CN104468581B - The method and device of login application program - Google Patents

The method and device of login application program Download PDF

Info

Publication number
CN104468581B
CN104468581B CN201410757919.5A CN201410757919A CN104468581B CN 104468581 B CN104468581 B CN 104468581B CN 201410757919 A CN201410757919 A CN 201410757919A CN 104468581 B CN104468581 B CN 104468581B
Authority
CN
China
Prior art keywords
password
data
user
entry
terminal device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410757919.5A
Other languages
Chinese (zh)
Other versions
CN104468581A (en
Inventor
宫天翔
吴廷彬
张军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiaomi Inc
Original Assignee
Xiaomi Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiaomi Inc filed Critical Xiaomi Inc
Priority to CN201410757919.5A priority Critical patent/CN104468581B/en
Publication of CN104468581A publication Critical patent/CN104468581A/en
Application granted granted Critical
Publication of CN104468581B publication Critical patent/CN104468581B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Abstract

The disclosure is directed to a kind of method and device of login application program.Methods described includes:When receiving the User Identity and password of user's input, the verification sent to server to User Identity and password is asked;When receiving verification from server and passing through result, password request data are sent to Intelligent worn device, Intelligent worn device is used to carry out authentication to terminal device according to password request data, when being verified, generates entry password data;The entry password data that Intelligent worn device is sent are received, entry password data include the identification data of password, User Identity and Intelligent worn device;When receiving the password of user's input, judge whether the password of user's input and the password in entry password data are consistent;When the password of user's input is consistent with the password in entry password data, login application program.This method is used for the security and convenience for realizing login application program.

