CN106130964B - The automatic logging method and device at micro- end - Google Patents

The automatic logging method and device at micro- end Download PDF

Info

Publication number
CN106130964B
CN106130964B CN201610440213.5A CN201610440213A CN106130964B CN 106130964 B CN106130964 B CN 106130964B CN 201610440213 A CN201610440213 A CN 201610440213A CN 106130964 B CN106130964 B CN 106130964B
Authority
CN
China
Prior art keywords
user
check code
micro
information
user terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610440213.5A
Other languages
Chinese (zh)
Other versions
CN106130964A (en
Inventor
李辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Hongxiang Technical Service Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201610440213.5A priority Critical patent/CN106130964B/en
Publication of CN106130964A publication Critical patent/CN106130964A/en
Priority to PCT/CN2017/088692 priority patent/WO2017215650A1/en
Application granted granted Critical
Publication of CN106130964B publication Critical patent/CN106130964B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]

Abstract

The invention discloses the automatic logging method and device at a kind of micro- end, be at least able to solve traditional micro- end login mode need to by manual entry caused by cumbersome and time-consuming technical problem.This method comprises: the downloading request that user terminal is sent is received, according to the micro- end log file and user information that the downloading request is to be downloaded;User's check code is generated according to the user information, it is redirected according to download address of the user's check code to micro- end log file to be downloaded, make in the download address after redirecting comprising user's check code, so that the user terminal is verified according to user's check code after the download is complete;The login request message sent after the user terminal verifies successfully is received, login response message is returned to the user terminal according to the login request message, so that the user terminal is according to the micro- end of login response message automated log on.

Description

The automatic logging method and device at micro- end
Technical field
The present invention relates to network communication technology fields, and in particular to a kind of automatic logging method and device at micro- end.
Background technique
Currently, the type and quantity of online game are more and more.Game developer is in order to preferably attract user, constantly Release the online game that game picture is more life-like, interactive function is more powerful.However, at the same time, also leading to game client The data volume at end is increasing, reaches hundreds of million or even tens G easily, and so huge game client undoubtedly significantly extends Waiting time in user's downloading process, and huge challenge is brought to the memory space of terminal device.It can be seen that Huge game client probably due to the defects of download time is too long, occupied space is excessive and be lost a large number of users.
In order to solve above-mentioned drawback brought by huge game client, game developer is proposed miniature trip one after another It plays client, hereinafter referred to as micro- end.Micro- end often only have several million sizes, user can moment complete downloading process into And rapidly enter game.Basic game function rapidly can be provided for user by micro- end, and can be carried out in game Other required resources are downloaded in journey, significantly reduce the waiting time of user, the high praise by a large number of users.
But inventor has found in the implementation of the present invention, existing micro- end at least has the following deficiencies: to work as and use After micro- end has been downloaded at family, need to be manually entered user information and the micro- end of manual entry, and the process of manual entry not only operates It is cumbersome, and the time is expended, inconvenience thus is brought for user, and virtually lost certain customers.
Summary of the invention
In view of the above problems, the present invention is proposed to overcome the above problem in order to provide one kind or at least be partially solved The automatic logging method and device at micro- end of the above problem.
According to one aspect of the present invention, a kind of automatic logging method at micro- end is provided, comprising: receive user terminal The downloading of transmission is requested, according to the micro- end log file and user information that the downloading request is to be downloaded;According to described User information generates user's check code, to the downloading of micro- end log file to be downloaded according to user's check code Location redirects, and makes in the download address after redirecting comprising user's check code, so that the user terminal is being downloaded It is verified after the completion according to user's check code;The logging request sent after the user terminal verifies successfully is received to disappear Breath returns to login response message to the user terminal according to the login request message, so that the user terminal is according to institute State the micro- end of login response message automated log on.
Another aspect according to the present invention provides a kind of automatic login device at micro- end, comprising: receiving module is suitable for The downloading request that user terminal is sent is received, according to the micro- end log file and user that the downloading request is to be downloaded Information;Check code generation module is suitable for generating user's check code according to the user information, according to user's check code pair The download address of micro- end log file to be downloaded redirects, and makes in the download address after redirecting comprising described User's check code, so that the user terminal is verified according to user's check code after the download is complete;Login response mould Block, suitable for receiving the login request message sent after the user terminal verifies successfully, according to the login request message to institute It states user terminal and returns to login response message, so that the user terminal is according to the micro- end of login response message automated log on.
In the automatic logging method and device at micro- end provided by the invention, firstly, server can be according to user terminal The downloading request of transmission is to user information and accordingly generates user's check code, then, can be at the micro- end of user terminal downloads User's check code is supplied to user terminal during log file, so that user terminal is according to user's check code pair User information is verified, and sends login request message from trend server after verifying successfully to be logged in.Thus As it can be seen that in the present invention, user's check code that server is generated according to user information is sent to user terminal verification, thus Enable user terminal to send login to server automatically according to the corresponding user information of user's check code after verifying successfully to ask Message and then automated log on are asked, thus avoids need to being manually entered user information and manual entry by user in the prior art Troublesome operation has saved user time.
The above description is only an overview of the technical scheme of the present invention, in order to better understand the technical means of the present invention, And it can be implemented in accordance with the contents of the specification, and in order to allow above and other objects of the present invention, feature and advantage can It is clearer and more comprehensible, the followings are specific embodiments of the present invention.
Detailed description of the invention
By reading the following detailed description of the preferred embodiment, various other advantages and benefits are general for this field Logical technical staff will become clear.The drawings are only for the purpose of illustrating a preferred embodiment, and is not considered as to this hair Bright limitation.And throughout the drawings, the same reference numbers will be used to refer to the same parts.In the accompanying drawings:
Fig. 1 shows the flow chart of the automatic logging method at micro- end provided by one embodiment of the present invention;
Fig. 2 shows the flow charts of the automatic logging method at micro- end of the offer of the embodiment of the present invention one;
Fig. 3 shows the flow chart of the automatic logging method at micro- end provided by Embodiment 2 of the present invention;
Fig. 4 shows the structure chart of the automatic login device at micro- end provided by one embodiment of the present invention.
Specific embodiment
Exemplary embodiments of the present disclosure are described in more detail below with reference to accompanying drawings.Although showing this public affairs in attached drawing The exemplary embodiment opened, it being understood, however, that may be realized in various forms the disclosure without the implementation that should be illustrated here Example is limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the disclosure Range is fully disclosed to those skilled in the art.
The embodiment of the invention provides the automatic logging method and device at a kind of micro- end, at least it is able to solve traditional micro- Hold login mode need to by manual entry caused by cumbersome and time-consuming technical problem.
Fig. 1 shows the flow chart of the automatic logging method at micro- end provided by one embodiment of the present invention.As shown in Figure 1, This method specifically includes the following steps:
Step S110: the downloading request that user terminal is sent is received, micro- end to be downloaded logs according to downloading request File and user information.
Wherein, the downloading that user terminal is sent is requested for downloading micro- end log file, to log in micro- end game.Its In, the implementation according to downloading request micro- end log file and user information to be downloaded can be a variety of, example Such as, in one implementation, can directly downloading request in comprising micro- end log file to be downloaded identification information with And user information, so that micro- end log file and user to be downloaded can be got by parsing to downloading request Information.
It in another implementation, only can include the mark of micro- end log file to be downloaded in downloading request Information is read the user information for sending the user terminal of downloading request by server by stipulated form.For example, service Device determines the user terminal address for sending downloading request by the source port number for including in downloading request, according to user end End address determines the relevant information for the game account being currently running on the user terminal.
Step S120: user's check code is generated according to user information, according to user's check code to described to be downloaded The download address of micro- end log file redirects, and makes in the download address after redirecting to include user's check code, with It is verified after the download is complete according to user's check code for user terminal.
Wherein, it can flexibly be realized by various modes according to the process that user information generates user's check code, for example, User information can be encrypted by md5 algorithm, to obtain user's check code.The effect of user's check code is to provide To user terminal, so that user terminal verifies user information.In short, the purpose of this step is: under user terminal When carrying micro- end log file, user's check code is supplied to user terminal, user's check code can be supplied to user's end by other The mode at end also can be applied to the present invention.
Step S130: receiving the login request message that sends after user terminal verifies successfully, according to login request message to User terminal returns to login response message, so that user terminal is according to the micro- end of login response message automated log on.
Wherein, it can be realized the automated log at micro- end by login request message and login response message.Thus may be used See, in the present invention, user's check code that server is generated according to user information is sent to user terminal verification, to make User terminal can send logging request to server automatically according to the corresponding user information of user's check code after verifying successfully Message and then automated log on thus avoid need to being manually entered the numerous of user information and manual entry by user in the prior art Trivial operation, has saved user time.
Below by the specific reality of the automatic logging method at micro- end of two specific embodiment the present invention is described in detail offer Existing details:
Embodiment one,
Fig. 2 shows the flow charts of the automatic logging method at micro- end of the offer of the embodiment of the present invention one.It, should as shown in Fig. 2 Method specifically includes the following steps:
Step S210: user terminal sends downloading request to server.
Wherein, user terminal includes all kinds of fixed terminals or mobile terminal, wherein fixed terminal includes personal computer Deng mobile terminal includes PAD, mobile phone etc..Types of applications can be run on the subscriber terminal, for example, browser application, game Using etc..Wherein, game application further includes platform game, web game, micro- end game etc..For micro- end game Speech further includes front-end client and back-end services end, wherein front-end client is used to provide interface class for user Intuitive operation, back-end services end are used to provide background service for front-end client and support, and carry out necessary lead to server Letter.In the present embodiment, after user terminal opens platform game homepage by chrome browser or red fox browser, energy Downloading request enough is sent for certain game on the homepage, to download the corresponding micro- end game of this game.
Step S220: server receives the above-mentioned downloading request that user terminal is sent, and is waited for down according to the downloading request The micro- end log file and user information carried.
Wherein, server refers mainly to WEB server.After server receives above-mentioned downloading request, it is parsed, Micro- end log file and user information to be downloaded are obtained according to parsing result.Specific acquisition modes can be by this field skill Art personnel flexibly set.For example, directly can include micro- end to be downloaded in downloading request in the first implementation The identification information and user information of log file, server can be directly obtained the mark of micro- end log file by parsing Know information and user information.In the second implementation, it can also only be stepped in downloading request comprising micro- end to be downloaded The identification information of file is recorded, server gets the user terminal for sending that the downloading is requested according to the source address of downloading request Address information, and the related letter for the game application being currently running on the user terminal is inquired and obtained according to the address information Breath, therefrom extracts required user information.When specific implementation, server can obtain user information, Lua language by Lua language Not only sentence is succinct and performance efficiency for speech, can be obviously improved search efficiency by Lua language.In addition, in addition to Lua language, this Field technical staff can also flexibly select each speech like sound such as PHP, JAVA to obtain user information.
Step S230: server generates user's check code according to above-mentioned user information.
Wherein, user information may include various information.For example, user information includes at least one of following information: Present system time, gaming platform, Game Zone clothes, user identifier and user cookie.When specific generation user's check code, Operation can be carried out to user information according to preset operation rule, user's check code is generated according to operation result.Wherein, it transports Calculating rule can flexibly be realized by various algorithms, for example, md5 algorithm, SHA algorithm, hash algorithm, RSA Algorithm and DES are calculated Method etc..
In the present embodiment, it is illustrated by taking md5 algorithm as an example.Encryption fortune is carried out to user information by md5 algorithm It calculates, obtains the first operation result.It is under normal conditions 32 since the digit of the first operation result is longer, it is subsequent in order to improve Treatment effeciency intercepts presetting digit capacity as the second operation result, and by second in the present embodiment from the first operation result Operation result is as user's check code.For example, randomly continuous interception 7 is used as user's check code from 32.Pass through interception The mode of presetting digit capacity can significantly shorten subsequent propagation delay time, promote processing speed, certainly, of the invention other real It applies in example, can also be directly using the first operation result as user's check code, or presetting digit capacity is intercepted by other means, For example, in addition to continuously interception numerical digit one can also be intercepted every several.
In addition, the generated user's check code of the second operation result and server after intercepting in order to prevent repeats, at this In step, it can also further judge whether the second operation result repeats with existing user's check code;If judging result is It is no, using the second operation result as user's check code;If the determination result is YES, then interception is pre- again from the first operation result If digit, until when the presetting digit capacity that intercepts again and existing user's check code do not repeat, the presetting digit capacity that will intercept again As user's check code.
Optionally, in the present embodiment, in order to effectively avoid interception after the second operation result and existing user verify Code repetition, can preset effective time and/or the effective degree of user's check code, correspondingly, generate user's check code Later, further record user's check code the generation time and/or access times, will generate the time be more than effective time and/or Access times are more than that the state of user's check code of effective degree is set to invalid state.For example, can having user's check code The effect time is set as one minute, and super user's check code is in invalid state later after one minute, can not normal use;May be used also To set the effective degree of user's check code to once, when its using it is primary after then cease to be in force automatically, can not reuse.By This can be avoided the polyisomenism between user's check code.
Step S240: server renames micro- end log file to be downloaded according to user's check code, will order again Micro- end log file after name is supplied to user terminal downloads.
Wherein, micro- end log file is often referred to can be used in running micro- client software of specified game.For example, at this In embodiment, it is assumed that the file identification for the micro- end log file for including in downloading request is DZZ, can be with by this document mark Determine that corresponding micro- end log file is micro- client software corresponding to big dominant force game.Micro- end log file it is original The entitled DZZ.EXE of file.In the present embodiment, it is renamed according to user's check code, makes user terminal according to ordering again Filename after name can determine user's check code.When specific implementation, it can be renamed by various modes.First In kind implementation, user's check code is directly added to the designated position of raw filename, is added for example, passing through underscore To the end of raw filename, raw filename is made to be changed to DZZ_CODE.EXE.In the second implementation, in order to mention The safety in transmission process is risen, preset Encryption Algorithm can be carried out to user's check code, and cryptographic calculation result is added To the designated position of raw filename.Later, micro- end log file after renaming is supplied under user terminal by server It carries.Specifically, the downloading portal of micro- end log file after renaming can be sent to user terminal.
Step S250: user terminal is obtained according to the filename of micro- end log file and is used when downloading micro- end log file Family check code.
Specifically, user terminal downloads micro- end log file by the downloading portal of server feedback.The downloading portal can To be the various forms such as download link, downloading icon.In downloading process or after the completion of downloading, user terminal is stepped on according to micro- end The filename for recording file obtains user's check code.Specific acquisition modes depend on the renaming mode in previous step, work as use When the first renaming mode, user's check code directly can be obtained by filename;When using second of renaming mode When, user's check code can be obtained by executing preset decipherment algorithm to the specific field in filename.
In addition, step S250 can be according to pre-set operation logic automatic trigger, for example, can be set to user Terminal obtains user's check code automatically before downloading starts;Alternatively, user terminal obtains user school automatically in downloading process Test code;Alternatively, user terminal obtains user's check code automatically after downloading.In addition, step S250 can also be according to user The operation requests of sending are triggered, for example, when user double-clicks the micro- end log file downloaded, the front-end customer at micro- end Termination receives the operation requests of the double-click type, and the operation requests of the double-click type are passed to the back-end services end at micro- end It is handled, the back-end services end at micro- end reads filename and acquisition after renaming according to the operation requests of the double-click type User's check code.
Step S260: user terminal verifies user's check code according to preset verification rule.
Wherein, this step can be continuously performed according to the triggering of step S250, that is to say, that no matter step S250 is adopted Which kind of triggered with mode, the automatic trigger step S260 as long as step S250 is finished.Alternatively, this step can also be micro- Automatic trigger after holding log file to download, that is to say, that no matter step S250 is triggered using which kind of mode, as long as micro- end Log file downloading finishes then automatic trigger step S260.
Specifically, it can be verified by least one of following rule rule in this step: the first verification rule Are as follows: whether the generation time for judging user's check code is more than preset effective time, if judging result be it is no, verify success; If the determination result is YES, then failure is verified.For example, when preset effective time is 1 minute, if when the generation of user's check code Between surpass then verify failure after one minute.Second of verification rule are as follows: whether the access times for judging user's check code are more than default Effective degree, if judging result be it is no, verify success;If the determination result is YES, then failure is verified.For example, when preset When effective degree is 1 time, failure was verified as long as user's check code has used.The third verification rule are as follows: according to user The user cookie that includes in information determines user identifier corresponding with user cookie, if it is determined that the user identifier that goes out and The user identifier for including in user information is identical, then verifies success;Conversely, then verifying failure.Above-mentioned three kinds of verification modes both may be used To be used alone, can also be used in combination.In addition, those skilled in the art can also flexibly set in addition to above-mentioned verification mode Other verification modes are verified, as long as can determine the validity of user's check code and its between user information With relationship.
It can be seen that the execution purpose of this step is to determine user's check code of acquisition and the user of subscriber terminal side Whether information matches, since user's check code is generated according to user information, can be obtained by user's check code User information, the user information that will acquire is compared with the user information of subscriber terminal side local can determine that user verifies The legitimacy of code.
Step S270: when verifying successfully, user terminal sends login request message to server.
Specifically, this step can after verifying successfully automatic trigger.Wherein, it is further included in login request message Above-mentioned user information and/or user's check code, so that server determines user to be logged in.
Step S280: server receives the login request message sent after user terminal verifies successfully, according to logging request Message returns to login response message to user terminal.
Wherein, the logentry in login response message comprising being generated according to user information and/or user's check code is believed Breath, can be automatically performed login by logentry information.Specifically, server is according to user information and/or user's check code It can determine the letters such as the current online game name of user to be logged in, Game Zone clothes, gaming platform and user cookie Breath, accordingly, server distribute corresponding logentry information, to realize the automated log on of the user.
Step S290: the micro- end of login response message automated log on that user terminal is returned according to server.
When specific implementation, this step can be executed by the micro- end server-side run on user terminal.Micro- end service termination After receiving login response message, automated log on is carried out according to logentry information wherein included.Wherein, logentry information It can be the forms such as login link.
It can be seen that the mode in through the embodiment of the present invention can be realized the automated log at micro- end, user people is eliminated Work inputs the troublesome operation of user information and manual entry, has saved the plenty of time for user, after the completion of avoiding micro- end downloading The phenomenon that leading to customer churn because having no time login generation.
Embodiment two,
Fig. 3 shows the flow chart of the automatic logging method at micro- end provided by Embodiment 2 of the present invention.It, should as shown in Fig. 3 Method specifically includes the following steps:
Step S310: user terminal sends downloading request to server.
Wherein, user terminal includes all kinds of fixed terminals or mobile terminal, wherein fixed terminal includes personal computer Deng mobile terminal includes PAD, mobile phone etc..Types of applications can be run on the subscriber terminal, for example, browser application, game Using etc..Wherein, game application further includes platform game, web game, micro- end game etc..For micro- end game Speech further includes front-end client and back-end services end, wherein front-end client is used to provide interface class for user Intuitive operation, back-end services end are used to provide background service for front-end client and support, and carry out necessary lead to server Letter.It in the present embodiment, can be on the homepage after user terminal opens platform game homepage by IE browser Certain game sends downloading request, to download the corresponding micro- end game of this game.
Step S320: server receives the above-mentioned downloading request that user terminal is sent, and is waited for down according to the downloading request The micro- end log file and user information carried.
Wherein, server refers mainly to WEB server.After server receives above-mentioned downloading request, it is parsed, Micro- end log file and user information to be downloaded are obtained according to parsing result.Specific acquisition modes can be by this field skill Art personnel flexibly set.For example, directly can include micro- end to be downloaded in downloading request in the first implementation The identification information and user information of log file, server can be directly obtained the mark of micro- end log file by parsing Know information and user information.In the second implementation, it can also only be stepped in downloading request comprising micro- end to be downloaded The identification information of file is recorded, server gets the user terminal for sending that the downloading is requested according to the source address of downloading request Address information, and the related letter for the game application being currently running on the user terminal is inquired and obtained according to the address information Breath, therefrom extracts required user information.When specific implementation, server can obtain user information, Lua language by Lua language Not only sentence is succinct and performance efficiency for speech, can be obviously improved search efficiency by Lua language.In addition, in addition to Lua language, this Field technical staff can also flexibly select each speech like sound such as PHP, JAVA to obtain user information.
Step S330: server generates user's check code according to above-mentioned user information.
Wherein, user information may include various information.For example, user information includes at least one of following information: Present system time, gaming platform, Game Zone clothes, user identifier and user cookie.When specific generation user's check code, Operation can be carried out to user information according to preset operation rule, user's check code is generated according to operation result.Wherein, it transports Calculating rule can flexibly be realized by various algorithms, for example, md5 algorithm, SHA algorithm, hash algorithm, RSA Algorithm and DES are calculated Method etc..
In the present embodiment, it is illustrated by taking md5 algorithm as an example.Encryption fortune is carried out to user information by md5 algorithm It calculates, obtains the first operation result.It is under normal conditions 32 since the digit of the first operation result is longer, it is subsequent in order to improve Treatment effeciency intercepts presetting digit capacity as the second operation result, and by second in the present embodiment from the first operation result Operation result is as user's check code.For example, randomly continuous interception 7 is used as user's check code from 32.Pass through interception The mode of presetting digit capacity can significantly shorten subsequent propagation delay time, promote processing speed, certainly, of the invention other real It applies in example, can also be directly using the first operation result as user's check code, or presetting digit capacity is intercepted by other means, For example, in addition to continuously interception numerical digit one can also be intercepted every several.
In addition, the generated user's check code of the second operation result and server after intercepting in order to prevent repeats, at this In step, it can also further judge whether the second operation result repeats with existing user's check code;If judging result is It is no, using the second operation result as user's check code;If the determination result is YES, then interception is pre- again from the first operation result If digit, until when the presetting digit capacity that intercepts again and existing user's check code do not repeat, the presetting digit capacity that will intercept again As user's check code.
Optionally, in the present embodiment, in order to effectively avoid interception after the second operation result and existing user verify Code repetition, can preset effective time and/or the effective degree of user's check code, correspondingly, generate user's check code Later, further record user's check code the generation time and/or access times, will generate the time be more than effective time and/or Access times are more than that the state of user's check code of effective degree is set to invalid state.For example, can having user's check code The effect time is set as one minute, and super user's check code is in invalid state later after one minute, can not normal use;May be used also To set the effective degree of user's check code to once, when its using it is primary after then cease to be in force automatically, can not reuse.By This can be avoided the polyisomenism between user's check code.
Step S340: server according to above-mentioned user's check code to the download address of micro- end log file to be downloaded into Row redirects, and makes in the download address after redirecting comprising above-mentioned user's check code.
When specific implementation, redirection operation can be realized in the following way: firstly, in micro- end log file to be downloaded Download address in add checking parameter field, set the value for verifying parameter field to the value of user's check code.Wherein, school Testing parameter field can be set any position in download address, for example, the end of download address is arranged in.Then, pass through Page jump mode jumps the download address of micro- end log file to be downloaded for the downloading after addition checking parameter field Location.When specifically jumping, mode can be jumped by 302 and be jumped.Wherein, it 302 jumps also to cry and temporarily jumps, jumped using 302 When turning, user terminal can request download address twice, and the download address requested for the first time is not comprising checking parameter field Original download address, second download address request is the redirection download address containing checking parameter field, and And since 302 jump temporarily to jump, search engine will not be stored to download address is redirected.Due to server The user's check code generated every time is different, and therefore, the redirect address executed when redirecting operation every time is also different, therefore, makes Interim redirection operation can be completed under the premise of not changing original download address by jumping mode with 302, be particularly suitable for The application scenarios that user's check code dynamic in the present invention changes.Certainly, in addition to 302 jump mode, other page jump sides Formula can also apply to the present invention.
Step S350: user terminal is when downloading micro- end log file, according under micro- end log file after redirection The checking parameter field for including in set address obtains user's check code.
Specifically, user terminal downloads micro- end log file by the download address of server feedback.Due to the downloading Location has carried out re-orientation processes, and therefore, user terminal needs to request to server twice, to request to server for the first time original Download address requests to redirect download address to server according to redirection instruction for the second time.In downloading process or download Cheng Hou, user terminal obtain user's check code according to the checking parameter field for including in download address is redirected.In addition, step S350 can according to pre-set operation logic automatic trigger, for example, can be set to user terminal in downloading process from It is dynamic to obtain user's check code;Alternatively, user terminal obtains user's check code automatically after downloading.In addition, due to this reality It applies example and is mainly used in IE browser, and the kernel of IE browser is different from the kernel of chrome browser or red fox browser, Therefore, the file type of the micro- end log file downloaded to by IE browser is usually application type, different The file type of the entitled .exe of suffix in embodiment one.Pass through the text for the application type that IE browser downloads to Part does not need user's execution double click operation can automatic running.Therefore, different from the step S250 in embodiment one, this implementation Step S350 in example is typically without to be triggered according to the operation requests that user issues.
Step S360: user terminal verifies user's check code according to preset verification rule.
Wherein, this step can be continuously performed according to the triggering of step S350, that is to say, that no matter step S350 is adopted Which kind of triggered with mode, the automatic trigger step S360 as long as step S350 is finished.Alternatively, this step can also be micro- Automatic trigger after holding log file to download, that is to say, that no matter step S350 is triggered using which kind of mode, as long as micro- end Log file downloading finishes then automatic trigger step S360.
Specifically, it can be verified by least one of following rule rule in this step: the first verification rule Are as follows: whether the generation time for judging user's check code is more than preset effective time, if judging result be it is no, verify success; If the determination result is YES, then failure is verified.For example, when preset effective time is 1 minute, if when the generation of user's check code Between surpass then verify failure after one minute.Second of verification rule are as follows: whether the access times for judging user's check code are more than default Effective degree, if judging result be it is no, verify success;If the determination result is YES, then failure is verified.For example, when preset When effective degree is 1 time, failure was verified as long as user's check code has used.The third verification rule are as follows: according to user The user cookie that includes in information determines user identifier corresponding with user cookie, if it is determined that the user identifier that goes out and The user identifier for including in user information is identical, then verifies success;Conversely, then verifying failure.Above-mentioned three kinds of verification modes both may be used To be used alone, can also be used in combination.In addition, those skilled in the art can also flexibly set in addition to above-mentioned verification mode Other verification modes are verified, as long as can determine the validity of user's check code and its between user information With relationship.
It can be seen that the execution purpose of this step is to determine user's check code of acquisition and the user of subscriber terminal side Whether information matches, since user's check code is generated according to user information, can be obtained by user's check code User information, the user information that will acquire is compared with the user information of subscriber terminal side local can determine that user verifies The legitimacy of code.
Step S370: when verifying successfully, user terminal sends login request message to server.
Specifically, this step can after verifying successfully automatic trigger.Wherein, it is further included in login request message Above-mentioned user information and/or user's check code, so that server determines user to be logged in.
Step S380: server receives the login request message sent after user terminal verifies successfully, according to logging request Message returns to login response message to user terminal.
Wherein, the logentry in login response message comprising being generated according to user information and/or user's check code is believed Breath, can be automatically performed login by logentry information.Specifically, server is according to user information and/or user's check code It can determine the letters such as the current online game name of user to be logged in, Game Zone clothes, gaming platform and user cookie Breath, accordingly, server distribute corresponding logentry information, to realize the automated log on of the user.
Step S390: the micro- end of login response message automated log on that user terminal is returned according to server.
When specific implementation, this step can be executed by the micro- end server-side run on user terminal.Micro- end service termination After receiving login response message, automated log on is carried out according to logentry information wherein included.Wherein, logentry information It can be the forms such as login link.
It can be seen that the mode in through the embodiment of the present invention, on the one hand, can be generated by server for verifying User's check code on the other hand can complete the verification of user information by micro- end server-side on user terminal, and Verification is automatically requested to server for logging in the logentry information of micro- end game after passing through, to realize oneself of micro- end It is dynamic to log in, the troublesome operation that user information and manual entry is manually entered in user is eliminated, has saved the plenty of time for user, Avoid the phenomenon that logging in because having no time due to lead to customer churn after the completion of micro- end is downloaded generation.
In addition, it will be appreciated to those of skill in the art that in above-described embodiment one and embodiment two, user terminal Performed operations, for example, send downloading request, user's check code is verified and is sent login request message with And be automatically performed login etc., it is all to be realized by means of micro- end server-side, micro- end server-side is in addition to can integrate at user's end Hold except local, it is highly preferred that for the ease of being managed collectively to each micro- end client, promoted verification accuracy and Efficiency, micro- end server-side can also be realized by one or more individual network server.
In addition, the above embodiments one are mainly used in chrome browser or red fox browser, both browsers Common trait is: micro- end log file of downloading is usually the file of .exe format, also, after the download is complete, need to by with Micro- end log file is double-clicked to trigger the automated log at micro- end, therefore, in example 1, by micro- end log file in family The mode renamed makes micro- end log file obtain automatically when receiving the operation requests for double-clicking type and verify user Check code, to realize the effect of automated log on after verification passes through.
The above embodiments two are mainly used in IE browser, and the micro- end log file downloaded by the browser is usual For the file of .application format, also, after the download is complete, IE browser being capable of micro- end for having downloaded of automatic running Log file executes double click operation without user, and the above-mentioned characteristic based on IE browser, embodiment two is to micro- end log file Download address redirect, so as to user terminal in downloading process by redirect after download address obtain user Check code is simultaneously verified automatically.
In addition to above-mentioned several browsers, present invention can also apply to other all kinds of browsers, and according to browser Characteristic accordingly adjust the realization details in above-described embodiment, send user's check code to use as long as can be realized server Family terminal, the purpose verified for user terminal.In addition, various types of clear in order to enable the invention to be compatible with Look at device, the present invention can also further include following embodiments three, so as to by above-described embodiment one and embodiment two-phase knot It closes, specifically, in the third embodiment, the step S210 to step S230 in above-described embodiment one is first carried out, then, service Device judges the core type of the browser of subscriber terminal side, if it is judged that the first kind of the core type of browser is (i.e. Chrome type or red fox type), then execute the step S240 to step S290 in embodiment one;If it is judged that browser Core type Second Type (i.e. IE type), then execute the step S340 to step S390 in embodiment two.Thus may be used See, is implementing the operating procedure for judging browser kernel type to be increased, so as to be flexibly applied to various types in three Browser.
Fig. 4 show another embodiment of the present invention provides micro- end automatic login device structure chart.As shown in figure 4, The device includes:
Receiving module 41, the downloading request sent suitable for receiving user terminal are to be downloaded according to the downloading request Micro- end log file and user information;
Check code generation module 42 is suitable for generating user's check code according to the user information, be verified according to the user Code redirects the download address of micro- end log file to be downloaded, includes in the download address after making redirection User's check code, so that the user terminal is verified according to user's check code after the download is complete;
Login response module 43, suitable for receiving the login request message sent after the user terminal verifies successfully, according to The login request message returns to login response message to the user terminal, so that the user terminal is according to the login The micro- end of response message automated log on.
Optionally, the check code generation module 42 is specifically used for: in the downloading of micro- end log file to be downloaded Checking parameter field is added in address, sets the value of the checking parameter field to the value of user's check code;Pass through page Face jumps after mode jumps the download address of micro- end log file to be downloaded to add the checking parameter field Download address.
Optionally, the check code generation module 42 is specifically used for: according to preset operation rule to the user information Operation is carried out, the first operation result is obtained, user's check code is generated according to first operation result;Wherein, the fortune Calculating rule includes at least one of following algorithm: md5 algorithm, SHA algorithm, hash algorithm, RSA Algorithm and DES algorithm, and The user information includes at least one of following information: present system time, gaming platform, Game Zone clothes, Yong Hubiao Knowledge and user cookie.
Optionally, the check code generation module 42 is specifically used for: intercepting presetting digit capacity from first operation result As the second operation result, using second operation result as user's check code.
Optionally, the check code generation module 42 is specifically used for: judge second operation result whether with it is existing User's check code repeats;If judging result be it is no, using second operation result as user's check code;If judgement knot Fruit be it is yes, then intercept presetting digit capacity again from first operation result, until the presetting digit capacity intercepted again with When some user's check codes do not repeat, using the presetting digit capacity intercepted again as user's check code.
Optionally, further comprise: setup module 44, suitable for presetting the effective time of user's check code and/or having Number is imitated, also, the setup module is in the generation time for generating user's check code described in the laggard one-step recording of user's check code And/or access times, will generate the time is more than the user's check code of effective time and/or access times more than effective degree State is set to invalid state.
Wherein, the user information and/or user's check code are further included in the login request message, and Logentry information in the login response message comprising being generated according to the user information and/or user's check code. Wherein, the downloading request and the login request message are the request messages sent by IE browser.
The specific structure and working principle of above-mentioned modules can refer to the description of corresponding steps in embodiment of the method, this Place repeats no more.
In conclusion in the automatic logging method and device at micro- end provided by the invention, firstly, server being capable of root To user information and user's check code is accordingly generated according to the downloading request that user terminal is sent, it then, can be at user's end User's check code is supplied to user terminal during the micro- end log file of end downloading, so that user terminal is according to the use Family check code verifies user information, and after verifying successfully from trend server send login request message into Row logs in.It can be seen that in the present invention, user's check code that server is generated according to user information is sent to user's end End verification, thus enable user terminal after verifying successfully automatically according to the corresponding user information of user's check code to service Device sends login request message and then automated log on, thus avoids user information need to being manually entered by user in the prior art And the troublesome operation of manual entry, save user time.
Algorithm and display are not inherently related to any particular computer, virtual system, or other device provided herein. Various general-purpose systems can also be used together with teachings based herein.As described above, it constructs required by this kind of system Structure be obvious.In addition, the present invention is also not directed to any particular programming language.It should be understood that can use various Programming language realizes summary of the invention described herein, and the description done above to language-specific is to disclose this The preferred forms of invention.
In the instructions provided here, numerous specific details are set forth.It is to be appreciated, however, that implementation of the invention Example can be practiced without these specific details.In some instances, well known method, knot is not been shown in detail Structure and technology, so as not to obscure the understanding of this specification.
Similarly, it should be understood that in order to simplify the disclosure and help to understand one or more of the various inventive aspects, In the above description of the exemplary embodiment of the present invention, each feature of the invention is grouped together into single reality sometimes It applies in example, figure or descriptions thereof.However, the disclosed method should not be interpreted as reflecting the following intention: being wanted Ask protection the present invention claims features more more than feature expressly recited in each claim.More precisely, such as As following claims reflect, inventive aspect is all features less than single embodiment disclosed above. Therefore, it then follows thus claims of specific embodiment are expressly incorporated in the specific embodiment, wherein each right It is required that itself is all as a separate embodiment of the present invention.
Those skilled in the art will understand that adaptivity can be carried out to the module in the equipment in embodiment Ground changes and they is arranged in one or more devices different from this embodiment.It can be the module in embodiment Or unit or assembly is combined into a module or unit or component, and furthermore they can be divided into multiple submodule or sons Unit or sub-component.It, can be with other than such feature and/or at least some of process or unit exclude each other Using any combination to all features disclosed in this specification (including adjoint claim, abstract and attached drawing) and such as All process or units of any method or apparatus of the displosure are combined.Unless expressly stated otherwise, this specification Each feature disclosed in (including the accompanying claims, abstract and drawings) can be by providing identical, equivalent, or similar mesh Alternative features replace.
In addition, it will be appreciated by those of skill in the art that although some embodiments in this include institute in other embodiments Including certain features rather than other feature, but the combination of the feature of different embodiment means to be in model of the invention Within enclosing and form different embodiments.For example, in the following claims, embodiment claimed is appointed Meaning one of can in any combination mode come using.
Various component embodiments of the invention can be implemented in hardware, or to transport on one or more processors Capable software module is realized, or is implemented in a combination thereof.It will be understood by those of skill in the art that can be in practice Realized using microprocessor or digital signal processor (DSP) some in device according to an embodiment of the present invention or The some or all functions of whole components.The present invention is also implemented as one for executing method as described herein Point or whole device or device programs (for example, computer program and computer program product).Such this hair of realization Bright program can store on a computer-readable medium, or may be in the form of one or more signals.It is such Signal can be downloaded from an internet website to obtain, and is perhaps provided on the carrier signal or is provided in any other form.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and this Field technical staff can be designed alternative embodiment without departing from the scope of the appended claims.In claim In, any reference symbol between parentheses should not be configured to limitations on claims.Word "comprising" is not excluded for depositing In element or step not listed in the claims.Word "a" or "an" located in front of the element does not exclude the presence of multiple Such element.The present invention can be by means of including the hardware of several different elements and by means of properly programmed calculating Machine is realized.In the unit claims listing several devices, several in these devices can be by same Hardware branch embodies.The use of word first, second, and third does not indicate any sequence.It can be by these words It is construed to title.

Claims (16)

1. a kind of automatic logging method at micro- end, comprising:
The downloading request that user terminal is sent is received, according to the micro- end log file and use that the downloading request is to be downloaded Family information;
User's check code is generated according to the user information, text is logged in micro- end to be downloaded according to user's check code The download address of part redirects, and makes in the download address after redirecting comprising user's check code, for the user Terminal is verified according to user's check code after the download is complete;Wherein, user terminal determines the user's check code obtained Whether matched with the user information of subscriber terminal side;
The login request message sent after the user terminal verifies successfully is received, according to the login request message to the use Family terminal returns to login response message, so that the user terminal is according to the micro- end of login response message automated log on.
2. described to be stepped on according to user's check code to micro- end to be downloaded according to the method described in claim 1, wherein The step of download address of record file redirects further comprises:
Checking parameter field is added in the download address of micro- end log file to be downloaded, by the checking parameter field Value be set as the value of user's check code;
The download address of micro- end log file to be downloaded is jumped for the addition verification ginseng by page jump mode Download address after digital section.
3. according to the method described in claim 1, wherein, the realization side that user's check code is generated according to the user information Formula includes: to carry out operation to the user information according to preset operation rule, the first operation result is obtained, according to described first Operation result generates user's check code;
Wherein, the operation rule includes at least one of following algorithm: md5 algorithm, SHA algorithm, hash algorithm, RSA are calculated Method and DES algorithm, and the user information includes at least one of following information: present system time, gaming platform, game Area's clothes, user identifier and user cookie.
4. according to the method described in claim 3, wherein, the step of user's check code is generated according to first operation result Suddenly it specifically includes: intercepting presetting digit capacity from first operation result as the second operation result, by the second operation knot Fruit is as user's check code.
5. according to the method described in claim 4, wherein, the presetting digit capacity that intercepts from first operation result is as the The step of two operation results, specifically includes:
Judge whether second operation result repeats with existing user's check code;If judging result be it is no, by described second Operation result is as user's check code;If the determination result is YES, then interception is default again from first operation result Digit, until when the presetting digit capacity intercepted again and existing user's check code do not repeat, by it is described intercept again it is pre- If digit is as user's check code.
6. -5 any method according to claim 1, wherein further comprise step: presetting user's check code Effective time and/or effective degree, also, generate the generation time of user's check code described in the laggard one-step recording of user's check code And/or access times, will generate the time is more than the shape of effective time and/or access times more than user's check code of effective degree State is set to invalid state.
7. -5 any method according to claim 1, wherein further include the user in the login request message Information and/or user's check code, and comprising according to the user information and/or the user in the login response message The logentry information that check code generates.
8. -5 any method according to claim 1, wherein the downloading request and the login request message pass through IE browser is sent.
9. a kind of automatic login device at micro- end, comprising:
Receiving module, the downloading request sent suitable for receiving user terminal, according to micro- end that the downloading request is to be downloaded Log file and user information;
Check code generation module is suitable for generating user's check code according to the user information, according to user's check code to institute The download address for stating micro- end log file to be downloaded redirects, and makes in the download address after redirecting comprising the user Check code, so that the user terminal is verified according to user's check code after the download is complete;Wherein, user terminal is true Whether the user's check code obtained surely matches with the user information of subscriber terminal side;
Login response module is stepped on suitable for receiving the login request message sent after the user terminal verifies successfully according to described It records request message and returns to login response message to the user terminal, so that the user terminal is according to the login response message The micro- end of automated log on.
10. device according to claim 9, wherein the check code generation module is specifically used for:
Checking parameter field is added in the download address of micro- end log file to be downloaded, by the checking parameter field Value be set as the value of user's check code;
The download address of micro- end log file to be downloaded is jumped for the addition verification ginseng by page jump mode Download address after digital section.
11. device according to claim 9, wherein the check code generation module is specifically used for: according to preset operation Rule carries out operation to the user information, obtains the first operation result, generates the user according to first operation result Check code;
Wherein, the operation rule includes at least one of following algorithm: md5 algorithm, SHA algorithm, hash algorithm, RSA are calculated Method and DES algorithm, and the user information includes at least one of following information: present system time, gaming platform, game Area's clothes, user identifier and user cookie.
12. device according to claim 11, wherein the check code generation module is specifically used for: from first fortune It calculates and intercepts presetting digit capacity in result as the second operation result, using second operation result as user's check code.
13. device according to claim 12, wherein the check code generation module is specifically used for:
Judge whether second operation result repeats with existing user's check code;If judging result be it is no, by described second Operation result is as user's check code;If the determination result is YES, then interception is default again from first operation result Digit, until when the presetting digit capacity intercepted again and existing user's check code do not repeat, by it is described intercept again it is pre- If digit is as user's check code.
14. according to any device of claim 9-13, wherein further comprise: setup module, suitable for presetting use The effective time of family check code and/or effective degree, also, the setup module is generating the laggard one-step recording of user's check code The generation time of user's check code and/or access times will the generation time be more than more than effective time and/or access times The state of user's check code of effective degree is set to invalid state.
15. according to any device of claim 9-13, wherein further include the use in the login request message Family information and/or user's check code, and comprising according to the user information and/or the use in the login response message The logentry information that family check code generates.
16. according to any device of claim 9-13, wherein the downloading request and the login request message are The request message sent by IE browser.
CN201610440213.5A 2016-06-17 2016-06-17 The automatic logging method and device at micro- end Active CN106130964B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201610440213.5A CN106130964B (en) 2016-06-17 2016-06-17 The automatic logging method and device at micro- end
PCT/CN2017/088692 WO2017215650A1 (en) 2016-06-17 2017-06-16 Automatic login method and device for micro-game client, program, and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610440213.5A CN106130964B (en) 2016-06-17 2016-06-17 The automatic logging method and device at micro- end

Publications (2)

Publication Number Publication Date
CN106130964A CN106130964A (en) 2016-11-16
CN106130964B true CN106130964B (en) 2019-06-21

Family

ID=57470120

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610440213.5A Active CN106130964B (en) 2016-06-17 2016-06-17 The automatic logging method and device at micro- end

Country Status (1)

Country Link
CN (1) CN106130964B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017215650A1 (en) * 2016-06-17 2017-12-21 北京奇虎科技有限公司 Automatic login method and device for micro-game client, program, and medium
CN111865889B (en) * 2019-12-10 2022-08-26 北京嘀嘀无限科技发展有限公司 Login request processing method, system, device, electronic equipment and storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1905443A (en) * 2005-07-30 2007-01-31 腾讯科技(深圳)有限公司 Method and system of automatic login server for client
CN103327115A (en) * 2013-07-05 2013-09-25 百度在线网络技术(北京)有限公司 Entry control method and device of application program
CN103401907A (en) * 2013-07-23 2013-11-20 惠州Tcl移动通信有限公司 Synchronous processing method and system for login information of application program
CN103428159A (en) * 2012-05-14 2013-12-04 联想(北京)有限公司 Method for logging in to program and server
CN103841188A (en) * 2014-02-27 2014-06-04 北京奇虎科技有限公司 Cookie information processing method and device in browser
CN104298533A (en) * 2014-11-06 2015-01-21 北京奇虎科技有限公司 Method, device and equipment for customizing software installation package
CN105162779A (en) * 2015-08-20 2015-12-16 南威软件股份有限公司 Method for using uniform user authentication in multiple systems
CN105429961A (en) * 2015-11-03 2016-03-23 竞技世界(杭州)网络技术有限公司 Automatic account number registration and login method

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1905443A (en) * 2005-07-30 2007-01-31 腾讯科技(深圳)有限公司 Method and system of automatic login server for client
CN103428159A (en) * 2012-05-14 2013-12-04 联想(北京)有限公司 Method for logging in to program and server
CN103327115A (en) * 2013-07-05 2013-09-25 百度在线网络技术(北京)有限公司 Entry control method and device of application program
CN103401907A (en) * 2013-07-23 2013-11-20 惠州Tcl移动通信有限公司 Synchronous processing method and system for login information of application program
CN103841188A (en) * 2014-02-27 2014-06-04 北京奇虎科技有限公司 Cookie information processing method and device in browser
CN104298533A (en) * 2014-11-06 2015-01-21 北京奇虎科技有限公司 Method, device and equipment for customizing software installation package
CN105162779A (en) * 2015-08-20 2015-12-16 南威软件股份有限公司 Method for using uniform user authentication in multiple systems
CN105429961A (en) * 2015-11-03 2016-03-23 竞技世界(杭州)网络技术有限公司 Automatic account number registration and login method

Also Published As

Publication number Publication date
CN106130964A (en) 2016-11-16

Similar Documents

Publication Publication Date Title
CN104219316B (en) A kind of call request processing method and processing device in distributed system
CN108897691A (en) Data processing method, device, server and medium based on interface analog service
TWI654533B (en) Method for downloading and installing client, server and client
CN105337990B (en) The method of calibration and device of user identity
CN108183962B (en) Simulation test system
CN104519050B (en) Login method and login system
US20030182408A1 (en) Load test system for a server and method of use
CN105635178B (en) Ensure the block type Network Access Method and device of safety
CN105577799B (en) A kind of fault detection method and device of data-base cluster
US11726800B2 (en) Remote component loader
CN112988608B (en) Data testing method and device, computer equipment and storage medium
CN105204917B (en) The method and device of loading configuration file in application program launching
CN105871853A (en) Portal authenticating method and system
CN113449022A (en) Method and device for processing service request
CN106130964B (en) The automatic logging method and device at micro- end
CN106161429B (en) The automatic logging method and device at micro- end
CN105871927B (en) The automatic logging method and device at micro- end
US9002847B2 (en) Identifying an auto-complete communication pattern
Hunter II Distributed Systems with Node. js
US10310962B2 (en) Infrastructure rule generation
CN108848077A (en) The login method and device of application program
CN106390458B (en) Webpage game on-hook method, server, mobile terminal and browser client
CN105141586B (en) A kind of method and system verified to user
WO2017215650A1 (en) Automatic login method and device for micro-game client, program, and medium
CN108337227B (en) Method and middleware based on OpenID account login application program

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20220804

Address after: 300450 No. 9-3-401, No. 39, Gaoxin 6th Road, Binhai Science Park, Binhai New Area, Tianjin

Patentee after: 3600 Technology Group Co.,Ltd.

Address before: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park)

Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Patentee before: Qizhi software (Beijing) Co.,Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20230705

Address after: 1765, floor 17, floor 15, building 3, No. 10 Jiuxianqiao Road, Chaoyang District, Beijing 100015

Patentee after: Beijing Hongxiang Technical Service Co.,Ltd.

Address before: 300450 No. 9-3-401, No. 39, Gaoxin 6th Road, Binhai Science Park, Binhai New Area, Tianjin

Patentee before: 3600 Technology Group Co.,Ltd.

TR01 Transfer of patent right