Embodiment one,
Fig. 2 shows the flow charts of the automatic logging method at micro- end of the offer of the embodiment of the present invention one.It, should as shown in Fig. 2
Method specifically includes the following steps:
Step S210: user terminal sends downloading request to server.
Wherein, user terminal includes all kinds of fixed terminals or mobile terminal, wherein fixed terminal includes personal computer
Deng mobile terminal includes PAD, mobile phone etc..Types of applications can be run on the subscriber terminal, for example, browser application, game
Using etc..Wherein, game application further includes platform game, web game, micro- end game etc..For micro- end game
Speech further includes front-end client and back-end services end, wherein front-end client is used to provide interface class for user
Intuitive operation, back-end services end are used to provide background service for front-end client and support, and carry out necessary lead to server
Letter.In the present embodiment, after user terminal opens platform game homepage by chrome browser or red fox browser, energy
Downloading request enough is sent for certain game on the homepage, to download the corresponding micro- end game of this game.
Step S220: server receives the above-mentioned downloading request that user terminal is sent, and is waited for down according to the downloading request
The micro- end log file and user information carried.
Wherein, server refers mainly to WEB server.After server receives above-mentioned downloading request, it is parsed,
Micro- end log file and user information to be downloaded are obtained according to parsing result.Specific acquisition modes can be by this field skill
Art personnel flexibly set.For example, directly can include micro- end to be downloaded in downloading request in the first implementation
The identification information and user information of log file, server can be directly obtained the mark of micro- end log file by parsing
Know information and user information.In the second implementation, it can also only be stepped in downloading request comprising micro- end to be downloaded
The identification information of file is recorded, server gets the user terminal for sending that the downloading is requested according to the source address of downloading request
Address information, and the related letter for the game application being currently running on the user terminal is inquired and obtained according to the address information
Breath, therefrom extracts required user information.When specific implementation, server can obtain user information, Lua language by Lua language
Not only sentence is succinct and performance efficiency for speech, can be obviously improved search efficiency by Lua language.In addition, in addition to Lua language, this
Field technical staff can also flexibly select each speech like sound such as PHP, JAVA to obtain user information.
Step S230: server generates user's check code according to above-mentioned user information.
Wherein, user information may include various information.For example, user information includes at least one of following information:
Present system time, gaming platform, Game Zone clothes, user identifier and user cookie.When specific generation user's check code,
Operation can be carried out to user information according to preset operation rule, user's check code is generated according to operation result.Wherein, it transports
Calculating rule can flexibly be realized by various algorithms, for example, md5 algorithm, SHA algorithm, hash algorithm, RSA Algorithm and DES are calculated
Method etc..
In the present embodiment, it is illustrated by taking md5 algorithm as an example.Encryption fortune is carried out to user information by md5 algorithm
It calculates, obtains the first operation result.It is under normal conditions 32 since the digit of the first operation result is longer, it is subsequent in order to improve
Treatment effeciency intercepts presetting digit capacity as the second operation result, and by second in the present embodiment from the first operation result
Operation result is as user's check code.For example, randomly continuous interception 7 is used as user's check code from 32.Pass through interception
The mode of presetting digit capacity can significantly shorten subsequent propagation delay time, promote processing speed, certainly, of the invention other real
It applies in example, can also be directly using the first operation result as user's check code, or presetting digit capacity is intercepted by other means,
For example, in addition to continuously interception numerical digit one can also be intercepted every several.
In addition, the generated user's check code of the second operation result and server after intercepting in order to prevent repeats, at this
In step, it can also further judge whether the second operation result repeats with existing user's check code;If judging result is
It is no, using the second operation result as user's check code;If the determination result is YES, then interception is pre- again from the first operation result
If digit, until when the presetting digit capacity that intercepts again and existing user's check code do not repeat, the presetting digit capacity that will intercept again
As user's check code.
Optionally, in the present embodiment, in order to effectively avoid interception after the second operation result and existing user verify
Code repetition, can preset effective time and/or the effective degree of user's check code, correspondingly, generate user's check code
Later, further record user's check code the generation time and/or access times, will generate the time be more than effective time and/or
Access times are more than that the state of user's check code of effective degree is set to invalid state.For example, can having user's check code
The effect time is set as one minute, and super user's check code is in invalid state later after one minute, can not normal use;May be used also
To set the effective degree of user's check code to once, when its using it is primary after then cease to be in force automatically, can not reuse.By
This can be avoided the polyisomenism between user's check code.
Step S240: server renames micro- end log file to be downloaded according to user's check code, will order again
Micro- end log file after name is supplied to user terminal downloads.
Wherein, micro- end log file is often referred to can be used in running micro- client software of specified game.For example, at this
In embodiment, it is assumed that the file identification for the micro- end log file for including in downloading request is DZZ, can be with by this document mark
Determine that corresponding micro- end log file is micro- client software corresponding to big dominant force game.Micro- end log file it is original
The entitled DZZ.EXE of file.In the present embodiment, it is renamed according to user's check code, makes user terminal according to ordering again
Filename after name can determine user's check code.When specific implementation, it can be renamed by various modes.First
In kind implementation, user's check code is directly added to the designated position of raw filename, is added for example, passing through underscore
To the end of raw filename, raw filename is made to be changed to DZZ_CODE.EXE.In the second implementation, in order to mention
The safety in transmission process is risen, preset Encryption Algorithm can be carried out to user's check code, and cryptographic calculation result is added
To the designated position of raw filename.Later, micro- end log file after renaming is supplied under user terminal by server
It carries.Specifically, the downloading portal of micro- end log file after renaming can be sent to user terminal.
Step S250: user terminal is obtained according to the filename of micro- end log file and is used when downloading micro- end log file
Family check code.
Specifically, user terminal downloads micro- end log file by the downloading portal of server feedback.The downloading portal can
To be the various forms such as download link, downloading icon.In downloading process or after the completion of downloading, user terminal is stepped on according to micro- end
The filename for recording file obtains user's check code.Specific acquisition modes depend on the renaming mode in previous step, work as use
When the first renaming mode, user's check code directly can be obtained by filename;When using second of renaming mode
When, user's check code can be obtained by executing preset decipherment algorithm to the specific field in filename.
In addition, step S250 can be according to pre-set operation logic automatic trigger, for example, can be set to user
Terminal obtains user's check code automatically before downloading starts;Alternatively, user terminal obtains user school automatically in downloading process
Test code;Alternatively, user terminal obtains user's check code automatically after downloading.In addition, step S250 can also be according to user
The operation requests of sending are triggered, for example, when user double-clicks the micro- end log file downloaded, the front-end customer at micro- end
Termination receives the operation requests of the double-click type, and the operation requests of the double-click type are passed to the back-end services end at micro- end
It is handled, the back-end services end at micro- end reads filename and acquisition after renaming according to the operation requests of the double-click type
User's check code.
Step S260: user terminal verifies user's check code according to preset verification rule.
Wherein, this step can be continuously performed according to the triggering of step S250, that is to say, that no matter step S250 is adopted
Which kind of triggered with mode, the automatic trigger step S260 as long as step S250 is finished.Alternatively, this step can also be micro-
Automatic trigger after holding log file to download, that is to say, that no matter step S250 is triggered using which kind of mode, as long as micro- end
Log file downloading finishes then automatic trigger step S260.
Specifically, it can be verified by least one of following rule rule in this step: the first verification rule
Are as follows: whether the generation time for judging user's check code is more than preset effective time, if judging result be it is no, verify success;
If the determination result is YES, then failure is verified.For example, when preset effective time is 1 minute, if when the generation of user's check code
Between surpass then verify failure after one minute.Second of verification rule are as follows: whether the access times for judging user's check code are more than default
Effective degree, if judging result be it is no, verify success;If the determination result is YES, then failure is verified.For example, when preset
When effective degree is 1 time, failure was verified as long as user's check code has used.The third verification rule are as follows: according to user
The user cookie that includes in information determines user identifier corresponding with user cookie, if it is determined that the user identifier that goes out and
The user identifier for including in user information is identical, then verifies success;Conversely, then verifying failure.Above-mentioned three kinds of verification modes both may be used
To be used alone, can also be used in combination.In addition, those skilled in the art can also flexibly set in addition to above-mentioned verification mode
Other verification modes are verified, as long as can determine the validity of user's check code and its between user information
With relationship.
It can be seen that the execution purpose of this step is to determine user's check code of acquisition and the user of subscriber terminal side
Whether information matches, since user's check code is generated according to user information, can be obtained by user's check code
User information, the user information that will acquire is compared with the user information of subscriber terminal side local can determine that user verifies
The legitimacy of code.
Step S270: when verifying successfully, user terminal sends login request message to server.
Specifically, this step can after verifying successfully automatic trigger.Wherein, it is further included in login request message
Above-mentioned user information and/or user's check code, so that server determines user to be logged in.
Step S280: server receives the login request message sent after user terminal verifies successfully, according to logging request
Message returns to login response message to user terminal.
Wherein, the logentry in login response message comprising being generated according to user information and/or user's check code is believed
Breath, can be automatically performed login by logentry information.Specifically, server is according to user information and/or user's check code
It can determine the letters such as the current online game name of user to be logged in, Game Zone clothes, gaming platform and user cookie
Breath, accordingly, server distribute corresponding logentry information, to realize the automated log on of the user.
Step S290: the micro- end of login response message automated log on that user terminal is returned according to server.
When specific implementation, this step can be executed by the micro- end server-side run on user terminal.Micro- end service termination
After receiving login response message, automated log on is carried out according to logentry information wherein included.Wherein, logentry information
It can be the forms such as login link.
It can be seen that the mode in through the embodiment of the present invention can be realized the automated log at micro- end, user people is eliminated
Work inputs the troublesome operation of user information and manual entry, has saved the plenty of time for user, after the completion of avoiding micro- end downloading
The phenomenon that leading to customer churn because having no time login generation.
Embodiment two,
Fig. 3 shows the flow chart of the automatic logging method at micro- end provided by Embodiment 2 of the present invention.It, should as shown in Fig. 3
Method specifically includes the following steps:
Step S310: user terminal sends downloading request to server.
Wherein, user terminal includes all kinds of fixed terminals or mobile terminal, wherein fixed terminal includes personal computer
Deng mobile terminal includes PAD, mobile phone etc..Types of applications can be run on the subscriber terminal, for example, browser application, game
Using etc..Wherein, game application further includes platform game, web game, micro- end game etc..For micro- end game
Speech further includes front-end client and back-end services end, wherein front-end client is used to provide interface class for user
Intuitive operation, back-end services end are used to provide background service for front-end client and support, and carry out necessary lead to server
Letter.It in the present embodiment, can be on the homepage after user terminal opens platform game homepage by IE browser
Certain game sends downloading request, to download the corresponding micro- end game of this game.
Step S320: server receives the above-mentioned downloading request that user terminal is sent, and is waited for down according to the downloading request
The micro- end log file and user information carried.
Wherein, server refers mainly to WEB server.After server receives above-mentioned downloading request, it is parsed,
Micro- end log file and user information to be downloaded are obtained according to parsing result.Specific acquisition modes can be by this field skill
Art personnel flexibly set.For example, directly can include micro- end to be downloaded in downloading request in the first implementation
The identification information and user information of log file, server can be directly obtained the mark of micro- end log file by parsing
Know information and user information.In the second implementation, it can also only be stepped in downloading request comprising micro- end to be downloaded
The identification information of file is recorded, server gets the user terminal for sending that the downloading is requested according to the source address of downloading request
Address information, and the related letter for the game application being currently running on the user terminal is inquired and obtained according to the address information
Breath, therefrom extracts required user information.When specific implementation, server can obtain user information, Lua language by Lua language
Not only sentence is succinct and performance efficiency for speech, can be obviously improved search efficiency by Lua language.In addition, in addition to Lua language, this
Field technical staff can also flexibly select each speech like sound such as PHP, JAVA to obtain user information.
Step S330: server generates user's check code according to above-mentioned user information.
Wherein, user information may include various information.For example, user information includes at least one of following information:
Present system time, gaming platform, Game Zone clothes, user identifier and user cookie.When specific generation user's check code,
Operation can be carried out to user information according to preset operation rule, user's check code is generated according to operation result.Wherein, it transports
Calculating rule can flexibly be realized by various algorithms, for example, md5 algorithm, SHA algorithm, hash algorithm, RSA Algorithm and DES are calculated
Method etc..
In the present embodiment, it is illustrated by taking md5 algorithm as an example.Encryption fortune is carried out to user information by md5 algorithm
It calculates, obtains the first operation result.It is under normal conditions 32 since the digit of the first operation result is longer, it is subsequent in order to improve
Treatment effeciency intercepts presetting digit capacity as the second operation result, and by second in the present embodiment from the first operation result
Operation result is as user's check code.For example, randomly continuous interception 7 is used as user's check code from 32.Pass through interception
The mode of presetting digit capacity can significantly shorten subsequent propagation delay time, promote processing speed, certainly, of the invention other real
It applies in example, can also be directly using the first operation result as user's check code, or presetting digit capacity is intercepted by other means,
For example, in addition to continuously interception numerical digit one can also be intercepted every several.
In addition, the generated user's check code of the second operation result and server after intercepting in order to prevent repeats, at this
In step, it can also further judge whether the second operation result repeats with existing user's check code;If judging result is
It is no, using the second operation result as user's check code;If the determination result is YES, then interception is pre- again from the first operation result
If digit, until when the presetting digit capacity that intercepts again and existing user's check code do not repeat, the presetting digit capacity that will intercept again
As user's check code.
Optionally, in the present embodiment, in order to effectively avoid interception after the second operation result and existing user verify
Code repetition, can preset effective time and/or the effective degree of user's check code, correspondingly, generate user's check code
Later, further record user's check code the generation time and/or access times, will generate the time be more than effective time and/or
Access times are more than that the state of user's check code of effective degree is set to invalid state.For example, can having user's check code
The effect time is set as one minute, and super user's check code is in invalid state later after one minute, can not normal use;May be used also
To set the effective degree of user's check code to once, when its using it is primary after then cease to be in force automatically, can not reuse.By
This can be avoided the polyisomenism between user's check code.
Step S340: server according to above-mentioned user's check code to the download address of micro- end log file to be downloaded into
Row redirects, and makes in the download address after redirecting comprising above-mentioned user's check code.
When specific implementation, redirection operation can be realized in the following way: firstly, in micro- end log file to be downloaded
Download address in add checking parameter field, set the value for verifying parameter field to the value of user's check code.Wherein, school
Testing parameter field can be set any position in download address, for example, the end of download address is arranged in.Then, pass through
Page jump mode jumps the download address of micro- end log file to be downloaded for the downloading after addition checking parameter field
Location.When specifically jumping, mode can be jumped by 302 and be jumped.Wherein, it 302 jumps also to cry and temporarily jumps, jumped using 302
When turning, user terminal can request download address twice, and the download address requested for the first time is not comprising checking parameter field
Original download address, second download address request is the redirection download address containing checking parameter field, and
And since 302 jump temporarily to jump, search engine will not be stored to download address is redirected.Due to server
The user's check code generated every time is different, and therefore, the redirect address executed when redirecting operation every time is also different, therefore, makes
Interim redirection operation can be completed under the premise of not changing original download address by jumping mode with 302, be particularly suitable for
The application scenarios that user's check code dynamic in the present invention changes.Certainly, in addition to 302 jump mode, other page jump sides
Formula can also apply to the present invention.
Step S350: user terminal is when downloading micro- end log file, according under micro- end log file after redirection
The checking parameter field for including in set address obtains user's check code.
Specifically, user terminal downloads micro- end log file by the download address of server feedback.Due to the downloading
Location has carried out re-orientation processes, and therefore, user terminal needs to request to server twice, to request to server for the first time original
Download address requests to redirect download address to server according to redirection instruction for the second time.In downloading process or download
Cheng Hou, user terminal obtain user's check code according to the checking parameter field for including in download address is redirected.In addition, step
S350 can according to pre-set operation logic automatic trigger, for example, can be set to user terminal in downloading process from
It is dynamic to obtain user's check code;Alternatively, user terminal obtains user's check code automatically after downloading.In addition, due to this reality
It applies example and is mainly used in IE browser, and the kernel of IE browser is different from the kernel of chrome browser or red fox browser,
Therefore, the file type of the micro- end log file downloaded to by IE browser is usually application type, different
The file type of the entitled .exe of suffix in embodiment one.Pass through the text for the application type that IE browser downloads to
Part does not need user's execution double click operation can automatic running.Therefore, different from the step S250 in embodiment one, this implementation
Step S350 in example is typically without to be triggered according to the operation requests that user issues.
Step S360: user terminal verifies user's check code according to preset verification rule.
Wherein, this step can be continuously performed according to the triggering of step S350, that is to say, that no matter step S350 is adopted
Which kind of triggered with mode, the automatic trigger step S360 as long as step S350 is finished.Alternatively, this step can also be micro-
Automatic trigger after holding log file to download, that is to say, that no matter step S350 is triggered using which kind of mode, as long as micro- end
Log file downloading finishes then automatic trigger step S360.
Specifically, it can be verified by least one of following rule rule in this step: the first verification rule
Are as follows: whether the generation time for judging user's check code is more than preset effective time, if judging result be it is no, verify success;
If the determination result is YES, then failure is verified.For example, when preset effective time is 1 minute, if when the generation of user's check code
Between surpass then verify failure after one minute.Second of verification rule are as follows: whether the access times for judging user's check code are more than default
Effective degree, if judging result be it is no, verify success;If the determination result is YES, then failure is verified.For example, when preset
When effective degree is 1 time, failure was verified as long as user's check code has used.The third verification rule are as follows: according to user
The user cookie that includes in information determines user identifier corresponding with user cookie, if it is determined that the user identifier that goes out and
The user identifier for including in user information is identical, then verifies success;Conversely, then verifying failure.Above-mentioned three kinds of verification modes both may be used
To be used alone, can also be used in combination.In addition, those skilled in the art can also flexibly set in addition to above-mentioned verification mode
Other verification modes are verified, as long as can determine the validity of user's check code and its between user information
With relationship.
It can be seen that the execution purpose of this step is to determine user's check code of acquisition and the user of subscriber terminal side
Whether information matches, since user's check code is generated according to user information, can be obtained by user's check code
User information, the user information that will acquire is compared with the user information of subscriber terminal side local can determine that user verifies
The legitimacy of code.
Step S370: when verifying successfully, user terminal sends login request message to server.
Specifically, this step can after verifying successfully automatic trigger.Wherein, it is further included in login request message
Above-mentioned user information and/or user's check code, so that server determines user to be logged in.
Step S380: server receives the login request message sent after user terminal verifies successfully, according to logging request
Message returns to login response message to user terminal.
Wherein, the logentry in login response message comprising being generated according to user information and/or user's check code is believed
Breath, can be automatically performed login by logentry information.Specifically, server is according to user information and/or user's check code
It can determine the letters such as the current online game name of user to be logged in, Game Zone clothes, gaming platform and user cookie
Breath, accordingly, server distribute corresponding logentry information, to realize the automated log on of the user.
Step S390: the micro- end of login response message automated log on that user terminal is returned according to server.
When specific implementation, this step can be executed by the micro- end server-side run on user terminal.Micro- end service termination
After receiving login response message, automated log on is carried out according to logentry information wherein included.Wherein, logentry information
It can be the forms such as login link.
It can be seen that the mode in through the embodiment of the present invention, on the one hand, can be generated by server for verifying
User's check code on the other hand can complete the verification of user information by micro- end server-side on user terminal, and
Verification is automatically requested to server for logging in the logentry information of micro- end game after passing through, to realize oneself of micro- end
It is dynamic to log in, the troublesome operation that user information and manual entry is manually entered in user is eliminated, has saved the plenty of time for user,
Avoid the phenomenon that logging in because having no time due to lead to customer churn after the completion of micro- end is downloaded generation.
In addition, it will be appreciated to those of skill in the art that in above-described embodiment one and embodiment two, user terminal
Performed operations, for example, send downloading request, user's check code is verified and is sent login request message with
And be automatically performed login etc., it is all to be realized by means of micro- end server-side, micro- end server-side is in addition to can integrate at user's end
Hold except local, it is highly preferred that for the ease of being managed collectively to each micro- end client, promoted verification accuracy and
Efficiency, micro- end server-side can also be realized by one or more individual network server.
In addition, the above embodiments one are mainly used in chrome browser or red fox browser, both browsers
Common trait is: micro- end log file of downloading is usually the file of .exe format, also, after the download is complete, need to by with
Micro- end log file is double-clicked to trigger the automated log at micro- end, therefore, in example 1, by micro- end log file in family
The mode renamed makes micro- end log file obtain automatically when receiving the operation requests for double-clicking type and verify user
Check code, to realize the effect of automated log on after verification passes through.
The above embodiments two are mainly used in IE browser, and the micro- end log file downloaded by the browser is usual
For the file of .application format, also, after the download is complete, IE browser being capable of micro- end for having downloaded of automatic running
Log file executes double click operation without user, and the above-mentioned characteristic based on IE browser, embodiment two is to micro- end log file
Download address redirect, so as to user terminal in downloading process by redirect after download address obtain user
Check code is simultaneously verified automatically.
In addition to above-mentioned several browsers, present invention can also apply to other all kinds of browsers, and according to browser
Characteristic accordingly adjust the realization details in above-described embodiment, send user's check code to use as long as can be realized server
Family terminal, the purpose verified for user terminal.In addition, various types of clear in order to enable the invention to be compatible with
Look at device, the present invention can also further include following embodiments three, so as to by above-described embodiment one and embodiment two-phase knot
It closes, specifically, in the third embodiment, the step S210 to step S230 in above-described embodiment one is first carried out, then, service
Device judges the core type of the browser of subscriber terminal side, if it is judged that the first kind of the core type of browser is (i.e.
Chrome type or red fox type), then execute the step S240 to step S290 in embodiment one;If it is judged that browser
Core type Second Type (i.e. IE type), then execute the step S340 to step S390 in embodiment two.Thus may be used
See, is implementing the operating procedure for judging browser kernel type to be increased, so as to be flexibly applied to various types in three
Browser.
Fig. 4 show another embodiment of the present invention provides micro- end automatic login device structure chart.As shown in figure 4,
The device includes:
Receiving module 41, the downloading request sent suitable for receiving user terminal are to be downloaded according to the downloading request
Micro- end log file and user information;
Check code generation module 42 is suitable for generating user's check code according to the user information, be verified according to the user
Code redirects the download address of micro- end log file to be downloaded, includes in the download address after making redirection
User's check code, so that the user terminal is verified according to user's check code after the download is complete;
Login response module 43, suitable for receiving the login request message sent after the user terminal verifies successfully, according to
The login request message returns to login response message to the user terminal, so that the user terminal is according to the login
The micro- end of response message automated log on.
Optionally, the check code generation module 42 is specifically used for: in the downloading of micro- end log file to be downloaded
Checking parameter field is added in address, sets the value of the checking parameter field to the value of user's check code;Pass through page
Face jumps after mode jumps the download address of micro- end log file to be downloaded to add the checking parameter field
Download address.
Optionally, the check code generation module 42 is specifically used for: according to preset operation rule to the user information
Operation is carried out, the first operation result is obtained, user's check code is generated according to first operation result;Wherein, the fortune
Calculating rule includes at least one of following algorithm: md5 algorithm, SHA algorithm, hash algorithm, RSA Algorithm and DES algorithm, and
The user information includes at least one of following information: present system time, gaming platform, Game Zone clothes, Yong Hubiao
Knowledge and user cookie.
Optionally, the check code generation module 42 is specifically used for: intercepting presetting digit capacity from first operation result
As the second operation result, using second operation result as user's check code.
Optionally, the check code generation module 42 is specifically used for: judge second operation result whether with it is existing
User's check code repeats;If judging result be it is no, using second operation result as user's check code;If judgement knot
Fruit be it is yes, then intercept presetting digit capacity again from first operation result, until the presetting digit capacity intercepted again with
When some user's check codes do not repeat, using the presetting digit capacity intercepted again as user's check code.
Optionally, further comprise: setup module 44, suitable for presetting the effective time of user's check code and/or having
Number is imitated, also, the setup module is in the generation time for generating user's check code described in the laggard one-step recording of user's check code
And/or access times, will generate the time is more than the user's check code of effective time and/or access times more than effective degree
State is set to invalid state.
Wherein, the user information and/or user's check code are further included in the login request message, and
Logentry information in the login response message comprising being generated according to the user information and/or user's check code.
Wherein, the downloading request and the login request message are the request messages sent by IE browser.
The specific structure and working principle of above-mentioned modules can refer to the description of corresponding steps in embodiment of the method, this
Place repeats no more.
In conclusion in the automatic logging method and device at micro- end provided by the invention, firstly, server being capable of root
To user information and user's check code is accordingly generated according to the downloading request that user terminal is sent, it then, can be at user's end
User's check code is supplied to user terminal during the micro- end log file of end downloading, so that user terminal is according to the use
Family check code verifies user information, and after verifying successfully from trend server send login request message into
Row logs in.It can be seen that in the present invention, user's check code that server is generated according to user information is sent to user's end
End verification, thus enable user terminal after verifying successfully automatically according to the corresponding user information of user's check code to service
Device sends login request message and then automated log on, thus avoids user information need to being manually entered by user in the prior art
And the troublesome operation of manual entry, save user time.
Algorithm and display are not inherently related to any particular computer, virtual system, or other device provided herein.
Various general-purpose systems can also be used together with teachings based herein.As described above, it constructs required by this kind of system
Structure be obvious.In addition, the present invention is also not directed to any particular programming language.It should be understood that can use various
Programming language realizes summary of the invention described herein, and the description done above to language-specific is to disclose this
The preferred forms of invention.
In the instructions provided here, numerous specific details are set forth.It is to be appreciated, however, that implementation of the invention
Example can be practiced without these specific details.In some instances, well known method, knot is not been shown in detail
Structure and technology, so as not to obscure the understanding of this specification.
Similarly, it should be understood that in order to simplify the disclosure and help to understand one or more of the various inventive aspects,
In the above description of the exemplary embodiment of the present invention, each feature of the invention is grouped together into single reality sometimes
It applies in example, figure or descriptions thereof.However, the disclosed method should not be interpreted as reflecting the following intention: being wanted
Ask protection the present invention claims features more more than feature expressly recited in each claim.More precisely, such as
As following claims reflect, inventive aspect is all features less than single embodiment disclosed above.
Therefore, it then follows thus claims of specific embodiment are expressly incorporated in the specific embodiment, wherein each right
It is required that itself is all as a separate embodiment of the present invention.
Those skilled in the art will understand that adaptivity can be carried out to the module in the equipment in embodiment
Ground changes and they is arranged in one or more devices different from this embodiment.It can be the module in embodiment
Or unit or assembly is combined into a module or unit or component, and furthermore they can be divided into multiple submodule or sons
Unit or sub-component.It, can be with other than such feature and/or at least some of process or unit exclude each other
Using any combination to all features disclosed in this specification (including adjoint claim, abstract and attached drawing) and such as
All process or units of any method or apparatus of the displosure are combined.Unless expressly stated otherwise, this specification
Each feature disclosed in (including the accompanying claims, abstract and drawings) can be by providing identical, equivalent, or similar mesh
Alternative features replace.
In addition, it will be appreciated by those of skill in the art that although some embodiments in this include institute in other embodiments
Including certain features rather than other feature, but the combination of the feature of different embodiment means to be in model of the invention
Within enclosing and form different embodiments.For example, in the following claims, embodiment claimed is appointed
Meaning one of can in any combination mode come using.
Various component embodiments of the invention can be implemented in hardware, or to transport on one or more processors
Capable software module is realized, or is implemented in a combination thereof.It will be understood by those of skill in the art that can be in practice
Realized using microprocessor or digital signal processor (DSP) some in device according to an embodiment of the present invention or
The some or all functions of whole components.The present invention is also implemented as one for executing method as described herein
Point or whole device or device programs (for example, computer program and computer program product).Such this hair of realization
Bright program can store on a computer-readable medium, or may be in the form of one or more signals.It is such
Signal can be downloaded from an internet website to obtain, and is perhaps provided on the carrier signal or is provided in any other form.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and this
Field technical staff can be designed alternative embodiment without departing from the scope of the appended claims.In claim
In, any reference symbol between parentheses should not be configured to limitations on claims.Word "comprising" is not excluded for depositing
In element or step not listed in the claims.Word "a" or "an" located in front of the element does not exclude the presence of multiple
Such element.The present invention can be by means of including the hardware of several different elements and by means of properly programmed calculating
Machine is realized.In the unit claims listing several devices, several in these devices can be by same
Hardware branch embodies.The use of word first, second, and third does not indicate any sequence.It can be by these words
It is construed to title.