Description

The method and device of login application program
Technical field
This disclosure relates to Internet technical field, more particularly to a kind of method and device of login application program.
Background technology
With the rise of the development of internet, especially cloud service, personal data are stored in mutually by increasing user In networking, when user needs to check or download personal data, it is necessary first to log in corresponding application program, then carry out corresponding Operation.
In correlation technique, the mode that login application program generally use user inputs username and password logs in, however, by In increasing user by individual privacy data storage on the internet, therefore, simple user name, password can not expire Requirement that sufficient user is protected to private data, it is necessary to a kind of more safety easily identification mode is logged in using journey again Sequence.
The content of the invention
To overcome problem present in correlation technique, the disclosure provides a kind of method and device of login application program.
According to the first aspect of the embodiment of the present disclosure, there is provided a kind of method of login application program, applied to terminal device, Including:
When receiving the User Identity and password of user's input, sent to server to the User Identity Verification with password is asked;
When receiving verification from the server and passing through result, password request data, institute are sent to Intelligent worn device State Intelligent worn device to be used to carry out authentication to the terminal device according to the password request data, when being verified When, generate entry password data;
Receive the entry password data that the Intelligent worn device is sent, the entry password data include password, described The identification data of User Identity and the Intelligent worn device;
When receiving the password of user's input, in the password and the entry password data that judge user's input Whether password is consistent;
When the password of user input is consistent with the password in the entry password data, login is described to apply journey Sequence.
The technical scheme provided by this disclosed embodiment can include the following benefits:Pass through Intelligent worn device and end The mode of end equipment interaction produces entry password, and according to password logon application program, so as to provide the user a kind of utilization Intelligent worn device aids in the mode of login application program so that login application program more safe and convenient.
Optionally, the password request data include sending the time of the password request data, the user identity mark Know the identification data with the terminal device.
Optionally, it is described when receiving the User Identity and password of user's input, sent to server to described Before the verification request of User Identity and password, methods described also includes:
Wireless connection is established with Intelligent worn device.
In alternative, terminal device pre-establishes wireless connection with Intelligent worn device, is answered so that user logs in It during with program, can be logged according to the password that the Intelligent worn device of binding is generated, journey is applied so as to enhance to log in The security and convenience of sequence.
According to the second aspect of the embodiment of the present disclosure, there is provided a kind of method of login application program, applied to intelligent wearing Equipment, including:
Wireless connection is established with terminal device;
Receive the password request data that the terminal device is sent;
Authentication is carried out to the terminal device according to the password request data;
When being verified, entry password data are generated, the entry password data include password, the user identity mark Know the identification data with the Intelligent worn device;
The password request data are sent to the terminal device.
The technical scheme provided by this disclosed embodiment can include the following benefits:Pass through Intelligent worn device and end The mode of end equipment interaction produces entry password, and according to password logon application program, so as to provide the user a kind of utilization Intelligent worn device aids in the mode of login application program so that login application program more safe and convenient.
According to the third aspect of the embodiment of the present disclosure, there is provided a kind of device of login application program, including:
First sending module, for when receiving the User Identity and password of user's input, being sent to server Verification request to the User Identity and password;
Second sending module, for when receiving verification from the server and passing through result, being sent out to Intelligent worn device Password request data are sent, the Intelligent worn device is used to carry out identity to the terminal device according to the password request data Checking, when being verified, generate entry password data;
First receiving module, the entry password data sent for receiving the Intelligent worn device, the entry password Data include the identification data of password, the User Identity and the Intelligent worn device;
Judge module, for when receiving the password of user's input, judging that the password of user's input is stepped on described Whether the password recorded in password data is consistent;
Login module, when the password for being inputted as the user is consistent with the password in the entry password data, step on Record the application program.
Optionally, described device also includes:
First establishes link block, and the verification for being sent to server to the User Identity and password asks it Before, establish wireless connection with Intelligent worn device.
According to the fourth aspect of the embodiment of the present disclosure, there is provided a kind of device of login application program, including:
Second establishes link block, for establishing wireless connection with terminal device;
Second receiving module, the password request data sent for receiving the terminal device;
Authentication module, for carrying out authentication to the terminal device according to the password request data;
Generation module, for when being verified, generate entry password data, the entry password data include password, The identification data of the User Identity and the Intelligent worn device;
3rd sending module, for sending the password request data to the terminal device.
According to the 5th of the embodiment of the present disclosure the aspect, there is provided a kind of device of login application program, including:
Processor;
For storing the memory of processor-executable instruction;
Wherein, the processor is configured as:
When receiving the User Identity and password of user's input, sent to server to the User Identity Verification with password is asked;
When receiving verification from the server and passing through result, password request data, institute are sent to Intelligent worn device State Intelligent worn device to be used to carry out authentication to the terminal device according to the password request data, when being verified When, generate entry password data;
Receive the entry password data that the Intelligent worn device is sent, the entry password data include password, described The identification data of User Identity and the Intelligent worn device;
When receiving the password of user's input, in the password and the entry password data that judge user's input Whether password is consistent;
When the password of user input is consistent with the password in the entry password data, login is described to apply journey Sequence.
According to the 6th of the embodiment of the present disclosure the aspect, there is provided a kind of device of login application program, including:
Processor;
For storing the memory of processor-executable instruction;
Wherein, the processor is configured as:
Wireless connection is established with terminal device;
Receive the password request data that the terminal device is sent;
Authentication is carried out to the terminal device according to the password request data;
When being verified, entry password data are generated, the entry password data include password, the user identity mark Know the identification data with the Intelligent worn device;
The password request data are sent to the terminal device.
It should be appreciated that the general description and following detailed description of the above are only exemplary and explanatory, not The disclosure can be limited.
Brief description of the drawings
Accompanying drawing herein is merged in specification and forms the part of this specification, shows the implementation for meeting the disclosure Example, and be used to together with specification to explain the principle of the disclosure.
Fig. 1 is a kind of flow chart of the method for login application program according to an exemplary embodiment;
Fig. 2 is a kind of flow chart of the method for login application program according to another exemplary embodiment;
Fig. 3 is a kind of flow chart of the method for the login application program exemplified according to a specific implementation;
Fig. 4 is a kind of block diagram of the device of login application program according to an exemplary embodiment;
Fig. 5 is a kind of block diagram of the device of login application program according to another exemplary embodiment;
Fig. 6 is a kind of block diagram of the system of login application program according to an exemplary embodiment;
Fig. 7 is a kind of block diagram of device for login application program according to an exemplary embodiment.
Embodiment
Here exemplary embodiment will be illustrated in detail, its example is illustrated in the accompanying drawings.Following description is related to During accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represent same or analogous key element.Following exemplary embodiment Described in embodiment do not represent all embodiments consistent with the disclosure.On the contrary, they be only with it is such as appended The example of the consistent apparatus and method of some aspects be described in detail in claims, the disclosure.
Fig. 1 is a kind of flow chart of the method for login application program according to an exemplary embodiment, such as Fig. 1 institutes Show, a kind of method of login application program is used in terminal device, comprises the following steps S11-S15:
Step S11, when receiving the User Identity and password of user's input, sent to server to user identity The verification of mark and password is asked;
Step S12, when receiving verification from server and passing through result, password request number is sent to Intelligent worn device According to Intelligent worn device is used to carry out authentication to terminal device according to the password request data, raw when being verified Into entry password data;
Step S13, receives the entry password data that Intelligent worn device is sent, and entry password data include password, user Identity and the identification data of Intelligent worn device;
Step S14, when receiving the password of user's input, in the password and entry password data that judge user's input Whether password is consistent;
Step S15, when the password of user's input is consistent with the password in entry password data, login application program.
The technical scheme that the present embodiment provides can include the following benefits:Pass through Intelligent worn device and terminal device Interactive mode produces entry password, and according to password logon application program, is worn so as to provide the user a kind of utilization intelligence Wear the mode of equipment auxiliary login application program so that login application program more safe and convenient.
The above method, in step S12, password request data include sending time, the user identity mark of password request data Know the identification data with terminal device.According to time and the user identity that password request data are sent in password request data Mark, Intelligent worn device can provide the user accurate entry password data, the password request for avoiding different time from receiving Data are obscured;The identification data of terminal device in password request data can be the form of encryption string, according to terminal The identification data of equipment, Intelligent worn device can carry out authentication to terminal device, when being verified, illustrate eventually End equipment is the equipment matched in advance with Intelligent worn device, then further generation entry password Data Concurrent is sent.
After server receives the verification request to User Identity and password, according to the user identity prestored Whether the corresponding relation of mark and password, the User Identity and password for judging user's input match;When the use of user's input When family identity and password match, send verification to terminal device and pass through result;
Optionally, before S11 is implemented, the above method also includes:Wireless connection is established with Intelligent worn device.Work as user When using terminal equipment starts application program, terminal device establishes wireless connection with Intelligent worn device first, can use bluetooth Establish wireless connection.
Fig. 2 is a kind of flow chart of the method for login application program according to an exemplary embodiment, such as Fig. 2 institutes Show, in the embodiment, a kind of method of login application program is used in Intelligent worn device, comprises the following steps S21-S25:
Step S21, wireless connection is established with terminal device;
Step S22, the password request data that receiving terminal apparatus is sent;
Wherein, password request data include time, User Identity and the end that terminal device sends password request data The identification data of end equipment;
