key triggering event is intercepted, when the intercepted key triggering event comprises a preset combined key, login information corresponding to the preset combined key is called, then the login information is displayed in a login interface of the application program, then prompt information used for prompting a user to input a preset confirmed key is output, the login confirmed key triggering event input by the user is intercepted through the preset key intercepting program, and when the login confirmed key is matched with the preset confirmed key, the login information is verified to automatically login the application program. The automatic input of the login information is realized by triggering the preset combination key, the login confirmation is carried out by the user after the user name and the password are input, and the login information is verified to realize the automatic login of the application program after the confirmation is finished. The method and the device realize quick login of the application program and ensure the information safety of the user through login verification.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic flowchart of a login method of an application program according to an embodiment of the present application;
FIG. 2 is a schematic flow chart diagram illustrating steps for establishing an association relationship provided in an embodiment of the present application;
FIG. 3 is a flow diagram illustrating sub-steps of association establishment provided by an embodiment of the present application;
FIG. 4 is a flowchart illustrating steps provided by an embodiment of the present application for authenticating a current user;
fig. 5 is a schematic block diagram of a login device of an application program according to an embodiment of the present application;
FIG. 6 is a schematic block diagram of sub-modules of the login means of the application provided in FIG. 5;
fig. 7 is a schematic block diagram of a structure of a computer device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all, embodiments of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The flow diagrams depicted in the figures are merely illustrative and do not necessarily include all of the elements and operations/steps, nor do they necessarily have to be performed in the order depicted. For example, some operations/steps may be decomposed, combined or partially combined, so that the actual execution sequence may be changed according to the actual situation.
The embodiment of the application provides a login method and device of an application program, computer equipment and a storage medium. The login method of the application program is used for quickly logging in the application program and simultaneously ensuring the information security of a user.
Some embodiments of the present application will be described in detail below with reference to the accompanying drawings. The embodiments described below and the features of the embodiments can be combined with each other without conflict.
Referring to fig. 1, fig. 1 is a schematic flowchart illustrating a login method of an application according to an embodiment of the present application. The login method of the application program can be applied to a terminal or a server, and can realize input-free quick login and simultaneously ensure the information safety of a user.
S101, establishing an association relation between a preset combination key and login information.
The incidence relation between the preset combination keys and the login information is established, so that when a user inputs the preset combination keys, the login information corresponding to the input preset combination keys can be called according to the incidence relation, and input-free quick login is realized.
In some embodiments, please refer to fig. 2, the establishing of the association relationship specifically includes step S101a and step S101 b.
S101, 101a, obtaining login information for logging in the application program, and generating an executable file according to the login information.
The executable file refers to a file that can be directly executed under windows, and the file format may be an exe format. The executable file has the functions of automatically inputting a user name in a user name input box of the application program, automatically switching from TAB to a password input box, inputting a password in the password input box, and finally automatically returning for logging in.
In some embodiments, referring to fig. 3, the step S101 may specifically include steps S101a1 to S101a 3.
S101a1, displaying an acquisition interface of login information, wherein the acquisition interface comprises a user name input box and a password input box.
Specifically, an acquisition interface of login information may be displayed to the user, where the acquisition interface includes a user name input box and a password input box, and the user inputs a user name and a login password of an application program that needs to be automatically logged in the user name input box and the password input box, respectively.
S101a2, acquiring the user name input by the user in the user name input box and the password input in the password input box.
Specifically, the obtaining interface further includes a submit button, and the submit button is used for submitting the user name and the login password respectively input by the user in the user name input box and the password input box to the database for storage. In a specific implementation, the user name and login password may be submitted to the database using form data.
When the user name and the login password are submitted in a form data mode, after a user triggers a submit button, form data in a database can be analyzed to judge whether the user name and the login password exist in the form data, and if the user name and/or the login password do not exist, input prompt information is returned to an acquisition interface of login information to prompt the user to input the user name and/or the login password. In a specific implementation process, the input prompt information may be presented in a system broadcast manner such as popping up a prompt box on an acquisition interface of the login information.
S101a3, generating a login script according to the user name and the password, and performing format conversion on the login script to obtain an executable file corresponding to the login script.
In particular, a login script may be generated using a login script template. The login script template is reserved with a user name filling position and a login password filling position, and after the user name and the login password input by the user are obtained, the obtained user name and the login password are respectively and automatically filled into the corresponding user name filling position and the corresponding login password filling position, so that the login script is obtained.
