Embodiment one,
Fig. 2 shows the flow chart of the automatic logging method of micro-end that the embodiment of the present invention one provides.Such as Fig. 2
Shown in, the method specifically includes following steps:
Step S210: user terminal sends, to server, the request of download.
Wherein, user terminal includes all kinds of fixed terminal or mobile terminal, and wherein, fixed terminal includes individual
People's computers etc., mobile terminal includes PAD, mobile phone etc..Types of applications can be run on the subscriber terminal,
Such as, browser application, game application etc..Wherein, game application further include platform game,
Web game, micro-end game etc..For micro-end play for, further include front-end client and after
End service end, wherein, front-end client is for providing the user the intuitive operation of interface class, back-end services
End is for providing background service support for front-end client, and carries out the communication of necessity with server.At this
In embodiment, after user terminal opens platform game homepage by chrome browser or red fox browser,
Can play for certain money on this homepage and send the request of download, the micro-end trip corresponding to download this game
Play.
Step S220: server receives the above-mentioned download request that user terminal sends, and asks according to this download
Obtain micro-end log file to be downloaded and user profile.
Wherein, server refers mainly to WEB server.After server receives above-mentioned download request, to it
Resolve, obtain micro-end log file to be downloaded and user profile according to analysis result.Specifically obtain
The mode of taking can be set flexibly by those skilled in the art.Such as, in the first implementation, permissible
Identification information and the user profile of micro-end log file to be downloaded, clothes are directly comprised in the request of downloading
Business device is by resolving identification information and the user profile that can be directly obtained micro-end log file.?
In two kinds of implementations, it is also possible to only comprise the mark of micro-end log file to be downloaded in the request of downloading
Information, server gets the ground of the user terminal sending this download request according to the source address of the request of downloading
Location information, and inquire about and obtain what the game being currently running on this user terminal was applied according to this address information
Relevant information, therefrom extracts required user profile.When implementing, server can pass through Lua language
Speech obtains user profile, and Lua language not only statement is succinct and performance efficiency, can be notable by Lua language
Promote search efficiency.It addition, in addition to Lua language, those skilled in the art can also select flexibly PHP,
Each speech like sound such as JAVA obtains user profile.
Step S230: server generates user's check code according to above-mentioned user profile.
Wherein, user profile can include various information.Such as, during user profile includes following information
At least one: present system time, gaming platform, Game Zone clothes, ID and user cookie.
During concrete generation user's check code, according to default operational rule, user profile can be carried out computing, root
User's check code is generated according to operation result.Wherein, operational rule can be realized by various algorithms flexibly,
Such as, md5 algorithm, SHA algorithm, hash algorithm, RSA Algorithm and DES algorithm etc..
In the present embodiment, illustrate as a example by md5 algorithm.By md5 algorithm, user profile is entered
Row cryptographic calculation, obtains the first operation result.Owing to the figure place of the first operation result is longer, normal conditions
Under be 32, in order to improve subsequent treatment efficiency, in the present embodiment, from the first operation result intercept
Preset figure place as the second operation result, and using the second operation result as user's check code.Such as, from
32 intercept 7 the most continuously as user's check code.Can by the way of intercepting and presetting figure place
Notable shorten follow-up propagation delay time, promote processing speed, certainly, in other embodiment of the present invention,
Can also directly using the first operation result as user's check code, or intercept default position by other means
Number, such as, in addition to intercepting numerical digit continuously, it is also possible to intercept one every some.
It addition, for the user's check code weight preventing the second operation result after intercepting from having generated with server
Multiple, in this step, it is also possible to determine whether the second operation result whether with existing user's check code
Repeat;If judged result is no, using the second operation result as user's check code;If the determination result is YES,
Then again intercept from the first operation result and preset figure place, until the default figure place again intercepted is with existing
When user's check code does not repeats, using the default figure place that again intercepts as user's check code.
Alternatively, in the present embodiment, in order to be prevented effectively from the second operation result after intercepting with existing
User's check code repeats, and can pre-set effective time and/or the effective degree of user's check code, accordingly
Ground, after generating user's check code, records generation time and/or the use time of user's check code further
Number, exceedes effective time by the generation time and/or access times exceed the shape of user's check code of effective degree
State is set to disarmed state.For example, it is possible to the effective time of user's check code is set to one minute, exceed
After one minute, this user's check code is in disarmed state, it is impossible to normally use;User can also be verified
The effective degree of code is set to once, then ceases to be in force automatically, it is impossible to reuse after it uses once.By
This is it can be avoided that polyisomenism between user's check code.
Step S240: server carries out renaming according to user's check code to micro-end log file to be downloaded,
Micro-end log file after renaming is supplied to user terminal downloads.
Wherein, micro-end log file is often referred to can be used in running the micro-client software specifying game.Example
As, in this example, it is assumed that the file identification downloading the micro-end log file comprised in request is DZZ,
May determine that corresponding micro-end log file is the big micro-client dominated corresponding to game by this document mark
End software.The entitled DZZ.EXE of original document of this micro-end log file.In the present embodiment, according to
Family check code carries out renaming to it, makes user terminal can determine user according to the filename after renaming
Check code.When implementing, renaming can be carried out by various modes.In the first implementation,
Directly user's check code is added to the appointment position of raw filename, such as, is added to by underscore
The end of raw filename, makes raw filename be changed to DZZ_CODE.EXE.In the second realization side
In formula, in order to promote the safety in transmitting procedure, the encryption can preset user's check code is calculated
Method, and cryptographic calculation result is added to the appointment position of raw filename.Afterwards, server will heavily be ordered
Micro-end log file after Ming is supplied to user terminal downloads.Specifically, can be by the micro-end after renaming
The downloading portal of log file is sent to user terminal.
Step S250: user terminal is when downloading micro-end log file, according to the file of micro-end log file
Name obtains user's check code.
Specifically, user terminal downloads micro-end log file by the downloading portal of server feedback.Under this
It is loaded into mouth can be download link, download the various forms such as icon.In downloading process or after having downloaded,
User terminal obtains user's check code according to the filename of micro-end log file.Concrete acquisition mode depends on
Renaming mode in previous step, when using the first renaming mode, by filename be directly
User's check code can be obtained;When using the second renaming mode, the specific field in filename is held
The decipherment algorithm that row is preset can obtain user's check code.
It addition, step S250 can trigger automatically according to the operation logic pre-set, for example, it is possible to set
It is set to user terminal before download starts, automatically obtains user's check code;Or, user terminal is being downloaded
During automatically obtain user's check code;Or, user terminal obtains user school after download terminates automatically
Test code.It addition, step S250 can also trigger according to the operation requests that user sends, such as, when
When user double-clicks the micro-end log file downloaded, the front-end client of micro-end receives this double-click type
Operation requests, and the back-end services end that the operation requests of this double-click type passes to micro-end processes,
The back-end services end of micro-end is according to the filename after the operation requests reading renaming of this double-click type and obtains
User's check code.
Step S260: user's check code is verified by user terminal according to default verification rule.
Wherein, this step can continuously perform according to the triggering of step S250, say, that no matter walks
Which kind of mode rapid S250 uses trigger, as long as step S250 is finished the most automatically triggers step S260.
Or, this step can also trigger after micro-end log file is downloaded automatically, say, that no matter
Which kind of mode is step S250 use trigger, as long as micro-end log file is downloaded complete, automatically triggers step
S260。
Specifically, this step can be verified by least one rule in following rule: the first
Verification rule is: judge whether the generation time of user's check code exceedes default effective time, if judging
Result is no, then verify successfully;If the determination result is YES, then failure is verified.Such as, have when default
The effect time is 1 minute, if the generation time of user's check code is super after one minute, verifies failure.The second
Verification rule is: judge whether the access times of user's check code exceed default effective degree, if judging
Result is no, then verify successfully;If the determination result is YES, then failure is verified.Such as, have when default
When effect number of times is 1 time, as long as user's check code had used then verifies failure.The third verification rule is:
User cookie according to comprising in user profile determines the ID corresponding with user cookie, if
The ID determined is identical with the ID comprised in user profile, then verify successfully;Otherwise,
Then verify failure.Above-mentioned three kinds of verification modes both can be used alone, it is also possible to is used in combination.It addition,
In addition to above-mentioned verification mode, those skilled in the art can also set other verification mode flexibly and carry out school
Test, if can determine user's check code effectiveness and and user profile between matching relationship.
As can be seen here, the execution purpose of this step is to determine user's check code of acquisition and subscriber terminal side
User profile whether mate, due to user's check code according to user profile generate, therefore, pass through
User's check code can obtain user profile, by user local to the user profile obtained and subscriber terminal side
Information compares the legitimacy that i.e. can determine that user's check code.
Step S270: when verifying successfully, user terminal sends login request message to server.
Specifically, this step can trigger after verifying successfully automatically.Wherein, login request message is entered
One step comprises above-mentioned user profile and/or user's check code, determines user to be logged in for server.
Step S280: server receives the login request message sent after user terminal verifies successfully, according to
Login request message returns login response message to user terminal.
Wherein, login response message comprises the login generated according to user profile and/or user's check code to enter
Message ceases, and can be automatically performed login by logentry information.Specifically, server is believed according to user
Breath and/or user's check code can determine the most online game name of user to be logged in, Game Zone clothes,
The information such as gaming platform and user cookie, accordingly, the logentry information that server-assignment is corresponding,
To realize the automated log on of this user.
Step S290: the login response micro-end of message automated log on that user terminal returns according to server.
When implementing, this step can be performed by the micro-end service end run on user terminal.Micro-end
After service end receives login response message, the logentry information according to wherein comprising carries out automated log on.
Wherein, logentry information can be to be logged on the forms such as link.
As can be seen here, by the way of in the embodiment of the present invention, it is capable of the automated log on of micro-end, removes from
User is manually entered the troublesome operation of user profile manual entry, has saved the plenty of time for user,
Avoid and log in because having no time after micro-end has been downloaded and cause the phenomenon of customer loss to occur.
Embodiment two,
Fig. 3 shows the flow chart of the automatic logging method of micro-end that the embodiment of the present invention two provides.Such as Fig. 3
Shown in, the method specifically includes following steps:
Step S310: user terminal sends, to server, the request of download.
Wherein, user terminal includes all kinds of fixed terminal or mobile terminal, and wherein, fixed terminal includes individual
People's computers etc., mobile terminal includes PAD, mobile phone etc..Types of applications can be run on the subscriber terminal,
Such as, browser application, game application etc..Wherein, game application further include platform game,
Web game, micro-end game etc..For micro-end play for, further include front-end client and after
End service end, wherein, front-end client is for providing the user the intuitive operation of interface class, back-end services
End is for providing background service support for front-end client, and carries out the communication of necessity with server.At this
In embodiment, after user terminal opens platform game homepage by IE browser, it is possible to for this homepage
On the game of certain money send the request of download, the micro-end game corresponding to download this game.
Step S320: server receives the above-mentioned download request that user terminal sends, and asks according to this download
Obtain micro-end log file to be downloaded and user profile.
Wherein, server refers mainly to WEB server.After server receives above-mentioned download request, to it
Resolve, obtain micro-end log file to be downloaded and user profile according to analysis result.Specifically obtain
The mode of taking can be set flexibly by those skilled in the art.Such as, in the first implementation, permissible
Identification information and the user profile of micro-end log file to be downloaded, clothes are directly comprised in the request of downloading
Business device is by resolving identification information and the user profile that can be directly obtained micro-end log file.?
In two kinds of implementations, it is also possible to only comprise the mark of micro-end log file to be downloaded in the request of downloading
Information, server gets the ground of the user terminal sending this download request according to the source address of the request of downloading
Location information, and inquire about and obtain what the game being currently running on this user terminal was applied according to this address information
Relevant information, therefrom extracts required user profile.When implementing, server can pass through Lua language
Speech obtains user profile, and Lua language not only statement is succinct and performance efficiency, can be notable by Lua language
Promote search efficiency.It addition, in addition to Lua language, those skilled in the art can also select flexibly PHP,
Each speech like sound such as JAVA obtains user profile.
Step S330: server generates user's check code according to above-mentioned user profile.
Wherein, user profile can include various information.Such as, during user profile includes following information
At least one: present system time, gaming platform, Game Zone clothes, ID and user cookie.
During concrete generation user's check code, according to default operational rule, user profile can be carried out computing, root
User's check code is generated according to operation result.Wherein, operational rule can be realized by various algorithms flexibly,
Such as, md5 algorithm, SHA algorithm, hash algorithm, RSA Algorithm and DES algorithm etc..
In the present embodiment, illustrate as a example by md5 algorithm.By md5 algorithm, user profile is entered
Row cryptographic calculation, obtains the first operation result.Owing to the figure place of the first operation result is longer, normal conditions
Under be 32, in order to improve subsequent treatment efficiency, in the present embodiment, from the first operation result intercept
Preset figure place as the second operation result, and using the second operation result as user's check code.Such as, from
32 intercept 7 the most continuously as user's check code.Can by the way of intercepting and presetting figure place
Notable shorten follow-up propagation delay time, promote processing speed, certainly, in other embodiment of the present invention,
Can also directly using the first operation result as user's check code, or intercept default position by other means
Number, such as, in addition to intercepting numerical digit continuously, it is also possible to intercept one every some.
It addition, for the user's check code weight preventing the second operation result after intercepting from having generated with server
Multiple, in this step, it is also possible to determine whether the second operation result whether with existing user's check code
Repeat;If judged result is no, using the second operation result as user's check code;If the determination result is YES,
Then again intercept from the first operation result and preset figure place, until the default figure place again intercepted is with existing
When user's check code does not repeats, using the default figure place that again intercepts as user's check code.
Alternatively, in the present embodiment, in order to be prevented effectively from the second operation result after intercepting with existing
User's check code repeats, and can pre-set effective time and/or the effective degree of user's check code, accordingly
Ground, after generating user's check code, records generation time and/or the use time of user's check code further
Number, exceedes effective time by the generation time and/or access times exceed the shape of user's check code of effective degree
State is set to disarmed state.For example, it is possible to the effective time of user's check code is set to one minute, exceed
After one minute, this user's check code is in disarmed state, it is impossible to normally use;User can also be verified
The effective degree of code is set to once, then ceases to be in force automatically, it is impossible to reuse after it uses once.By
This is it can be avoided that polyisomenism between user's check code.
Step S340: server is according to the download to micro-end log file to be downloaded of the above-mentioned user's check code
Address redirects, and makes to comprise above-mentioned user's check code in the download address after redirection.
When implementing, can realize in the following way redirecting operation: first, at micro-end to be downloaded
The download address of log file is added checking parameter field, the value of verification parameter field is set to user
The value of check code.Wherein, checking parameter field can be arranged on the optional position in download address, such as,
It is arranged on the end of download address.Then, micro-end log file to be downloaded is made by page jump mode
Download address redirect as adding the download address after checking parameter field.When specifically redirecting, can be by 302
The mode of redirecting redirects.Wherein, 302 redirect also to cry and redirect temporarily, when using 302 to redirect, and user
Terminal can ask twice download address, and the download address asked for the first time is not for comprise checking parameter field
Original download address, second time request to download address be under the redirection containing checking parameter field
Set address, and, owing to 302 redirect as redirecting temporarily, therefore search engine will not be downloaded redirecting
Address stores.The user's check code every time generated due to server is different, therefore, performs weight every time
Redirect Address during directional operation is the most different, therefore, use 302 redirect mode can not change former
Interim redirection operation, the user school being particularly suited in the present invention is completed on the premise of beginning download address
Test the application scenarios that code dynamically changes.Certainly, in addition to 302 redirect mode, other page jump mode
Can also apply to the present invention.
Step S350: user terminal, when downloading micro-end log file, logs according to the micro-end after redirecting
The checking parameter field comprised in the download address of file obtains user's check code.
Specifically, user terminal downloads micro-end log file by the download address of server feedback.Due to
This download address has carried out re-orientation processes, and therefore, user terminal needs to server request twice, the
Once to server request original download address, second time resets to server request according to redirecting instruction
To download address.In downloading process or after having downloaded, user terminal is according to redirecting in download address
The checking parameter field comprised obtains user's check code.It addition, step S350 can be according to pre-setting
Operation logic triggers automatically, for example, it is possible to be set to user terminal automatically obtain user in downloading process
Check code;Or, user terminal obtains user's check code after download terminates automatically.Further, since this
Embodiment is mainly used in IE browser, and the kernel of IE browser is different from chrome browser or fire
The kernel of Vulpes browser, therefore, the file type of the micro-end log file downloaded to by IE browser is led to
It is often .application type, the file type of the entitled .exe of its suffix being different from embodiment one.Pass through
The file of the .application type that IE browser downloads to need not user perform double click operation can automatically
Run.Therefore, different from step S250 in embodiment one, step S350 in the present embodiment is usual
Need not trigger according to the operation requests that user sends.
Step S360: user's check code is verified by user terminal according to default verification rule.
Wherein, this step can continuously perform according to the triggering of step S350, say, that no matter walks
Which kind of mode rapid S350 uses trigger, as long as step S350 is finished the most automatically triggers step S360.
Or, this step can also trigger after micro-end log file is downloaded automatically, say, that no matter
Which kind of mode is step S350 use trigger, as long as micro-end log file is downloaded complete, automatically triggers step
S360。
Specifically, this step can be verified by least one rule in following rule: the first
Verification rule is: judge whether the generation time of user's check code exceedes default effective time, if judging
Result is no, then verify successfully;If the determination result is YES, then failure is verified.Such as, have when default
The effect time is 1 minute, if the generation time of user's check code is super after one minute, verifies failure.The second
Verification rule is: judge whether the access times of user's check code exceed default effective degree, if judging
Result is no, then verify successfully;If the determination result is YES, then failure is verified.Such as, have when default
When effect number of times is 1 time, as long as user's check code had used then verifies failure.The third verification rule is:
User cookie according to comprising in user profile determines the ID corresponding with user cookie, if
The ID determined is identical with the ID comprised in user profile, then verify successfully;Otherwise,
Then verify failure.Above-mentioned three kinds of verification modes both can be used alone, it is also possible to is used in combination.It addition,
In addition to above-mentioned verification mode, those skilled in the art can also set other verification mode flexibly and carry out school
Test, if can determine user's check code effectiveness and and user profile between matching relationship.
As can be seen here, the execution purpose of this step is to determine user's check code of acquisition and subscriber terminal side
User profile whether mate, due to user's check code according to user profile generate, therefore, pass through
User's check code can obtain user profile, by user local to the user profile obtained and subscriber terminal side
Information compares the legitimacy that i.e. can determine that user's check code.
Step S370: when verifying successfully, user terminal sends login request message to server.
Specifically, this step can trigger after verifying successfully automatically.Wherein, login request message is entered
One step comprises above-mentioned user profile and/or user's check code, determines user to be logged in for server.
Step S380: server receives the login request message sent after user terminal verifies successfully, according to
Login request message returns login response message to user terminal.
Wherein, login response message comprises the login generated according to user profile and/or user's check code to enter
Message ceases, and can be automatically performed login by logentry information.Specifically, server is believed according to user
Breath and/or user's check code can determine the most online game name of user to be logged in, Game Zone clothes,
The information such as gaming platform and user cookie, accordingly, the logentry information that server-assignment is corresponding,
To realize the automated log on of this user.
Step S390: the login response micro-end of message automated log on that user terminal returns according to server.
When implementing, this step can be performed by the micro-end service end run on user terminal.Micro-end
After service end receives login response message, the logentry information according to wherein comprising carries out automated log on.
Wherein, logentry information can be to be logged on the forms such as link.
As can be seen here, by the way of in the embodiment of the present invention, on the one hand, can be generated by server
For user's check code of verification, on the other hand, can be completed by the micro-end service end on user terminal
The verification of user profile, and verification by after automatically to server request for log in micro-end game
Logentry information, thus realize the automated log on of micro-end, eliminate user and be manually entered user profile also
The troublesome operation of manual entry, has saved the plenty of time for user, it is to avoid micro-end downloaded after because of nothing
Free time logs in and causes the phenomenon of customer loss to occur.
It addition, it will be appreciated to those of skill in the art that in above-described embodiment one and embodiment two,
Operations performed by user terminal, such as, sends the request of download, verifies user's check code
With send login request message and be automatically performed login etc., be all by mean of what micro-end service end realized,
Micro-end service end is in addition to can being integrated in user terminal this locality, it is highly preferred that for the ease of to each
Micro-end client is managed collectively, and promotes the accuracy and efficiency of verification, and micro-end service end can also be led to
Cross one or more single webserver to realize.
It addition, the above embodiments one are mainly used in chrome browser or red fox browser, both
The common trait of browser is: micro-end log file of download is usually the file of .exe form, and,
After the download is complete, need to by user double-click micro-end log file with trigger micro-end automated log on, therefore,
In embodiment one, by the way of micro-end log file is carried out renaming, micro-end log file is made to connect
Automatically obtain and verify user's check code when receiving the operation requests double-clicking type, in order in verification by rear
Realize the effect of automated log on.
The above embodiments two are mainly used in IE browser, log in literary composition by micro-end of this browser downloads
Part is usually the file of .application form, and, after the download is complete, IE browser can be automatic
Run the micro-end log file downloaded, it is not necessary to user performs double click operation, based on IE browser above-mentioned
Characteristic, the download address of micro-end log file is redirected by embodiment two, in order to user terminal under
Obtain user's check code by the download address after redirecting during load and automatically verify.
In addition to above-mentioned several browsers, present invention can also apply to other all kinds of browsers, and root
Adjust accordingly according to the characteristic of browser and above-described embodiment realizes details, will as long as being capable of server
User's check code sends user terminal to, carries out the purpose verified for user terminal.It addition, be
Enabling the invention to compatible various types of browser, the present invention can also comprise following reality further
Execute example three, in order to above-described embodiment one and embodiment two are combined, specifically, in embodiment three,
Step S210 in above-described embodiment one being first carried out to step S230, then, server judges that user is eventually
The core type of the browser of side, if it is judged that the first kind of the core type of browser is (i.e.
Chrome type or red fox type), then perform step S240 in embodiment one to step S290;As
Fruit judges the Second Type (i.e. IE type) of the core type of browser, then perform in embodiment two
Step S340 is to step S390.As can be seen here, implementing in three, adding and judge browser kernel type
Operating procedure such that it is able to be flexibly applied to various types of browser.
Fig. 4 shows the structure chart of the automatic login device of micro-end that another embodiment of the present invention provides.As
Shown in Fig. 4, this device includes:
Sending module 41, is suitable to send, to server, the request of download, for described server according under described
Carry acquisition request micro-end log file to be downloaded and user profile;
Acquisition module 42, is suitable to, when downloading described micro-end log file, obtain described server according to institute
State user's check code that user profile generates;
Correction verification module 43, is suitable to regular to described user's check code according to default verification after the download is complete
Verify, when verifying successfully, send login request message to server;
Login module 44, is suitable to the login response micro-end of message automated log on returned according to server.
Alternatively, described acquisition module 42 specifically for: obtain according to the filename of described micro-end log file
Take family check code.
Alternatively, described download request and described login request message are by chrome browser or fire
The request message that Vulpes browser sends.
Alternatively, described acquisition module 42 specifically for: according to redirect after micro-end log file under
The checking parameter field comprised in set address obtains user's check code.
Alternatively, described download request and described login request message are by asking that IE browser sends
Seek message.
Alternatively, at least one during described user profile includes following information: present system time, trip
Play platform, Game Zone clothes, ID and user cookie.
Alternatively, described default verification rule includes at least one in following rule:
Judge whether the generation time of user's check code exceedes default effective time, if judged result is no,
Then verify successfully;If the determination result is YES, then failure is verified;
Judge whether the access times of user's check code exceed default effective degree, if judged result is no,
Then verify successfully;If the determination result is YES, then failure is verified;
Determine and described user's mark corresponding for user cookie according to the user cookie comprised in user profile
Know, if the ID comprised in described ID corresponding for user cookie and described user profile
Identical, then verify successfully;Otherwise, then failure is verified.
Alternatively, described login request message comprises described user profile and/or described user's check code,
And described login response message comprises according to stepping on that described user profile and/or described user's check code generate
Record access information.
The concrete structure of above-mentioned modules and operation principle can refer to retouching of corresponding steps in embodiment of the method
Stating, here is omitted.
In sum, in the automatic logging method of micro-end provided in the present invention and device, first, service
Device can according to user terminal send download acquisition request to user profile and accordingly generate user verify
Code, then, it is possible to during user terminal downloads micro-end log file, this user's check code is provided
To user terminal, in order to user profile is verified by user terminal according to this user's check code, and in school
Send login request message from trend server after testing successfully thus log in.As can be seen here, at this
In bright, server is sent to user terminal verification according to user's check code that user profile generates, thus
Enable user terminal after verifying successfully automatically according to user profile corresponding to user's check code to server
Send login request message and then automated log on, thus avoid in prior art and need to be manually entered by user
User profile the troublesome operation of manual entry, saved user time.
Algorithm and display be not solid with any certain computer, virtual system or miscellaneous equipment provided herein
Have relevant.Various general-purpose systems can also be used together with based on teaching in this.As described above,
Construct the structure required by this kind of system to be apparent from.Additionally, the present invention is also not for any specific
Programming language.It is understood that, it is possible to use various programming languages realize the content of invention described herein,
And the description done language-specific above is the preferred forms in order to disclose the present invention.
In description mentioned herein, illustrate a large amount of detail.It is to be appreciated, however, that this
Inventive embodiment can be put into practice in the case of not having these details.In some instances, not
It is shown specifically known method, structure and technology, in order to do not obscure the understanding of this description.
Similarly, it will be appreciated that in order to simplify the disclosure and help understand in each inventive aspect one
Or multiple, above in the description of the exemplary embodiment of the present invention, each feature of the present invention is sometimes
It is grouped together in single embodiment, figure or descriptions thereof.But, should be by the disclosure
Method be construed to reflect an intention that i.e. the present invention for required protection require ratio in each claim
The middle more feature of feature be expressly recited.More precisely, as the following claims reflect
As, inventive aspect is all features less than single embodiment disclosed above.Therefore, it then follows
Claims of detailed description of the invention are thus expressly incorporated in this detailed description of the invention, the most each right
Requirement itself is all as the independent embodiment of the present invention.
Those skilled in the art are appreciated that and can carry out the module in the equipment in embodiment certainly
Change adaptively and they are arranged in one or more equipment different from this embodiment.Permissible
Module in embodiment or unit or assembly are combined into a module or unit or assembly, and in addition may be used
To put them into multiple submodule or subelement or sub-component.Except such feature and/or process or
Outside at least some in unit excludes each other, can use any combination that (this specification is included companion
With claim, summary and accompanying drawing) disclosed in all features and so disclosed any method or
All processes of person's equipment or unit are combined.Unless expressly stated otherwise, this specification (includes companion
With claim, summary and accompanying drawing) disclosed in each feature can by provide identical, equivalent or phase
Replace like the alternative features of purpose.
Although additionally, it will be appreciated by those of skill in the art that embodiments more in this include that other is real
Execute some feature included in example rather than further feature, but the combination of the feature of different embodiment is anticipated
Taste and is within the scope of the present invention and is formed different embodiments.Such as, want in following right
Ask in book, one of arbitrarily can mode using in any combination of embodiment required for protection.
The all parts embodiment of the present invention can realize with hardware, or to process at one or more
The software module run on device realizes, or realizes with combinations thereof.Those skilled in the art should
Understand, microprocessor or digital signal processor (DSP) can be used in practice to realize according to this
The some or all functions of the some or all parts in the device of inventive embodiments.The present invention also may be used
To be embodied as part or all the equipment for performing method as described herein or device program
(such as, computer program and computer program).The program of such present invention of realization can be deposited
Store up on a computer-readable medium, or can be to have the form of one or more signal.Such letter
Number can download from internet website and to obtain, or provide on carrier signal, or with any other
Form provides.
The invention discloses A1, the automatic logging method of a kind of micro-end, including:
The request of download is sent to server, to be downloaded according to described download acquisition request for described server
Micro-end log file and user profile;
When downloading described micro-end log file, obtain what described server generated according to described user profile
User's check code;
According to default verification rule, described user's check code is verified after the download is complete, work as verification
During success, send login request message to server;
The login response micro-end of message automated log on returned according to server.
A2, according to the method described in A1, wherein, the described server of described acquisition is believed according to described user
The step of user's check code that breath generates specifically includes: obtain according to the filename of described micro-end log file
User's check code.
A3, according to the method described in A2, wherein, described download request and described login request message
Sent by chrome browser or red fox browser.
A4, according to the method described in A1, wherein, the described server of described acquisition is believed according to described user
The step of user's check code that breath generates specifically includes: according to the download of the micro-end log file after redirecting
The checking parameter field comprised in address obtains user's check code.
A5, according to the method described in A4, wherein, described download request and described login request message
Sent by IE browser.
A6, according to the arbitrary described method of A1-5, wherein, described user profile includes in following information
At least one: present system time, gaming platform, Game Zone clothes, ID and user cookie.
A7, according to the method described in A6, wherein, described default verification rule includes in following rule
At least one:
Judge whether the generation time of user's check code exceedes default effective time, if judged result is no,
Then verify successfully;If the determination result is YES, then failure is verified;
Judge whether the access times of user's check code exceed default effective degree, if judged result is no,
Then verify successfully;If the determination result is YES, then failure is verified;
Determine and described user's mark corresponding for user cookie according to the user cookie comprised in user profile
Know, if the ID comprised in described ID corresponding for user cookie and described user profile
Identical, then verify successfully;Otherwise, then failure is verified.
A8, according to the arbitrary described method of A1-7, wherein, described login request message comprises described use
Family information and/or described user's check code, and described login response message comprise according to described user profile
And/or the logentry information that described user's check code generates.
B9, the automatic login device of a kind of micro-end, including:
Sending module, is suitable to send the request of download, for described server according to described download to server
Micro-end log file that acquisition request is to be downloaded and user profile;
Acquisition module, is suitable to, when downloading described micro-end log file, obtain described server according to described
User's check code that user profile generates;
Correction verification module, is suitable to enter described user's check code according to default verification rule after the download is complete
Row verification, when verifying successfully, sends login request message to server;
Login module, is suitable to the login response micro-end of message automated log on returned according to server.
B10, according to the device described in B9, wherein, described acquisition module specifically for: according to described micro-
The filename of end log file obtains user's check code.
B11, according to the device described in B10, wherein, described download request and described login request message
It is the request message sent by chrome browser or red fox browser.
B12, according to the device described in B9, wherein, described acquisition module specifically for: according to redirection
After micro-end log file download address in the checking parameter field that comprises obtain user's check code.
B13, according to the device described in B12, wherein, described download request and described login request message
It is the request message sent by IE browser.
B14, according to the arbitrary described device of B9-13, wherein, described user profile includes in following information
At least one: present system time, gaming platform, Game Zone clothes, ID and user cookie.
B15, according to the device described in B14, wherein, described default verification rule includes in following rule
At least one:
Judge whether the generation time of user's check code exceedes default effective time, if judged result is no,
Then verify successfully;If the determination result is YES, then failure is verified;
Judge whether the access times of user's check code exceed default effective degree, if judged result is no,
Then verify successfully;If the determination result is YES, then failure is verified;
Determine and described user's mark corresponding for user cookie according to the user cookie comprised in user profile
Know, if the ID comprised in described ID corresponding for user cookie and described user profile
Identical, then verify successfully;Otherwise, then failure is verified.
B16, according to the arbitrary described device of B9-15, wherein, described login request message comprises described
User profile and/or described user's check code, and described login response message comprise and believes according to described user
The logentry information that breath and/or described user's check code generate.
The present invention will be described rather than limits the invention to it should be noted above-described embodiment, and
And those skilled in the art can design replacement enforcement without departing from the scope of the appended claims
Example.In the claims, any reference marks that should not will be located between bracket is configured to claim
Restriction.Word " comprises " and does not excludes the presence of the element or step not arranged in the claims.Be positioned at element it
Front word "a" or "an" does not excludes the presence of multiple such element.The present invention can be by means of including
The hardware of some different elements and realizing by means of properly programmed computer.Listing some dresses
In the unit claim put, several in these devices can be to be come specifically by same hardware branch
Embody.Word first, second and third use do not indicate that any order.Can be by these words
It is construed to title.