CN104468581B - The method and device of login application program - Google Patents
The method and device of login application program Download PDFInfo
- Publication number
- CN104468581B CN104468581B CN201410757919.5A CN201410757919A CN104468581B CN 104468581 B CN104468581 B CN 104468581B CN 201410757919 A CN201410757919 A CN 201410757919A CN 104468581 B CN104468581 B CN 104468581B
- Authority
- CN
- China
- Prior art keywords
- password
- data
- user
- entry
- terminal device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
Abstract
The disclosure is directed to a kind of method and device of login application program.Methods described includes:When receiving the User Identity and password of user's input, the verification sent to server to User Identity and password is asked;When receiving verification from server and passing through result, password request data are sent to Intelligent worn device, Intelligent worn device is used to carry out authentication to terminal device according to password request data, when being verified, generates entry password data;The entry password data that Intelligent worn device is sent are received, entry password data include the identification data of password, User Identity and Intelligent worn device;When receiving the password of user's input, judge whether the password of user's input and the password in entry password data are consistent;When the password of user's input is consistent with the password in entry password data, login application program.This method is used for the security and convenience for realizing login application program.
Description
Technical field
This disclosure relates to Internet technical field, more particularly to a kind of method and device of login application program.
Background technology
With the rise of the development of internet, especially cloud service, personal data are stored in mutually by increasing user
In networking, when user needs to check or download personal data, it is necessary first to log in corresponding application program, then carry out corresponding
Operation.
In correlation technique, the mode that login application program generally use user inputs username and password logs in, however, by
In increasing user by individual privacy data storage on the internet, therefore, simple user name, password can not expire
Requirement that sufficient user is protected to private data, it is necessary to a kind of more safety easily identification mode is logged in using journey again
Sequence.
The content of the invention
To overcome problem present in correlation technique, the disclosure provides a kind of method and device of login application program.
According to the first aspect of the embodiment of the present disclosure, there is provided a kind of method of login application program, applied to terminal device,
Including:
When receiving the User Identity and password of user's input, sent to server to the User Identity
Verification with password is asked;
When receiving verification from the server and passing through result, password request data, institute are sent to Intelligent worn device
State Intelligent worn device to be used to carry out authentication to the terminal device according to the password request data, when being verified
When, generate entry password data;
Receive the entry password data that the Intelligent worn device is sent, the entry password data include password, described
The identification data of User Identity and the Intelligent worn device;
When receiving the password of user's input, in the password and the entry password data that judge user's input
Whether password is consistent;
When the password of user input is consistent with the password in the entry password data, login is described to apply journey
Sequence.
The technical scheme provided by this disclosed embodiment can include the following benefits:Pass through Intelligent worn device and end
The mode of end equipment interaction produces entry password, and according to password logon application program, so as to provide the user a kind of utilization
Intelligent worn device aids in the mode of login application program so that login application program more safe and convenient.
Optionally, the password request data include sending the time of the password request data, the user identity mark
Know the identification data with the terminal device.
Optionally, it is described when receiving the User Identity and password of user's input, sent to server to described
Before the verification request of User Identity and password, methods described also includes:
Wireless connection is established with Intelligent worn device.
In alternative, terminal device pre-establishes wireless connection with Intelligent worn device, is answered so that user logs in
It during with program, can be logged according to the password that the Intelligent worn device of binding is generated, journey is applied so as to enhance to log in
The security and convenience of sequence.
According to the second aspect of the embodiment of the present disclosure, there is provided a kind of method of login application program, applied to intelligent wearing
Equipment, including:
Wireless connection is established with terminal device;
Receive the password request data that the terminal device is sent;
Authentication is carried out to the terminal device according to the password request data;
When being verified, entry password data are generated, the entry password data include password, the user identity mark
Know the identification data with the Intelligent worn device;
The password request data are sent to the terminal device.
The technical scheme provided by this disclosed embodiment can include the following benefits:Pass through Intelligent worn device and end
The mode of end equipment interaction produces entry password, and according to password logon application program, so as to provide the user a kind of utilization
Intelligent worn device aids in the mode of login application program so that login application program more safe and convenient.