After the login script is generated, the format of the login script is converted. In particular implementations, the login script may be formatted using py2exe, thereby converting the login script into an executable file. In other embodiments, the login script may also be formatted using pylnstar and cx _ Freeze.
The login script is converted into the executable file, so that a user who does not install python can run the executable file on the windows system, the purpose of automatic login is achieved, and the use universality is improved.
S101b, acquiring a preset combination key, and establishing an association relation between the preset combination key and the executable file.
The preset combination key can be set by a user in a self-defined mode, and the association relation between the preset combination key and the executable file is established, so that the user can call the corresponding executable file when inputting the preset combination key, and the automatic login of the application program is realized.
In some embodiments, the obtaining the preset combination key includes: capturing the combined key operated by a user in preset capturing time, and defining the combined key as a preset combined key.
Specifically, the capture time of the combination key may be preset, for example, if the preset capture time is 2S, the combination key input by the user in 2S is captured, and the captured combination key is defined as the preset combination key.
When multiple groups of login information exist, different preset combination keys can be configured for each group of login information respectively, so that the multiple groups of login information all have the corresponding preset combination keys, and the login method of the application program can adapt to automatic login of the multiple groups of login information.
S102, when the starting of the application program is monitored, a preset key capture program is operated to capture a key trigger event.
Specifically, the application program may be software under a DOS or Windows system (extension. exe), or a web page (extension. com), or the like. The preset key interception program may be a global hook, also called a keyboard hook, which intercepts and processes Windows messages using an API for monitoring the keyboard operations of the user. In a specific implementation process, the global hook can be set to run in the background by modifying a function of the global hook, so that the global hook does not display a running interface.
When the application program is monitored to be started, a preset key capture program is operated to capture the keys input by the user at the moment.
S103, when the intercepted key triggering event comprises a preset combination key, calling login information corresponding to the preset combination key.
Specifically, the login information includes a user name and a login password. In a specific implementation process, the login information corresponding to the preset combination key may be called only when the intercepted key trigger event includes the preset combination key within a preset interception interval. The preset interception interval refers to a time interval from the interception of the Nth input character to the interception of the (N + 1) th input character. For example, the preset intercept interval is 1S. The probability of misoperation is reduced by setting a preset interception interval.
In some embodiments, before invoking the login information corresponding to the preset combination key, in order to ensure information security of the user, a step of verifying an identity of the current user is further included, please refer to fig. 4, where the step of verifying the identity of the current user includes steps S1031 to S1033.
And S1031, obtaining the reserved identity information.
And the reserved identity information is used for verifying the identity of the user. The reserved identity information can be voiceprint information, character information or digital information and the like which are stored in advance by the user.
S1032, acquiring identity authentication information, and matching the identity authentication information with the reserved identity information.
Specifically, when the intercepted key triggering event includes a preset combination key, the identity authentication information of the current user is acquired so as to authenticate the identity of the current user. The current user is the user currently logged into the application.
S1033, when the identity authentication information is successfully matched with the reserved identity information, executing the step of calling the login information corresponding to the preset combination key.
Specifically, the acquired authentication information of the current user is matched with the reserved identity information of the user, and when the authentication information is successfully matched with the reserved identity information, the authentication is successful at the moment, and the login information corresponding to the preset combination key can be called.
The identity of the current user who inputs the preset combination key is verified, and the use safety of the user information is improved.
And S104, displaying the user name and the login password in the login interface of the application program.
Specifically, a login interface of the application may first be displayed to the user, the login interface including a username entry box and a password entry box.
The user name input box and the password input box may be respectively displayed with prompt identifiers, for example, "user name is input here" is displayed in the user name input box, and "password is input here" is displayed in the password input box. In a specific implementation process, the prompt identifiers displayed in the user name input box and the password input box can be displayed in gray fonts, the prompt identifiers automatically disappear when a cursor of a user is positioned in the user name input box or the password input box, and the prompt identifiers automatically display when the cursor of the user is moved away from the user name input box or the password input box and the content is not input in the user name input box or the password input box.
In some embodiments, to facilitate the user's identification of the entered username and password to facilitate the user's verification of the username, the username may be displayed in plain text and the login password may be displayed in cipher text in the login interface of the application. The user can judge whether the user name is the user name which needs to be logged in currently through the user name displayed in the plaintext, and the password displayed in the ciphertext protects the information security of the user.
In one embodiment, the password input box includes a first password input box for inputting a user password (UM password) and a second password input box for inputting a domain password, wherein the UM password and the domain password are displayed in different manners, a plain text display and a cipher text display.
Specifically, when it is detected that the user positions the mouse cursor in the user name input box, the executable file is executed, the executable file automatically inputs the user name in the user name input box, and then the TAB switches to the password input box automatically and inputs the password to display the user name and the password in the login interface of the application program. In the specific implementation process, the position of the mouse cursor can be actively detected to judge whether the position of the mouse cursor is positioned at the position of the user name input box; or the user can directly position the mouse cursor in the user name input box.
And S105, outputting prompt information for prompting a user to input a preset confirmation key, and intercepting a confirmation key triggering event input by the user according to the prompt information through the key interception program to obtain a login confirmation key corresponding to the confirmation key triggering event.
Specifically, the preset determination key may be a key preset by the user for login confirmation, and the preset determination key may be a combination key or a single key.
After the user name and the password are automatically input, the user is prompted to input a confirmation key, and a preset key interception program intercepts a confirmation key triggering event input by the user to obtain a login confirmation key corresponding to the confirmation key triggering event.
And S106, when the login confirmation key is matched with the preset confirmation key, verifying the user name and the login password to automatically log in the application program.
Specifically, a login confirmation key input by a user is matched according to a preset confirmation key, when the login confirmation key is matched with the preset confirmation key, a user name and a password are verified, and the application program is automatically logged in by using the executable file after the verification is passed.
The embodiment is that an association relationship between a preset combination key and login information is established in advance, then when the application program is monitored to be started, a key trigger event is intercepted, when the intercepted key trigger event comprises the preset combination key, the login information is called by using the association relationship, the login information is displayed in a login interface of the application program, then a user is prompted to input a preset determination key, and when the login confirmation key is matched with the preset determination key, the login information is verified to automatically log in the application program. The automatic input of the login information is realized by triggering the preset combination key, the login confirmation is carried out by the user after the user name and the password are input, and the login information is verified to realize the automatic login of the application program after the confirmation is finished. The method and the device realize quick login of the application program and ensure the information safety of the user through login verification.
Referring to fig. 5, fig. 5 is a schematic block diagram of a login device of an application program according to an embodiment of the present application, where the login device of the application program is used to execute the aforementioned login method of the application program. The login device of the application program may be configured in a server or a terminal.
The server may be an independent server or a server cluster. The terminal can be an electronic device such as a mobile phone, a tablet computer, a notebook computer, a desktop computer, a personal digital assistant and a wearable device.
As shown in fig. 5, the login device 300 for an application includes: an association establishing module 301, a key interception module 302, an information calling module 303, an information display module 304, a confirmation key module 305 and an automatic login module 306.
The association establishing module 301 is configured to establish an association relationship between a preset combination key and login information.
In some embodiments, the association establishment module 301 comprises: a file generation sub-module 3011 and a file association sub-module 3012.
The file generation submodule 3011 is configured to obtain login information used for logging in an application program, and generate an executable file according to the login information.
In some embodiments, referring to fig. 6, the file generation sub-module 3011 includes an interface display sub-module 30111, an information obtaining sub-module 30112, and a file obtaining sub-module 30113.
The interface display sub-module 30111 is configured to display an acquisition interface of the login information, where the acquisition interface includes a user name input box and a password input box.
And the information acquisition sub-module 30112 is configured to acquire a user name input in the user name input box and a password input in the password input box by the user.
The file obtaining sub-module 30113 is configured to generate a login script according to the user name and the password, and perform format conversion on the login script to obtain an executable file corresponding to the login script.
The file association sub-module 3012 is configured to obtain a preset combination key and establish an association relationship between the preset combination key and the executable file.
The key capture module 302 is configured to run a preset key capture program to capture a key trigger event when it is monitored that the application program is started.
And the information calling module 303 is configured to call login information corresponding to a preset combination key when the intercepted key trigger event includes the preset combination key.
In some embodiments, the information invoking module 303 further comprises: a reserved information submodule 3031, a verification information submodule 3032 and an information matching submodule 3033.
The reserved information submodule 3031 is configured to obtain reserved identity information.
And the verification information submodule 3032 is configured to acquire authentication information and match the authentication information with the reserved identity information.
And the information matching submodule 3033 is configured to execute the step of calling the login information corresponding to the preset combination key when the identity authentication information is successfully matched with the reserved identity information.
And the information display module 304 is configured to display the user name and the login password in the login interface of the application program.
The confirmation key module 305 is configured to output prompt information for prompting a user to input a preset confirmation key, and intercept, by the key interception program, a confirmation key trigger event input by the user according to the prompt information, so as to obtain a login confirmation key corresponding to the confirmation key trigger event.
And an automatic login module 306, configured to verify the user name and the login password to automatically log in the application program when the login confirmation key matches the preset determination key.
It should be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the login apparatus and each module of the application program described above may refer to the corresponding processes in the foregoing embodiment of the login method of the application program, and are not described herein again.
The logging means of the application program described above may be implemented in the form of a computer program which may be run on a computer device as shown in fig. 6.
Referring to fig. 6, fig. 6 is a schematic block diagram of a computer device according to an embodiment of the present disclosure. The computer device may be a server or a terminal.
Referring to fig. 6, the computer device includes a processor, a memory, and a network interface connected through a system bus, wherein the memory may include a nonvolatile storage medium and an internal memory.
The non-volatile storage medium may store an operating system and a computer program. The computer program includes program instructions that, when executed, cause a processor to perform any one of the methods of logging in an application.
The processor is used for providing calculation and control capability and supporting the operation of the whole computer equipment.
The internal memory provides an environment for running a computer program in the nonvolatile storage medium, and the computer program, when executed by the processor, causes the processor to execute any one of the login methods of the application program.
The network interface is used for network communication, such as sending assigned tasks and the like. Those skilled in the art will appreciate that the architecture shown in fig. 6 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
It should be understood that the Processor may be a Central Processing Unit (CPU), and the Processor may be other general purpose processors, Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components, etc. Wherein a general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
Wherein, in one embodiment, the processor is configured to execute a computer program stored in the memory to implement the steps of:
establishing an incidence relation between a preset combination key and login information; when the starting of an application program is monitored, a preset key interception program is operated to intercept a key triggering event; when the intercepted keyboard trigger event comprises a preset combination key, calling login information corresponding to the preset combination key, wherein the login information comprises a user name and a login password; displaying a user name and a login password in a login interface of the application program; outputting prompt information for prompting a user to input a preset confirmation key, and intercepting a confirmation key triggering event input by the user according to the prompt information through the key interception program to obtain a login confirmation key corresponding to the confirmation key triggering event; and when the login confirmation key is matched with the preset confirmation key, verifying the user name and the login password to automatically log in the application program.
In some embodiments, the processor, when implementing the establishing of the association relationship between the preset combination key and the login information, is configured to implement:
obtaining login information for logging in an application program, and generating an executable file according to the login information; and acquiring a preset combination key, and establishing an association relation between the preset combination key and the executable file.
In some embodiments, the processor, when implementing the obtaining login information for logging in an application and generating an executable file according to the login information, is configured to implement:
displaying an acquisition interface of login information, wherein the acquisition interface comprises a user name input box and a password input box; acquiring a user name input by a user in the user name input box and a password input in the password input box; and generating a login script according to the user name and the password, and performing format conversion on the login script to obtain an executable file corresponding to the login script.
In some embodiments, the processor, when implementing the obtaining of the preset combination key, is configured to implement:
capturing the combined key operated by a user in preset capturing time, and defining the combined key as a preset combined key.
In some embodiments, before the invoking of the login information corresponding to the preset combination key is implemented, the processor is configured to implement:
acquiring reserved identity information, wherein the reserved identity information is used for verifying the identity of a user; acquiring identity authentication information, and matching the identity authentication information with the reserved identity information; and when the identity authentication information is successfully matched with the reserved identity information, executing the step of calling the login information corresponding to the preset combination key.
In some embodiments, the processor, in implementing the displaying the username and login password in the login interface of the application, is configured to implement:
and displaying the user name in plain text and the login password in cipher text in a login interface of the application program.
The embodiment of the application further provides a computer-readable storage medium, wherein a computer program is stored in the computer-readable storage medium, the computer program comprises program instructions, and the processor executes the program instructions to realize the login method of any application program provided by the embodiment of the application.
The computer-readable storage medium may be an internal storage unit of the computer device described in the foregoing embodiment, for example, a hard disk or a memory of the computer device. The computer readable storage medium may also be an external storage device of the computer device, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like provided on the computer device.
While the invention has been described with reference to specific embodiments, the scope of the invention is not limited thereto, and those skilled in the art can easily conceive various equivalent modifications or substitutions within the technical scope of the invention. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (10)

1. A login method for an application program, comprising:
when the starting of an application program is monitored, a preset key interception program is operated to intercept a key triggering event;
when the intercepted key triggering event comprises a preset combination key, calling login information corresponding to the preset combination key, wherein the login information comprises a user name and a login password;
displaying a user name and a login password in a login interface of the application program;
outputting prompt information for prompting a user to input a preset confirmation key, and intercepting a confirmation key triggering event input by the user according to the prompt information through the key interception program to obtain a login confirmation key corresponding to the confirmation key triggering event;
and when the login confirmation key is matched with the preset confirmation key, verifying the user name and the login password to automatically log in the application program.
2. The login method of the application program according to claim 1, wherein before the invoking of the login information corresponding to the preset combination key, the method further comprises:
acquiring reserved identity information, wherein the reserved identity information is used for verifying the identity of a user;
acquiring identity authentication information, and matching the identity authentication information with the reserved identity information;
and when the identity authentication information is successfully matched with the reserved identity information, executing the step of calling the login information corresponding to the preset combination key.
3. The login method for an application program according to claim 1, further comprising:
and establishing an incidence relation between the preset combination key and the login information.
4. The login method of application program according to claim 3, wherein the establishing of the association relationship between the preset combination key and the login information comprises:
obtaining login information for logging in an application program, and generating an executable file according to the login information;
and acquiring a preset combination key, and establishing an association relation between the preset combination key and the executable file.
5. The method according to claim 4, wherein the acquiring login information for logging in the application program and generating the executable file based on the login information includes:
displaying an acquisition interface of login information, wherein the acquisition interface comprises a user name input box and a password input box;
acquiring a user name input by a user in the user name input box and a password input in the password input box;
and generating a login script according to the user name and the password, and performing format conversion on the login script to obtain an executable file corresponding to the login script.
6. The login method of application program according to claim 5, wherein said obtaining a preset combination key comprises:
capturing the combined key operated by a user in preset capturing time, and defining the combined key as a preset combined key.
7. The login method of the application program according to claim 1, wherein the displaying a user name and a login password in a login interface of the application program comprises:
and displaying the user name in plain text and the login password in cipher text in a login interface of the application program.
8. An apparatus for logging in an application program, comprising:
the event interception module is used for operating a preset key interception program to intercept a key triggering event when the starting of the application program is monitored;
the information calling module is used for calling login information corresponding to a preset combination key when the intercepted keyboard trigger event comprises the preset combination key, wherein the login information comprises a user name and a login password;
the information display module is used for displaying a user name and a login password in a login interface of the application program;
the confirmation prompting module is used for outputting prompting information for prompting a user to input a preset confirmation key, and intercepting a confirmation key triggering event input by the user according to the prompting information through the key intercepting program so as to obtain a login confirmation key corresponding to the confirmation key triggering event;
and the verification login module is used for verifying the user name and the login password to automatically log in the application program when the login confirmation key is matched with the preset confirmation key.
9. A computer device, wherein the computer device comprises a memory and a processor;
the memory is used for storing a computer program;
the processor for executing the computer program and implementing a login method for an application program according to any one of claims 1 to 7 when executing the computer program.
10. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer program which, when executed by a processor, causes the processor to implement a login method of an application program according to any one of claims 1 to 7.
CN201910843691.4A 2019-09-06 2019-09-06 Application program login method, device, equipment and storage medium Pending CN110688632A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910843691.4A CN110688632A (en) 2019-09-06 2019-09-06 Application program login method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910843691.4A CN110688632A (en) 2019-09-06 2019-09-06 Application program login method, device, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN110688632A true CN110688632A (en) 2020-01-14

Family

ID=69107897

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910843691.4A Pending CN110688632A (en) 2019-09-06 2019-09-06 Application program login method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN110688632A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111258595A (en) * 2020-03-13 2020-06-09 山东超越数控电子股份有限公司 PyInstaler-based python source code packaging method
CN112163201A (en) * 2020-09-29 2021-01-01 江西江铃集团新能源汽车有限公司 User login management method and system, readable storage medium and electronic device

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102752295A (en) * 2012-06-25 2012-10-24 奇智软件(北京)有限公司 Method and device for setting keys
CN104618515A (en) * 2015-03-04 2015-05-13 陈佩珊 Cloud storage account number-based one-key logging method
US20150143493A1 (en) * 2013-11-21 2015-05-21 Qnap Systems, Inc. Electronic device and login method thereof
CN105069351A (en) * 2015-07-23 2015-11-18 浪潮电子信息产业股份有限公司 Apparatus and method for preventing stealing of login information of application program
CN105184140A (en) * 2015-07-30 2015-12-23 广东欧珀移动通信有限公司 Password input method and device as well as mobile terminal
CN105553984A (en) * 2015-12-18 2016-05-04 北京金山安全软件有限公司 User account login management method and device and electronic equipment
CN105893285A (en) * 2016-03-30 2016-08-24 青岛海信移动通信技术股份有限公司 Method for opening USB debugging option and terminal
CN107135504A (en) * 2016-02-29 2017-09-05 深圳秀豹科技有限公司 The login method and device of a kind of WiFi networks

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102752295A (en) * 2012-06-25 2012-10-24 奇智软件(北京)有限公司 Method and device for setting keys
US20150143493A1 (en) * 2013-11-21 2015-05-21 Qnap Systems, Inc. Electronic device and login method thereof
CN104618515A (en) * 2015-03-04 2015-05-13 陈佩珊 Cloud storage account number-based one-key logging method
CN105069351A (en) * 2015-07-23 2015-11-18 浪潮电子信息产业股份有限公司 Apparatus and method for preventing stealing of login information of application program
CN105184140A (en) * 2015-07-30 2015-12-23 广东欧珀移动通信有限公司 Password input method and device as well as mobile terminal
CN105553984A (en) * 2015-12-18 2016-05-04 北京金山安全软件有限公司 User account login management method and device and electronic equipment
CN107135504A (en) * 2016-02-29 2017-09-05 深圳秀豹科技有限公司 The login method and device of a kind of WiFi networks
CN105893285A (en) * 2016-03-30 2016-08-24 青岛海信移动通信技术股份有限公司 Method for opening USB debugging option and terminal

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111258595A (en) * 2020-03-13 2020-06-09 山东超越数控电子股份有限公司 PyInstaler-based python source code packaging method
CN112163201A (en) * 2020-09-29 2021-01-01 江西江铃集团新能源汽车有限公司 User login management method and system, readable storage medium and electronic device

Similar Documents

Publication Publication Date Title
CN108200089B (en) Method, device and system for realizing information security and storage medium
CN108681662B (en) Method and device for installing program
EP3065074A1 (en) Fingerprint authentication method and device, intelligent terminal, and computer storage medium
CN108829528B (en) Content sharing method and device, and message processing method and device
CN109684873B (en) Data access control method and device, computer equipment and storage medium
CN109547426B (en) Service response method and server
US9942752B1 (en) Method and system for detecting phishing calls using one-time password
CN105245489B (en) Verification method and device
CN108418797B (en) Webpage access method and device, computer equipment and storage medium
CN111176543A (en) Method, device, computer equipment and storage medium for realizing electronic signature
CN110688632A (en) Application program login method, device, equipment and storage medium
CN107480513B (en) Authentication implementation method and device, computer device and readable storage medium
CN108200075B (en) Identity authentication method, system, terminal and storage medium
CN115022047A (en) Account login method and device based on multi-cloud gateway, computer equipment and medium
CN108509228B (en) Page loading method, terminal equipment and computer readable storage medium
CN112260983B (en) Identity authentication method, device, equipment and computer readable storage medium
CN112966242A (en) User name and password authentication method, device and equipment and readable storage medium
CN112966249A (en) Multi-user account switching method and device, computer equipment and medium
CN110222492B (en) System switching method and device, computer equipment and computer readable storage medium
CN110752933A (en) Verification code input method and device, electronic equipment and storage medium
CN108769059B (en) Verification method, device, medium and computing equipment
US20200389449A1 (en) Systems and methods of enabling fast user access to remote desktops
CN113935008B (en) User authentication method, device, electronic equipment and computer readable storage medium
CN110795710B (en) Unlocking method of electronic device, electronic device and computer-readable storage medium
CN114154128A (en) User information cloud sharing method and system, computer and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination