Embodiment one,
Fig. 2 shows the flow charts of the automatic logging method at micro- end of the offer of the embodiment of the present invention one.As shown in Fig. 2, should
Method specifically includes the following steps:
Step S210: user terminal sends downloading request to server.
Wherein, user terminal includes all kinds of fixed terminals or mobile terminal, wherein fixed terminal includes personal computer
Deng mobile terminal includes PAD, mobile phone etc..Types of applications can be run on the subscriber terminal, for example, browser application, game are answered
With etc..Wherein, game application further includes platform game, web game, micro- end game etc..For micro- end game,
It further include front-end client and back-end services end, wherein front-end client is used to provide the intuitive of interface class for user
Operation, back-end services end is used to provide background service for front-end client and support, and carries out necessary communication with server.At this
In embodiment, after user terminal opens platform game homepage by chrome browser or red fox browser, can be directed to should
Certain game on homepage sends downloading request, to download the corresponding micro- end game of this game.
Step S220: server receives the above-mentioned downloading request that user terminal is sent, and is waited for down according to the downloading request
The micro- end log file and user information carried.
Wherein, server refers mainly to WEB server.After server receives above-mentioned downloading request, it is parsed, root
Micro- end log file and user information to be downloaded are obtained according to parsing result.Specific acquisition modes can be by those skilled in the art
Member's flexibly setting.For example, in the first implementation, text directly can be logged in comprising micro- end to be downloaded in downloading request
The identification information and user information of part, server by parsing can be directly obtained the identification information of micro- end log file with
And user information.It in the second implementation, can also only include micro- end log file to be downloaded in downloading request
Identification information, server get the address information for sending the user terminal that the downloading is requested according to the source address of downloading request,
And inquired according to the address information and obtain the relevant information for the game application being currently running on the user terminal, therefrom extract institute
The user information needed.When specific implementation, server can obtain user information by Lua language, and not only sentence is succinct for Lua language
And performance efficiency, search efficiency can be obviously improved by Lua language.In addition, those skilled in the art are also in addition to Lua language
Each speech like sound such as PHP, JAVA can be flexibly selected to obtain user information.
Step S230: server generates user's check code according to above-mentioned user information.
Wherein, user information may include various information.For example, user information includes at least one of following information:
Present system time, gaming platform, Game Zone clothes, user identifier and user cookie.It, can when specific generation user's check code
To carry out operation to user information according to preset operation rule, user's check code is generated according to operation result.Wherein, operation is advised
It then can flexibly be realized by various algorithms, for example, md5 algorithm, SHA algorithm, hash algorithm, RSA Algorithm and DES algorithm etc..
In the present embodiment, it is illustrated by taking md5 algorithm as an example.Cryptographic calculation is carried out to user information by md5 algorithm,
Obtain the first operation result.It is under normal conditions 32, in order to improve subsequent processing since the digit of the first operation result is longer
Efficiency intercepts presetting digit capacity as the second operation result, and by the second operation knot in the present embodiment from the first operation result
Fruit is as user's check code.For example, randomly continuous interception 7 is used as user's check code from 32.By intercepting default position
Several modes can significantly shorten subsequent propagation delay time, promote processing speed, certainly, in other embodiments of the invention,
Can also be directly using the first operation result as user's check code, or presetting digit capacity is intercepted by other means, for example, except connecting
Outside continuous interception numerical digit, one can also be intercepted every several.
In addition, the generated user's check code of the second operation result and server after intercepting in order to prevent repeats, at this
In step, it can also further judge whether the second operation result repeats with existing user's check code;If judging result be it is no,
Using the second operation result as user's check code;If the determination result is YES, then default position is intercepted again from the first operation result
Number, until when the presetting digit capacity that intercepts again and existing user's check code do not repeat, using the presetting digit capacity intercepted again as
User's check code.
Optionally, in the present embodiment, in order to effectively avoid interception after the second operation result and existing user verify
Code repetition, can preset effective time and/or the effective degree of user's check code, correspondingly, generate user's check code
Later, further record user's check code the generation time and/or access times, will generate the time be more than effective time and/or
Access times are more than that the state of user's check code of effective degree is set to invalid state.For example, can having user's check code
The effect time is set as one minute, and super user's check code is in invalid state later after one minute, can not normal use;It can be with
Set the effective degree of user's check code to once, when its using it is primary after then cease to be in force automatically, can not reuse.Thus, it is possible to
Enough avoid the polyisomenism between user's check code.
Step S240: server renames micro- end log file to be downloaded according to user's check code, will order again
Micro- end log file after name is supplied to user terminal downloads.
Wherein, micro- end log file is often referred to can be used in running micro- client software of specified game.For example, in this reality
It applies in example, it is assumed that the file identification for the micro- end log file for including in downloading request is DZZ, can be determined by this document mark
Corresponding micro- end log file is micro- client software corresponding to big dominant force game.The raw filename of micro- end log file
For DZZ.EXE.In the present embodiment, it is renamed according to user's check code, make user terminal according to renaming after
Filename can determine user's check code.When specific implementation, it can be renamed by various modes.In the first realization side
In formula, user's check code is directly added to the designated position of raw filename, for example, being added to original document by underscore
The end of name, makes raw filename be changed to DZZ_CODE.EXE.In the second implementation, in order to be promoted in transmission process
Safety, preset Encryption Algorithm can be carried out to user's check code, and cryptographic calculation result is added to raw filename
Designated position.Later, micro- end log file after renaming is supplied to user terminal downloads by server.It specifically, can be with
The downloading portal of micro- end log file after renaming is sent to user terminal.
Step S250: user terminal is obtained according to the filename of micro- end log file and is used when downloading micro- end log file
Family check code.
Specifically, user terminal downloads micro- end log file by the downloading portal of server feedback.The downloading portal can
To be the various forms such as download link, downloading icon.In downloading process or after the completion of downloading, user terminal is logged according to micro- end
The filename of file obtains user's check code.Specific acquisition modes depend on the renaming mode in previous step, when using the
When a kind of renaming mode, user's check code directly can be obtained by filename;It is right when using second of renaming mode
Specific field in filename, which executes preset decipherment algorithm, can obtain user's check code.
In addition, step S250 can be according to pre-set operation logic automatic trigger, for example, can be set to user's end
End obtains user's check code automatically before downloading starts;Alternatively, user terminal obtains user's verification automatically in downloading process
Code;Alternatively, user terminal obtains user's check code automatically after downloading.In addition, step S250 can also be sent out according to user
Operation requests out are triggered, for example, when user double-clicks the micro- end log file downloaded, the front-end customer termination at micro- end
The operation requests of the double-click type are received, and the operation requests of the double-click type are passed at the back-end services end at micro- end
The filename after renaming is read according to the operation requests of the double-click type and obtains user's verification in the back-end services end of reason, micro- end
Code.
Step S260: user terminal verifies user's check code according to preset verification rule.
Wherein, this step can be continuously performed according to the triggering of step S250, that is to say, that no matter step S250 is used
Which kind of mode triggers, the automatic trigger step S260 as long as step S250 is finished.Alternatively, this step can also step at micro- end
Automatic trigger after record file download, that is to say, that no matter step S250 is triggered using which kind of mode, as long as micro- end logs in text
Part downloading finishes then automatic trigger step S260.
Specifically, it can be verified by least one of following rule rule in this step: the first verification rule
Are as follows: whether the generation time for judging user's check code is more than preset effective time, if judging result be it is no, verify success;
If the determination result is YES, then failure is verified.For example, when preset effective time is 1 minute, if the generation time of user's check code
It is super then to verify failure after one minute.Second of verification rule are as follows: whether the access times for judging user's check code are more than preset
Effective degree, if judging result be it is no, verify success;If the determination result is YES, then failure is verified.For example, preset ought have
When effect number is 1 time, failure was verified as long as user's check code has used.The third verification rule are as follows: according to user information
In include user cookie determine corresponding with user cookie user identifier, if it is determined that the user identifier gone out and user's letter
The user identifier for including in breath is identical, then verifies success;Conversely, then verifying failure.Above-mentioned three kinds of verification modes both can be independent
It uses, can also be used in combination.In addition, those skilled in the art can also flexibly set others in addition to above-mentioned verification mode
Verification mode is verified, as long as can determine the validity of user's check code and its matching relationship between user information i.e.
It can.
It can be seen that the execution purpose of this step is to determine that the user of user's check code of acquisition and subscriber terminal side believes
Whether breath matches, since user's check code is generated according to user information, user can be obtained by user's check code
Information, the user information that will acquire are compared the conjunction that can determine user's check code with the user information of subscriber terminal side local
Method.
Step S270: when verifying successfully, user terminal sends login request message to server.
Specifically, this step can after verifying successfully automatic trigger.Wherein, it is further included in login request message
The user information and/or user's check code stated, so that server determines user to be logged in.
Step S280: server receives the login request message sent after user terminal verifies successfully, according to logging request
Message returns to login response message to user terminal.
It wherein, include the logentry information generated according to user information and/or user's check code in login response message,
Login can be automatically performed by logentry information.Specifically, server can according to user information and/or user's check code
Determine the information such as the current online game name of user to be logged in, Game Zone clothes, gaming platform and user cookie, according to
This, server distributes corresponding logentry information, to realize the automated log on of the user.
Step S290: the micro- end of login response message automated log on that user terminal is returned according to server.
When specific implementation, this step can be executed by the micro- end server-side run on user terminal.Micro- end service termination
After receiving login response message, automated log on is carried out according to logentry information wherein included.Wherein, logentry information can
By be log in link etc. in the form of.
It can be seen that the mode in through the embodiment of the present invention can be realized the automated log at micro- end, user people is eliminated
Work inputs the troublesome operation of user information and manual entry, has saved the plenty of time for user, after the completion of avoiding micro- end downloading
The phenomenon that leading to customer churn because having no time login generation.
Embodiment two,
Fig. 3 shows the flow chart of the automatic logging method at micro- end provided by Embodiment 2 of the present invention.As shown in figure 3, should
Method specifically includes the following steps:
Step S310: user terminal sends downloading request to server.
Wherein, user terminal includes all kinds of fixed terminals or mobile terminal, wherein fixed terminal includes personal computer
Deng mobile terminal includes PAD, mobile phone etc..Types of applications can be run on the subscriber terminal, for example, browser application, game are answered
With etc..Wherein, game application further includes platform game, web game, micro- end game etc..For micro- end game,
It further include front-end client and back-end services end, wherein front-end client is used to provide the intuitive of interface class for user
Operation, back-end services end is used to provide background service for front-end client and support, and carries out necessary communication with server.At this
It, can be for certain game on the homepage after user terminal opens platform game homepage by IE browser in embodiment
Downloading request is sent, to download the corresponding micro- end game of this game.
Step S320: server receives the above-mentioned downloading request that user terminal is sent, and is waited for down according to the downloading request
The micro- end log file and user information carried.
Wherein, server refers mainly to WEB server.After server receives above-mentioned downloading request, it is parsed, root
Micro- end log file and user information to be downloaded are obtained according to parsing result.Specific acquisition modes can be by those skilled in the art
Member's flexibly setting.For example, in the first implementation, text directly can be logged in comprising micro- end to be downloaded in downloading request
The identification information and user information of part, server by parsing can be directly obtained the identification information of micro- end log file with
And user information.It in the second implementation, can also only include micro- end log file to be downloaded in downloading request
Identification information, server get the address information for sending the user terminal that the downloading is requested according to the source address of downloading request,
And inquired according to the address information and obtain the relevant information for the game application being currently running on the user terminal, therefrom extract institute
The user information needed.When specific implementation, server can obtain user information by Lua language, and not only sentence is succinct for Lua language
And performance efficiency, search efficiency can be obviously improved by Lua language.In addition, those skilled in the art are also in addition to Lua language
Each speech like sound such as PHP, JAVA can be flexibly selected to obtain user information.
Step S330: server generates user's check code according to above-mentioned user information.
Wherein, user information may include various information.For example, user information includes at least one of following information:
Present system time, gaming platform, Game Zone clothes, user identifier and user cookie.It, can when specific generation user's check code
To carry out operation to user information according to preset operation rule, user's check code is generated according to operation result.Wherein, operation is advised
It then can flexibly be realized by various algorithms, for example, md5 algorithm, SHA algorithm, hash algorithm, RSA Algorithm and DES algorithm etc..
In the present embodiment, it is illustrated by taking md5 algorithm as an example.Cryptographic calculation is carried out to user information by md5 algorithm,
Obtain the first operation result.It is under normal conditions 32, in order to improve subsequent processing since the digit of the first operation result is longer
Efficiency intercepts presetting digit capacity as the second operation result, and by the second operation knot in the present embodiment from the first operation result
Fruit is as user's check code.For example, randomly continuous interception 7 is used as user's check code from 32.By intercepting default position
Several modes can significantly shorten subsequent propagation delay time, promote processing speed, certainly, in other embodiments of the invention,
Can also be directly using the first operation result as user's check code, or presetting digit capacity is intercepted by other means, for example, except connecting
Outside continuous interception numerical digit, one can also be intercepted every several.
In addition, the generated user's check code of the second operation result and server after intercepting in order to prevent repeats, at this
In step, it can also further judge whether the second operation result repeats with existing user's check code;If judging result be it is no,
Using the second operation result as user's check code;If the determination result is YES, then default position is intercepted again from the first operation result
Number, until when the presetting digit capacity that intercepts again and existing user's check code do not repeat, using the presetting digit capacity intercepted again as
User's check code.
Optionally, in the present embodiment, in order to effectively avoid interception after the second operation result and existing user verify
Code repetition, can preset effective time and/or the effective degree of user's check code, correspondingly, generate user's check code
Later, further record user's check code the generation time and/or access times, will generate the time be more than effective time and/or
Access times are more than that the state of user's check code of effective degree is set to invalid state.For example, can having user's check code
The effect time is set as one minute, and super user's check code is in invalid state later after one minute, can not normal use;It can be with
Set the effective degree of user's check code to once, when its using it is primary after then cease to be in force automatically, can not reuse.Thus, it is possible to
Enough avoid the polyisomenism between user's check code.
Step S340: server is carried out according to download address of the above-mentioned user's check code to micro- end log file to be downloaded
It redirects, makes in the download address after redirecting comprising above-mentioned user's check code.
When specific implementation, redirection operation can be realized in the following way: firstly, in micro- end log file to be downloaded
Checking parameter field is added in download address, sets the value for verifying parameter field to the value of user's check code.Wherein, verification ginseng
Any position in download address can be set in digital section, for example, the end of download address is arranged in.Then, pass through the page
The mode of jumping jumps the download address of micro- end log file to be downloaded for the download address after addition checking parameter field.Tool
When body jumps, mode can be jumped by 302 and be jumped.Wherein, it 302 jumps also to cry and temporarily jumps, when being jumped using 302,
User terminal can request download address twice, download address request for the first time be do not include checking parameter field it is original under
Set address, second of download address requested is the redirection download address containing checking parameter field, also, due to 302
It jumps temporarily to jump, therefore search engine will not be stored to download address is redirected.It is generated every time due to server
User's check code is different, and therefore, the redirect address executed when redirecting operation every time is also different, therefore, uses 302 sides of jumping
Formula can complete interim redirection operation, the use being particularly suitable in the present invention under the premise of not changing original download address
The application scenarios that family check code dynamic changes.Certainly, in addition to 302 jump mode, other page jump modes can also be applied
In the present invention.
Step S350: user terminal is when downloading micro- end log file, according under micro- end log file after redirection
The checking parameter field for including in set address obtains user's check code.
Specifically, user terminal downloads micro- end log file by the download address of server feedback.Due to the downloading
Location has carried out re-orientation processes, therefore, user terminal need to server request twice, for the first time to server request it is original under
Set address requests to redirect download address to server according to redirection instruction for the second time.In downloading process or downloading is completed
Afterwards, user terminal obtains user's check code according to the checking parameter field for including in download address is redirected.In addition, step S350
It can be obtained automatically in downloading process according to pre-set operation logic automatic trigger for example, can be set to user terminal
Take family check code;Alternatively, user terminal obtains user's check code automatically after downloading.In addition, due to the present embodiment master
To be applied to IE browser, and the kernel of IE browser is different from the kernel of chrome browser or red fox browser, therefore, leads to
The file type for crossing micro- end log file that IE browser downloads to is usually .application type, is different from embodiment
The file type of the entitled .exe of suffix in one.The file of the .application type downloaded to by IE browser does not need
User executes double click operation can automatic running.Therefore, different from the step S250 in embodiment one, the step in the present embodiment
S350 is typically without to be triggered according to the operation requests that user issues.
Step S360: user terminal verifies user's check code according to preset verification rule.
Wherein, this step can be continuously performed according to the triggering of step S350, that is to say, that no matter step S350 is used
Which kind of mode triggers, the automatic trigger step S360 as long as step S350 is finished.Alternatively, this step can also step at micro- end
Automatic trigger after record file download, that is to say, that no matter step S350 is triggered using which kind of mode, as long as micro- end logs in text
Part downloading finishes then automatic trigger step S360.
Specifically, it can be verified by least one of following rule rule in this step: the first verification rule
Are as follows: whether the generation time for judging user's check code is more than preset effective time, if judging result be it is no, verify success;
If the determination result is YES, then failure is verified.For example, when preset effective time is 1 minute, if the generation time of user's check code
It is super then to verify failure after one minute.Second of verification rule are as follows: whether the access times for judging user's check code are more than preset
Effective degree, if judging result be it is no, verify success;If the determination result is YES, then failure is verified.For example, preset ought have
When effect number is 1 time, failure was verified as long as user's check code has used.The third verification rule are as follows: according to user information
In include user cookie determine corresponding with user cookie user identifier, if it is determined that the user identifier gone out and user's letter
The user identifier for including in breath is identical, then verifies success;Conversely, then verifying failure.Above-mentioned three kinds of verification modes both can be independent
It uses, can also be used in combination.In addition, those skilled in the art can also flexibly set others in addition to above-mentioned verification mode
Verification mode is verified, as long as can determine the validity of user's check code and its matching relationship between user information i.e.
It can.
It can be seen that the execution purpose of this step is to determine that the user of user's check code of acquisition and subscriber terminal side believes
Whether breath matches, since user's check code is generated according to user information, user can be obtained by user's check code
Information, the user information that will acquire are compared the conjunction that can determine user's check code with the user information of subscriber terminal side local
Method.
Step S370: when verifying successfully, user terminal sends login request message to server.
Specifically, this step can after verifying successfully automatic trigger.Wherein, it is further included in login request message
The user information and/or user's check code stated, so that server determines user to be logged in.
Step S380: server receives the login request message sent after user terminal verifies successfully, according to logging request
Message returns to login response message to user terminal.
It wherein, include the logentry information generated according to user information and/or user's check code in login response message,
Login can be automatically performed by logentry information.Specifically, server can according to user information and/or user's check code
Determine the information such as the current online game name of user to be logged in, Game Zone clothes, gaming platform and user cookie, according to
This, server distributes corresponding logentry information, to realize the automated log on of the user.
Step S390: the micro- end of login response message automated log on that user terminal is returned according to server.
When specific implementation, this step can be executed by the micro- end server-side run on user terminal.Micro- end service termination
After receiving login response message, automated log on is carried out according to logentry information wherein included.Wherein, logentry information can
By be log in link etc. in the form of.
It can be seen that the mode in through the embodiment of the present invention, on the one hand, can be generated by server for verification
On the other hand user's check code can complete the verification of user information by micro- end server-side on user terminal, and verifying
It is automatically requested to server for logging in the logentry information of micro- end game after, to realize stepping on automatically for micro- end
Record, eliminates the troublesome operation that user information and manual entry is manually entered in user, has saved the plenty of time for user, has avoided
The phenomenon that leading to customer churn because having no time login after the completion of micro- end downloading generation.
In addition, it will be appreciated to those of skill in the art that in above-described embodiment one and embodiment two, user terminal institute
The operations of execution, for example, send downloading request, user's check code is verified and is sent login request message and from
It is dynamic to complete login etc., it is all to be realized by means of micro- end server-side, micro- end server-side is in addition to can integrate in user terminal sheet
Except ground, it is highly preferred that the accuracy and efficiency of verification is promoted for the ease of being managed collectively to each micro- end client,
Micro- end server-side can also be realized by one or more individual network server.
In addition, the above embodiments one are mainly used in chrome browser or red fox browser, both browsers
Common trait is: micro- end log file of downloading is usually the file of .exe format, also, after the download is complete, need to by with
Micro- end log file is double-clicked to trigger the automated log at micro- end in family, therefore, in example 1, by micro- end log file into
The mode of row renaming obtains micro- end log file automatically when receiving the operation requests for double-clicking type and verifies user's verification
Code, to realize the effect of automated log on after verification passes through.
The above embodiments two are mainly used in IE browser, and the micro- end log file downloaded by the browser is usual
For the file of .application format, also, after the download is complete, IE browser can micro- end for having downloaded of automatic running step on
File is recorded, executes double click operation without user, the above-mentioned characteristic based on IE browser, embodiment two is under micro- end log file
Set address redirects, so that user terminal obtains user's check code by the download address after redirecting in downloading process
And it is verified automatically.
In addition to above-mentioned several browsers, present invention can also apply to other all kinds of browsers, and according to browser
Characteristic accordingly adjust the realization details in above-described embodiment, send user's check code to user as long as can be realized server
Terminal, the purpose verified for user terminal.In addition, in order to enable the invention to be compatible with various types of browsings
Device, the present invention can also further include following embodiments three, so that above-described embodiment one and embodiment two are combined, tool
Body, in the third embodiment, the step S210 to step S230 in above-described embodiment one is first carried out, then, server judgement
The core type of the browser of subscriber terminal side, if it is judged that the first kind (the i.e. chrome class of the core type of browser
Type or red fox type), then execute the step S240 to step S290 in embodiment one;If it is judged that the core type of browser
Second Type (i.e. IE type), then execute the step S340 to step S390 in embodiment two.It can be seen that implementing three
In, the operating procedure for judging browser kernel type is increased, so as to be flexibly applied to various types of browsers.
Fig. 4 show another embodiment of the present invention provides micro- end automatic login device structure chart.As shown in figure 4,
The device includes:
Sending module 41 is suitable for sending downloading request to server, so that the server is obtained according to downloading request
Take micro- end log file and user information to be downloaded;
Module 42 is obtained, is suitable for when downloading micro- end log file, is obtained the server and believed according to the user
Cease the user's check code generated;
Correction verification module 43, suitable for carrying out school to user's check code according to preset verification rule after the download is complete
It tests, when verifying successfully, sends login request message to server;
Login module 44, suitable for the micro- end of login response message automated log on returned according to server.
Optionally, the acquisition module 42 is specifically used for: obtaining user school according to the filename of micro- end log file
Test code.
Optionally, the downloading request and the login request message are by chrome browser or red fox browser
The request message of transmission.
Optionally, the acquisition module 42 is specifically used for: according in the download address of micro- end log file after redirection
The checking parameter field for including obtains user's check code.
Optionally, the downloading request and the login request message are the request messages sent by IE browser.
Optionally, the user information includes at least one in following information: present system time, gaming platform, trip
Play area's clothes, user identifier and user cookie.
Optionally, the preset verification rule includes at least one of following rule:
Whether the generation time for judging user's check code is more than preset effective time, if judging result be it is no, verify
Success;If the determination result is YES, then failure is verified;
Whether the access times for judging user's check code are more than preset effective degree, if judging result be it is no, verify
Success;If the determination result is YES, then failure is verified;
User identifier corresponding with the user cookie is determined according to the user cookie for including in user information, if
The user identifier for including in the corresponding user identifier of user cookie and the user information is identical, then verifies success;Instead
It, then verify failure.
Optionally, include the user information and/or user's check code in the login request message, and described step on
Record the logentry information in response message comprising generating according to the user information and/or user's check code.
The specific structure and working principle of above-mentioned modules can refer to the description of corresponding steps in embodiment of the method, herein
It repeats no more.
In conclusion in the automatic logging method and device at micro- end provided by the invention, firstly, server being capable of basis
The downloading request that user terminal is sent to user information and accordingly generates user's check code, then, can be in user terminal
It downloads and user's check code is supplied to user terminal during micro- end log file, so that user terminal is according to the user school
It tests code to verify user information, and sends login request message from trend server after verifying successfully to be stepped on
Record.It can be seen that in the present invention, user's check code that server is generated according to user information is sent to user terminal school
It tests, so that user terminal be enable to send automatically according to the corresponding user information of user's check code to server after verifying successfully
Login request message and then automated log on, thus avoid user information need to being manually entered by user in the prior art and manually step on
The troublesome operation of record, has saved user time.
Algorithm and display are not inherently related to any particular computer, virtual system, or other device provided herein.
Various general-purpose systems can also be used together with teachings based herein.As described above, it constructs required by this kind of system
Structure be obvious.In addition, the present invention is also not directed to any particular programming language.It should be understood that can use various
Programming language realizes summary of the invention described herein, and the description done above to language-specific is to disclose this hair
Bright preferred forms.
In the instructions provided here, numerous specific details are set forth.It is to be appreciated, however, that implementation of the invention
Example can be practiced without these specific details.In some instances, well known method, structure is not been shown in detail
And technology, so as not to obscure the understanding of this specification.
Similarly, it should be understood that in order to simplify the disclosure and help to understand one or more of the various inventive aspects,
Above in the description of exemplary embodiment of the present invention, each feature of the invention is grouped together into single implementation sometimes
In example, figure or descriptions thereof.However, the disclosed method should not be interpreted as reflecting the following intention: i.e. required to protect
Shield the present invention claims features more more than feature expressly recited in each claim.More precisely, as following
Claims reflect as, inventive aspect is all features less than single embodiment disclosed above.Therefore,
Thus the claims for following specific embodiment are expressly incorporated in the specific embodiment, wherein each claim itself
All as a separate embodiment of the present invention.
Those skilled in the art will understand that can be carried out adaptively to the module in the equipment in embodiment
Change and they are arranged in one or more devices different from this embodiment.It can be the module or list in embodiment
Member or component are combined into a module or unit or component, and furthermore they can be divided into multiple submodule or subelement or
Sub-component.Other than such feature and/or at least some of process or unit exclude each other, it can use any
Combination is to all features disclosed in this specification (including adjoint claim, abstract and attached drawing) and so disclosed
All process or units of what method or apparatus are combined.Unless expressly stated otherwise, this specification is (including adjoint power
Benefit require, abstract and attached drawing) disclosed in each feature can carry out generation with an alternative feature that provides the same, equivalent, or similar purpose
It replaces.
In addition, it will be appreciated by those of skill in the art that although some embodiments in this include institute in other embodiments
Including certain features rather than other feature, but the combination of the feature of different embodiment means in the scope of the present invention
Within and form different embodiments.For example, in the following claims, embodiment claimed it is any it
One can in any combination mode come using.
Various component embodiments of the invention can be implemented in hardware, or to run on one or more processors
Software module realize, or be implemented in a combination thereof.It will be understood by those of skill in the art that can be used in practice
Microprocessor or digital signal processor (DSP) realize some or all portions in device according to an embodiment of the present invention
The some or all functions of part.The present invention is also implemented as a part or complete for executing method as described herein
The device or device program (for example, computer program and computer program product) in portion.It is such to realize program of the invention
It can store on a computer-readable medium, or may be in the form of one or more signals.Such signal can be with
It downloads from internet website, is perhaps provided on the carrier signal or is provided in any other form.
The invention discloses A1, a kind of automatic logging method at micro- end, comprising:
Downloading request is sent to server, so that the server is stepped on according to the downloading request micro- end to be downloaded
Record file and user information;
When downloading micro- end log file, obtains the server and verified according to the user that the user information generates
Code;
User's check code is verified according to preset verification rule after the download is complete, when verifying successfully,
Login request message is sent to server;
The micro- end of login response message automated log on returned according to server.
A2, method according to a1, wherein the user for obtaining the server and being generated according to the user information
The step of check code, specifically includes: obtaining user's check code according to the filename of micro- end log file.
A3, the method according to A2, wherein the downloading request and the login request message are clear by chrome
Looking at device or red fox browser sends.
A4, method according to a1, wherein the user for obtaining the server and being generated according to the user information
The step of check code, specifically includes: according to the checking parameter field for including in the download address of micro- end log file after redirection
Obtain user's check code.
A5, method according to a4, wherein the downloading request and the login request message pass through IE browser
It sends.
A6, according to any method of A1-5, wherein the user information include in following information at least one of:
Present system time, gaming platform, Game Zone clothes, user identifier and user cookie.
A7, the method according to A6, wherein the preset verification rule includes at least one of following rule:
Whether the generation time for judging user's check code is more than preset effective time, if judging result be it is no, verify
Success;If the determination result is YES, then failure is verified;
Whether the access times for judging user's check code are more than preset effective degree, if judging result be it is no, verify
Success;If the determination result is YES, then failure is verified;
User identifier corresponding with the user cookie is determined according to the user cookie for including in user information, if
The user identifier for including in the corresponding user identifier of user cookie and the user information is identical, then verifies success;Instead
It, then verify failure.
A8, according to any method of A1-7, wherein in the login request message comprising the user information and/
Or user's check code, and comprising according to the user information and/or user's check code in the login response message
The logentry information of generation.
B9, a kind of automatic login device at micro- end, comprising:
Sending module is suitable for sending downloading request to server, so that the server is according to the downloading request
Micro- end log file to be downloaded and user information;
Module is obtained, is suitable for when downloading micro- end log file, obtains the server according to the user information
User's check code of generation;
Correction verification module, suitable for being verified after the download is complete according to preset verification rule to user's check code,
When verifying successfully, login request message is sent to server;
Login module, suitable for the micro- end of login response message automated log on returned according to server.
B10, the device according to B9, wherein the acquisition module is specifically used for: according to micro- end log file
Filename obtains user's check code.
B11, device according to b10, wherein the downloading is requested and the login request message is to pass through
The request message that chrome browser or red fox browser are sent.
B12, the device according to B9, wherein the module that obtains is specifically used for: being logged according to micro- end after redirection
The checking parameter field for including in the download address of file obtains user's check code.
B13, device according to b12, wherein the downloading is requested and the login request message is clear by IE
The request message that device of looking at is sent.
B14, according to any device of B9-13, wherein the user information includes at least one in following information
: present system time, gaming platform, Game Zone clothes, user identifier and user cookie.
B15, device according to b14, wherein the preset verification rule includes at least one in following rule
It is a:
Whether the generation time for judging user's check code is more than preset effective time, if judging result be it is no, verify
Success;If the determination result is YES, then failure is verified;
Whether the access times for judging user's check code are more than preset effective degree, if judging result be it is no, verify
Success;If the determination result is YES, then failure is verified;
User identifier corresponding with the user cookie is determined according to the user cookie for including in user information, if
The user identifier for including in the corresponding user identifier of user cookie and the user information is identical, then verifies success;Instead
It, then verify failure.
B16, according to any device of B9-15, wherein include the user information in the login request message
And/or user's check code, and comprising being verified according to the user information and/or the user in the login response message
The logentry information that code generates.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and ability
Field technique personnel can be designed alternative embodiment without departing from the scope of the appended claims.In the claims,
Any reference symbol between parentheses should not be configured to limitations on claims.Word "comprising" does not exclude the presence of not
Element or step listed in the claims.Word "a" or "an" located in front of the element does not exclude the presence of multiple such
Element.The present invention can be by means of including the hardware of several different elements and being come by means of properly programmed computer real
It is existing.In the unit claims listing several devices, several in these devices can be through the same hardware branch
To embody.The use of word first, second, and third does not indicate any sequence.These words can be explained and be run after fame
Claim.