According to the third aspect of the embodiment of the present disclosure, there is provided a kind of device of login application program, including:
First sending module, for when receiving the User Identity and password of user's input, being sent to server
Verification request to the User Identity and password;
Second sending module, for when receiving verification from the server and passing through result, being sent out to Intelligent worn device
Password request data are sent, the Intelligent worn device is used to carry out identity to the terminal device according to the password request data
Checking, when being verified, generate entry password data;
First receiving module, the entry password data sent for receiving the Intelligent worn device, the entry password
Data include the identification data of password, the User Identity and the Intelligent worn device;
Judge module, for when receiving the password of user's input, judging that the password of user's input is stepped on described
Whether the password recorded in password data is consistent;
Login module, when the password for being inputted as the user is consistent with the password in the entry password data, step on
Record the application program.
Optionally, described device also includes:
First establishes link block, and the verification for being sent to server to the User Identity and password asks it
Before, establish wireless connection with Intelligent worn device.
According to the fourth aspect of the embodiment of the present disclosure, there is provided a kind of device of login application program, including:
Second establishes link block, for establishing wireless connection with terminal device;
Second receiving module, the password request data sent for receiving the terminal device;
Authentication module, for carrying out authentication to the terminal device according to the password request data;
Generation module, for when being verified, generate entry password data, the entry password data include password,
The identification data of the User Identity and the Intelligent worn device;
3rd sending module, for sending the password request data to the terminal device.
According to the 5th of the embodiment of the present disclosure the aspect, there is provided a kind of device of login application program, including:
Processor;
For storing the memory of processor-executable instruction;
Wherein, the processor is configured as:
When receiving the User Identity and password of user's input, sent to server to the User Identity
Verification with password is asked;
When receiving verification from the server and passing through result, password request data, institute are sent to Intelligent worn device
State Intelligent worn device to be used to carry out authentication to the terminal device according to the password request data, when being verified
When, generate entry password data;
Receive the entry password data that the Intelligent worn device is sent, the entry password data include password, described
The identification data of User Identity and the Intelligent worn device;
When receiving the password of user's input, in the password and the entry password data that judge user's input
Whether password is consistent;
When the password of user input is consistent with the password in the entry password data, login is described to apply journey
Sequence.
According to the 6th of the embodiment of the present disclosure the aspect, there is provided a kind of device of login application program, including:
Processor;
For storing the memory of processor-executable instruction;
Wherein, the processor is configured as:
Wireless connection is established with terminal device;
Receive the password request data that the terminal device is sent;
Authentication is carried out to the terminal device according to the password request data;
When being verified, entry password data are generated, the entry password data include password, the user identity mark
Know the identification data with the Intelligent worn device;
The password request data are sent to the terminal device.
It should be appreciated that the general description and following detailed description of the above are only exemplary and explanatory, not
The disclosure can be limited.
Brief description of the drawings
Accompanying drawing herein is merged in specification and forms the part of this specification, shows the implementation for meeting the disclosure
Example, and be used to together with specification to explain the principle of the disclosure.
Fig. 1 is a kind of flow chart of the method for login application program according to an exemplary embodiment;
Fig. 2 is a kind of flow chart of the method for login application program according to another exemplary embodiment;
Fig. 3 is a kind of flow chart of the method for the login application program exemplified according to a specific implementation;
Fig. 4 is a kind of block diagram of the device of login application program according to an exemplary embodiment;
Fig. 5 is a kind of block diagram of the device of login application program according to another exemplary embodiment;
Fig. 6 is a kind of block diagram of the system of login application program according to an exemplary embodiment;
Fig. 7 is a kind of block diagram of device for login application program according to an exemplary embodiment.
Embodiment
Here exemplary embodiment will be illustrated in detail, its example is illustrated in the accompanying drawings.Following description is related to
During accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represent same or analogous key element.Following exemplary embodiment
Described in embodiment do not represent all embodiments consistent with the disclosure.On the contrary, they be only with it is such as appended
The example of the consistent apparatus and method of some aspects be described in detail in claims, the disclosure.
Fig. 1 is a kind of flow chart of the method for login application program according to an exemplary embodiment, such as Fig. 1 institutes
Show, a kind of method of login application program is used in terminal device, comprises the following steps S11-S15:
Step S11, when receiving the User Identity and password of user's input, sent to server to user identity
The verification of mark and password is asked;
Step S12, when receiving verification from server and passing through result, password request number is sent to Intelligent worn device
According to Intelligent worn device is used to carry out authentication to terminal device according to the password request data, raw when being verified
Into entry password data;
Step S13, receives the entry password data that Intelligent worn device is sent, and entry password data include password, user
Identity and the identification data of Intelligent worn device;
Step S14, when receiving the password of user's input, in the password and entry password data that judge user's input
Whether password is consistent;
Step S15, when the password of user's input is consistent with the password in entry password data, login application program.
The technical scheme that the present embodiment provides can include the following benefits:Pass through Intelligent worn device and terminal device
Interactive mode produces entry password, and according to password logon application program, is worn so as to provide the user a kind of utilization intelligence
Wear the mode of equipment auxiliary login application program so that login application program more safe and convenient.
The above method, in step S12, password request data include sending time, the user identity mark of password request data
Know the identification data with terminal device.According to time and the user identity that password request data are sent in password request data
Mark, Intelligent worn device can provide the user accurate entry password data, the password request for avoiding different time from receiving
Data are obscured;The identification data of terminal device in password request data can be the form of encryption string, according to terminal
The identification data of equipment, Intelligent worn device can carry out authentication to terminal device, when being verified, illustrate eventually
End equipment is the equipment matched in advance with Intelligent worn device, then further generation entry password Data Concurrent is sent.
After server receives the verification request to User Identity and password, according to the user identity prestored
Whether the corresponding relation of mark and password, the User Identity and password for judging user's input match;When the use of user's input
When family identity and password match, send verification to terminal device and pass through result;
Optionally, before S11 is implemented, the above method also includes:Wireless connection is established with Intelligent worn device.Work as user
When using terminal equipment starts application program, terminal device establishes wireless connection with Intelligent worn device first, can use bluetooth
Establish wireless connection.
Fig. 2 is a kind of flow chart of the method for login application program according to an exemplary embodiment, such as Fig. 2 institutes
Show, in the embodiment, a kind of method of login application program is used in Intelligent worn device, comprises the following steps S21-S25:
Step S21, wireless connection is established with terminal device;
Step S22, the password request data that receiving terminal apparatus is sent;
Wherein, password request data include time, User Identity and the end that terminal device sends password request data
The identification data of end equipment;
Step S23, authentication is carried out to terminal device according to password request data;
Step S24, when being verified, entry password data are generated, entry password data include password, user identity mark
Know the identification data with Intelligent worn device;
Wherein, password is generated at random by Intelligent worn device, for being sent to terminal device, is read and is inputted for user,
And then verified by terminal device and log in application program;The identification data of Intelligent worn device can be encryption string
Form;
Step S25, password request data are sent to terminal device.
The technical scheme that the present embodiment provides can include the following benefits:Pass through Intelligent worn device and terminal device
Interactive mode produces entry password, and according to password logon application program, is worn so as to provide the user a kind of utilization intelligence
Wear the mode of equipment auxiliary login application program so that login application program more safe and convenient.
A kind of method of login application program of disclosure offer is provided below by specific embodiment.
Fig. 3 is a kind of flow chart of the method for the login application program exemplified according to a specific implementation, in the embodiment
In, terminal device is interacted with Intelligent worn device (such as Intelligent bracelet), and Intelligent worn device auxiliary user's registration terminal is set
Standby upper application program.As shown in figure 3, comprise the following steps S301-S313:
Step S301, terminal and Intelligent bracelet establish wireless connection by bluetooth;
Step S302, user start the application program in terminal;
Step S303, the application program in terminal access Intelligent bracelet;
Step S304, user input the User Identity and password of application program in terminal;
Step S305, terminal receive the User Identity and password of user's input, and will be to User Identity and close
The verification request of code is sent to server;
Step S306, server verify to User Identity and password;When verifying correct, step is performed
S307;When check errors, return to step S304;
Step S307, server send verification to terminal and pass through result;
Step S308, terminal send password request data to Intelligent worn device;Password request data include sending password
The identification data of time of request data, User Identity and terminal;
Step S309, Intelligent worn device carry out authentication according to password request data to terminal;
Step S310, when the authentication to terminal by when, Intelligent worn device generation entry password data, and will step on
Record password data is sent to terminal;The identity that entry password data include password, User Identity and Intelligent worn device is known
Other data;
Step S311, the password in the entry password data that user's reading terminals receive, and input password;
Step S312, terminal judge whether the password of user's input and the password in entry password data are consistent;If user
The password of input is consistent with the password in entry password data, performs step S313;If the password and entry password of user's input
Password in data is inconsistent, return to step S311;
Step S313, terminal login application program.
In the above-described embodiments, terminal is in advance and Intelligent bracelet establishes wireless connection, when user's login application program, intelligence
Energy bracelet and terminal interact, and generate the password for user's login application program, and user inputs correct password, you can steps on
Application program is recorded, it is achieved thereby that a kind of mode that login application program is aided in using Intelligent worn device has been provided the user,
So that login application program more safe and convenient.
Fig. 4 is a kind of device block diagram of login application program according to an exemplary embodiment.Reference picture 4, the dress
Put including:
First sending module 41, for when receiving the User Identity and password of user's input, being sent out to server
The verification to User Identity and password is sent to ask;
Second sending module 42, for when receiving verification from server and passing through result, being sent to Intelligent worn device
Password request data, Intelligent worn device are used to carry out authentication to terminal device according to password request data, when checking is logical
It is out-of-date, generate entry password data;
First receiving module 43, for receiving the entry password data of Intelligent worn device transmission, entry password packet
Include the identification data of password, User Identity and Intelligent worn device;
Judge module 44, for when receiving the password of user's input, judging the password and entry password of user's input
Whether the password in data is consistent;
Login module 45, when the password for being inputted as user is consistent with the password in entry password data, log in application
Program.
Optionally, said apparatus also includes:
First establishes link block, before the verification for being sent to server to User Identity and password is asked,
Wireless connection is established with Intelligent worn device.
The technical scheme that the present embodiment provides can include the following benefits:Pass through Intelligent worn device and terminal device
Interactive mode produces entry password, and according to password logon application program, is worn so as to provide the user a kind of utilization intelligence
Wear the mode of equipment auxiliary login application program so that login application program more safe and convenient.
Fig. 5 is a kind of device block diagram of login application program according to another exemplary embodiment.Reference picture 5, should
Device includes:
Second establishes link block 51, for establishing wireless connection with terminal device;
Second receiving module 52, the password request data sent for receiving terminal apparatus;
Authentication module 53, for carrying out authentication to terminal device according to password request data;
Generation module 54, for when being verified, generating entry password data, entry password data include password, used
Family identity and the identification data of Intelligent worn device;
3rd sending module 55, for sending password request data to terminal device.
The technical scheme that the present embodiment provides can include the following benefits:Pass through Intelligent worn device and terminal device
Interactive mode produces entry password, and according to password logon application program, is worn so as to provide the user a kind of utilization intelligence
Wear the mode of equipment auxiliary login application program so that login application program more safe and convenient.
For the method for the login application program described in above-described embodiment, the disclosure also provides a kind of login application program
System, as shown in fig. 6, a kind of system of login application program includes:Terminal device 61, server 62 and Intelligent worn device
63;
Wherein, terminal device 61, for when receive user input User Identity and password when, to server 62
Send the verification request to User Identity and password;When receiving verification from server 62 and passing through result, worn to intelligence
Wear equipment 63 and send password request data, Intelligent worn device 63 is used to carry out body to terminal device 61 according to password request data
Part checking, when being verified, generate entry password data;The entry password data that Intelligent worn device 63 is sent are received, are stepped on
Record password data includes the identification data of password, User Identity and Intelligent worn device 63;It is defeated when receiving user
During the password entered, judge whether the password of user's input and the password in entry password data are consistent;When the password of user's input
When consistent with the password in entry password data, login application program;
Server 62, the request of the verification to User Identity and password sent for receiving terminal apparatus 61, verification
Request includes the User Identity and password of user's input;According to the User Identity and the correspondence of password prestored
Whether relation, the User Identity and password for judging user's input match;When the User Identity and password of user's input
During matching, send verification to terminal device 61 and pass through result;
Intelligent worn device 63, for establishing wireless connection with terminal device 61;The password that receiving terminal apparatus 61 is sent
Request data;Authentication is carried out to terminal device 61 according to password request data;When being verified, entry password number is generated
According to entry password data include the identification data of password, User Identity and Intelligent worn device 63;To terminal device
61 send password request data.
Optionally, terminal device 61 is additionally operable to establish wireless connection with Intelligent worn device 63.
In the exemplary embodiment, the disclosure additionally provides a kind of device of login application program, including:
Processor;
For storing the memory of processor-executable instruction;
Wherein, the processor is configured as:
When receiving the User Identity and password of user's input, sent to server to the User Identity
Verification with password is asked;
When receiving verification from the server and passing through result, password request data, institute are sent to Intelligent worn device
State Intelligent worn device to be used to carry out authentication to the terminal device according to the password request data, when being verified
When, generate entry password data;
Receive the entry password data that the Intelligent worn device is sent, the entry password data include password, described
The identification data of User Identity and the Intelligent worn device;
When receiving the password of user's input, in the password and the entry password data that judge user's input
Whether password is consistent;
When the password of user input is consistent with the password in the entry password data, login is described to apply journey
Sequence.
In the exemplary embodiment, the disclosure additionally provides a kind of device of login application program, including:
Processor;
For storing the memory of processor-executable instruction;
Wherein, the processor is configured as:
Wireless connection is established with terminal device;
Receive the password request data that the terminal device is sent;
Authentication is carried out to the terminal device according to the password request data;
When being verified, entry password data are generated, the entry password data include password, the user identity mark
Know the identification data with the Intelligent worn device;
The password request data are sent to the terminal device.
On the device in above-described embodiment, wherein modules perform the concrete mode of operation in relevant this method
Embodiment in be described in detail, explanation will be not set forth in detail herein.
Fig. 7 is a kind of block diagram of device 700 for login application program according to an exemplary embodiment.Example
Such as, device 700 can be mobile phone, computer, digital broadcast terminal, messaging devices, game console, and flat board is set
It is standby, Medical Devices, body-building equipment, personal digital assistant etc..
Reference picture 7, device 700 can include following one or more assemblies:Processing component 702, memory 704, power supply
Component 706, multimedia groupware 708, audio-frequency assembly 710, the interface 712 of input/output (I/O), sensor cluster 714, and
Communication component 716.
The integrated operation of the usual control device 700 of processing component 702, such as communicated with display, call, data, phase
The operation that machine operates and record operation is associated.Treatment element 702 can refer to including one or more processors 720 to perform
Order, to complete all or part of step of above-mentioned method.In addition, processing component 702 can include one or more modules, just
Interaction between processing component 702 and other assemblies.For example, processing component 702 can include multi-media module, it is more to facilitate
Interaction between media component 708 and processing component 702.
Memory 704 is configured as storing various types of data to support the operation in equipment 700.These data are shown
Example includes the instruction of any application program or method for being operated on device 700, contact data, telephone book data, disappears
Breath, picture, video etc..Memory 704 can be by any kind of volatibility or non-volatile memory device or their group
Close and realize, as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM) are erasable to compile
Journey read-only storage (EPROM), programmable read only memory (PROM), read-only storage (ROM), magnetic memory, flash
Device, disk or CD.
Electric power assembly 706 provides electric power for the various assemblies of device 700.Electric power assembly 706 can include power management system
System, one or more power supplys, and other components associated with generating, managing and distributing electric power for device 700.
Multimedia groupware 708 is included in the screen of one output interface of offer between described device 700 and user.One
In a little embodiments, screen can include liquid crystal display (LCD) and touch panel (TP).If screen includes touch panel, screen
Curtain may be implemented as touch-screen, to receive the input signal from user.Touch panel includes one or more touch sensings
Device is with the gesture on sensing touch, slip and touch panel.The touch sensor can not only sensing touch or sliding action
Border, but also detect and touched or the related duration and pressure of slide with described.In certain embodiments, more matchmakers
Body component 708 includes a front camera and/or rear camera.When equipment 700 is in operator scheme, such as screening-mode or
During video mode, front camera and/or rear camera can receive outside multi-medium data.Each front camera and
Rear camera can be a fixed optical lens system or have focusing and optical zoom capabilities.
Audio-frequency assembly 710 is configured as output and/or input audio signal.For example, audio-frequency assembly 710 includes a Mike
Wind (MIC), when device 700 is in operator scheme, during such as call model, logging mode and speech recognition mode, microphone by with
It is set to reception external audio signal.The audio signal received can be further stored in memory 704 or via communication set
Part 716 is sent.In certain embodiments, audio-frequency assembly 710 also includes a loudspeaker, for exports audio signal.
I/O interfaces 712 provide interface between processing component 702 and peripheral interface module, and above-mentioned peripheral interface module can
To be keyboard, click wheel, button etc..These buttons may include but be not limited to:Home button, volume button, start button and lock
Determine button.
Sensor cluster 714 includes one or more sensors, and the state for providing various aspects for device 700 is commented
Estimate.For example, sensor cluster 714 can detect opening/closed mode of equipment 700, and the relative positioning of component, for example, it is described
Component is the display and keypad of device 700, and sensor cluster 714 can be with 700 1 components of detection means 700 or device
Position change, the existence or non-existence that user contacts with device 700, the orientation of device 700 or acceleration/deceleration and device 700
Temperature change.Sensor cluster 714 can include proximity transducer, be configured to detect in no any physical contact
The presence of neighbouring object.Sensor cluster 714 can also include optical sensor, such as CMOS or ccd image sensor, for into
As being used in application.In certain embodiments, the sensor cluster 714 can also include acceleration transducer, gyro sensors
Device, Magnetic Sensor, pressure sensor or temperature sensor.
Communication component 716 is configured to facilitate the communication of wired or wireless way between device 700 and other equipment.Device
700 can access the wireless network based on communication standard, such as WiFi, 2G or 3G, or combinations thereof.In an exemplary implementation
In example, communication component 716 receives broadcast singal or broadcast related information from external broadcasting management system via broadcast channel.
In one exemplary embodiment, the communication component 716 also includes near-field communication (NFC) module, to promote junction service.Example
Such as, in NFC module radio frequency identification (RFID) technology can be based on, Infrared Data Association (IrDA) technology, ultra wide band (UWB) technology,
Bluetooth (BT) technology and other technologies are realized.
In the exemplary embodiment, device 700 can be believed by one or more application specific integrated circuits (ASIC), numeral
Number processor (DSP), digital signal processing appts (DSPD), PLD (PLD), field programmable gate array
(FPGA), controller, microcontroller, microprocessor or other electronic components are realized, for performing the above method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instructing, example are additionally provided
Such as include the memory 704 of instruction, above-mentioned instruction can be performed to complete the above method by the processor 720 of device 700.For example,
The non-transitorycomputer readable storage medium can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk
With optical data storage devices etc..
A kind of non-transitorycomputer readable storage medium, when the instruction in the storage medium is by the processing of mobile terminal
When device performs so that mobile terminal is able to carry out a kind of method of login application program, and methods described includes:
When receiving the User Identity and password of user's input, sent to server to the User Identity
Verification with password is asked;
When receiving verification from the server and passing through result, password request data, institute are sent to Intelligent worn device
State Intelligent worn device to be used to carry out authentication to the terminal device according to the password request data, when being verified
When, generate entry password data;
Receive the entry password data that the Intelligent worn device is sent, the entry password data include password, described
The identification data of User Identity and the Intelligent worn device;
When receiving the password of user's input, in the password and the entry password data that judge user's input
Whether password is consistent;
When the password of user input is consistent with the password in the entry password data, login is described to apply journey
Sequence.
The password request data include sending the time of the password request data, the User Identity and described
The identification data of terminal device.
It is described when receive user input User Identity and password when, to server send to the user identity
Before the verification request of mark and password, methods described also includes:
Wireless connection is established with Intelligent worn device.
A kind of non-transitorycomputer readable storage medium, when the instruction in the storage medium is by Intelligent worn device
During computing device so that Intelligent worn device is able to carry out a kind of method of login application program, and methods described includes:
Wireless connection is established with terminal device;
Receive the password request data that the terminal device is sent;
Authentication is carried out to the terminal device according to the password request data;
When being verified, entry password data are generated, the entry password data include password, the user identity mark
Know the identification data with the Intelligent worn device;
The password request data are sent to the terminal device.
Those skilled in the art will readily occur to other realities of the disclosure after considering specification and putting into practice disclosure herein
Apply scheme.The application is intended to any modification, purposes or the adaptations of the disclosure, these modifications, purposes or suitable
The change of answering property follows the general principle of the disclosure and including the undocumented common knowledge or used in the art of the disclosure
Use technological means.Description and embodiments are considered only as exemplary, and the true scope of the disclosure and spirit are by following right
It is required that point out.
It should be appreciated that the precision architecture that the disclosure is not limited to be described above and is shown in the drawings, and
And various modifications and changes can be being carried out without departing from the scope.The scope of the present disclosure is only limited by appended claim.
Claims (10)
- A kind of 1. method of login application program, it is characterised in that applied to terminal device, including:When receiving the User Identity and password of user's input, sent to server to the User Identity and close The verification request of code;When receiving verification from the server and passing through result, password request data, the intelligence are sent to Intelligent worn device Energy wearable device is used to carry out authentication to the terminal device according to the password request data, raw when being verified Into entry password data;The entry password data that the Intelligent worn device is sent are received, the entry password data include password, the user Identity and the identification data of the Intelligent worn device;When receiving the password of user's input, the password of user's input and the password in the entry password data are judged It is whether consistent;When the password of user input is consistent with the password in the entry password data, the application program is logged in;The password request data include time, the User Identity and the terminal for sending the password request data The identification data of equipment.
- 2. according to the method for claim 1, it is characterised in that it is described when receive user input User Identity and During password, before the verification request to the User Identity and password is sent to server, methods described also includes:Wireless connection is established with Intelligent worn device.
- A kind of 3. method of login application program, it is characterised in that applied to Intelligent worn device, including:Wireless connection is established with terminal device;The password request data that the terminal device is sent are received, the password request data include sending the password request number According to time, User Identity and the terminal device identification data;Authentication is carried out to the terminal device according to the password request data;When being verified, generate entry password data, the entry password data include password, the User Identity and The identification data of the Intelligent worn device;The entry password data are sent to the terminal device.
- A kind of 4. device of login application program, it is characterised in that including:First sending module, for when receiving the User Identity and password of user's input, being sent to server to institute State the verification request of User Identity and password;Second sending module, for when receiving verification from the server and passing through result, mouth to be sent to Intelligent worn device Request data is made, the Intelligent worn device is used to carry out authentication to terminal device according to the password request data, when When being verified, entry password data are generated, the password request data include sending time, the institute of the password request data State the identification data of User Identity and the terminal device;First receiving module, the entry password data sent for receiving the Intelligent worn device, the entry password data Include the identification data of password, the User Identity and the Intelligent worn device;Judge module, for when receiving the password of user's input, judging the password of user's input and the login mouth Make the password in data whether consistent;Login module, when the password for being inputted as the user is consistent with the password in the entry password data, log in institute State application program.
- 5. device according to claim 4, it is characterised in that described device also includes:First establishes link block, before the verification for being sent to server to the User Identity and password is asked, Wireless connection is established with Intelligent worn device.
- A kind of 6. device of login application program, it is characterised in that including:Second establishes link block, for establishing wireless connection with terminal device;Second receiving module, the password request data sent for receiving the terminal device, the password request data include Send the identification data of time of the password request data, User Identity and the terminal device;Authentication module, for carrying out authentication to the terminal device according to the password request data;Generation module, for when being verified, generate entry password data, the entry password data include password, described The identification data of User Identity and Intelligent worn device;3rd sending module, for sending the entry password data to the terminal device.
- A kind of 7. device of login application program, it is characterised in that including:Processor;For storing the memory of processor-executable instruction;Wherein, the processor is configured as:When receiving the User Identity and password of user's input, sent to server to the User Identity and close The verification request of code;When receiving verification from the server and passing through result, password request data, the intelligence are sent to Intelligent worn device Energy wearable device is used to carry out authentication to terminal device according to the password request data, and when being verified, generation is stepped on Record password data, the password request data include sending the time of the password request data, the User Identity and The identification data of the terminal device;The entry password data that the Intelligent worn device is sent are received, the entry password data include password, the user Identity and the identification data of the Intelligent worn device;When receiving the password of user's input, the password of user's input and the password in the entry password data are judged It is whether consistent;When the password of user input is consistent with the password in the entry password data, the application program is logged in.
- A kind of 8. device of login application program, it is characterised in that including:Processor;For storing the memory of processor-executable instruction;Wherein, the processor is configured as:Wireless connection is established with terminal device;The password request data that the terminal device is sent are received, the password request data include sending the password request number According to time, User Identity and the terminal device identification data;Authentication is carried out to the terminal device according to the password request data;When being verified, generate entry password data, the entry password data include password, the User Identity and The identification data of Intelligent worn device;The entry password data are sent to the terminal device.
- 9. a kind of computer-readable recording medium, is stored thereon with computer instruction, it is characterised in that the instruction is held by processor The step of the claims 1-2 methods describeds are realized during row.
- 10. a kind of computer-readable recording medium, is stored thereon with computer instruction, it is characterised in that the instruction is by processor The step of 3 methods described of the claims is realized during execution.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410757919.5A CN104468581B (en) | 2014-12-10 | 2014-12-10 | The method and device of login application program |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410757919.5A CN104468581B (en) | 2014-12-10 | 2014-12-10 | The method and device of login application program |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104468581A CN104468581A (en) | 2015-03-25 |
CN104468581B true CN104468581B (en) | 2018-03-02 |
Family
ID=52913953
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410757919.5A Active CN104468581B (en) | 2014-12-10 | 2014-12-10 | The method and device of login application program |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104468581B (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106341379B (en) * | 2015-07-17 | 2020-01-24 | 中兴通讯股份有限公司 | Information processing method, device and system |
CN105187382B (en) * | 2015-08-05 | 2018-03-06 | 西安电子科技大学 | Prevent from hitting the multiple-factor identity identifying method of storehouse attack |
CN105072132B (en) * | 2015-08-27 | 2019-05-14 | 宇龙计算机通信科技(深圳)有限公司 | Verification method, verifying system and communication equipment |
CN107026736A (en) * | 2016-01-29 | 2017-08-08 | 李明 | A kind of wearable device and the method that Password Input number of times is reduced by it |
CN108377563B (en) * | 2016-11-08 | 2021-08-20 | 北京京东尚科信息技术有限公司 | Method for managing wearable equipment, server and client |
CN106911666B (en) * | 2017-01-04 | 2020-07-17 | 青岛海信移动通信技术股份有限公司 | Wearable intelligent device and message processing method and system thereof |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1427609A (en) * | 2001-12-20 | 2003-07-02 | 西北工业大学 | Nonrecurring countersign and business confirmation method |
CN102123033A (en) * | 2011-03-23 | 2011-07-13 | 北京恒光数码科技有限公司 | Identity authentication method and system of dynamic password token as well as mobile terminal of dynamic password token |
CN102164141A (en) * | 2011-04-24 | 2011-08-24 | 陈珂 | Method for protecting security of account |
WO2014083335A2 (en) * | 2012-11-28 | 2014-06-05 | Hoverkey Ltd | A method and system of providing authentication of user access to a computer resource via a mobile device using multiple separate security factors |
CN103905191A (en) * | 2012-12-26 | 2014-07-02 | 阿里巴巴集团控股有限公司 | Verification method applied to mobile terminal, mobile terminal and system |
CN104168329A (en) * | 2014-08-28 | 2014-11-26 | 尚春明 | User secondary authentication method, device and system in cloud computing and Internet |
-
2014
- 2014-12-10 CN CN201410757919.5A patent/CN104468581B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1427609A (en) * | 2001-12-20 | 2003-07-02 | 西北工业大学 | Nonrecurring countersign and business confirmation method |
CN102123033A (en) * | 2011-03-23 | 2011-07-13 | 北京恒光数码科技有限公司 | Identity authentication method and system of dynamic password token as well as mobile terminal of dynamic password token |
CN102164141A (en) * | 2011-04-24 | 2011-08-24 | 陈珂 | Method for protecting security of account |
WO2014083335A2 (en) * | 2012-11-28 | 2014-06-05 | Hoverkey Ltd | A method and system of providing authentication of user access to a computer resource via a mobile device using multiple separate security factors |
CN103905191A (en) * | 2012-12-26 | 2014-07-02 | 阿里巴巴集团控股有限公司 | Verification method applied to mobile terminal, mobile terminal and system |
CN104168329A (en) * | 2014-08-28 | 2014-11-26 | 尚春明 | User secondary authentication method, device and system in cloud computing and Internet |
Also Published As
Publication number | Publication date |
---|---|
CN104468581A (en) | 2015-03-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104468581B (en) | The method and device of login application program | |
CN104125067B (en) | Account and token secret key binding method and device | |
CN104243484B (en) | Information interacting method and device, electronic equipment | |
CN104219058B (en) | Authentication, identification authorization method and device | |
CN104283876A (en) | Operation authorization method and device | |
CN104391870B (en) | Logistics information acquisition methods and device | |
CN104159218B (en) | Internetwork connection establishing method and device | |
CN104933351A (en) | Information security processing method and information security processing device | |
CN104091376A (en) | Intelligent lock control method and apparatus thereof | |
CN104484593B (en) | terminal verification method and device | |
CN106097494A (en) | The method for unlocking of smart lock and device | |
CN104469714A (en) | Short message sending method and device | |
CN103957103A (en) | Safety authentication method and device and mobile terminal | |
CN104158659B (en) | Anti-counterfeit authentication method, device and system | |
CN104093119B (en) | unlocking method and device | |
CN105407070A (en) | Logging-in authorization method and device | |
CN104950838A (en) | Network account binding method and device | |
CN104217328A (en) | Multi-verification payment method and multi-verification payment device | |
CN104158665A (en) | Method and device of verification | |
CN106204029A (en) | The method and apparatus of Quick Response Code payment | |
CN106375096A (en) | Short message verification method and device | |
CN105450662A (en) | Encryption method and device | |
CN104125267A (en) | Account protection method, device and terminal equipment | |
CN106060027A (en) | Methods, devices, equipment and systems for verification based on verification codes | |
CN107230060A (en) | The method and apparatus that a kind of account is reported the loss |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |