CN105871927B - The automatic logging method and device at micro- end - Google Patents

The automatic logging method and device at micro- end Download PDF

Info

Publication number
CN105871927B
CN105871927B CN201610440211.6A CN201610440211A CN105871927B CN 105871927 B CN105871927 B CN 105871927B CN 201610440211 A CN201610440211 A CN 201610440211A CN 105871927 B CN105871927 B CN 105871927B
Authority
CN
China
Prior art keywords
user
check code
micro
server
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610440211.6A
Other languages
Chinese (zh)
Other versions
CN105871927A (en
Inventor
李辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Hongxiang Technical Service Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201610440211.6A priority Critical patent/CN105871927B/en
Publication of CN105871927A publication Critical patent/CN105871927A/en
Priority to PCT/CN2017/088692 priority patent/WO2017215650A1/en
Application granted granted Critical
Publication of CN105871927B publication Critical patent/CN105871927B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses the automatic logging method and device at a kind of micro- end, be at least able to solve traditional micro- end login mode need to by manual entry caused by cumbersome and time-consuming technical problem.This method comprises: downloading request is sent to server, for the micro- end log file and user information that the server is to be downloaded according to the downloading request;When downloading micro- end log file, user's check code that the server is generated according to the user information is obtained;User's check code is verified according to preset verification rule after the download is complete, when verifying successfully, sends login request message to server;The micro- end of login response message automated log on returned according to server.

Description

The automatic logging method and device at micro- end
Technical field
The present invention relates to network communication technology fields, and in particular to a kind of automatic logging method and device at micro- end.
Background technique
Currently, the type and quantity of online game are more and more.Game developer constantly pushes away to preferably attract user The online game that game picture is more life-like, interactive function is more powerful out.However, at the same time, also leading to game client Data volume it is increasing, reach hundreds of million or even tens G easily, so huge game client undoubtedly significantly extends use Waiting time in the downloading process of family, and huge challenge is brought to the memory space of terminal device.It can be seen that huge Game client probably due to the defects of download time is too long, occupied space is excessive and be lost a large number of users.
It is proposed mini game one after another in order to solve above-mentioned drawback, game developer brought by huge game client Client, hereinafter referred to as micro- end.Micro- end often only has several million sizes, and it is fast in turn that user can complete downloading process in moment Speed enters game.Basic game function rapidly can be provided for user by micro- end, and can be during game carries out Other required resources are downloaded, the waiting time of user is significantly reduced, the high praise by a large number of users.
But inventor has found in the implementation of the present invention, existing micro- end, which at least has the following deficiencies:, works as user After having downloaded micro- end, need to be manually entered user information and the micro- end of manual entry, and the process of manual entry not only operate it is numerous It is trivial, and the time is expended, inconvenience thus is brought for user, and virtually lost certain customers.
Summary of the invention
In view of the above problems, it proposes on the present invention overcomes the above problem or at least be partially solved in order to provide one kind State the automatic logging method and device at micro- end of problem.
According to one aspect of the present invention, a kind of automatic logging method at micro- end is provided, comprising: under sending to server Request is carried, for the micro- end log file and user information that the server is to be downloaded according to the downloading request;? When downloading micro- end log file, user's check code that the server is generated according to the user information is obtained;It is downloading User's check code is verified according to preset verification rule after the completion, when verifying successfully, is stepped on to server transmission Record request message;The micro- end of login response message automated log on returned according to server.
Another aspect according to the present invention provides a kind of automatic login device at micro- end, comprising: sending module is suitable for Send downloading request to server, for the server according to the downloading request micro- end log file to be downloaded with And user information;Module is obtained, is suitable for when downloading micro- end log file, is obtained the server and believed according to the user Cease the user's check code generated;Correction verification module is suitable for after the download is complete verifying the user according to preset verification rule Code is verified, and when verifying successfully, sends login request message to server;Login module, suitable for being returned according to server The micro- end of login response message automated log on.
In the automatic logging method and device at micro- end provided by the invention, firstly, user terminal can be sent out to server It send downloading to request, so that server according to the downloading request to user information and accordingly generates user's check code, then, uses Family terminal can obtain user's check code during downloading micro- end log file, so as to according to user's check code to Family information is verified, and sends login request message from trend server after verifying successfully to be logged in.Thus may be used See, in the present invention, user's check code that server is generated according to user information is sent to user terminal verification, to use Family terminal can send logging request to server automatically according to the corresponding user information of user's check code after verifying successfully and disappear Breath and then automated log on thus avoid the cumbersome behaviour that user information and manual entry need to be manually entered by user in the prior art Make, has saved user time.
The above description is only an overview of the technical scheme of the present invention, in order to better understand the technical means of the present invention, And it can be implemented in accordance with the contents of the specification, and in order to allow above and other objects of the present invention, feature and advantage can It is clearer and more comprehensible, the followings are specific embodiments of the present invention.
Detailed description of the invention
By reading the following detailed description of the preferred embodiment, various other advantages and benefits are common for this field Technical staff will become clear.The drawings are only for the purpose of illustrating a preferred embodiment, and is not considered as to the present invention Limitation.And throughout the drawings, the same reference numbers will be used to refer to the same parts.In the accompanying drawings:
Fig. 1 shows the flow chart of the automatic logging method at micro- end provided by one embodiment of the present invention;
Fig. 2 shows the flow charts of the automatic logging method at micro- end of the offer of the embodiment of the present invention one;
Fig. 3 shows the flow chart of the automatic logging method at micro- end provided by Embodiment 2 of the present invention;
Fig. 4 shows the structure chart of the automatic login device at micro- end provided by one embodiment of the present invention.
Specific embodiment
Exemplary embodiments of the present disclosure are described in more detail below with reference to accompanying drawings.Although showing the disclosure in attached drawing Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here It is limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the scope of the present disclosure It is fully disclosed to those skilled in the art.
The embodiment of the invention provides the automatic logging methods and device at a kind of micro- end, are at least able to solve traditional micro- end Login mode need to by manual entry caused by cumbersome and time-consuming technical problem.
Fig. 1 shows the flow chart of the automatic logging method at micro- end provided by one embodiment of the present invention.As shown in Figure 1, This method specifically includes the following steps:
Step S110: sending downloading request to server, for micro- end that server is to be downloaded according to downloading request Log file and user information.
Wherein, downloading request is for downloading micro- end log file, the server micro- end to be downloaded according to downloading request Log file and the implementation of user information can be it is a variety of, for example, in one implementation, can directly download It include the identification information and user information of micro- end log file to be downloaded in request, thus by being solved to downloading request Analysis can get micro- end log file and user information to be downloaded.In another implementation, it can be asked in downloading Only include the identification information of micro- end log file to be downloaded in asking, the downloading is sent by stipulated form reading by server and is asked The user information at user terminal asked.It is sent under this for example, server is determined by the source port number for including in downloading request The user terminal address for carrying request, the phase for the game account being currently running on the user terminal is determined according to the user terminal address Close information.
Step S120: when downloading micro- end log file, user's check code that server is generated according to user information is obtained.
Wherein, it can flexibly be realized by various modes according to the process that user information generates user's check code, for example, can To be encrypted by md5 algorithm to user information, to obtain user's check code.The effect of user's check code is to be supplied to use Family terminal, so that user terminal verifies user information.Specifically, when user terminal obtains user's check code, both may be used It is obtained with the filename by micro- end log file, the download address of micro- end log file after redirecting can also be passed through Obtained, the present invention to specific acquisition modes without limitation.
Step S130: after the download is complete verifying user's check code according to preset verification rule, when verification at When function, login request message is sent to server.
Wherein, the purpose of verification mainly has two aspects, on the one hand for confirming the legitimacy of user's check code, on the other hand For confirming whether user's check code matches with the user information being locally stored.Those skilled in the art can flexibly set various Rule is verified to realize above-mentioned purpose.
Step S140: the micro- end of login response message automated log on returned according to server.
Wherein, it can be realized the automated log at micro- end by login request message and login response message.It can be seen that In the present invention, user's check code that server is generated according to user information is sent to user terminal verification, to make user Terminal can send login request message to server automatically according to the corresponding user information of user's check code after verifying successfully And then automated log on, thus avoid the cumbersome behaviour that user information and manual entry need to be manually entered by user in the prior art Make, has saved user time.
Below by the specific reality of the automatic logging method at micro- end of two specific embodiment the present invention is described in detail offer Existing details:
Embodiment one,
Fig. 2 shows the flow charts of the automatic logging method at micro- end of the offer of the embodiment of the present invention one.As shown in Fig. 2, should Method specifically includes the following steps:
Step S210: user terminal sends downloading request to server.
Wherein, user terminal includes all kinds of fixed terminals or mobile terminal, wherein fixed terminal includes personal computer Deng mobile terminal includes PAD, mobile phone etc..Types of applications can be run on the subscriber terminal, for example, browser application, game are answered With etc..Wherein, game application further includes platform game, web game, micro- end game etc..For micro- end game, It further include front-end client and back-end services end, wherein front-end client is used to provide the intuitive of interface class for user Operation, back-end services end is used to provide background service for front-end client and support, and carries out necessary communication with server.At this In embodiment, after user terminal opens platform game homepage by chrome browser or red fox browser, can be directed to should Certain game on homepage sends downloading request, to download the corresponding micro- end game of this game.
Step S220: server receives the above-mentioned downloading request that user terminal is sent, and is waited for down according to the downloading request The micro- end log file and user information carried.
Wherein, server refers mainly to WEB server.After server receives above-mentioned downloading request, it is parsed, root Micro- end log file and user information to be downloaded are obtained according to parsing result.Specific acquisition modes can be by those skilled in the art Member's flexibly setting.For example, in the first implementation, text directly can be logged in comprising micro- end to be downloaded in downloading request The identification information and user information of part, server by parsing can be directly obtained the identification information of micro- end log file with And user information.It in the second implementation, can also only include micro- end log file to be downloaded in downloading request Identification information, server get the address information for sending the user terminal that the downloading is requested according to the source address of downloading request, And inquired according to the address information and obtain the relevant information for the game application being currently running on the user terminal, therefrom extract institute The user information needed.When specific implementation, server can obtain user information by Lua language, and not only sentence is succinct for Lua language And performance efficiency, search efficiency can be obviously improved by Lua language.In addition, those skilled in the art are also in addition to Lua language Each speech like sound such as PHP, JAVA can be flexibly selected to obtain user information.
Step S230: server generates user's check code according to above-mentioned user information.
Wherein, user information may include various information.For example, user information includes at least one of following information: Present system time, gaming platform, Game Zone clothes, user identifier and user cookie.It, can when specific generation user's check code To carry out operation to user information according to preset operation rule, user's check code is generated according to operation result.Wherein, operation is advised It then can flexibly be realized by various algorithms, for example, md5 algorithm, SHA algorithm, hash algorithm, RSA Algorithm and DES algorithm etc..
In the present embodiment, it is illustrated by taking md5 algorithm as an example.Cryptographic calculation is carried out to user information by md5 algorithm, Obtain the first operation result.It is under normal conditions 32, in order to improve subsequent processing since the digit of the first operation result is longer Efficiency intercepts presetting digit capacity as the second operation result, and by the second operation knot in the present embodiment from the first operation result Fruit is as user's check code.For example, randomly continuous interception 7 is used as user's check code from 32.By intercepting default position Several modes can significantly shorten subsequent propagation delay time, promote processing speed, certainly, in other embodiments of the invention, Can also be directly using the first operation result as user's check code, or presetting digit capacity is intercepted by other means, for example, except connecting Outside continuous interception numerical digit, one can also be intercepted every several.
In addition, the generated user's check code of the second operation result and server after intercepting in order to prevent repeats, at this In step, it can also further judge whether the second operation result repeats with existing user's check code;If judging result be it is no, Using the second operation result as user's check code;If the determination result is YES, then default position is intercepted again from the first operation result Number, until when the presetting digit capacity that intercepts again and existing user's check code do not repeat, using the presetting digit capacity intercepted again as User's check code.
Optionally, in the present embodiment, in order to effectively avoid interception after the second operation result and existing user verify Code repetition, can preset effective time and/or the effective degree of user's check code, correspondingly, generate user's check code Later, further record user's check code the generation time and/or access times, will generate the time be more than effective time and/or Access times are more than that the state of user's check code of effective degree is set to invalid state.For example, can having user's check code The effect time is set as one minute, and super user's check code is in invalid state later after one minute, can not normal use;It can be with Set the effective degree of user's check code to once, when its using it is primary after then cease to be in force automatically, can not reuse.Thus, it is possible to Enough avoid the polyisomenism between user's check code.
Step S240: server renames micro- end log file to be downloaded according to user's check code, will order again Micro- end log file after name is supplied to user terminal downloads.
Wherein, micro- end log file is often referred to can be used in running micro- client software of specified game.For example, in this reality It applies in example, it is assumed that the file identification for the micro- end log file for including in downloading request is DZZ, can be determined by this document mark Corresponding micro- end log file is micro- client software corresponding to big dominant force game.The raw filename of micro- end log file For DZZ.EXE.In the present embodiment, it is renamed according to user's check code, make user terminal according to renaming after Filename can determine user's check code.When specific implementation, it can be renamed by various modes.In the first realization side In formula, user's check code is directly added to the designated position of raw filename, for example, being added to original document by underscore The end of name, makes raw filename be changed to DZZ_CODE.EXE.In the second implementation, in order to be promoted in transmission process Safety, preset Encryption Algorithm can be carried out to user's check code, and cryptographic calculation result is added to raw filename Designated position.Later, micro- end log file after renaming is supplied to user terminal downloads by server.It specifically, can be with The downloading portal of micro- end log file after renaming is sent to user terminal.
Step S250: user terminal is obtained according to the filename of micro- end log file and is used when downloading micro- end log file Family check code.
Specifically, user terminal downloads micro- end log file by the downloading portal of server feedback.The downloading portal can To be the various forms such as download link, downloading icon.In downloading process or after the completion of downloading, user terminal is logged according to micro- end The filename of file obtains user's check code.Specific acquisition modes depend on the renaming mode in previous step, when using the When a kind of renaming mode, user's check code directly can be obtained by filename;It is right when using second of renaming mode Specific field in filename, which executes preset decipherment algorithm, can obtain user's check code.
In addition, step S250 can be according to pre-set operation logic automatic trigger, for example, can be set to user's end End obtains user's check code automatically before downloading starts;Alternatively, user terminal obtains user's verification automatically in downloading process Code;Alternatively, user terminal obtains user's check code automatically after downloading.In addition, step S250 can also be sent out according to user Operation requests out are triggered, for example, when user double-clicks the micro- end log file downloaded, the front-end customer termination at micro- end The operation requests of the double-click type are received, and the operation requests of the double-click type are passed at the back-end services end at micro- end The filename after renaming is read according to the operation requests of the double-click type and obtains user's verification in the back-end services end of reason, micro- end Code.
Step S260: user terminal verifies user's check code according to preset verification rule.
Wherein, this step can be continuously performed according to the triggering of step S250, that is to say, that no matter step S250 is used Which kind of mode triggers, the automatic trigger step S260 as long as step S250 is finished.Alternatively, this step can also step at micro- end Automatic trigger after record file download, that is to say, that no matter step S250 is triggered using which kind of mode, as long as micro- end logs in text Part downloading finishes then automatic trigger step S260.
Specifically, it can be verified by least one of following rule rule in this step: the first verification rule Are as follows: whether the generation time for judging user's check code is more than preset effective time, if judging result be it is no, verify success; If the determination result is YES, then failure is verified.For example, when preset effective time is 1 minute, if the generation time of user's check code It is super then to verify failure after one minute.Second of verification rule are as follows: whether the access times for judging user's check code are more than preset Effective degree, if judging result be it is no, verify success;If the determination result is YES, then failure is verified.For example, preset ought have When effect number is 1 time, failure was verified as long as user's check code has used.The third verification rule are as follows: according to user information In include user cookie determine corresponding with user cookie user identifier, if it is determined that the user identifier gone out and user's letter The user identifier for including in breath is identical, then verifies success;Conversely, then verifying failure.Above-mentioned three kinds of verification modes both can be independent It uses, can also be used in combination.In addition, those skilled in the art can also flexibly set others in addition to above-mentioned verification mode Verification mode is verified, as long as can determine the validity of user's check code and its matching relationship between user information i.e. It can.
It can be seen that the execution purpose of this step is to determine that the user of user's check code of acquisition and subscriber terminal side believes Whether breath matches, since user's check code is generated according to user information, user can be obtained by user's check code Information, the user information that will acquire are compared the conjunction that can determine user's check code with the user information of subscriber terminal side local Method.
Step S270: when verifying successfully, user terminal sends login request message to server.
Specifically, this step can after verifying successfully automatic trigger.Wherein, it is further included in login request message The user information and/or user's check code stated, so that server determines user to be logged in.
Step S280: server receives the login request message sent after user terminal verifies successfully, according to logging request Message returns to login response message to user terminal.
It wherein, include the logentry information generated according to user information and/or user's check code in login response message, Login can be automatically performed by logentry information.Specifically, server can according to user information and/or user's check code Determine the information such as the current online game name of user to be logged in, Game Zone clothes, gaming platform and user cookie, according to This, server distributes corresponding logentry information, to realize the automated log on of the user.
Step S290: the micro- end of login response message automated log on that user terminal is returned according to server.
When specific implementation, this step can be executed by the micro- end server-side run on user terminal.Micro- end service termination After receiving login response message, automated log on is carried out according to logentry information wherein included.Wherein, logentry information can By be log in link etc. in the form of.
It can be seen that the mode in through the embodiment of the present invention can be realized the automated log at micro- end, user people is eliminated Work inputs the troublesome operation of user information and manual entry, has saved the plenty of time for user, after the completion of avoiding micro- end downloading The phenomenon that leading to customer churn because having no time login generation.
Embodiment two,
Fig. 3 shows the flow chart of the automatic logging method at micro- end provided by Embodiment 2 of the present invention.As shown in figure 3, should Method specifically includes the following steps:
Step S310: user terminal sends downloading request to server.
Wherein, user terminal includes all kinds of fixed terminals or mobile terminal, wherein fixed terminal includes personal computer Deng mobile terminal includes PAD, mobile phone etc..Types of applications can be run on the subscriber terminal, for example, browser application, game are answered With etc..Wherein, game application further includes platform game, web game, micro- end game etc..For micro- end game, It further include front-end client and back-end services end, wherein front-end client is used to provide the intuitive of interface class for user Operation, back-end services end is used to provide background service for front-end client and support, and carries out necessary communication with server.At this It, can be for certain game on the homepage after user terminal opens platform game homepage by IE browser in embodiment Downloading request is sent, to download the corresponding micro- end game of this game.
Step S320: server receives the above-mentioned downloading request that user terminal is sent, and is waited for down according to the downloading request The micro- end log file and user information carried.
Wherein, server refers mainly to WEB server.After server receives above-mentioned downloading request, it is parsed, root Micro- end log file and user information to be downloaded are obtained according to parsing result.Specific acquisition modes can be by those skilled in the art Member's flexibly setting.For example, in the first implementation, text directly can be logged in comprising micro- end to be downloaded in downloading request The identification information and user information of part, server by parsing can be directly obtained the identification information of micro- end log file with And user information.It in the second implementation, can also only include micro- end log file to be downloaded in downloading request Identification information, server get the address information for sending the user terminal that the downloading is requested according to the source address of downloading request, And inquired according to the address information and obtain the relevant information for the game application being currently running on the user terminal, therefrom extract institute The user information needed.When specific implementation, server can obtain user information by Lua language, and not only sentence is succinct for Lua language And performance efficiency, search efficiency can be obviously improved by Lua language.In addition, those skilled in the art are also in addition to Lua language Each speech like sound such as PHP, JAVA can be flexibly selected to obtain user information.
Step S330: server generates user's check code according to above-mentioned user information.
Wherein, user information may include various information.For example, user information includes at least one of following information: Present system time, gaming platform, Game Zone clothes, user identifier and user cookie.It, can when specific generation user's check code To carry out operation to user information according to preset operation rule, user's check code is generated according to operation result.Wherein, operation is advised It then can flexibly be realized by various algorithms, for example, md5 algorithm, SHA algorithm, hash algorithm, RSA Algorithm and DES algorithm etc..
In the present embodiment, it is illustrated by taking md5 algorithm as an example.Cryptographic calculation is carried out to user information by md5 algorithm, Obtain the first operation result.It is under normal conditions 32, in order to improve subsequent processing since the digit of the first operation result is longer Efficiency intercepts presetting digit capacity as the second operation result, and by the second operation knot in the present embodiment from the first operation result Fruit is as user's check code.For example, randomly continuous interception 7 is used as user's check code from 32.By intercepting default position Several modes can significantly shorten subsequent propagation delay time, promote processing speed, certainly, in other embodiments of the invention, Can also be directly using the first operation result as user's check code, or presetting digit capacity is intercepted by other means, for example, except connecting Outside continuous interception numerical digit, one can also be intercepted every several.
In addition, the generated user's check code of the second operation result and server after intercepting in order to prevent repeats, at this In step, it can also further judge whether the second operation result repeats with existing user's check code;If judging result be it is no, Using the second operation result as user's check code;If the determination result is YES, then default position is intercepted again from the first operation result Number, until when the presetting digit capacity that intercepts again and existing user's check code do not repeat, using the presetting digit capacity intercepted again as User's check code.
Optionally, in the present embodiment, in order to effectively avoid interception after the second operation result and existing user verify Code repetition, can preset effective time and/or the effective degree of user's check code, correspondingly, generate user's check code Later, further record user's check code the generation time and/or access times, will generate the time be more than effective time and/or Access times are more than that the state of user's check code of effective degree is set to invalid state.For example, can having user's check code The effect time is set as one minute, and super user's check code is in invalid state later after one minute, can not normal use;It can be with Set the effective degree of user's check code to once, when its using it is primary after then cease to be in force automatically, can not reuse.Thus, it is possible to Enough avoid the polyisomenism between user's check code.
Step S340: server is carried out according to download address of the above-mentioned user's check code to micro- end log file to be downloaded It redirects, makes in the download address after redirecting comprising above-mentioned user's check code.
When specific implementation, redirection operation can be realized in the following way: firstly, in micro- end log file to be downloaded Checking parameter field is added in download address, sets the value for verifying parameter field to the value of user's check code.Wherein, verification ginseng Any position in download address can be set in digital section, for example, the end of download address is arranged in.Then, pass through the page The mode of jumping jumps the download address of micro- end log file to be downloaded for the download address after addition checking parameter field.Tool When body jumps, mode can be jumped by 302 and be jumped.Wherein, it 302 jumps also to cry and temporarily jumps, when being jumped using 302, User terminal can request download address twice, download address request for the first time be do not include checking parameter field it is original under Set address, second of download address requested is the redirection download address containing checking parameter field, also, due to 302 It jumps temporarily to jump, therefore search engine will not be stored to download address is redirected.It is generated every time due to server User's check code is different, and therefore, the redirect address executed when redirecting operation every time is also different, therefore, uses 302 sides of jumping Formula can complete interim redirection operation, the use being particularly suitable in the present invention under the premise of not changing original download address The application scenarios that family check code dynamic changes.Certainly, in addition to 302 jump mode, other page jump modes can also be applied In the present invention.
Step S350: user terminal is when downloading micro- end log file, according under micro- end log file after redirection The checking parameter field for including in set address obtains user's check code.
Specifically, user terminal downloads micro- end log file by the download address of server feedback.Due to the downloading Location has carried out re-orientation processes, therefore, user terminal need to server request twice, for the first time to server request it is original under Set address requests to redirect download address to server according to redirection instruction for the second time.In downloading process or downloading is completed Afterwards, user terminal obtains user's check code according to the checking parameter field for including in download address is redirected.In addition, step S350 It can be obtained automatically in downloading process according to pre-set operation logic automatic trigger for example, can be set to user terminal Take family check code;Alternatively, user terminal obtains user's check code automatically after downloading.In addition, due to the present embodiment master To be applied to IE browser, and the kernel of IE browser is different from the kernel of chrome browser or red fox browser, therefore, leads to The file type for crossing micro- end log file that IE browser downloads to is usually .application type, is different from embodiment The file type of the entitled .exe of suffix in one.The file of the .application type downloaded to by IE browser does not need User executes double click operation can automatic running.Therefore, different from the step S250 in embodiment one, the step in the present embodiment S350 is typically without to be triggered according to the operation requests that user issues.
Step S360: user terminal verifies user's check code according to preset verification rule.
Wherein, this step can be continuously performed according to the triggering of step S350, that is to say, that no matter step S350 is used Which kind of mode triggers, the automatic trigger step S360 as long as step S350 is finished.Alternatively, this step can also step at micro- end Automatic trigger after record file download, that is to say, that no matter step S350 is triggered using which kind of mode, as long as micro- end logs in text Part downloading finishes then automatic trigger step S360.
Specifically, it can be verified by least one of following rule rule in this step: the first verification rule Are as follows: whether the generation time for judging user's check code is more than preset effective time, if judging result be it is no, verify success; If the determination result is YES, then failure is verified.For example, when preset effective time is 1 minute, if the generation time of user's check code It is super then to verify failure after one minute.Second of verification rule are as follows: whether the access times for judging user's check code are more than preset Effective degree, if judging result be it is no, verify success;If the determination result is YES, then failure is verified.For example, preset ought have When effect number is 1 time, failure was verified as long as user's check code has used.The third verification rule are as follows: according to user information In include user cookie determine corresponding with user cookie user identifier, if it is determined that the user identifier gone out and user's letter The user identifier for including in breath is identical, then verifies success;Conversely, then verifying failure.Above-mentioned three kinds of verification modes both can be independent It uses, can also be used in combination.In addition, those skilled in the art can also flexibly set others in addition to above-mentioned verification mode Verification mode is verified, as long as can determine the validity of user's check code and its matching relationship between user information i.e. It can.
It can be seen that the execution purpose of this step is to determine that the user of user's check code of acquisition and subscriber terminal side believes Whether breath matches, since user's check code is generated according to user information, user can be obtained by user's check code Information, the user information that will acquire are compared the conjunction that can determine user's check code with the user information of subscriber terminal side local Method.
Step S370: when verifying successfully, user terminal sends login request message to server.
Specifically, this step can after verifying successfully automatic trigger.Wherein, it is further included in login request message The user information and/or user's check code stated, so that server determines user to be logged in.
Step S380: server receives the login request message sent after user terminal verifies successfully, according to logging request Message returns to login response message to user terminal.
It wherein, include the logentry information generated according to user information and/or user's check code in login response message, Login can be automatically performed by logentry information.Specifically, server can according to user information and/or user's check code Determine the information such as the current online game name of user to be logged in, Game Zone clothes, gaming platform and user cookie, according to This, server distributes corresponding logentry information, to realize the automated log on of the user.
Step S390: the micro- end of login response message automated log on that user terminal is returned according to server.
When specific implementation, this step can be executed by the micro- end server-side run on user terminal.Micro- end service termination After receiving login response message, automated log on is carried out according to logentry information wherein included.Wherein, logentry information can By be log in link etc. in the form of.
It can be seen that the mode in through the embodiment of the present invention, on the one hand, can be generated by server for verification On the other hand user's check code can complete the verification of user information by micro- end server-side on user terminal, and verifying It is automatically requested to server for logging in the logentry information of micro- end game after, to realize stepping on automatically for micro- end Record, eliminates the troublesome operation that user information and manual entry is manually entered in user, has saved the plenty of time for user, has avoided The phenomenon that leading to customer churn because having no time login after the completion of micro- end downloading generation.
In addition, it will be appreciated to those of skill in the art that in above-described embodiment one and embodiment two, user terminal institute The operations of execution, for example, send downloading request, user's check code is verified and is sent login request message and from It is dynamic to complete login etc., it is all to be realized by means of micro- end server-side, micro- end server-side is in addition to can integrate in user terminal sheet Except ground, it is highly preferred that the accuracy and efficiency of verification is promoted for the ease of being managed collectively to each micro- end client, Micro- end server-side can also be realized by one or more individual network server.
In addition, the above embodiments one are mainly used in chrome browser or red fox browser, both browsers Common trait is: micro- end log file of downloading is usually the file of .exe format, also, after the download is complete, need to by with Micro- end log file is double-clicked to trigger the automated log at micro- end in family, therefore, in example 1, by micro- end log file into The mode of row renaming obtains micro- end log file automatically when receiving the operation requests for double-clicking type and verifies user's verification Code, to realize the effect of automated log on after verification passes through.
The above embodiments two are mainly used in IE browser, and the micro- end log file downloaded by the browser is usual For the file of .application format, also, after the download is complete, IE browser can micro- end for having downloaded of automatic running step on File is recorded, executes double click operation without user, the above-mentioned characteristic based on IE browser, embodiment two is under micro- end log file Set address redirects, so that user terminal obtains user's check code by the download address after redirecting in downloading process And it is verified automatically.
In addition to above-mentioned several browsers, present invention can also apply to other all kinds of browsers, and according to browser Characteristic accordingly adjust the realization details in above-described embodiment, send user's check code to user as long as can be realized server Terminal, the purpose verified for user terminal.In addition, in order to enable the invention to be compatible with various types of browsings Device, the present invention can also further include following embodiments three, so that above-described embodiment one and embodiment two are combined, tool Body, in the third embodiment, the step S210 to step S230 in above-described embodiment one is first carried out, then, server judgement The core type of the browser of subscriber terminal side, if it is judged that the first kind (the i.e. chrome class of the core type of browser Type or red fox type), then execute the step S240 to step S290 in embodiment one;If it is judged that the core type of browser Second Type (i.e. IE type), then execute the step S340 to step S390 in embodiment two.It can be seen that implementing three In, the operating procedure for judging browser kernel type is increased, so as to be flexibly applied to various types of browsers.
Fig. 4 show another embodiment of the present invention provides micro- end automatic login device structure chart.As shown in figure 4, The device includes:
Sending module 41 is suitable for sending downloading request to server, so that the server is obtained according to downloading request Take micro- end log file and user information to be downloaded;
Module 42 is obtained, is suitable for when downloading micro- end log file, is obtained the server and believed according to the user Cease the user's check code generated;
Correction verification module 43, suitable for carrying out school to user's check code according to preset verification rule after the download is complete It tests, when verifying successfully, sends login request message to server;
Login module 44, suitable for the micro- end of login response message automated log on returned according to server.
Optionally, the acquisition module 42 is specifically used for: obtaining user school according to the filename of micro- end log file Test code.
Optionally, the downloading request and the login request message are by chrome browser or red fox browser The request message of transmission.
Optionally, the acquisition module 42 is specifically used for: according in the download address of micro- end log file after redirection The checking parameter field for including obtains user's check code.
Optionally, the downloading request and the login request message are the request messages sent by IE browser.
Optionally, the user information includes at least one in following information: present system time, gaming platform, trip Play area's clothes, user identifier and user cookie.
Optionally, the preset verification rule includes at least one of following rule:
Whether the generation time for judging user's check code is more than preset effective time, if judging result be it is no, verify Success;If the determination result is YES, then failure is verified;
Whether the access times for judging user's check code are more than preset effective degree, if judging result be it is no, verify Success;If the determination result is YES, then failure is verified;
User identifier corresponding with the user cookie is determined according to the user cookie for including in user information, if The user identifier for including in the corresponding user identifier of user cookie and the user information is identical, then verifies success;Instead It, then verify failure.
Optionally, include the user information and/or user's check code in the login request message, and described step on Record the logentry information in response message comprising generating according to the user information and/or user's check code.
The specific structure and working principle of above-mentioned modules can refer to the description of corresponding steps in embodiment of the method, herein It repeats no more.
In conclusion in the automatic logging method and device at micro- end provided by the invention, firstly, server being capable of basis The downloading request that user terminal is sent to user information and accordingly generates user's check code, then, can be in user terminal It downloads and user's check code is supplied to user terminal during micro- end log file, so that user terminal is according to the user school It tests code to verify user information, and sends login request message from trend server after verifying successfully to be stepped on Record.It can be seen that in the present invention, user's check code that server is generated according to user information is sent to user terminal school It tests, so that user terminal be enable to send automatically according to the corresponding user information of user's check code to server after verifying successfully Login request message and then automated log on, thus avoid user information need to being manually entered by user in the prior art and manually step on The troublesome operation of record, has saved user time.
Algorithm and display are not inherently related to any particular computer, virtual system, or other device provided herein. Various general-purpose systems can also be used together with teachings based herein.As described above, it constructs required by this kind of system Structure be obvious.In addition, the present invention is also not directed to any particular programming language.It should be understood that can use various Programming language realizes summary of the invention described herein, and the description done above to language-specific is to disclose this hair Bright preferred forms.
In the instructions provided here, numerous specific details are set forth.It is to be appreciated, however, that implementation of the invention Example can be practiced without these specific details.In some instances, well known method, structure is not been shown in detail And technology, so as not to obscure the understanding of this specification.
Similarly, it should be understood that in order to simplify the disclosure and help to understand one or more of the various inventive aspects, Above in the description of exemplary embodiment of the present invention, each feature of the invention is grouped together into single implementation sometimes In example, figure or descriptions thereof.However, the disclosed method should not be interpreted as reflecting the following intention: i.e. required to protect Shield the present invention claims features more more than feature expressly recited in each claim.More precisely, as following Claims reflect as, inventive aspect is all features less than single embodiment disclosed above.Therefore, Thus the claims for following specific embodiment are expressly incorporated in the specific embodiment, wherein each claim itself All as a separate embodiment of the present invention.
Those skilled in the art will understand that can be carried out adaptively to the module in the equipment in embodiment Change and they are arranged in one or more devices different from this embodiment.It can be the module or list in embodiment Member or component are combined into a module or unit or component, and furthermore they can be divided into multiple submodule or subelement or Sub-component.Other than such feature and/or at least some of process or unit exclude each other, it can use any Combination is to all features disclosed in this specification (including adjoint claim, abstract and attached drawing) and so disclosed All process or units of what method or apparatus are combined.Unless expressly stated otherwise, this specification is (including adjoint power Benefit require, abstract and attached drawing) disclosed in each feature can carry out generation with an alternative feature that provides the same, equivalent, or similar purpose It replaces.
In addition, it will be appreciated by those of skill in the art that although some embodiments in this include institute in other embodiments Including certain features rather than other feature, but the combination of the feature of different embodiment means in the scope of the present invention Within and form different embodiments.For example, in the following claims, embodiment claimed it is any it One can in any combination mode come using.
Various component embodiments of the invention can be implemented in hardware, or to run on one or more processors Software module realize, or be implemented in a combination thereof.It will be understood by those of skill in the art that can be used in practice Microprocessor or digital signal processor (DSP) realize some or all portions in device according to an embodiment of the present invention The some or all functions of part.The present invention is also implemented as a part or complete for executing method as described herein The device or device program (for example, computer program and computer program product) in portion.It is such to realize program of the invention It can store on a computer-readable medium, or may be in the form of one or more signals.Such signal can be with It downloads from internet website, is perhaps provided on the carrier signal or is provided in any other form.
The invention discloses A1, a kind of automatic logging method at micro- end, comprising:
Downloading request is sent to server, so that the server is stepped on according to the downloading request micro- end to be downloaded Record file and user information;
When downloading micro- end log file, obtains the server and verified according to the user that the user information generates Code;
User's check code is verified according to preset verification rule after the download is complete, when verifying successfully, Login request message is sent to server;
The micro- end of login response message automated log on returned according to server.
A2, method according to a1, wherein the user for obtaining the server and being generated according to the user information The step of check code, specifically includes: obtaining user's check code according to the filename of micro- end log file.
A3, the method according to A2, wherein the downloading request and the login request message are clear by chrome Looking at device or red fox browser sends.
A4, method according to a1, wherein the user for obtaining the server and being generated according to the user information The step of check code, specifically includes: according to the checking parameter field for including in the download address of micro- end log file after redirection Obtain user's check code.
A5, method according to a4, wherein the downloading request and the login request message pass through IE browser It sends.
A6, according to any method of A1-5, wherein the user information include in following information at least one of: Present system time, gaming platform, Game Zone clothes, user identifier and user cookie.
A7, the method according to A6, wherein the preset verification rule includes at least one of following rule:
Whether the generation time for judging user's check code is more than preset effective time, if judging result be it is no, verify Success;If the determination result is YES, then failure is verified;
Whether the access times for judging user's check code are more than preset effective degree, if judging result be it is no, verify Success;If the determination result is YES, then failure is verified;
User identifier corresponding with the user cookie is determined according to the user cookie for including in user information, if The user identifier for including in the corresponding user identifier of user cookie and the user information is identical, then verifies success;Instead It, then verify failure.
A8, according to any method of A1-7, wherein in the login request message comprising the user information and/ Or user's check code, and comprising according to the user information and/or user's check code in the login response message The logentry information of generation.
B9, a kind of automatic login device at micro- end, comprising:
Sending module is suitable for sending downloading request to server, so that the server is according to the downloading request Micro- end log file to be downloaded and user information;
Module is obtained, is suitable for when downloading micro- end log file, obtains the server according to the user information User's check code of generation;
Correction verification module, suitable for being verified after the download is complete according to preset verification rule to user's check code, When verifying successfully, login request message is sent to server;
Login module, suitable for the micro- end of login response message automated log on returned according to server.
B10, the device according to B9, wherein the acquisition module is specifically used for: according to micro- end log file Filename obtains user's check code.
B11, device according to b10, wherein the downloading is requested and the login request message is to pass through The request message that chrome browser or red fox browser are sent.
B12, the device according to B9, wherein the module that obtains is specifically used for: being logged according to micro- end after redirection The checking parameter field for including in the download address of file obtains user's check code.
B13, device according to b12, wherein the downloading is requested and the login request message is clear by IE The request message that device of looking at is sent.
B14, according to any device of B9-13, wherein the user information includes at least one in following information : present system time, gaming platform, Game Zone clothes, user identifier and user cookie.
B15, device according to b14, wherein the preset verification rule includes at least one in following rule It is a:
Whether the generation time for judging user's check code is more than preset effective time, if judging result be it is no, verify Success;If the determination result is YES, then failure is verified;
Whether the access times for judging user's check code are more than preset effective degree, if judging result be it is no, verify Success;If the determination result is YES, then failure is verified;
User identifier corresponding with the user cookie is determined according to the user cookie for including in user information, if The user identifier for including in the corresponding user identifier of user cookie and the user information is identical, then verifies success;Instead It, then verify failure.
B16, according to any device of B9-15, wherein include the user information in the login request message And/or user's check code, and comprising being verified according to the user information and/or the user in the login response message The logentry information that code generates.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and ability Field technique personnel can be designed alternative embodiment without departing from the scope of the appended claims.In the claims, Any reference symbol between parentheses should not be configured to limitations on claims.Word "comprising" does not exclude the presence of not Element or step listed in the claims.Word "a" or "an" located in front of the element does not exclude the presence of multiple such Element.The present invention can be by means of including the hardware of several different elements and being come by means of properly programmed computer real It is existing.In the unit claims listing several devices, several in these devices can be through the same hardware branch To embody.The use of word first, second, and third does not indicate any sequence.These words can be explained and be run after fame Claim.

Claims (16)

1. a kind of automatic logging method at micro- end, comprising:
Downloading request is sent to server, so that the server logs in text according to the downloading request micro- end to be downloaded Part and user information;Wherein, server is believed by the user that stipulated form is read at the user terminal for sending downloading request Breath;
When downloading micro- end log file, user's check code that the server is generated according to the user information is obtained; Wherein, server carries out cryptographic calculation to user information by md5 algorithm, the first operation result is obtained, from the first operation result Middle interception presetting digit capacity judges whether the second operation result repeats with existing user's check code as the second operation result;If Judging result be it is no, using the second operation result as user's check code;If the determination result is YES, then heavy from the first operation result New interception presetting digit capacity, until when the presetting digit capacity intercepted again and existing user's check code do not repeat, by what is intercepted again Presetting digit capacity is as user's check code;Wherein, effective time and/or the effective degree for presetting user's check code, are generating After user's check code, generation time and/or the access times of user's check code are further recorded, it is more than effective for generating the time Time and/or access times are more than that the state of user's check code of effective degree is set to invalid state;
User's check code is verified according to preset verification rule after the download is complete, when verifying successfully, to clothes Business device sends login request message;
The micro- end of login response message automated log on returned according to server.
2. according to the method described in claim 1, wherein, the use for obtaining the server and being generated according to the user information The step of family check code, specifically includes: obtaining user's check code according to the filename of micro- end log file.
3. according to the method described in claim 2, wherein, the downloading request and the login request message pass through chrome Browser or red fox browser are sent.
4. according to the method described in claim 1, wherein, the use for obtaining the server and being generated according to the user information The step of family check code, specifically includes: according to the checking parameter word for including in the download address of micro- end log file after redirection Section obtains user's check code.
5. according to the method described in claim 4, wherein, the downloading request and the login request message are browsed by IE Device is sent.
6. -5 any method according to claim 1, wherein the user information includes at least one in following information : present system time, gaming platform, Game Zone clothes, user identifier and user cookie.
7. according to the method described in claim 6, wherein, the preset verification rule includes at least one in following rule It is a:
Whether the generation time for judging user's check code is more than preset effective time, if judging result be it is no, verify success; If the determination result is YES, then failure is verified;
Whether the access times for judging user's check code are more than preset effective degree, if judging result be it is no, verify success; If the determination result is YES, then failure is verified.
8. -5 any method according to claim 1, wherein include the user information in the login request message And/or user's check code, and comprising being verified according to the user information and/or the user in the login response message The logentry information that code generates.
9. a kind of automatic login device at micro- end, comprising:
Sending module is suitable for sending downloading request to server, so that the server waits for down according to the downloading request The micro- end log file and user information carried;Wherein, server reads the user for sending downloading request by stipulated form User information at terminal;
Module is obtained, is suitable for when downloading micro- end log file, is obtained the server and generated according to the user information User's check code;Wherein, server carries out cryptographic calculation to user information by md5 algorithm, obtains the first operation result, from Presetting digit capacity is intercepted in first operation result as the second operation result, judge the second operation result whether with existing user school Test code repetition;If judging result be it is no, using the second operation result as user's check code;If the determination result is YES, then from first Again presetting digit capacity is intercepted in operation result, until when the presetting digit capacity intercepted again and existing user's check code do not repeat, Using the presetting digit capacity intercepted again as user's check code;Wherein, preset user's check code effective time and/or effectively Number further records generation time and/or the access times of user's check code, will generate after generating user's check code Time is set to invalid state more than the state of user's check code of effective degree more than effective time and/or access times;Verification Module, suitable for being verified after the download is complete according to preset verification rule to user's check code, when verifying successfully, Login request message is sent to server;
Login module, suitable for the micro- end of login response message automated log on returned according to server.
10. device according to claim 9, wherein the acquisition module is specifically used for: according to micro- end log file Filename obtain user's check code.
11. device according to claim 10, wherein the downloading is requested and the login request message is to pass through The request message that chrome browser or red fox browser are sent.
12. device according to claim 9, wherein the acquisition module is specifically used for: being stepped on according to micro- end after redirection It records the checking parameter field for including in the download address of file and obtains user's check code.
13. device according to claim 12, wherein the downloading is requested and the login request message is to pass through IE The request message that browser is sent.
14. according to any device of claim 9-13, wherein the user information includes at least one in following information : present system time, gaming platform, Game Zone clothes, user identifier and user cookie.
15. device according to claim 14, wherein the preset verification rule includes at least one in following rule It is a:
Whether the generation time for judging user's check code is more than preset effective time, if judging result be it is no, verify success; If the determination result is YES, then failure is verified;
Whether the access times for judging user's check code are more than preset effective degree, if judging result be it is no, verify success; If the determination result is YES, then failure is verified.
16. according to any device of claim 9-13, wherein include the user information in the login request message And/or user's check code, and comprising being verified according to the user information and/or the user in the login response message The logentry information that code generates.
CN201610440211.6A 2016-06-17 2016-06-17 The automatic logging method and device at micro- end Active CN105871927B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201610440211.6A CN105871927B (en) 2016-06-17 2016-06-17 The automatic logging method and device at micro- end
PCT/CN2017/088692 WO2017215650A1 (en) 2016-06-17 2017-06-16 Automatic login method and device for micro-game client, program, and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610440211.6A CN105871927B (en) 2016-06-17 2016-06-17 The automatic logging method and device at micro- end

Publications (2)

Publication Number Publication Date
CN105871927A CN105871927A (en) 2016-08-17
CN105871927B true CN105871927B (en) 2019-09-06

Family

ID=56650879

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610440211.6A Active CN105871927B (en) 2016-06-17 2016-06-17 The automatic logging method and device at micro- end

Country Status (1)

Country Link
CN (1) CN105871927B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017215650A1 (en) * 2016-06-17 2017-12-21 北京奇虎科技有限公司 Automatic login method and device for micro-game client, program, and medium
CN110141866A (en) * 2018-02-13 2019-08-20 网易(杭州)网络有限公司 Game login method and device

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6963908B1 (en) * 2000-03-29 2005-11-08 Symantec Corporation System for transferring customized hardware and software settings from one computer to another computer to provide personalized operating environments
CN102413238A (en) * 2011-11-15 2012-04-11 毛诗超 Method for installing client software on mobile terminal and system thereof
CN103179134A (en) * 2013-04-19 2013-06-26 中国建设银行股份有限公司 Single sign on method and system based on Cookie and application server thereof
CN103327115A (en) * 2013-07-05 2013-09-25 百度在线网络技术(北京)有限公司 Entry control method and device of application program
CN103647695A (en) * 2013-10-31 2014-03-19 北京奇虎科技有限公司 Client application program user registration method, mobile terminal and server
CN104158896A (en) * 2014-08-22 2014-11-19 百度在线网络技术(北京)有限公司 Application recommendation method and system as well as application store server
CN104298533A (en) * 2014-11-06 2015-01-21 北京奇虎科技有限公司 Method, device and equipment for customizing software installation package
CN104468637A (en) * 2013-09-12 2015-03-25 阿里巴巴集团控股有限公司 Method and equipment for downloading and installing client
CN104503784A (en) * 2014-12-16 2015-04-08 珠海金山网络游戏科技有限公司 Method and system for controlling micro-client downloading by using script
CN105592065A (en) * 2015-11-05 2016-05-18 中国银联股份有限公司 Method and system for website registration on the basis of mobile phone message

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU3527200A (en) * 1999-03-12 2000-09-28 Sun Microsystems, Inc. Resource locator
BRPI0621455A2 (en) * 2006-03-09 2011-12-13 Vasco Data Security Inc system and methods of user authentication and implemented by server

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6963908B1 (en) * 2000-03-29 2005-11-08 Symantec Corporation System for transferring customized hardware and software settings from one computer to another computer to provide personalized operating environments
CN102413238A (en) * 2011-11-15 2012-04-11 毛诗超 Method for installing client software on mobile terminal and system thereof
CN103179134A (en) * 2013-04-19 2013-06-26 中国建设银行股份有限公司 Single sign on method and system based on Cookie and application server thereof
CN103327115A (en) * 2013-07-05 2013-09-25 百度在线网络技术(北京)有限公司 Entry control method and device of application program
CN104468637A (en) * 2013-09-12 2015-03-25 阿里巴巴集团控股有限公司 Method and equipment for downloading and installing client
CN103647695A (en) * 2013-10-31 2014-03-19 北京奇虎科技有限公司 Client application program user registration method, mobile terminal and server
CN104158896A (en) * 2014-08-22 2014-11-19 百度在线网络技术(北京)有限公司 Application recommendation method and system as well as application store server
CN104298533A (en) * 2014-11-06 2015-01-21 北京奇虎科技有限公司 Method, device and equipment for customizing software installation package
CN104503784A (en) * 2014-12-16 2015-04-08 珠海金山网络游戏科技有限公司 Method and system for controlling micro-client downloading by using script
CN105592065A (en) * 2015-11-05 2016-05-18 中国银联股份有限公司 Method and system for website registration on the basis of mobile phone message

Also Published As

Publication number Publication date
CN105871927A (en) 2016-08-17

Similar Documents

Publication Publication Date Title
US11307969B2 (en) Methods for improved web application testing using remote headless browsers and devices thereof
CN105337990B (en) The method of calibration and device of user identity
KR102244281B1 (en) Kernel module loading method and device
CN108897691A (en) Data processing method, device, server and medium based on interface analog service
KR102600025B1 (en) Distributing shaders between client machines for precaching
CN104519050B (en) Login method and login system
CN105635178B (en) Ensure the block type Network Access Method and device of safety
US20030182408A1 (en) Load test system for a server and method of use
US11726800B2 (en) Remote component loader
CN105095367B (en) A kind of acquisition method and device of client data
CN105204917B (en) The method and device of loading configuration file in application program launching
CN109492181A (en) Method for page jump, device, computer equipment and storage medium
CN110012096A (en) Mobile client service updates management method, apparatus and system
CN113449022A (en) Method and device for processing service request
CN105871927B (en) The automatic logging method and device at micro- end
CN106161429B (en) The automatic logging method and device at micro- end
CN106130964B (en) The automatic logging method and device at micro- end
CN105959280B (en) The hold-up interception method and device of malice network address
CN107315677B (en) Method and device for judging abnormity of application program
CN108337227B (en) Method and middleware based on OpenID account login application program
WO2017215650A1 (en) Automatic login method and device for micro-game client, program, and medium
CN107247661B (en) Method and system for supporting automatic verification of installation package of application
Kholodkov Nginx Essentials
CN111338928A (en) Chrome-based browser testing method and device
CN110708199A (en) Method, device, electronic equipment and medium for upgrading terminal equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20220726

Address after: 300450 No. 9-3-401, No. 39, Gaoxin 6th Road, Binhai Science Park, Binhai New Area, Tianjin

Patentee after: 3600 Technology Group Co.,Ltd.

Address before: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park)

Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Patentee before: Qizhi software (Beijing) Co.,Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20230712

Address after: 1765, floor 17, floor 15, building 3, No. 10 Jiuxianqiao Road, Chaoyang District, Beijing 100015

Patentee after: Beijing Hongxiang Technical Service Co.,Ltd.

Address before: 300450 No. 9-3-401, No. 39, Gaoxin 6th Road, Binhai Science Park, Binhai New Area, Tianjin

Patentee before: 3600 Technology Group Co.,Ltd.