Step S23, authentication is carried out to terminal device according to password request data;
Step S24, when being verified, entry password data are generated, entry password data include password, user identity mark Know the identification data with Intelligent worn device;
Wherein, password is generated at random by Intelligent worn device, for being sent to terminal device, is read and is inputted for user, And then verified by terminal device and log in application program;The identification data of Intelligent worn device can be encryption string Form;
Step S25, password request data are sent to terminal device.
The technical scheme that the present embodiment provides can include the following benefits:Pass through Intelligent worn device and terminal device Interactive mode produces entry password, and according to password logon application program, is worn so as to provide the user a kind of utilization intelligence Wear the mode of equipment auxiliary login application program so that login application program more safe and convenient.
A kind of method of login application program of disclosure offer is provided below by specific embodiment.
Fig. 3 is a kind of flow chart of the method for the login application program exemplified according to a specific implementation, in the embodiment In, terminal device is interacted with Intelligent worn device (such as Intelligent bracelet), and Intelligent worn device auxiliary user's registration terminal is set Standby upper application program.As shown in figure 3, comprise the following steps S301-S313:
Step S301, terminal and Intelligent bracelet establish wireless connection by bluetooth;
Step S302, user start the application program in terminal;
Step S303, the application program in terminal access Intelligent bracelet;
Step S304, user input the User Identity and password of application program in terminal;
Step S305, terminal receive the User Identity and password of user's input, and will be to User Identity and close The verification request of code is sent to server;
Step S306, server verify to User Identity and password;When verifying correct, step is performed S307;When check errors, return to step S304;
Step S307, server send verification to terminal and pass through result;
Step S308, terminal send password request data to Intelligent worn device;Password request data include sending password The identification data of time of request data, User Identity and terminal;
Step S309, Intelligent worn device carry out authentication according to password request data to terminal;
Step S310, when the authentication to terminal by when, Intelligent worn device generation entry password data, and will step on Record password data is sent to terminal;The identity that entry password data include password, User Identity and Intelligent worn device is known Other data;
Step S311, the password in the entry password data that user's reading terminals receive, and input password;
Step S312, terminal judge whether the password of user's input and the password in entry password data are consistent;If user The password of input is consistent with the password in entry password data, performs step S313;If the password and entry password of user's input Password in data is inconsistent, return to step S311;
Step S313, terminal login application program.
In the above-described embodiments, terminal is in advance and Intelligent bracelet establishes wireless connection, when user's login application program, intelligence Energy bracelet and terminal interact, and generate the password for user's login application program, and user inputs correct password, you can steps on Application program is recorded, it is achieved thereby that a kind of mode that login application program is aided in using Intelligent worn device has been provided the user, So that login application program more safe and convenient.
Fig. 4 is a kind of device block diagram of login application program according to an exemplary embodiment.Reference picture 4, the dress Put including:
First sending module 41, for when receiving the User Identity and password of user's input, being sent out to server The verification to User Identity and password is sent to ask;
Second sending module 42, for when receiving verification from server and passing through result, being sent to Intelligent worn device Password request data, Intelligent worn device are used to carry out authentication to terminal device according to password request data, when checking is logical It is out-of-date, generate entry password data;
First receiving module 43, for receiving the entry password data of Intelligent worn device transmission, entry password packet Include the identification data of password, User Identity and Intelligent worn device;
Judge module 44, for when receiving the password of user's input, judging the password and entry password of user's input Whether the password in data is consistent;
Login module 45, when the password for being inputted as user is consistent with the password in entry password data, log in application Program.
Optionally, said apparatus also includes:
First establishes link block, before the verification for being sent to server to User Identity and password is asked, Wireless connection is established with Intelligent worn device.
The technical scheme that the present embodiment provides can include the following benefits:Pass through Intelligent worn device and terminal device Interactive mode produces entry password, and according to password logon application program, is worn so as to provide the user a kind of utilization intelligence Wear the mode of equipment auxiliary login application program so that login application program more safe and convenient.
Fig. 5 is a kind of device block diagram of login application program according to another exemplary embodiment.Reference picture 5, should Device includes:
Second establishes link block 51, for establishing wireless connection with terminal device;
Second receiving module 52, the password request data sent for receiving terminal apparatus;
Authentication module 53, for carrying out authentication to terminal device according to password request data;
Generation module 54, for when being verified, generating entry password data, entry password data include password, used Family identity and the identification data of Intelligent worn device;
3rd sending module 55, for sending password request data to terminal device.
The technical scheme that the present embodiment provides can include the following benefits:Pass through Intelligent worn device and terminal device Interactive mode produces entry password, and according to password logon application program, is worn so as to provide the user a kind of utilization intelligence Wear the mode of equipment auxiliary login application program so that login application program more safe and convenient.
For the method for the login application program described in above-described embodiment, the disclosure also provides a kind of login application program System, as shown in fig. 6, a kind of system of login application program includes:Terminal device 61, server 62 and Intelligent worn device 63;
Wherein, terminal device 61, for when receive user input User Identity and password when, to server 62 Send the verification request to User Identity and password;When receiving verification from server 62 and passing through result, worn to intelligence Wear equipment 63 and send password request data, Intelligent worn device 63 is used to carry out body to terminal device 61 according to password request data Part checking, when being verified, generate entry password data;The entry password data that Intelligent worn device 63 is sent are received, are stepped on Record password data includes the identification data of password, User Identity and Intelligent worn device 63;It is defeated when receiving user During the password entered, judge whether the password of user's input and the password in entry password data are consistent;When the password of user's input When consistent with the password in entry password data, login application program;
Server 62, the request of the verification to User Identity and password sent for receiving terminal apparatus 61, verification Request includes the User Identity and password of user's input;According to the User Identity and the correspondence of password prestored Whether relation, the User Identity and password for judging user's input match;When the User Identity and password of user's input During matching, send verification to terminal device 61 and pass through result;
Intelligent worn device 63, for establishing wireless connection with terminal device 61;The password that receiving terminal apparatus 61 is sent Request data;Authentication is carried out to terminal device 61 according to password request data;When being verified, entry password number is generated According to entry password data include the identification data of password, User Identity and Intelligent worn device 63;To terminal device 61 send password request data.
Optionally, terminal device 61 is additionally operable to establish wireless connection with Intelligent worn device 63.
In the exemplary embodiment, the disclosure additionally provides a kind of device of login application program, including:
Processor;
For storing the memory of processor-executable instruction;
Wherein, the processor is configured as:
When receiving the User Identity and password of user's input, sent to server to the User Identity Verification with password is asked;
When receiving verification from the server and passing through result, password request data, institute are sent to Intelligent worn device State Intelligent worn device to be used to carry out authentication to the terminal device according to the password request data, when being verified When, generate entry password data;
Receive the entry password data that the Intelligent worn device is sent, the entry password data include password, described The identification data of User Identity and the Intelligent worn device;
When receiving the password of user's input, in the password and the entry password data that judge user's input Whether password is consistent;
When the password of user input is consistent with the password in the entry password data, login is described to apply journey Sequence.
In the exemplary embodiment, the disclosure additionally provides a kind of device of login application program, including:
Processor;
For storing the memory of processor-executable instruction;
Wherein, the processor is configured as:
Wireless connection is established with terminal device;
Receive the password request data that the terminal device is sent;
Authentication is carried out to the terminal device according to the password request data;
When being verified, entry password data are generated, the entry password data include password, the user identity mark Know the identification data with the Intelligent worn device;
The password request data are sent to the terminal device.
On the device in above-described embodiment, wherein modules perform the concrete mode of operation in relevant this method Embodiment in be described in detail, explanation will be not set forth in detail herein.
Fig. 7 is a kind of block diagram of device 700 for login application program according to an exemplary embodiment.Example Such as, device 700 can be mobile phone, computer, digital broadcast terminal, messaging devices, game console, and flat board is set It is standby, Medical Devices, body-building equipment, personal digital assistant etc..
Reference picture 7, device 700 can include following one or more assemblies:Processing component 702, memory 704, power supply Component 706, multimedia groupware 708, audio-frequency assembly 710, the interface 712 of input/output (I/O), sensor cluster 714, and Communication component 716.
The integrated operation of the usual control device 700 of processing component 702, such as communicated with display, call, data, phase The operation that machine operates and record operation is associated.Treatment element 702 can refer to including one or more processors 720 to perform Order, to complete all or part of step of above-mentioned method.In addition, processing component 702 can include one or more modules, just Interaction between processing component 702 and other assemblies.For example, processing component 702 can include multi-media module, it is more to facilitate Interaction between media component 708 and processing component 702.
Memory 704 is configured as storing various types of data to support the operation in equipment 700.These data are shown Example includes the instruction of any application program or method for being operated on device 700, contact data, telephone book data, disappears Breath, picture, video etc..Memory 704 can be by any kind of volatibility or non-volatile memory device or their group Close and realize, as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM) are erasable to compile Journey read-only storage (EPROM), programmable read only memory (PROM), read-only storage (ROM), magnetic memory, flash Device, disk or CD.
Electric power assembly 706 provides electric power for the various assemblies of device 700.Electric power assembly 706 can include power management system System, one or more power supplys, and other components associated with generating, managing and distributing electric power for device 700.
Multimedia groupware 708 is included in the screen of one output interface of offer between described device 700 and user.One In a little embodiments, screen can include liquid crystal display (LCD) and touch panel (TP).If screen includes touch panel, screen Curtain may be implemented as touch-screen, to receive the input signal from user.Touch panel includes one or more touch sensings Device is with the gesture on sensing touch, slip and touch panel.The touch sensor can not only sensing touch or sliding action Border, but also detect and touched or the related duration and pressure of slide with described.In certain embodiments, more matchmakers Body component 708 includes a front camera and/or rear camera.When equipment 700 is in operator scheme, such as screening-mode or During video mode, front camera and/or rear camera can receive outside multi-medium data.Each front camera and Rear camera can be a fixed optical lens system or have focusing and optical zoom capabilities.
Audio-frequency assembly 710 is configured as output and/or input audio signal.For example, audio-frequency assembly 710 includes a Mike Wind (MIC), when device 700 is in operator scheme, during such as call model, logging mode and speech recognition mode, microphone by with It is set to reception external audio signal.The audio signal received can be further stored in memory 704 or via communication set Part 716 is sent.In certain embodiments, audio-frequency assembly 710 also includes a loudspeaker, for exports audio signal.
I/O interfaces 712 provide interface between processing component 702 and peripheral interface module, and above-mentioned peripheral interface module can To be keyboard, click wheel, button etc..These buttons may include but be not limited to:Home button, volume button, start button and lock Determine button.
Sensor cluster 714 includes one or more sensors, and the state for providing various aspects for device 700 is commented Estimate.For example, sensor cluster 714 can detect opening/closed mode of equipment 700, and the relative positioning of component, for example, it is described Component is the display and keypad of device 700, and sensor cluster 714 can be with 700 1 components of detection means 700 or device Position change, the existence or non-existence that user contacts with device 700, the orientation of device 700 or acceleration/deceleration and device 700 Temperature change.Sensor cluster 714 can include proximity transducer, be configured to detect in no any physical contact The presence of neighbouring object.Sensor cluster 714 can also include optical sensor, such as CMOS or ccd image sensor, for into As being used in application.In certain embodiments, the sensor cluster 714 can also include acceleration transducer, gyro sensors Device, Magnetic Sensor, pressure sensor or temperature sensor.
Communication component 716 is configured to facilitate the communication of wired or wireless way between device 700 and other equipment.Device 700 can access the wireless network based on communication standard, such as WiFi, 2G or 3G, or combinations thereof.In an exemplary implementation In example, communication component 716 receives broadcast singal or broadcast related information from external broadcasting management system via broadcast channel. In one exemplary embodiment, the communication component 716 also includes near-field communication (NFC) module, to promote junction service.Example Such as, in NFC module radio frequency identification (RFID) technology can be based on, Infrared Data Association (IrDA) technology, ultra wide band (UWB) technology, Bluetooth (BT) technology and other technologies are realized.
In the exemplary embodiment, device 700 can be believed by one or more application specific integrated circuits (ASIC), numeral Number processor (DSP), digital signal processing appts (DSPD), PLD (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components are realized, for performing the above method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instructing, example are additionally provided Such as include the memory 704 of instruction, above-mentioned instruction can be performed to complete the above method by the processor 720 of device 700.For example, The non-transitorycomputer readable storage medium can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk With optical data storage devices etc..
A kind of non-transitorycomputer readable storage medium, when the instruction in the storage medium is by the processing of mobile terminal When device performs so that mobile terminal is able to carry out a kind of method of login application program, and methods described includes:
When receiving the User Identity and password of user's input, sent to server to the User Identity Verification with password is asked;
When receiving verification from the server and passing through result, password request data, institute are sent to Intelligent worn device State Intelligent worn device to be used to carry out authentication to the terminal device according to the password request data, when being verified When, generate entry password data;
Receive the entry password data that the Intelligent worn device is sent, the entry password data include password, described The identification data of User Identity and the Intelligent worn device;
When receiving the password of user's input, in the password and the entry password data that judge user's input Whether password is consistent;
When the password of user input is consistent with the password in the entry password data, login is described to apply journey Sequence.
The password request data include sending the time of the password request data, the User Identity and described The identification data of terminal device.
It is described when receive user input User Identity and password when, to server send to the user identity Before the verification request of mark and password, methods described also includes:
Wireless connection is established with Intelligent worn device.
A kind of non-transitorycomputer readable storage medium, when the instruction in the storage medium is by Intelligent worn device During computing device so that Intelligent worn device is able to carry out a kind of method of login application program, and methods described includes:
Wireless connection is established with terminal device;
Receive the password request data that the terminal device is sent;
Authentication is carried out to the terminal device according to the password request data;
When being verified, entry password data are generated, the entry password data include password, the user identity mark Know the identification data with the Intelligent worn device;
The password request data are sent to the terminal device.
Those skilled in the art will readily occur to other realities of the disclosure after considering specification and putting into practice disclosure herein Apply scheme.The application is intended to any modification, purposes or the adaptations of the disclosure, these modifications, purposes or suitable The change of answering property follows the general principle of the disclosure and including the undocumented common knowledge or used in the art of the disclosure Use technological means.Description and embodiments are considered only as exemplary, and the true scope of the disclosure and spirit are by following right It is required that point out.
It should be appreciated that the precision architecture that the disclosure is not limited to be described above and is shown in the drawings, and And various modifications and changes can be being carried out without departing from the scope.The scope of the present disclosure is only limited by appended claim.

Claims (10)

  1. A kind of 1. method of login application program, it is characterised in that applied to terminal device, including:
    When receiving the User Identity and password of user's input, sent to server to the User Identity and close The verification request of code;
    When receiving verification from the server and passing through result, password request data, the intelligence are sent to Intelligent worn device Energy wearable device is used to carry out authentication to the terminal device according to the password request data, raw when being verified Into entry password data;
    The entry password data that the Intelligent worn device is sent are received, the entry password data include password, the user Identity and the identification data of the Intelligent worn device;
    When receiving the password of user's input, the password of user's input and the password in the entry password data are judged It is whether consistent;
    When the password of user input is consistent with the password in the entry password data, the application program is logged in;
    The password request data include time, the User Identity and the terminal for sending the password request data The identification data of equipment.
  2. 2. according to the method for claim 1, it is characterised in that it is described when receive user input User Identity and During password, before the verification request to the User Identity and password is sent to server, methods described also includes:
    Wireless connection is established with Intelligent worn device.
  3. A kind of 3. method of login application program, it is characterised in that applied to Intelligent worn device, including:
    Wireless connection is established with terminal device;
    The password request data that the terminal device is sent are received, the password request data include sending the password request number According to time, User Identity and the terminal device identification data;
    Authentication is carried out to the terminal device according to the password request data;
    When being verified, generate entry password data, the entry password data include password, the User Identity and The identification data of the Intelligent worn device;
    The entry password data are sent to the terminal device.
  4. A kind of 4. device of login application program, it is characterised in that including:
    First sending module, for when receiving the User Identity and password of user's input, being sent to server to institute State the verification request of User Identity and password;
    Second sending module, for when receiving verification from the server and passing through result, mouth to be sent to Intelligent worn device Request data is made, the Intelligent worn device is used to carry out authentication to terminal device according to the password request data, when When being verified, entry password data are generated, the password request data include sending time, the institute of the password request data State the identification data of User Identity and the terminal device;
    First receiving module, the entry password data sent for receiving the Intelligent worn device, the entry password data Include the identification data of password, the User Identity and the Intelligent worn device;
    Judge module, for when receiving the password of user's input, judging the password of user's input and the login mouth Make the password in data whether consistent;
    Login module, when the password for being inputted as the user is consistent with the password in the entry password data, log in institute State application program.
  5. 5. device according to claim 4, it is characterised in that described device also includes:
    First establishes link block, before the verification for being sent to server to the User Identity and password is asked, Wireless connection is established with Intelligent worn device.
  6. A kind of 6. device of login application program, it is characterised in that including:
    Second establishes link block, for establishing wireless connection with terminal device;
    Second receiving module, the password request data sent for receiving the terminal device, the password request data include Send the identification data of time of the password request data, User Identity and the terminal device;
    Authentication module, for carrying out authentication to the terminal device according to the password request data;
    Generation module, for when being verified, generate entry password data, the entry password data include password, described The identification data of User Identity and Intelligent worn device;
    3rd sending module, for sending the entry password data to the terminal device.
  7. A kind of 7. device of login application program, it is characterised in that including:
    Processor;
    For storing the memory of processor-executable instruction;
    Wherein, the processor is configured as:
    When receiving the User Identity and password of user's input, sent to server to the User Identity and close The verification request of code;
    When receiving verification from the server and passing through result, password request data, the intelligence are sent to Intelligent worn device Energy wearable device is used to carry out authentication to terminal device according to the password request data, and when being verified, generation is stepped on Record password data, the password request data include sending the time of the password request data, the User Identity and The identification data of the terminal device;
    The entry password data that the Intelligent worn device is sent are received, the entry password data include password, the user Identity and the identification data of the Intelligent worn device;
    When receiving the password of user's input, the password of user's input and the password in the entry password data are judged It is whether consistent;
    When the password of user input is consistent with the password in the entry password data, the application program is logged in.
  8. A kind of 8. device of login application program, it is characterised in that including:
    Processor;
    For storing the memory of processor-executable instruction;
    Wherein, the processor is configured as:
    Wireless connection is established with terminal device;
    The password request data that the terminal device is sent are received, the password request data include sending the password request number According to time, User Identity and the terminal device identification data;
    Authentication is carried out to the terminal device according to the password request data;
    When being verified, generate entry password data, the entry password data include password, the User Identity and The identification data of Intelligent worn device;
    The entry password data are sent to the terminal device.
  9. 9. a kind of computer-readable recording medium, is stored thereon with computer instruction, it is characterised in that the instruction is held by processor The step of the claims 1-2 methods describeds are realized during row.
  10. 10. a kind of computer-readable recording medium, is stored thereon with computer instruction, it is characterised in that the instruction is by processor The step of 3 methods described of the claims is realized during execution.
CN201410757919.5A 2014-12-10 2014-12-10 The method and device of login application program Active CN104468581B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410757919.5A CN104468581B (en) 2014-12-10 2014-12-10 The method and device of login application program

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410757919.5A CN104468581B (en) 2014-12-10 2014-12-10 The method and device of login application program

Publications (2)

Publication Number Publication Date
CN104468581A CN104468581A (en) 2015-03-25
CN104468581B true CN104468581B (en) 2018-03-02

Family

ID=52913953

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410757919.5A Active CN104468581B (en) 2014-12-10 2014-12-10 The method and device of login application program

Country Status (1)

Country Link
CN (1) CN104468581B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106341379B (en) * 2015-07-17 2020-01-24 中兴通讯股份有限公司 Information processing method, device and system
CN105187382B (en) * 2015-08-05 2018-03-06 西安电子科技大学 Prevent from hitting the multiple-factor identity identifying method of storehouse attack
CN105072132B (en) * 2015-08-27 2019-05-14 宇龙计算机通信科技(深圳)有限公司 Verification method, verifying system and communication equipment
CN107026736A (en) * 2016-01-29 2017-08-08 李明 A kind of wearable device and the method that Password Input number of times is reduced by it
CN108377563B (en) * 2016-11-08 2021-08-20 北京京东尚科信息技术有限公司 Method for managing wearable equipment, server and client
CN106911666B (en) * 2017-01-04 2020-07-17 青岛海信移动通信技术股份有限公司 Wearable intelligent device and message processing method and system thereof

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1427609A (en) * 2001-12-20 2003-07-02 西北工业大学 Nonrecurring countersign and business confirmation method
CN102123033A (en) * 2011-03-23 2011-07-13 北京恒光数码科技有限公司 Identity authentication method and system of dynamic password token as well as mobile terminal of dynamic password token
CN102164141A (en) * 2011-04-24 2011-08-24 陈珂 Method for protecting security of account
WO2014083335A2 (en) * 2012-11-28 2014-06-05 Hoverkey Ltd A method and system of providing authentication of user access to a computer resource via a mobile device using multiple separate security factors
CN103905191A (en) * 2012-12-26 2014-07-02 阿里巴巴集团控股有限公司 Verification method applied to mobile terminal, mobile terminal and system
CN104168329A (en) * 2014-08-28 2014-11-26 尚春明 User secondary authentication method, device and system in cloud computing and Internet

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1427609A (en) * 2001-12-20 2003-07-02 西北工业大学 Nonrecurring countersign and business confirmation method
CN102123033A (en) * 2011-03-23 2011-07-13 北京恒光数码科技有限公司 Identity authentication method and system of dynamic password token as well as mobile terminal of dynamic password token
CN102164141A (en) * 2011-04-24 2011-08-24 陈珂 Method for protecting security of account
WO2014083335A2 (en) * 2012-11-28 2014-06-05 Hoverkey Ltd A method and system of providing authentication of user access to a computer resource via a mobile device using multiple separate security factors
CN103905191A (en) * 2012-12-26 2014-07-02 阿里巴巴集团控股有限公司 Verification method applied to mobile terminal, mobile terminal and system
CN104168329A (en) * 2014-08-28 2014-11-26 尚春明 User secondary authentication method, device and system in cloud computing and Internet

Also Published As

Publication number Publication date
CN104468581A (en) 2015-03-25

Similar Documents

Publication Publication Date Title
CN104468581B (en) The method and device of login application program
CN104125067B (en) Account and token secret key binding method and device
CN104243484B (en) Information interacting method and device, electronic equipment
CN104219058B (en) Authentication, identification authorization method and device
CN104283876A (en) Operation authorization method and device
CN104391870B (en) Logistics information acquisition methods and device
CN104159218B (en) Internetwork connection establishing method and device
CN104933351A (en) Information security processing method and information security processing device
CN104091376A (en) Intelligent lock control method and apparatus thereof
CN104484593B (en) terminal verification method and device
CN106097494A (en) The method for unlocking of smart lock and device
CN104469714A (en) Short message sending method and device
CN103957103A (en) Safety authentication method and device and mobile terminal
CN104158659B (en) Anti-counterfeit authentication method, device and system
CN104093119B (en) unlocking method and device
CN105407070A (en) Logging-in authorization method and device
CN104950838A (en) Network account binding method and device
CN104217328A (en) Multi-verification payment method and multi-verification payment device
CN104158665A (en) Method and device of verification
CN106204029A (en) The method and apparatus of Quick Response Code payment
CN106375096A (en) Short message verification method and device
CN105450662A (en) Encryption method and device
CN104125267A (en) Account protection method, device and terminal equipment
CN106060027A (en) Methods, devices, equipment and systems for verification based on verification codes
CN107230060A (en) The method and apparatus that a kind of account is reported the loss

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant