CN104935435A - Login methods, terminal and application server - Google Patents

Login methods, terminal and application server Download PDF

Info

Publication number
CN104935435A
CN104935435A CN201510212323.1A CN201510212323A CN104935435A CN 104935435 A CN104935435 A CN 104935435A CN 201510212323 A CN201510212323 A CN 201510212323A CN 104935435 A CN104935435 A CN 104935435A
Authority
CN
China
Prior art keywords
information
terminal
application server
key information
application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510212323.1A
Other languages
Chinese (zh)
Inventor
沈映泉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nubia Technology Co Ltd
Original Assignee
Nubia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nubia Technology Co Ltd filed Critical Nubia Technology Co Ltd
Priority to CN201510212323.1A priority Critical patent/CN104935435A/en
Publication of CN104935435A publication Critical patent/CN104935435A/en
Pending legal-status Critical Current

Links

Abstract

The invention discloses a login method. The login method comprises that when a terminal sends login request information to an application server via first application, secret key information is obtained, and the first application belongs to applications through which the terminal can log in the corresponding application server by using the same account information; the login request information is encrypted by utilizing the secret key information, and the encrypted login request information is sent to the application server; and when the terminal receives verification passing information returned by the application server and aimed at the login request information, the terminal logs in the application server via the first application. The invention also discloses another login method, the terminal and the application server.

Description

Login method, terminal and application server
Technical field
The present invention relates to identity identifying technology, be specifically related to login method, terminal and application server.
Background technology
Along with diversification and abundantization of application, terminal can include the browser etc. that the application that carries is applied as file management application, picture library and carried.For ease of remembering and obscuring, user logs in the different application by terminal and usually adopts same account information to during corresponding application server.At present, when user is logged in file management application server by the file management application of terminal, need to input an account information in the terminal; When the picture library application by terminal logs in picture library application server, also need to input once this account information again; The account information of this twice input is identical information, repeatedly inputs same account information, adds the Operating Complexity of user, greatly reduce the Experience Degree of user.
Summary of the invention
For solving the technical problem of existing existence, the embodiment of the present invention provides login method, terminal and application server, at least to solve the problem needing user repeatedly to input same account information, can reduce user operation complexity, improves user experience.
The technical scheme of the embodiment of the present invention is achieved in that
Embodiments provide a kind of login method, described method comprises:
When described terminal initiates landing request information by the first application to application server, obtain key information, described first is applied as in described terminal and can logs in at least one application in all application of respective application server by using same account information;
Utilize described key information, described landing request information is encrypted, and send the landing request information after encryption to described application server;
When described terminal receive that described application server returns for described landing request information be verified information time, described terminal is logged in described application server by described first application.
In such scheme, described acquisition key information, comprising:
Described key information is read in described terminal local;
If when described terminal local reads less than described key information, send key information to certificate server and obtain request;
Receive described certificate server and obtain the described key information asking to return for described key information.
In such scheme, before the landing request information after sending encryption to described application server, described method also comprises:
Obtain the identification information of described terminal;
When landing request information after sending encryption is to described application server, send described identification information to described application server, obtain described key information to make described application server according to the identification information of described terminal and utilize described key information to verify described landing request information.
In such scheme, described before certificate server transmission key information acquisition request, described method also comprises:
Obtain the described same account information that user inputs in described terminal;
When described terminal sends key information acquisition request to certificate server, the described same account information that user inputs in described terminal is sent to described certificate server;
Accordingly, described certificate server is verified described same account information after receiving described key information acquisition request;
When being verified, described certificate server generates described key information, and is back to described terminal.
The embodiment of the present invention additionally provides a kind of login method, and described method comprises:
Landing request information after the encryption that described application server receiving terminal sends, described landing request information is that described terminal applies by first the solicited message initiated to described application server;
Obtain key information;
Utilize described key information, the landing request information after described encryption is verified;
When being verified, send the information that is verified to described terminal.
In such scheme, during landing request information after the encryption that described application server receiving terminal sends,
Described application server receives the identification information of the described terminal that described terminal sends;
Accordingly, described acquisition key information, comprising:
Local at described application server, search the key information corresponding with described identification information.
In such scheme, describedly utilize described key information, the landing request information after described encryption verified, comprising:
Described application server utilizes described key information, is decrypted the landing request information after encryption;
When successful decryption, determine to be verified.
The embodiment of the present invention additionally provides a kind of terminal, and described terminal comprises:
First acquiring unit, for when described terminal initiates landing request information by the first application to application server, obtain key information, described first is applied as in described terminal and can logs in at least one application in all application of respective application server by using same account information;
First ciphering unit, for utilizing described key information, is encrypted described landing request information;
First transmitting element, for sending the landing request information after encryption to described application server;
First receiving element, for Receipt Validation by information, described in be verified information be the information for described landing request information that described application server returns;
First logs in unit, for being logged in described application server by described first application.
In such scheme, described first acquiring unit, also for:
Described key information is read in this locality;
If when reading less than described key information in this locality, send key information to certificate server and obtain request to obtain described key information.
In such scheme, described terminal also comprises:
Second acquisition unit, for obtaining the identification information of described terminal;
Accordingly, the first transmitting element, also for when sending the landing request information after encrypting to described application server, sends described identification information to described application server.
In such scheme, described first acquiring unit, also for:
Obtain the described same account information that user inputs in described terminal;
When sending key information and obtaining request, the described same account information that user inputs in described terminal is sent to described certificate server.
The embodiment of the present invention also provides a kind of application server, and described application server comprises:
First receiving element, for the landing request information after the encryption that receiving terminal sends, described landing request information is that described terminal applies by first the solicited message initiated to described application server;
First acquiring unit, for obtaining key information;
First authentication unit, for utilizing described key information, verifies the landing request information after described encryption, when being verified, triggers the first transmitting element;
First transmitting element, for sending the information that is verified to described terminal.
In such scheme, described first receiving element, also for receiving the identification information of the described terminal that described terminal sends;
Accordingly, the first acquiring unit, for searching the key information corresponding with described identification information in this locality.
In such scheme, described first authentication unit, also for utilizing described key information, being decrypted the landing request information after encryption, when successful decryption, determining to be verified.
The login method that the embodiment of the present invention provides, terminal and application server, all application of same account information are used to need shared same key information in terminal, when certain application in all application initiates landing request information to application server, obtain this key information, this key information is utilized to be encrypted landing request information, send the landing request information after encryption to application server, when terminal receive that application server returns for described landing request information be verified information time, username and password is inputted in the terminal without the need to user, described terminal can directly be logged in corresponding application server by this application.So, just can solve the problem needing user repeatedly to input same account information, user operation complexity can be reduced, can user experience be improved.
Accompanying drawing explanation
The realization flow figure of a kind of login method that Fig. 1 provides for the embodiment of the present invention;
The realization flow figure of the another kind of login method that Fig. 2 provides for the embodiment of the present invention;
The application scenarios schematic diagram that Fig. 3 provides for the embodiment of the present invention;
One specific implementation schematic diagram of the login method that Fig. 4 (a), (b) provide for the embodiment of the present invention;
The composition structural representation of the terminal that Fig. 5 provides for the embodiment of the present invention;
The composition structural representation of the application server that Fig. 6 provides for the embodiment of the present invention.
Embodiment
Below in conjunction with accompanying drawing to a preferred embodiment of the present invention will be described in detail, should be appreciated that following illustrated preferred embodiment is only for instruction and explanation of the present invention, is not intended to limit the present invention.
Embodiments provide a kind of login method, be applied in a terminal, as shown in Figure 1, described method comprises:
Step 101: when described terminal initiates landing request information by the first application to application server, obtain key information, described first is applied as in described terminal and can logs in at least one application in all application of respective application server by using same account information;
Here, give an example, described terminal (described terminal is provided with Android android system) logs in icon application server to file management application server with by picture library application when can be logged in by file management application, and the account information that uses when logging on this two methods server of described terminal identical time, described first application can be described file management application APK (Android installation kit) and/or picture library application APK; Wherein, described account information at least comprises username and password.
In the present embodiment, all application of same account information are used to need shared same key information.If when current first application is not first first application to corresponding application server initiation logging request in described all application, because the first application of logged respective application server will store this key information before current first application logs in, so current first application to this key information of the first application request of logged respective application server before, namely can obtain described key information by reading the mode of key information in terminal local.If current first application is first first application to corresponding application server initiation logging request in described all application, so current first application needs to this key information of certificate server request, namely described terminal sends key information to certificate server and obtains request, certificate server receives this request, generate a key information, and being back to described terminal, described terminal receives the key information that described certificate server returns for described key information acquisition request.
Step 102: utilize described key information, is encrypted described landing request information, and sends the landing request information after encryption to described application server;
Here, described terminal uses key information to be encrypted certification to landing request information, and encrypted landing request information is sent to application server.Such as, current first when being applied as file management application, use key information, the landing request information that terminal is initiated to file management application server by file management application is encrypted, and encrypted landing request information is sent to described file management application server.
In the embodiment of the present invention, before landing request information after described terminal sends encryption to described application server, also need the identification information obtaining described terminal, described identification information comprises but is not only defined in the following stated: described identification information can be the international mobile equipment identification number (IMEI of the slotting subscriber identification card of described terminal, International Mobile Equipment Identification Number), or mobile device identification code (MEID, Mobile Equipment Identifier), or the media access control address (MAC that described terminal uses when transfer of data, Media Access Control) etc.When landing request information after terminal sends encryption is to application server, send described identification information to described application server.Wherein, described subscriber identification card can be SIM card, UIM card etc.
Step 103: when described terminal receive that described application server returns for described landing request information be verified information time, described terminal is logged in described application server by described first application.
Here, after described terminal sends the landing request information after encryption and identification information to application server, described application server is according to the identification information of described terminal, local at application server, search the key information corresponding with this identification information, and use the key information found, described landing request information is verified, when being verified, the information of being verified is returned to described terminal, described terminal receives this when being verified information, username and password is inputted in the terminal without the need to user, described terminal directly can log in this application server and carry out follow-up Operational Visit.
As can be seen here, in the embodiment of the present invention, all application of same account information are used to need shared same key information in described terminal, when certain application in described all application initiates landing request information to the application server corresponding with this application, obtain this key information, and utilize this key information, landing request information is encrypted, send the application server of the landing request information after encryption to described correspondence, when terminal receive that the application server of described correspondence returns for described landing request information be verified information time, username and password is inputted in the terminal without the need to user, described terminal directly can log in the application server to described correspondence by this application, and carry out follow-up Operational Visit.So, just solve the problem needing user repeatedly to input same account information, reduce user operation complexity, improve user experience.
In addition, multiple application the key information shared can obtain in terminal local, can also be obtained by certificate server, wherein, this key information obtained by certificate server is only transmitted once between certificate server and terminal, this key information visible in a network the number of transmissions and frequency less, Information Security can be made effectively to be promoted.
Embodiments provide another kind of login method, be applied in an application server, as shown in Figure 2, described method comprises:
Step 201: described application server receives the landing request information after the encryption of described terminal transmission, and described landing request information is that described terminal applies by first solicited message initiated to described application server;
Here, when application server receives landing request information, also can the identification information that sends of receiving terminal, described identification information comprises but is not only defined in the following stated: the MAC etc. that described identification information can use when transfer of data by IMEI or MEID of the slotting subscriber identification card of described terminal or described terminal.
Step 202: obtain key information;
Here, local at described application server, search the key information corresponding with described identification information, and using the key information found as the key information got.
Step 203: utilize described key information, verifies the landing request information after described encryption;
Here, described application server utilizes described key information, is decrypted the landing request information after encryption.
Step 204: when being verified, sends the information that is verified to described terminal.
Here, when successful decryption, determine to be verified, and return the information of being verified to terminal, to inform terminal authentication result, make in end side, input username and password without the need to user, terminal can directly be logged in application server by this application, and carries out follow-up Operational Visit.
As can be seen here, in the embodiment of the present invention, consider in terminal and use all application of same account information to need shared same key information, in application server side, the landing request information of this key information to encryption is utilized to verify, when being verified, application server allows terminal directly to log in, and inputs username and password without the need to user.So, just solve the problem needing user repeatedly to input same account information, reduce user operation complexity, improve user experience.Wherein, the key information accessed by application server side is obtain in this locality, does not transmit in a network, ensuring information security property as seen.
Terminal in the present embodiment can comprise such as mobile phone, smart phone, notebook computer, digit broadcasting receiver, personal digital assistant PDA, panel computer PAD, portable media player PMP, can also comprise the fixed terminal of such as Digital Television TV, desktop computer etc.Application server involved in aforementioned schemes is also service server.
The application scenarios schematic diagram that Fig. 3 provides for the embodiment of the present invention; As shown in Figure 3, a terminal (mobile phone), two methods server and application server 1 and application server 2 and certificate server is comprised.Based on the application scenarios described in Fig. 3 and Fig. 4 (a), 4 (b), log in corresponding application server with terminal by application 1 and application 2 and use same account information to log on as example, the technical scheme of the embodiment of the present invention is described further.
Step 401: start the application 1 in terminal, described terminal initiates landing request information by application 1 to application server 1;
Step 402: search key information for application 1 in mobile phone this locality;
If do not find key information in mobile phone this locality, illustrate that application 1 is first and initiates the application of logging request to corresponding application server, performs step 403 in application 1 and other application with it with same account information as application 2;
If find key information in mobile phone this locality, illustrate before application 1 initiates logging request to application server 1, other having an identical account information with application 1 are applied as applied 2 logged application servers 2, because in terminal by after the logged application server 2 of application 2, terminal will authentication storage server be the key information that application 2 generates, so, terminal obtains described key information by reading the mode of the key information stored in this locality, continues to perform step 406;
Step 403: described terminal presents the account information inputting interface of application 1, so that user inputs the username and password logged in application server 1 in this inputting interface; Terminal receives the username and password of user's input, and the identification information reading self as terminal the IMEI of subscriber identification card that inserts, continue execution step 404;
Step 404: terminal sends this account information and identification information to certificate server, continues to perform step 405;
Step 405: certificate server carries out certification to this account information, when certification is passed through, generates a key information, and generated key information is back to terminal, continues to perform step 406;
Here, certificate server is after generation key information, the identification information of received terminal and the key information generated for this terminal are carried out corresponding record, form the first record sheet, what the key information generated to be designated which terminal is, and sends the first record sheet to application server 1 and application server 2.
Here, if when causing the authentification failure of certificate server due to the account information of user's input, be back to step 403.
Step 406: terminal, after getting key information, uses this key information to be encrypted logging request, and the landing request information after the identification information of terminal and encryption is together sent to application server 1, continue to perform step 407;
Step 407: application server 1 is after receiving these two information, in first record sheet of this locality, search the key information corresponding with received identification information, the key information found is utilized to be decrypted the landing request information after encryption, during successful decryption, illustrate that user successfully passes through and log in verification, application server 1 returns the information of being verified to terminal, continues to perform step 408;
In the present embodiment, consider the same key information of multiple Application share with identical account information, when certificate server is after application that in multiple application in terminal with identical account information, first is initiated logging request generates a key information, first record sheet is sent to each self-corresponding application server of described multiple application by certificate server, so that application server is decrypted the landing request information after encryption.
Certainly, in the present invention's preferred embodiment, these received two information also can be forwarded to certificate server by application server 1, are decrypted the landing request information after encryption by certificate server; Be not specifically limited herein.
Here, if decipher unsuccessfully, user's not yet certification or certification time-out is described, is back to step 403.
Step 408: when terminal receives and is verified information, input username and password in the terminal without the need to user, described terminal directly can log in application server 1 and carry out follow-up Operational Visit.
From such scheme, only when first of having in multiple application of same account information of terminal initiates the application of logging request to application server, user just needs to input username and password in the terminal, initiate the application of logging request to application server for non-first, application server only need utilize certificate server to be that these have the same key information of the application generation of same account information, landing request information is verified, when being verified, inform terminal authentication result, terminal can directly log in this application server, username and password is inputted in the terminal without the need to user.Namely aforementioned schemes describes terminal completes application server single-sign-on based on the mode of shared key.So, just solve the problem needing repeatedly to input same account information when terminal logs in extremely different application servers, reduce user operation complexity, improve user experience.
In addition, multiple application the key information shared can obtain in terminal local, can also be obtained by certificate server, wherein, this key information obtained by certificate server is only transmitted once between certificate server and terminal, this key information visible in a network the number of transmissions and frequency less, Information Security can be made effectively to be promoted.
Those skilled in the art are to be understood that all or part of step in preceding method can control corresponding hardware by program and complete, this degree can be stored in a computer read/write memory medium, and described storage medium can as read only memory ROM, random access memory ram, disk, CD etc.
Based on the login method of aforementioned applications in terminal, the embodiment of the present invention additionally provides a kind of terminal, as shown in Figure 5, described terminal comprises: the first acquiring unit 501, first ciphering unit 502, first transmitting element 503, first receiving element 504 and first logs in unit 505; Wherein,
First acquiring unit 501, for when described terminal initiates landing request information by the first application to application server, obtain key information, described first is applied as in described terminal and can logs in at least one application in all application of respective application server by using same account information;
Here, give an example, described terminal (described terminal is provided with Android android system) logs in icon application server to file management application server with by picture library application when can be logged in by file management application, and the account information that uses when logging on this two methods server of described terminal identical time, described first application can be described file management application APK (Android installation kit) and/or picture library application APK; Wherein, described account information at least comprises username and password.
In the present embodiment, all application of same account information are used to need shared same key information.If when current first application is not first first application to corresponding application server initiation logging request in described all application, because the first application of logged respective application server will store this key information before current first application logs in, so current first application can to this key information of the first application request of logged respective application server before, namely described terminal, specifically the first acquiring unit 501 obtain described key information by reading the mode of key information in this locality.If current first application is first first application to corresponding application server initiation logging request in described all application, so described terminal, specifically the first acquiring unit 501 need to this key information of certificate server request, namely the first acquiring unit 501 sends key information to certificate server and obtains request, certificate server receives this request, generate a key information, and being back to described terminal, described terminal, specifically the first acquiring unit 501 receive the key information that described certificate server returns for described key information acquisition request.
First ciphering unit 502, for utilizing described key information, is encrypted described landing request information;
First transmitting element 503, for sending the landing request information after encryption to described application server;
Here, described terminal, specifically the first ciphering unit 502 use key information to be encrypted certification to landing request information, and trigger the first transmitting element 503 encrypted landing request information is sent to application server.Such as, current first when being applied as file management application, described terminal, concrete first ciphering unit 502 use key information, the landing request information that terminal is initiated to file management application server by file management application is encrypted, and triggers the first transmitting element 503 encrypted landing request information is sent to described file management application server.
In the embodiment of the present invention, before landing request information after described terminal, specifically the first transmitting element 503 send encryption to described application server, described terminal, specifically second acquisition unit 506 also need the identification information obtaining described terminal, and described identification information comprises but is not only defined in the following stated: the MAC etc. that described identification information can use when transfer of data by international mobile equipment identification number IMEI or MEID of the slotting subscriber identification card of described terminal or described terminal.When landing request information after terminal, specifically the first transmitting element 503 send encryption is to application server, send described identification information to described application server.
First receiving element 504, for Receipt Validation by information, described in be verified information be the information for described landing request information that described application server returns;
First logs in unit 505, for being logged in described application server by described first application.
Here, described terminal, after specifically the first transmitting element 503 sends the landing request information after encrypting and identification information to application server, described application server is according to the identification information of described terminal, local at application server, search the key information corresponding with this identification information, and use the key information found, described landing request information is verified, when being verified, the information of being verified is returned to described terminal, described terminal, specifically the first receiving element 504 receives this when being verified information, username and password is inputted in the terminal without the need to user, described terminal logs in unit 505 by first and directly can log in this application server and carry out follow-up Operational Visit.
As can be seen here, in the embodiment of the present invention, all application of same account information are used to need shared same key information in described terminal, when certain application in described all application initiates landing request information to the application server corresponding with this application, obtain this key information, and utilize this key information, landing request information is encrypted, send the application server of the landing request information after encryption to described correspondence, when terminal receive that the application server of described correspondence returns for described landing request information be verified information time, username and password is inputted in the terminal without the need to user, described terminal directly can log in the application server to described correspondence by this application, and carry out follow-up Operational Visit.So, just solve the problem needing user repeatedly to input same account information, reduce user operation complexity, improve user experience.
In addition, multiple application the key information shared can obtain in terminal local, can also be obtained by certificate server, wherein, this key information obtained by certificate server is only transmitted once between certificate server and terminal, this key information visible in a network the number of transmissions and frequency less, Information Security can be made effectively to be promoted.
In actual applications, first acquiring unit 501, first ciphering unit 502, first transmitting element 503, first receiving element 504, first logs in unit 505 and second acquisition unit 506 all can by CPU (CPU, Central Processing Unit) or Digital Signal Processing (DSP, Digital SignalProcessor) or microprocessor (MPU, Micro Processor Unit) or field programmable gate array (FPGA, Field Programmable Gate Array) etc. realize; Described CPU, DSP, MPU, FPGA all can be built in terminal.
It will be appreciated by those skilled in the art that the practical function of each processing unit in the terminal shown in Fig. 5 can refer to the associated description of the login method of aforementioned applications in terminal and understands.It will be appreciated by those skilled in the art that the function of each processing unit in the terminal shown in Fig. 5 realizes by the program run on processor, also realize by concrete logical circuit.
Based on the aforesaid login method be applied in application server (service server), the embodiment of the present invention additionally provides a kind of application server, as shown in Figure 6, described application server comprises: the first receiving element 601, first acquiring unit 602, first authentication unit 603 and the first transmitting element 604; Wherein,
First receiving element 601, for the landing request information after the encryption that receiving terminal sends, described landing request information is that described terminal applies by first the solicited message initiated to described application server;
Here, application server, specifically the first receiving element 601 receives landing request information time, also can the identification information that sends of receiving terminal, described identification information comprises but is not only defined in the following stated: the MAC etc. that described identification information can use when transfer of data by described terminal slotting subscriber identification card IMEI or MEID or described terminal.
First acquiring unit 602, for obtaining key information;
Here, in this locality, the key information corresponding with described identification information searched by described application server, specifically the first acquiring unit 602, and using the key information found as the key information got.
First authentication unit 603, for utilizing described key information, verifies the landing request information after described encryption, when being verified, triggers the first transmitting element 604;
Here, described application server, specifically the first authentication unit 603 utilize described key information, are decrypted the landing request information after encryption.
First transmitting element 604, for sending the information that is verified to described terminal.
Here, when application server, specifically the first authentication unit 603 successful decryption, determine to be verified, and trigger the first transmitting element 604 and return the information of being verified to terminal, to inform terminal authentication result, make, in end side, to input username and password without the need to user, terminal can directly be logged in application server by this application, and carries out follow-up Operational Visit.
As can be seen here, in the embodiment of the present invention, consider in terminal and use all application of same account information to need shared same key information, in application server side, the landing request information of this key information to encryption is utilized to verify, when being verified, application server allows terminal directly to log in, and inputs username and password without the need to user.So, just solve the problem needing user repeatedly to input same account information, reduce user operation complexity, improve user experience.Wherein, the key information accessed by application server side is obtain in this locality, does not transmit in a network, ensuring information security property as seen.
In actual applications, the first receiving element 601, first acquiring unit 602, first authentication unit 603 and the first transmitting element 604 all can be realized by CPU or DSP or MPU or FPGA etc.; Described CPU, DSP, MPU, FPGA all can be built in terminal.
It will be appreciated by those skilled in the art that the practical function of each processing unit in the application server shown in Fig. 6 can refer to the associated description of the login method of aforementioned applications in application server and understands.It will be appreciated by those skilled in the art that the function of each processing unit in the application server shown in Fig. 6 realizes by the program run on processor, also realize by concrete logical circuit.
It should be noted that, in this article, term " comprises ", " comprising " or its any other variant are intended to contain comprising of nonexcludability, thus make to comprise the process of a series of key element, method, article or device and not only comprise those key elements, but also comprise other key elements clearly do not listed, or also comprise by the intrinsic key element of this process, method, article or device.When not more restrictions, the key element limited by statement " comprising ... ", and be not precluded within process, method, article or the device comprising this key element and also there is other identical element.
The invention described above embodiment sequence number, just to describing, does not represent the quality of embodiment.
Those skilled in the art should understand, embodiments of the invention can be provided as method, system or computer program.Therefore, the present invention can adopt the form of hardware embodiment, software implementation or the embodiment in conjunction with software and hardware aspect.And the present invention can adopt in one or more form wherein including the upper computer program implemented of computer-usable storage medium (including but not limited to magnetic disc store and optical memory etc.) of computer usable program code.
The present invention describes with reference to according to the flow chart of the method for the embodiment of the present invention, equipment (system) and computer program and/or block diagram.Should understand can by the combination of the flow process in each flow process in computer program instructions realization flow figure and/or block diagram and/or square frame and flow chart and/or block diagram and/or square frame.These computer program instructions can being provided to the processor of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing device to produce a machine, making the instruction performed by the processor of computer or other programmable data processing device produce device for realizing the function of specifying in flow chart flow process or multiple flow process and/or block diagram square frame or multiple square frame.
These computer program instructions also can be stored in can in the computer-readable memory that works in a specific way of vectoring computer or other programmable data processing device, the instruction making to be stored in this computer-readable memory produces the manufacture comprising command device, and this command device realizes the function of specifying in flow chart flow process or multiple flow process and/or block diagram square frame or multiple square frame.
These computer program instructions also can be loaded in computer or other programmable data processing device, make on computer or other programmable devices, to perform sequence of operations step to produce computer implemented process, thus the instruction performed on computer or other programmable devices is provided for the step realizing the function of specifying in flow chart flow process or multiple flow process and/or block diagram square frame or multiple square frame.
The above, be only preferred embodiment of the present invention, be not intended to limit protection scope of the present invention.

Claims (14)

1. a login method, is characterized in that, described method comprises:
When described terminal initiates landing request information by the first application to application server, obtain key information, described first is applied as in described terminal and can logs in at least one application in all application of respective application server by using same account information;
Utilize described key information, described landing request information is encrypted, and send the landing request information after encryption to described application server;
When described terminal receive that described application server returns for described landing request information be verified information time, described terminal is logged in described application server by described first application.
2. method according to claim 1, is characterized in that, described acquisition key information, comprising:
Described key information is read in described terminal local;
If when described terminal local reads less than described key information, send key information to certificate server and obtain request;
Receive described certificate server and obtain the described key information asking to return for described key information.
3. method according to claim 1 and 2, is characterized in that, before the landing request information after sending encryption to described application server, described method also comprises:
Obtain the identification information of described terminal;
When landing request information after sending encryption is to described application server, send described identification information to described application server, obtain described key information to make described application server according to the identification information of described terminal and utilize described key information to verify described landing request information.
4. method according to claim 2, is characterized in that, described before certificate server transmission key information acquisition request, described method also comprises:
Obtain the described same account information that user inputs in described terminal;
When described terminal sends key information acquisition request to certificate server, the described same account information that user inputs in described terminal is sent to described certificate server;
Accordingly, described certificate server is verified described same account information after receiving described key information acquisition request;
When being verified, described certificate server generates described key information, and is back to described terminal.
5. a login method, is characterized in that, described method comprises:
Landing request information after the encryption that described application server receiving terminal sends, described landing request information is that described terminal applies by first the solicited message initiated to described application server;
Obtain key information;
Utilize described key information, the landing request information after described encryption is verified;
When being verified, send the information that is verified to described terminal.
6. method according to claim 5, is characterized in that, during landing request information after the encryption that described application server receiving terminal sends,
Described application server receives the identification information of the described terminal that described terminal sends;
Accordingly, described acquisition key information, comprising:
Local at described application server, search the key information corresponding with described identification information.
7. the method according to claim 5 or 6, is characterized in that, describedly utilizes described key information, verifies, comprising the landing request information after described encryption:
Described application server utilizes described key information, is decrypted the landing request information after encryption;
When successful decryption, determine to be verified.
8. a terminal, is characterized in that, described terminal comprises:
First acquiring unit, for when described terminal initiates landing request information by the first application to application server, obtain key information, described first is applied as in described terminal and can logs in at least one application in all application of respective application server by using same account information;
First ciphering unit, for utilizing described key information, is encrypted described landing request information;
First transmitting element, for sending the landing request information after encryption to described application server;
First receiving element, for Receipt Validation by information, described in be verified information be the information for described landing request information that described application server returns;
First logs in unit, for being logged in described application server by described first application.
9. terminal according to claim 8, is characterized in that, described first acquiring unit, also for:
Described key information is read in this locality;
If when reading less than described key information in this locality, send key information to certificate server and obtain request to obtain described key information.
10. terminal according to claim 8 or claim 9, it is characterized in that, described terminal also comprises:
Second acquisition unit, for obtaining the identification information of described terminal;
Accordingly, the first transmitting element, also for when sending the landing request information after encrypting to described application server, sends described identification information to described application server.
11. terminals according to claim 9, is characterized in that, described first acquiring unit, also for:
Obtain the described same account information that user inputs in described terminal;
When sending key information and obtaining request, the described same account information that user inputs in described terminal is sent to described certificate server.
12. 1 kinds of application servers, is characterized in that, described application server comprises:
First receiving element, for the landing request information after the encryption that receiving terminal sends, described landing request information is that described terminal applies by first the solicited message initiated to described application server;
First acquiring unit, for obtaining key information;
First authentication unit, for utilizing described key information, verifies the landing request information after described encryption, when being verified, triggers the first transmitting element;
First transmitting element, for sending the information that is verified to described terminal.
13. application servers according to claim 12, is characterized in that, described first receiving element, also for receiving the identification information of the described terminal that described terminal sends;
Accordingly, the first acquiring unit, for searching the key information corresponding with described identification information in this locality.
14. application servers according to claim 12 or 13, is characterized in that, described first authentication unit, also for utilizing described key information, being decrypted, when successful decryption, determining to be verified to the landing request information after encryption.
CN201510212323.1A 2015-04-29 2015-04-29 Login methods, terminal and application server Pending CN104935435A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510212323.1A CN104935435A (en) 2015-04-29 2015-04-29 Login methods, terminal and application server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510212323.1A CN104935435A (en) 2015-04-29 2015-04-29 Login methods, terminal and application server

Publications (1)

Publication Number Publication Date
CN104935435A true CN104935435A (en) 2015-09-23

Family

ID=54122414

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510212323.1A Pending CN104935435A (en) 2015-04-29 2015-04-29 Login methods, terminal and application server

Country Status (1)

Country Link
CN (1) CN104935435A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106888183A (en) * 2015-12-15 2017-06-23 阿里巴巴集团控股有限公司 Data encryption, decryption, the method and apparatus and system of key request treatment
CN107995214A (en) * 2017-12-19 2018-05-04 深圳市创梦天地科技股份有限公司 A kind of Website logging method and relevant device
CN108111486A (en) * 2017-12-05 2018-06-01 北京天融信网络安全技术有限公司 A kind of method and device for exempting from repeat logon
CN109587162A (en) * 2018-12-26 2019-04-05 闻泰通讯股份有限公司 Login validation method, device, terminal, cipher server and storage medium
CN109587098A (en) * 2017-09-29 2019-04-05 阿里巴巴集团控股有限公司 A kind of Verification System and method, authorization server
CN109801092A (en) * 2017-11-16 2019-05-24 腾讯科技(武汉)有限公司 Resource security management method, device, computer equipment and storage medium
CN110266480A (en) * 2019-06-13 2019-09-20 腾讯科技(深圳)有限公司 Data transmission method, device and storage medium
CN113378221A (en) * 2021-06-11 2021-09-10 上海妙一生物科技有限公司 Account information processing method and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101350717A (en) * 2007-07-18 2009-01-21 中国移动通信集团公司 Method and system for logging on third party server through instant communication software
CN101510877A (en) * 2009-02-25 2009-08-19 中国网络通信集团公司 Single-point logging-on method and system, communication apparatus
CN103685282A (en) * 2013-12-18 2014-03-26 飞天诚信科技股份有限公司 Identity authentication method based on single sign on

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101350717A (en) * 2007-07-18 2009-01-21 中国移动通信集团公司 Method and system for logging on third party server through instant communication software
CN101510877A (en) * 2009-02-25 2009-08-19 中国网络通信集团公司 Single-point logging-on method and system, communication apparatus
CN103685282A (en) * 2013-12-18 2014-03-26 飞天诚信科技股份有限公司 Identity authentication method based on single sign on

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106888183A (en) * 2015-12-15 2017-06-23 阿里巴巴集团控股有限公司 Data encryption, decryption, the method and apparatus and system of key request treatment
CN109587098A (en) * 2017-09-29 2019-04-05 阿里巴巴集团控股有限公司 A kind of Verification System and method, authorization server
CN109587098B (en) * 2017-09-29 2022-04-08 阿里巴巴集团控股有限公司 Authentication system and method, and authorization server
CN109801092A (en) * 2017-11-16 2019-05-24 腾讯科技(武汉)有限公司 Resource security management method, device, computer equipment and storage medium
CN109801092B (en) * 2017-11-16 2023-09-08 腾讯科技(武汉)有限公司 Resource security management method, device, computer equipment and storage medium
CN108111486A (en) * 2017-12-05 2018-06-01 北京天融信网络安全技术有限公司 A kind of method and device for exempting from repeat logon
CN108111486B (en) * 2017-12-05 2021-06-08 北京天融信网络安全技术有限公司 Method and device for avoiding repeated login
CN107995214A (en) * 2017-12-19 2018-05-04 深圳市创梦天地科技股份有限公司 A kind of Website logging method and relevant device
CN109587162A (en) * 2018-12-26 2019-04-05 闻泰通讯股份有限公司 Login validation method, device, terminal, cipher server and storage medium
CN110266480A (en) * 2019-06-13 2019-09-20 腾讯科技(深圳)有限公司 Data transmission method, device and storage medium
CN113378221A (en) * 2021-06-11 2021-09-10 上海妙一生物科技有限公司 Account information processing method and device

Similar Documents

Publication Publication Date Title
CN108768970B (en) Binding method of intelligent equipment, identity authentication platform and storage medium
US10742620B2 (en) Method for dynamic encryption and signing, terminal and server
EP3726804A2 (en) Device authentication method, service access control method, device, and non-transitory computer-readable recording medium
CN104065653B (en) A kind of interactive auth method, device, system and relevant device
CN104935435A (en) Login methods, terminal and application server
US9445269B2 (en) Terminal identity verification and service authentication method, system and terminal
CN108462710B (en) Authentication and authorization method, device, authentication server and machine-readable storage medium
CN104144419A (en) Identity authentication method, device and system
CN105450406A (en) Data processing method and device
CN103249045A (en) Identification method, device and system
US20140351583A1 (en) Method of implementing a right over a content
CN102801616A (en) Message sending and receiving method, device and system
CN112632521B (en) Request response method and device, electronic equipment and storage medium
CN105141645A (en) Login method of terminal devices, terminal devices and cloud server
CN113726774B (en) Client login authentication method, system and computer equipment
CN105376059A (en) Method and system for performing application signature based on electronic key
CN103888429A (en) Virtual machine starting method, correlation devices and systems
CN110856170B (en) Data transmission method and device and communication system of Internet of things
CN114553590A (en) Data transmission method and related equipment
WO2020025056A1 (en) Method, device, system, and mobile terminal for security authorization
CN114095277A (en) Power distribution network secure communication method, secure access device and readable storage medium
CN103024735A (en) Method and equipment for service access of card-free terminal
CN107204959B (en) Verification method, device and system of verification code
CN103559430A (en) Application account management method and device based on android system
CN103049693B (en) Method, Apparatus and system that a kind of application program uses

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20150923

RJ01 Rejection of invention patent application after publication