CN105871927A - Automatic logging-in method and automatic logging-in device of micro-terminal - Google Patents

Automatic logging-in method and automatic logging-in device of micro-terminal Download PDF

Info

Publication number
CN105871927A
CN105871927A CN201610440211.6A CN201610440211A CN105871927A CN 105871927 A CN105871927 A CN 105871927A CN 201610440211 A CN201610440211 A CN 201610440211A CN 105871927 A CN105871927 A CN 105871927A
Authority
CN
China
Prior art keywords
user
micro
check code
server
download
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610440211.6A
Other languages
Chinese (zh)
Other versions
CN105871927B (en
Inventor
李辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Hongxiang Technical Service Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201610440211.6A priority Critical patent/CN105871927B/en
Publication of CN105871927A publication Critical patent/CN105871927A/en
Priority to PCT/CN2017/088692 priority patent/WO2017215650A1/en
Application granted granted Critical
Publication of CN105871927B publication Critical patent/CN105871927B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses an automatic logging-in method and an automatic logging-in device of a micro-terminal, aiming at solving the technical problems that the operation is complicated and time is wasted, caused by the fact that a traditional micro-terminal logging-in manner needs manual logging-in at least. The method comprises the following steps: sending a downloading request to a server so as to acquire a micro-terminal logging-in file to be downloaded and user information by the server according to the downloading request; and when the micro-terminal logging-in file is downloaded, acquiring a user checking code generated by the server according to the user information; after downloading, checking the user checking code according to a pre-set checking rule; when the checking is successful, sending a logging-in request message to the server; and automatically logging in the micro-terminal according to a logging-in response message returned by the terminal.

Description

The automatic logging method of micro-end and device
Technical field
The present invention relates to network communication technology field, be specifically related to automatic logging method and the dress of a kind of micro-end Put.
Background technology
At present, kind and the quantity of online game gets more and more.Game developer is in order to preferably attract to use Family, constantly releases the online game that game picture is more life-like, interactive function is more powerful.But, with This simultaneously, the data volume also causing game client is increasing, reaches hundreds of million even tens G easily, The hugest game client significantly extends the waiting time in user's downloading process, and right The memory space of terminal unit brings huge challenge.As can be seen here, huge game client is likely to Owing to download time is long, the defect such as excessive that takes up room and a large number of users that runs off.
In order to solve the above-mentioned drawback that huge game client is brought, game developer is proposed one after another Mini game client, is hereinafter called for short micro-end.Micro-end often only has several million sizes, and user can be Moment completes downloading process and then rapidly enters game.Can be provided the user rapidly substantially by micro-end Game function, and other resource requirements can be downloaded during game is carried out, significantly reduce user Waiting time, praised highly by a large number of users.
But, inventor finds during realizing the present invention, and existing micro-end at least exists following lacking Fall into: after user has downloaded micro-end, need to be manually entered user profile the micro-end of manual entry, and people The process not only complex operation that work logs in, and the time of consuming, thus bring inconvenience for user, and invisible In lost certain customers.
Summary of the invention
In view of the above problems, it is proposed that the present invention is to provide one to overcome the problems referred to above or at least partly Ground solves automatic logging method and the device of micro-end of the problems referred to above.
According to one aspect of the present invention, it is provided that the automatic logging method of a kind of micro-end, including: to clothes Business device sends the request of download, steps on according to micro-end that described download acquisition request is to be downloaded for described server Record file and user profile;When downloading described micro-end log file, obtain described server according to institute State user's check code that user profile generates;After the download is complete according to default verification rule to described use Family check code verifies, and when verifying successfully, sends login request message to server;According to service The login response micro-end of message automated log on that device returns.
According to another aspect of the present invention, it is provided that the automatic login device of a kind of micro-end, including: send Module, is suitable to send the request of download, for described server according to described download acquisition request to server Micro-end log file to be downloaded and user profile;Acquisition module, is suitable to downloading the login of described micro-end During file, obtain user's check code that described server generates according to described user profile;Correction verification module, Be suitable to according to default verification rule, described user's check code be verified after the download is complete, work as verification During success, send login request message to server;Login module, is suitable to according to stepping on that server returns The record micro-end of response message automated log on.
In the automatic logging method of micro-end provided in the present invention and device, first, user terminal can be to Server sends the request of download, to user profile and gives birth to accordingly according to this download acquisition request for server Becoming user's check code, then, user terminal can obtain this use during downloading micro-end log file Family check code, in order to user profile is verified according to this user's check code, and after verifying successfully certainly Trend server sends login request message thus logs in.As can be seen here, in the present invention, will clothes Business device is sent to user terminal verification according to user's check code that user profile generates, so that user terminal Can send login automatically according to the user profile that user's check code is corresponding to server after verifying successfully please Ask message and then automated log on, thus avoid in prior art and need to be manually entered user profile also by user The troublesome operation of manual entry, has saved user time.
Described above is only the general introduction of technical solution of the present invention, in order to better understand the skill of the present invention Art means, and can being practiced according to the content of description, and in order to allow, the present invention's is above and other Objects, features and advantages can become apparent, below especially exemplified by the detailed description of the invention of the present invention.
Accompanying drawing explanation
By reading the detailed description of hereafter preferred implementation, various other advantage and benefit for this Field those of ordinary skill will be clear from understanding.Accompanying drawing is only used for illustrating the purpose of preferred implementation, And it is not considered as limitation of the present invention.And in whole accompanying drawing, be denoted by the same reference numerals Identical parts.In the accompanying drawings:
Fig. 1 shows the flow chart of the automatic logging method of micro-end that one embodiment of the invention provides;
Fig. 2 shows the flow chart of the automatic logging method of micro-end that the embodiment of the present invention one provides;
Fig. 3 shows the flow chart of the automatic logging method of micro-end that the embodiment of the present invention two provides;
Fig. 4 shows the structure chart of the automatic login device of micro-end that one embodiment of the invention provides.
Detailed description of the invention
It is more fully described the exemplary embodiment of the disclosure below with reference to accompanying drawings.Although accompanying drawing shows The exemplary embodiment of the disclosure, it being understood, however, that may be realized in various forms the disclosure and not Should be limited by embodiments set forth here.On the contrary, it is provided that these embodiments are able to more thoroughly Understand the disclosure, and complete for the scope of the present disclosure can be conveyed to those skilled in the art.
Embodiments provide automatic logging method and the device of a kind of micro-end, at least can solve the problem that biography The complex operation that need to be caused by manual entry of micro-end login mode of system and time-consuming technical problem.
Fig. 1 shows the flow chart of the automatic logging method of micro-end that one embodiment of the invention provides.As Shown in Fig. 1, the method specifically includes following steps:
Step S110: send the request of download to server, treats down according to downloading acquisition request for server The micro-end log file carried and user profile.
Wherein, download request is used for downloading micro-end log file, and server is treated down according to downloading acquisition request The micro-end log file carried and the implementation of user profile can be multiple, such as, realize in one In mode, can directly download request in comprise micro-end log file to be downloaded identification information and User profile, thus micro-end log file to be downloaded can be got by carrying out resolving to the request of downloading And user profile.In another kind of implementation, only can comprise to be downloaded micro-in the request of downloading The identification information of end log file, is read the user of transmission this download request by server by stipulated form The user profile of end.Such as, the source port number comprised during server is asked by download determines transmission The user terminal address of this download request, determines according to this user terminal address and transports on this user terminal The relevant information of the GID of row.
Step S120: when downloading micro-end log file, obtains the use that server generates according to user profile Family check code.
Wherein, the process generating user's check code according to user profile can be passed through to be embodied in various ways flexibly, For example, it is possible to user profile is encrypted by md5 algorithm, to obtain user's check code.User school The effect testing code is to be supplied to user terminal, verifies user profile for user terminal.Specifically Ground, when user terminal obtains this user's check code, both can be carried out by the filename of micro-end log file Obtain, it is also possible to obtained by the download address of the micro-end log file after redirecting, the present invention couple Concrete acquisition mode does not limits.
Step S130: according to default verification rule, user's check code is verified after the download is complete, When verifying successfully, send login request message to server.
Wherein, the purpose of verification mainly has two aspects, on the one hand for confirming the legitimacy of user's check code, On the other hand for confirming whether user's check code mates with locally stored user profile.Art technology Personnel can set various verification rule flexibly to realize above-mentioned purpose.
Step S140: the login response micro-end of message automated log on returned according to server.
Wherein, the automated log on of micro-end it is capable of by login request message and login response message. As can be seen here, in the present invention, it is sent to use according to user's check code that user profile generates by server Family client checks, so that user terminal can be corresponding automatically according to user's check code after verifying successfully User profile sends login request message and then automated log on to server, thus avoid in prior art The troublesome operation of user profile manual entry need to be manually entered by user, saved user time.
The automatic logging method of micro-end that the present invention provides is described in detail below by two specific embodiments Implement details:
Embodiment one,
Fig. 2 shows the flow chart of the automatic logging method of micro-end that the embodiment of the present invention one provides.Such as Fig. 2 Shown in, the method specifically includes following steps:
Step S210: user terminal sends, to server, the request of download.
Wherein, user terminal includes all kinds of fixed terminal or mobile terminal, and wherein, fixed terminal includes individual People's computers etc., mobile terminal includes PAD, mobile phone etc..Types of applications can be run on the subscriber terminal, Such as, browser application, game application etc..Wherein, game application further include platform game, Web game, micro-end game etc..For micro-end play for, further include front-end client and after End service end, wherein, front-end client is for providing the user the intuitive operation of interface class, back-end services End is for providing background service support for front-end client, and carries out the communication of necessity with server.At this In embodiment, after user terminal opens platform game homepage by chrome browser or red fox browser, Can play for certain money on this homepage and send the request of download, the micro-end trip corresponding to download this game Play.
Step S220: server receives the above-mentioned download request that user terminal sends, and asks according to this download Obtain micro-end log file to be downloaded and user profile.
Wherein, server refers mainly to WEB server.After server receives above-mentioned download request, to it Resolve, obtain micro-end log file to be downloaded and user profile according to analysis result.Specifically obtain The mode of taking can be set flexibly by those skilled in the art.Such as, in the first implementation, permissible Identification information and the user profile of micro-end log file to be downloaded, clothes are directly comprised in the request of downloading Business device is by resolving identification information and the user profile that can be directly obtained micro-end log file.? In two kinds of implementations, it is also possible to only comprise the mark of micro-end log file to be downloaded in the request of downloading Information, server gets the ground of the user terminal sending this download request according to the source address of the request of downloading Location information, and inquire about and obtain what the game being currently running on this user terminal was applied according to this address information Relevant information, therefrom extracts required user profile.When implementing, server can pass through Lua language Speech obtains user profile, and Lua language not only statement is succinct and performance efficiency, can be notable by Lua language Promote search efficiency.It addition, in addition to Lua language, those skilled in the art can also select flexibly PHP, Each speech like sound such as JAVA obtains user profile.
Step S230: server generates user's check code according to above-mentioned user profile.
Wherein, user profile can include various information.Such as, during user profile includes following information At least one: present system time, gaming platform, Game Zone clothes, ID and user cookie. During concrete generation user's check code, according to default operational rule, user profile can be carried out computing, root User's check code is generated according to operation result.Wherein, operational rule can be realized by various algorithms flexibly, Such as, md5 algorithm, SHA algorithm, hash algorithm, RSA Algorithm and DES algorithm etc..
In the present embodiment, illustrate as a example by md5 algorithm.By md5 algorithm, user profile is entered Row cryptographic calculation, obtains the first operation result.Owing to the figure place of the first operation result is longer, normal conditions Under be 32, in order to improve subsequent treatment efficiency, in the present embodiment, from the first operation result intercept Preset figure place as the second operation result, and using the second operation result as user's check code.Such as, from 32 intercept 7 the most continuously as user's check code.Can by the way of intercepting and presetting figure place Notable shorten follow-up propagation delay time, promote processing speed, certainly, in other embodiment of the present invention, Can also directly using the first operation result as user's check code, or intercept default position by other means Number, such as, in addition to intercepting numerical digit continuously, it is also possible to intercept one every some.
It addition, for the user's check code weight preventing the second operation result after intercepting from having generated with server Multiple, in this step, it is also possible to determine whether the second operation result whether with existing user's check code Repeat;If judged result is no, using the second operation result as user's check code;If the determination result is YES, Then again intercept from the first operation result and preset figure place, until the default figure place again intercepted is with existing When user's check code does not repeats, using the default figure place that again intercepts as user's check code.
Alternatively, in the present embodiment, in order to be prevented effectively from the second operation result after intercepting with existing User's check code repeats, and can pre-set effective time and/or the effective degree of user's check code, accordingly Ground, after generating user's check code, records generation time and/or the use time of user's check code further Number, exceedes effective time by the generation time and/or access times exceed the shape of user's check code of effective degree State is set to disarmed state.For example, it is possible to the effective time of user's check code is set to one minute, exceed After one minute, this user's check code is in disarmed state, it is impossible to normally use;User can also be verified The effective degree of code is set to once, then ceases to be in force automatically, it is impossible to reuse after it uses once.By This is it can be avoided that polyisomenism between user's check code.
Step S240: server carries out renaming according to user's check code to micro-end log file to be downloaded, Micro-end log file after renaming is supplied to user terminal downloads.
Wherein, micro-end log file is often referred to can be used in running the micro-client software specifying game.Example As, in this example, it is assumed that the file identification downloading the micro-end log file comprised in request is DZZ, May determine that corresponding micro-end log file is the big micro-client dominated corresponding to game by this document mark End software.The entitled DZZ.EXE of original document of this micro-end log file.In the present embodiment, according to Family check code carries out renaming to it, makes user terminal can determine user according to the filename after renaming Check code.When implementing, renaming can be carried out by various modes.In the first implementation, Directly user's check code is added to the appointment position of raw filename, such as, is added to by underscore The end of raw filename, makes raw filename be changed to DZZ_CODE.EXE.In the second realization side In formula, in order to promote the safety in transmitting procedure, the encryption can preset user's check code is calculated Method, and cryptographic calculation result is added to the appointment position of raw filename.Afterwards, server will heavily be ordered Micro-end log file after Ming is supplied to user terminal downloads.Specifically, can be by the micro-end after renaming The downloading portal of log file is sent to user terminal.
Step S250: user terminal is when downloading micro-end log file, according to the file of micro-end log file Name obtains user's check code.
Specifically, user terminal downloads micro-end log file by the downloading portal of server feedback.Under this It is loaded into mouth can be download link, download the various forms such as icon.In downloading process or after having downloaded, User terminal obtains user's check code according to the filename of micro-end log file.Concrete acquisition mode depends on Renaming mode in previous step, when using the first renaming mode, by filename be directly User's check code can be obtained;When using the second renaming mode, the specific field in filename is held The decipherment algorithm that row is preset can obtain user's check code.
It addition, step S250 can trigger automatically according to the operation logic pre-set, for example, it is possible to set It is set to user terminal before download starts, automatically obtains user's check code;Or, user terminal is being downloaded During automatically obtain user's check code;Or, user terminal obtains user school after download terminates automatically Test code.It addition, step S250 can also trigger according to the operation requests that user sends, such as, when When user double-clicks the micro-end log file downloaded, the front-end client of micro-end receives this double-click type Operation requests, and the back-end services end that the operation requests of this double-click type passes to micro-end processes, The back-end services end of micro-end is according to the filename after the operation requests reading renaming of this double-click type and obtains User's check code.
Step S260: user's check code is verified by user terminal according to default verification rule.
Wherein, this step can continuously perform according to the triggering of step S250, say, that no matter walks Which kind of mode rapid S250 uses trigger, as long as step S250 is finished the most automatically triggers step S260. Or, this step can also trigger after micro-end log file is downloaded automatically, say, that no matter Which kind of mode is step S250 use trigger, as long as micro-end log file is downloaded complete, automatically triggers step S260。
Specifically, this step can be verified by least one rule in following rule: the first Verification rule is: judge whether the generation time of user's check code exceedes default effective time, if judging Result is no, then verify successfully;If the determination result is YES, then failure is verified.Such as, have when default The effect time is 1 minute, if the generation time of user's check code is super after one minute, verifies failure.The second Verification rule is: judge whether the access times of user's check code exceed default effective degree, if judging Result is no, then verify successfully;If the determination result is YES, then failure is verified.Such as, have when default When effect number of times is 1 time, as long as user's check code had used then verifies failure.The third verification rule is: User cookie according to comprising in user profile determines the ID corresponding with user cookie, if The ID determined is identical with the ID comprised in user profile, then verify successfully;Otherwise, Then verify failure.Above-mentioned three kinds of verification modes both can be used alone, it is also possible to is used in combination.It addition, In addition to above-mentioned verification mode, those skilled in the art can also set other verification mode flexibly and carry out school Test, if can determine user's check code effectiveness and and user profile between matching relationship.
As can be seen here, the execution purpose of this step is to determine user's check code of acquisition and subscriber terminal side User profile whether mate, due to user's check code according to user profile generate, therefore, pass through User's check code can obtain user profile, by user local to the user profile obtained and subscriber terminal side Information compares the legitimacy that i.e. can determine that user's check code.
Step S270: when verifying successfully, user terminal sends login request message to server.
Specifically, this step can trigger after verifying successfully automatically.Wherein, login request message is entered One step comprises above-mentioned user profile and/or user's check code, determines user to be logged in for server.
Step S280: server receives the login request message sent after user terminal verifies successfully, according to Login request message returns login response message to user terminal.
Wherein, login response message comprises the login generated according to user profile and/or user's check code to enter Message ceases, and can be automatically performed login by logentry information.Specifically, server is believed according to user Breath and/or user's check code can determine the most online game name of user to be logged in, Game Zone clothes, The information such as gaming platform and user cookie, accordingly, the logentry information that server-assignment is corresponding, To realize the automated log on of this user.
Step S290: the login response micro-end of message automated log on that user terminal returns according to server.
When implementing, this step can be performed by the micro-end service end run on user terminal.Micro-end After service end receives login response message, the logentry information according to wherein comprising carries out automated log on. Wherein, logentry information can be to be logged on the forms such as link.
As can be seen here, by the way of in the embodiment of the present invention, it is capable of the automated log on of micro-end, removes from User is manually entered the troublesome operation of user profile manual entry, has saved the plenty of time for user, Avoid and log in because having no time after micro-end has been downloaded and cause the phenomenon of customer loss to occur.
Embodiment two,
Fig. 3 shows the flow chart of the automatic logging method of micro-end that the embodiment of the present invention two provides.Such as Fig. 3 Shown in, the method specifically includes following steps:
Step S310: user terminal sends, to server, the request of download.
Wherein, user terminal includes all kinds of fixed terminal or mobile terminal, and wherein, fixed terminal includes individual People's computers etc., mobile terminal includes PAD, mobile phone etc..Types of applications can be run on the subscriber terminal, Such as, browser application, game application etc..Wherein, game application further include platform game, Web game, micro-end game etc..For micro-end play for, further include front-end client and after End service end, wherein, front-end client is for providing the user the intuitive operation of interface class, back-end services End is for providing background service support for front-end client, and carries out the communication of necessity with server.At this In embodiment, after user terminal opens platform game homepage by IE browser, it is possible to for this homepage On the game of certain money send the request of download, the micro-end game corresponding to download this game.
Step S320: server receives the above-mentioned download request that user terminal sends, and asks according to this download Obtain micro-end log file to be downloaded and user profile.
Wherein, server refers mainly to WEB server.After server receives above-mentioned download request, to it Resolve, obtain micro-end log file to be downloaded and user profile according to analysis result.Specifically obtain The mode of taking can be set flexibly by those skilled in the art.Such as, in the first implementation, permissible Identification information and the user profile of micro-end log file to be downloaded, clothes are directly comprised in the request of downloading Business device is by resolving identification information and the user profile that can be directly obtained micro-end log file.? In two kinds of implementations, it is also possible to only comprise the mark of micro-end log file to be downloaded in the request of downloading Information, server gets the ground of the user terminal sending this download request according to the source address of the request of downloading Location information, and inquire about and obtain what the game being currently running on this user terminal was applied according to this address information Relevant information, therefrom extracts required user profile.When implementing, server can pass through Lua language Speech obtains user profile, and Lua language not only statement is succinct and performance efficiency, can be notable by Lua language Promote search efficiency.It addition, in addition to Lua language, those skilled in the art can also select flexibly PHP, Each speech like sound such as JAVA obtains user profile.
Step S330: server generates user's check code according to above-mentioned user profile.
Wherein, user profile can include various information.Such as, during user profile includes following information At least one: present system time, gaming platform, Game Zone clothes, ID and user cookie. During concrete generation user's check code, according to default operational rule, user profile can be carried out computing, root User's check code is generated according to operation result.Wherein, operational rule can be realized by various algorithms flexibly, Such as, md5 algorithm, SHA algorithm, hash algorithm, RSA Algorithm and DES algorithm etc..
In the present embodiment, illustrate as a example by md5 algorithm.By md5 algorithm, user profile is entered Row cryptographic calculation, obtains the first operation result.Owing to the figure place of the first operation result is longer, normal conditions Under be 32, in order to improve subsequent treatment efficiency, in the present embodiment, from the first operation result intercept Preset figure place as the second operation result, and using the second operation result as user's check code.Such as, from 32 intercept 7 the most continuously as user's check code.Can by the way of intercepting and presetting figure place Notable shorten follow-up propagation delay time, promote processing speed, certainly, in other embodiment of the present invention, Can also directly using the first operation result as user's check code, or intercept default position by other means Number, such as, in addition to intercepting numerical digit continuously, it is also possible to intercept one every some.
It addition, for the user's check code weight preventing the second operation result after intercepting from having generated with server Multiple, in this step, it is also possible to determine whether the second operation result whether with existing user's check code Repeat;If judged result is no, using the second operation result as user's check code;If the determination result is YES, Then again intercept from the first operation result and preset figure place, until the default figure place again intercepted is with existing When user's check code does not repeats, using the default figure place that again intercepts as user's check code.
Alternatively, in the present embodiment, in order to be prevented effectively from the second operation result after intercepting with existing User's check code repeats, and can pre-set effective time and/or the effective degree of user's check code, accordingly Ground, after generating user's check code, records generation time and/or the use time of user's check code further Number, exceedes effective time by the generation time and/or access times exceed the shape of user's check code of effective degree State is set to disarmed state.For example, it is possible to the effective time of user's check code is set to one minute, exceed After one minute, this user's check code is in disarmed state, it is impossible to normally use;User can also be verified The effective degree of code is set to once, then ceases to be in force automatically, it is impossible to reuse after it uses once.By This is it can be avoided that polyisomenism between user's check code.
Step S340: server is according to the download to micro-end log file to be downloaded of the above-mentioned user's check code Address redirects, and makes to comprise above-mentioned user's check code in the download address after redirection.
When implementing, can realize in the following way redirecting operation: first, at micro-end to be downloaded The download address of log file is added checking parameter field, the value of verification parameter field is set to user The value of check code.Wherein, checking parameter field can be arranged on the optional position in download address, such as, It is arranged on the end of download address.Then, micro-end log file to be downloaded is made by page jump mode Download address redirect as adding the download address after checking parameter field.When specifically redirecting, can be by 302 The mode of redirecting redirects.Wherein, 302 redirect also to cry and redirect temporarily, when using 302 to redirect, and user Terminal can ask twice download address, and the download address asked for the first time is not for comprise checking parameter field Original download address, second time request to download address be under the redirection containing checking parameter field Set address, and, owing to 302 redirect as redirecting temporarily, therefore search engine will not be downloaded redirecting Address stores.The user's check code every time generated due to server is different, therefore, performs weight every time Redirect Address during directional operation is the most different, therefore, use 302 redirect mode can not change former Interim redirection operation, the user school being particularly suited in the present invention is completed on the premise of beginning download address Test the application scenarios that code dynamically changes.Certainly, in addition to 302 redirect mode, other page jump mode Can also apply to the present invention.
Step S350: user terminal, when downloading micro-end log file, logs according to the micro-end after redirecting The checking parameter field comprised in the download address of file obtains user's check code.
Specifically, user terminal downloads micro-end log file by the download address of server feedback.Due to This download address has carried out re-orientation processes, and therefore, user terminal needs to server request twice, the Once to server request original download address, second time resets to server request according to redirecting instruction To download address.In downloading process or after having downloaded, user terminal is according to redirecting in download address The checking parameter field comprised obtains user's check code.It addition, step S350 can be according to pre-setting Operation logic triggers automatically, for example, it is possible to be set to user terminal automatically obtain user in downloading process Check code;Or, user terminal obtains user's check code after download terminates automatically.Further, since this Embodiment is mainly used in IE browser, and the kernel of IE browser is different from chrome browser or fire The kernel of Vulpes browser, therefore, the file type of the micro-end log file downloaded to by IE browser is led to It is often .application type, the file type of the entitled .exe of its suffix being different from embodiment one.Pass through The file of the .application type that IE browser downloads to need not user perform double click operation can automatically Run.Therefore, different from step S250 in embodiment one, step S350 in the present embodiment is usual Need not trigger according to the operation requests that user sends.
Step S360: user's check code is verified by user terminal according to default verification rule.
Wherein, this step can continuously perform according to the triggering of step S350, say, that no matter walks Which kind of mode rapid S350 uses trigger, as long as step S350 is finished the most automatically triggers step S360. Or, this step can also trigger after micro-end log file is downloaded automatically, say, that no matter Which kind of mode is step S350 use trigger, as long as micro-end log file is downloaded complete, automatically triggers step S360。
Specifically, this step can be verified by least one rule in following rule: the first Verification rule is: judge whether the generation time of user's check code exceedes default effective time, if judging Result is no, then verify successfully;If the determination result is YES, then failure is verified.Such as, have when default The effect time is 1 minute, if the generation time of user's check code is super after one minute, verifies failure.The second Verification rule is: judge whether the access times of user's check code exceed default effective degree, if judging Result is no, then verify successfully;If the determination result is YES, then failure is verified.Such as, have when default When effect number of times is 1 time, as long as user's check code had used then verifies failure.The third verification rule is: User cookie according to comprising in user profile determines the ID corresponding with user cookie, if The ID determined is identical with the ID comprised in user profile, then verify successfully;Otherwise, Then verify failure.Above-mentioned three kinds of verification modes both can be used alone, it is also possible to is used in combination.It addition, In addition to above-mentioned verification mode, those skilled in the art can also set other verification mode flexibly and carry out school Test, if can determine user's check code effectiveness and and user profile between matching relationship.
As can be seen here, the execution purpose of this step is to determine user's check code of acquisition and subscriber terminal side User profile whether mate, due to user's check code according to user profile generate, therefore, pass through User's check code can obtain user profile, by user local to the user profile obtained and subscriber terminal side Information compares the legitimacy that i.e. can determine that user's check code.
Step S370: when verifying successfully, user terminal sends login request message to server.
Specifically, this step can trigger after verifying successfully automatically.Wherein, login request message is entered One step comprises above-mentioned user profile and/or user's check code, determines user to be logged in for server.
Step S380: server receives the login request message sent after user terminal verifies successfully, according to Login request message returns login response message to user terminal.
Wherein, login response message comprises the login generated according to user profile and/or user's check code to enter Message ceases, and can be automatically performed login by logentry information.Specifically, server is believed according to user Breath and/or user's check code can determine the most online game name of user to be logged in, Game Zone clothes, The information such as gaming platform and user cookie, accordingly, the logentry information that server-assignment is corresponding, To realize the automated log on of this user.
Step S390: the login response micro-end of message automated log on that user terminal returns according to server.
When implementing, this step can be performed by the micro-end service end run on user terminal.Micro-end After service end receives login response message, the logentry information according to wherein comprising carries out automated log on. Wherein, logentry information can be to be logged on the forms such as link.
As can be seen here, by the way of in the embodiment of the present invention, on the one hand, can be generated by server For user's check code of verification, on the other hand, can be completed by the micro-end service end on user terminal The verification of user profile, and verification by after automatically to server request for log in micro-end game Logentry information, thus realize the automated log on of micro-end, eliminate user and be manually entered user profile also The troublesome operation of manual entry, has saved the plenty of time for user, it is to avoid micro-end downloaded after because of nothing Free time logs in and causes the phenomenon of customer loss to occur.
It addition, it will be appreciated to those of skill in the art that in above-described embodiment one and embodiment two, Operations performed by user terminal, such as, sends the request of download, verifies user's check code With send login request message and be automatically performed login etc., be all by mean of what micro-end service end realized, Micro-end service end is in addition to can being integrated in user terminal this locality, it is highly preferred that for the ease of to each Micro-end client is managed collectively, and promotes the accuracy and efficiency of verification, and micro-end service end can also be led to Cross one or more single webserver to realize.
It addition, the above embodiments one are mainly used in chrome browser or red fox browser, both The common trait of browser is: micro-end log file of download is usually the file of .exe form, and, After the download is complete, need to by user double-click micro-end log file with trigger micro-end automated log on, therefore, In embodiment one, by the way of micro-end log file is carried out renaming, micro-end log file is made to connect Automatically obtain and verify user's check code when receiving the operation requests double-clicking type, in order in verification by rear Realize the effect of automated log on.
The above embodiments two are mainly used in IE browser, log in literary composition by micro-end of this browser downloads Part is usually the file of .application form, and, after the download is complete, IE browser can be automatic Run the micro-end log file downloaded, it is not necessary to user performs double click operation, based on IE browser above-mentioned Characteristic, the download address of micro-end log file is redirected by embodiment two, in order to user terminal under Obtain user's check code by the download address after redirecting during load and automatically verify.
In addition to above-mentioned several browsers, present invention can also apply to other all kinds of browsers, and root Adjust accordingly according to the characteristic of browser and above-described embodiment realizes details, will as long as being capable of server User's check code sends user terminal to, carries out the purpose verified for user terminal.It addition, be Enabling the invention to compatible various types of browser, the present invention can also comprise following reality further Execute example three, in order to above-described embodiment one and embodiment two are combined, specifically, in embodiment three, Step S210 in above-described embodiment one being first carried out to step S230, then, server judges that user is eventually The core type of the browser of side, if it is judged that the first kind of the core type of browser is (i.e. Chrome type or red fox type), then perform step S240 in embodiment one to step S290;As Fruit judges the Second Type (i.e. IE type) of the core type of browser, then perform in embodiment two Step S340 is to step S390.As can be seen here, implementing in three, adding and judge browser kernel type Operating procedure such that it is able to be flexibly applied to various types of browser.
Fig. 4 shows the structure chart of the automatic login device of micro-end that another embodiment of the present invention provides.As Shown in Fig. 4, this device includes:
Sending module 41, is suitable to send, to server, the request of download, for described server according under described Carry acquisition request micro-end log file to be downloaded and user profile;
Acquisition module 42, is suitable to, when downloading described micro-end log file, obtain described server according to institute State user's check code that user profile generates;
Correction verification module 43, is suitable to regular to described user's check code according to default verification after the download is complete Verify, when verifying successfully, send login request message to server;
Login module 44, is suitable to the login response micro-end of message automated log on returned according to server.
Alternatively, described acquisition module 42 specifically for: obtain according to the filename of described micro-end log file Take family check code.
Alternatively, described download request and described login request message are by chrome browser or fire The request message that Vulpes browser sends.
Alternatively, described acquisition module 42 specifically for: according to redirect after micro-end log file under The checking parameter field comprised in set address obtains user's check code.
Alternatively, described download request and described login request message are by asking that IE browser sends Seek message.
Alternatively, at least one during described user profile includes following information: present system time, trip Play platform, Game Zone clothes, ID and user cookie.
Alternatively, described default verification rule includes at least one in following rule:
Judge whether the generation time of user's check code exceedes default effective time, if judged result is no, Then verify successfully;If the determination result is YES, then failure is verified;
Judge whether the access times of user's check code exceed default effective degree, if judged result is no, Then verify successfully;If the determination result is YES, then failure is verified;
Determine and described user's mark corresponding for user cookie according to the user cookie comprised in user profile Know, if the ID comprised in described ID corresponding for user cookie and described user profile Identical, then verify successfully;Otherwise, then failure is verified.
Alternatively, described login request message comprises described user profile and/or described user's check code, And described login response message comprises according to stepping on that described user profile and/or described user's check code generate Record access information.
The concrete structure of above-mentioned modules and operation principle can refer to retouching of corresponding steps in embodiment of the method Stating, here is omitted.
In sum, in the automatic logging method of micro-end provided in the present invention and device, first, service Device can according to user terminal send download acquisition request to user profile and accordingly generate user verify Code, then, it is possible to during user terminal downloads micro-end log file, this user's check code is provided To user terminal, in order to user profile is verified by user terminal according to this user's check code, and in school Send login request message from trend server after testing successfully thus log in.As can be seen here, at this In bright, server is sent to user terminal verification according to user's check code that user profile generates, thus Enable user terminal after verifying successfully automatically according to user profile corresponding to user's check code to server Send login request message and then automated log on, thus avoid in prior art and need to be manually entered by user User profile the troublesome operation of manual entry, saved user time.
Algorithm and display be not solid with any certain computer, virtual system or miscellaneous equipment provided herein Have relevant.Various general-purpose systems can also be used together with based on teaching in this.As described above, Construct the structure required by this kind of system to be apparent from.Additionally, the present invention is also not for any specific Programming language.It is understood that, it is possible to use various programming languages realize the content of invention described herein, And the description done language-specific above is the preferred forms in order to disclose the present invention.
In description mentioned herein, illustrate a large amount of detail.It is to be appreciated, however, that this Inventive embodiment can be put into practice in the case of not having these details.In some instances, not It is shown specifically known method, structure and technology, in order to do not obscure the understanding of this description.
Similarly, it will be appreciated that in order to simplify the disclosure and help understand in each inventive aspect one Or multiple, above in the description of the exemplary embodiment of the present invention, each feature of the present invention is sometimes It is grouped together in single embodiment, figure or descriptions thereof.But, should be by the disclosure Method be construed to reflect an intention that i.e. the present invention for required protection require ratio in each claim The middle more feature of feature be expressly recited.More precisely, as the following claims reflect As, inventive aspect is all features less than single embodiment disclosed above.Therefore, it then follows Claims of detailed description of the invention are thus expressly incorporated in this detailed description of the invention, the most each right Requirement itself is all as the independent embodiment of the present invention.
Those skilled in the art are appreciated that and can carry out the module in the equipment in embodiment certainly Change adaptively and they are arranged in one or more equipment different from this embodiment.Permissible Module in embodiment or unit or assembly are combined into a module or unit or assembly, and in addition may be used To put them into multiple submodule or subelement or sub-component.Except such feature and/or process or Outside at least some in unit excludes each other, can use any combination that (this specification is included companion With claim, summary and accompanying drawing) disclosed in all features and so disclosed any method or All processes of person's equipment or unit are combined.Unless expressly stated otherwise, this specification (includes companion With claim, summary and accompanying drawing) disclosed in each feature can by provide identical, equivalent or phase Replace like the alternative features of purpose.
Although additionally, it will be appreciated by those of skill in the art that embodiments more in this include that other is real Execute some feature included in example rather than further feature, but the combination of the feature of different embodiment is anticipated Taste and is within the scope of the present invention and is formed different embodiments.Such as, want in following right Ask in book, one of arbitrarily can mode using in any combination of embodiment required for protection.
The all parts embodiment of the present invention can realize with hardware, or to process at one or more The software module run on device realizes, or realizes with combinations thereof.Those skilled in the art should Understand, microprocessor or digital signal processor (DSP) can be used in practice to realize according to this The some or all functions of the some or all parts in the device of inventive embodiments.The present invention also may be used To be embodied as part or all the equipment for performing method as described herein or device program (such as, computer program and computer program).The program of such present invention of realization can be deposited Store up on a computer-readable medium, or can be to have the form of one or more signal.Such letter Number can download from internet website and to obtain, or provide on carrier signal, or with any other Form provides.
The invention discloses A1, the automatic logging method of a kind of micro-end, including:
The request of download is sent to server, to be downloaded according to described download acquisition request for described server Micro-end log file and user profile;
When downloading described micro-end log file, obtain what described server generated according to described user profile User's check code;
According to default verification rule, described user's check code is verified after the download is complete, work as verification During success, send login request message to server;
The login response micro-end of message automated log on returned according to server.
A2, according to the method described in A1, wherein, the described server of described acquisition is believed according to described user The step of user's check code that breath generates specifically includes: obtain according to the filename of described micro-end log file User's check code.
A3, according to the method described in A2, wherein, described download request and described login request message Sent by chrome browser or red fox browser.
A4, according to the method described in A1, wherein, the described server of described acquisition is believed according to described user The step of user's check code that breath generates specifically includes: according to the download of the micro-end log file after redirecting The checking parameter field comprised in address obtains user's check code.
A5, according to the method described in A4, wherein, described download request and described login request message Sent by IE browser.
A6, according to the arbitrary described method of A1-5, wherein, described user profile includes in following information At least one: present system time, gaming platform, Game Zone clothes, ID and user cookie.
A7, according to the method described in A6, wherein, described default verification rule includes in following rule At least one:
Judge whether the generation time of user's check code exceedes default effective time, if judged result is no, Then verify successfully;If the determination result is YES, then failure is verified;
Judge whether the access times of user's check code exceed default effective degree, if judged result is no, Then verify successfully;If the determination result is YES, then failure is verified;
Determine and described user's mark corresponding for user cookie according to the user cookie comprised in user profile Know, if the ID comprised in described ID corresponding for user cookie and described user profile Identical, then verify successfully;Otherwise, then failure is verified.
A8, according to the arbitrary described method of A1-7, wherein, described login request message comprises described use Family information and/or described user's check code, and described login response message comprise according to described user profile And/or the logentry information that described user's check code generates.
B9, the automatic login device of a kind of micro-end, including:
Sending module, is suitable to send the request of download, for described server according to described download to server Micro-end log file that acquisition request is to be downloaded and user profile;
Acquisition module, is suitable to, when downloading described micro-end log file, obtain described server according to described User's check code that user profile generates;
Correction verification module, is suitable to enter described user's check code according to default verification rule after the download is complete Row verification, when verifying successfully, sends login request message to server;
Login module, is suitable to the login response micro-end of message automated log on returned according to server.
B10, according to the device described in B9, wherein, described acquisition module specifically for: according to described micro- The filename of end log file obtains user's check code.
B11, according to the device described in B10, wherein, described download request and described login request message It is the request message sent by chrome browser or red fox browser.
B12, according to the device described in B9, wherein, described acquisition module specifically for: according to redirection After micro-end log file download address in the checking parameter field that comprises obtain user's check code.
B13, according to the device described in B12, wherein, described download request and described login request message It is the request message sent by IE browser.
B14, according to the arbitrary described device of B9-13, wherein, described user profile includes in following information At least one: present system time, gaming platform, Game Zone clothes, ID and user cookie.
B15, according to the device described in B14, wherein, described default verification rule includes in following rule At least one:
Judge whether the generation time of user's check code exceedes default effective time, if judged result is no, Then verify successfully;If the determination result is YES, then failure is verified;
Judge whether the access times of user's check code exceed default effective degree, if judged result is no, Then verify successfully;If the determination result is YES, then failure is verified;
Determine and described user's mark corresponding for user cookie according to the user cookie comprised in user profile Know, if the ID comprised in described ID corresponding for user cookie and described user profile Identical, then verify successfully;Otherwise, then failure is verified.
B16, according to the arbitrary described device of B9-15, wherein, described login request message comprises described User profile and/or described user's check code, and described login response message comprise and believes according to described user The logentry information that breath and/or described user's check code generate.
The present invention will be described rather than limits the invention to it should be noted above-described embodiment, and And those skilled in the art can design replacement enforcement without departing from the scope of the appended claims Example.In the claims, any reference marks that should not will be located between bracket is configured to claim Restriction.Word " comprises " and does not excludes the presence of the element or step not arranged in the claims.Be positioned at element it Front word "a" or "an" does not excludes the presence of multiple such element.The present invention can be by means of including The hardware of some different elements and realizing by means of properly programmed computer.Listing some dresses In the unit claim put, several in these devices can be to be come specifically by same hardware branch Embody.Word first, second and third use do not indicate that any order.Can be by these words It is construed to title.

Claims (10)

1. an automatic logging method for micro-end, including:
The request of download is sent to server, to be downloaded according to described download acquisition request for described server Micro-end log file and user profile;
When downloading described micro-end log file, obtain what described server generated according to described user profile User's check code;
According to default verification rule, described user's check code is verified after the download is complete, work as verification During success, send login request message to server;
The login response micro-end of message automated log on returned according to server.
Method the most according to claim 1, wherein, the described server of described acquisition is according to described use The step of user's check code that family information generates specifically includes: according to the filename of described micro-end log file Obtain user's check code.
Method the most according to claim 2, wherein, described download is asked and described logging request Message is sent by chrome browser or red fox browser.
Method the most according to claim 1, wherein, the described server of described acquisition is according to described use The step of user's check code that family information generates specifically includes: according to the micro-end log file after redirecting The checking parameter field comprised in download address obtains user's check code.
Method the most according to claim 4, wherein, described download is asked and described logging request Message is sent by IE browser.
6., according to the arbitrary described method of claim 1-5, wherein, described user profile includes following letter At least one in breath: present system time, gaming platform, Game Zone clothes, ID and user cookie。
Method the most according to claim 6, wherein, described default verification rule includes following rule At least one in then:
Judge whether the generation time of user's check code exceedes default effective time, if judged result is no, Then verify successfully;If the determination result is YES, then failure is verified;
Judge whether the access times of user's check code exceed default effective degree, if judged result is no, Then verify successfully;If the determination result is YES, then failure is verified;
Determine and described user's mark corresponding for user cookie according to the user cookie comprised in user profile Know, if the ID comprised in described ID corresponding for user cookie and described user profile Identical, then verify successfully;Otherwise, then failure is verified.
8., according to the arbitrary described method of claim 1-7, wherein, described login request message comprises Described user profile and/or described user's check code, and described login response message comprise according to described use The logentry information that family information and/or described user's check code generate.
9. an automatic login device for micro-end, including:
Sending module, is suitable to send the request of download, for described server according to described download to server Micro-end log file that acquisition request is to be downloaded and user profile;
Acquisition module, is suitable to, when downloading described micro-end log file, obtain described server according to described User's check code that user profile generates;
Correction verification module, is suitable to enter described user's check code according to default verification rule after the download is complete Row verification, when verifying successfully, sends login request message to server;
Login module, is suitable to the login response micro-end of message automated log on returned according to server.
Device the most according to claim 9, wherein, described acquisition module specifically for: according to The filename of described micro-end log file obtains user's check code.
CN201610440211.6A 2016-06-17 2016-06-17 The automatic logging method and device at micro- end Active CN105871927B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201610440211.6A CN105871927B (en) 2016-06-17 2016-06-17 The automatic logging method and device at micro- end
PCT/CN2017/088692 WO2017215650A1 (en) 2016-06-17 2017-06-16 Automatic login method and device for micro-game client, program, and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610440211.6A CN105871927B (en) 2016-06-17 2016-06-17 The automatic logging method and device at micro- end

Publications (2)

Publication Number Publication Date
CN105871927A true CN105871927A (en) 2016-08-17
CN105871927B CN105871927B (en) 2019-09-06

Family

ID=56650879

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610440211.6A Active CN105871927B (en) 2016-06-17 2016-06-17 The automatic logging method and device at micro- end

Country Status (1)

Country Link
CN (1) CN105871927B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017215650A1 (en) * 2016-06-17 2017-12-21 北京奇虎科技有限公司 Automatic login method and device for micro-game client, program, and medium
CN110141866A (en) * 2018-02-13 2019-08-20 网易(杭州)网络有限公司 Game login method and device

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000054151A2 (en) * 1999-03-12 2000-09-14 Sun Microsystems, Inc. Resource locator
US6963908B1 (en) * 2000-03-29 2005-11-08 Symantec Corporation System for transferring customized hardware and software settings from one computer to another computer to provide personalized operating environments
WO2007102823A1 (en) * 2006-03-09 2007-09-13 Vasco Data Security International, Inc. Digipass for the web-functional description
CN102413238A (en) * 2011-11-15 2012-04-11 毛诗超 Method for installing client software on mobile terminal and system thereof
CN103179134A (en) * 2013-04-19 2013-06-26 中国建设银行股份有限公司 Single sign on method and system based on Cookie and application server thereof
CN103327115A (en) * 2013-07-05 2013-09-25 百度在线网络技术(北京)有限公司 Entry control method and device of application program
CN103647695A (en) * 2013-10-31 2014-03-19 北京奇虎科技有限公司 Client application program user registration method, mobile terminal and server
CN104158896A (en) * 2014-08-22 2014-11-19 百度在线网络技术(北京)有限公司 Application recommendation method and system as well as application store server
CN104298533A (en) * 2014-11-06 2015-01-21 北京奇虎科技有限公司 Method, device and equipment for customizing software installation package
CN104468637A (en) * 2013-09-12 2015-03-25 阿里巴巴集团控股有限公司 Method and equipment for downloading and installing client
CN104503784A (en) * 2014-12-16 2015-04-08 珠海金山网络游戏科技有限公司 Method and system for controlling micro-client downloading by using script
CN105592065A (en) * 2015-11-05 2016-05-18 中国银联股份有限公司 Method and system for website registration on the basis of mobile phone message

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000054151A2 (en) * 1999-03-12 2000-09-14 Sun Microsystems, Inc. Resource locator
US6963908B1 (en) * 2000-03-29 2005-11-08 Symantec Corporation System for transferring customized hardware and software settings from one computer to another computer to provide personalized operating environments
WO2007102823A1 (en) * 2006-03-09 2007-09-13 Vasco Data Security International, Inc. Digipass for the web-functional description
CN102413238A (en) * 2011-11-15 2012-04-11 毛诗超 Method for installing client software on mobile terminal and system thereof
CN103179134A (en) * 2013-04-19 2013-06-26 中国建设银行股份有限公司 Single sign on method and system based on Cookie and application server thereof
CN103327115A (en) * 2013-07-05 2013-09-25 百度在线网络技术(北京)有限公司 Entry control method and device of application program
CN104468637A (en) * 2013-09-12 2015-03-25 阿里巴巴集团控股有限公司 Method and equipment for downloading and installing client
CN103647695A (en) * 2013-10-31 2014-03-19 北京奇虎科技有限公司 Client application program user registration method, mobile terminal and server
CN104158896A (en) * 2014-08-22 2014-11-19 百度在线网络技术(北京)有限公司 Application recommendation method and system as well as application store server
CN104298533A (en) * 2014-11-06 2015-01-21 北京奇虎科技有限公司 Method, device and equipment for customizing software installation package
CN104503784A (en) * 2014-12-16 2015-04-08 珠海金山网络游戏科技有限公司 Method and system for controlling micro-client downloading by using script
CN105592065A (en) * 2015-11-05 2016-05-18 中国银联股份有限公司 Method and system for website registration on the basis of mobile phone message

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017215650A1 (en) * 2016-06-17 2017-12-21 北京奇虎科技有限公司 Automatic login method and device for micro-game client, program, and medium
CN110141866A (en) * 2018-02-13 2019-08-20 网易(杭州)网络有限公司 Game login method and device

Also Published As

Publication number Publication date
CN105871927B (en) 2019-09-06

Similar Documents

Publication Publication Date Title
US10732962B1 (en) End-to-end deployment infrastructure
US10430487B2 (en) System and method to share content utilizing universal link format
US8793375B2 (en) Prioritization of third party access to an online commerce site
US10447726B2 (en) Mitigating attacks on server computers by enforcing platform policies on client computers
CN103150513B (en) The method of the implantation information in interception application program and device
TWI713770B (en) Method, device and electronic equipment for realizing communication between network page and ontology application
JP2019532414A (en) Kernel module loading method and apparatus
JP6647800B2 (en) Method and system for tracking marketing channels of an application
CN105939313B (en) Status code reorientation method and device
CN105765527A (en) Method and apparatus for custom software development kit (SDK) generation
CN109218368A (en) Realize method, apparatus, electronic equipment and the readable medium of Http reverse proxy
US11726800B2 (en) Remote component loader
JP6967074B2 (en) Protecting your web server from malicious client applications
CN111177672A (en) Page access control method and device and electronic equipment
CN113449022A (en) Method and device for processing service request
US11853806B2 (en) Cloud computing platform that executes third-party code in a distributed cloud computing network and uses a distributed data store
CN115225707A (en) Resource access method and device
WO2017215650A1 (en) Automatic login method and device for micro-game client, program, and medium
CN105871927A (en) Automatic logging-in method and automatic logging-in device of micro-terminal
CN112491940B (en) Request forwarding method and device of proxy server, storage medium and electronic equipment
CN106161429B (en) The automatic logging method and device at micro- end
CN106130964A (en) The automatic logging method of micro-end and device
US11509730B1 (en) Analyzing web service frontends to extract security-relevant behavior information
US20210067583A1 (en) System and control method
CN109460531A (en) Web page management method, device and intelligent terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20220726

Address after: 300450 No. 9-3-401, No. 39, Gaoxin 6th Road, Binhai Science Park, Binhai New Area, Tianjin

Patentee after: 3600 Technology Group Co.,Ltd.

Address before: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park)

Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Patentee before: Qizhi software (Beijing) Co.,Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20230712

Address after: 1765, floor 17, floor 15, building 3, No. 10 Jiuxianqiao Road, Chaoyang District, Beijing 100015

Patentee after: Beijing Hongxiang Technical Service Co.,Ltd.

Address before: 300450 No. 9-3-401, No. 39, Gaoxin 6th Road, Binhai Science Park, Binhai New Area, Tianjin

Patentee before: 3600 Technology Group Co.,Ltd.

TR01 Transfer of patent right