A kind of method and system logging in application
Technical field
The present invention relates to communication technical field, more particularly to a kind of method and system logging in application.
Background technology
At present, most internet application, no matter be on PC, on mobile phone or flat
On plate computer, it is required for user's input account and password carries out authorizing access.Generally user is using electricity
Sub-voice mailbox, social media, even the internet application such as shopping online when it is necessary to first register account number
And password;Wherein password arranges to obtain the appropriate whether safe coefficient concerning account;General Password Length is longer,
Code characters composition distribution is more random, and Cipher Strength is stronger, and account is also safer.But high intensity
Password also has its weakness, the higher password of intensity, user memory difficulty also bigger, forgetting general
Rate is also higher.
Different internet applications is different to the intensity requirement of password, the password of usual program a accreditation
Strength test cannot be passed through in program b, this requires user to program a and program b using different
Cipher Strength setting;Although this enhances the security of user account, considerably increase user's
Memory burden, also considerably increases the probability forgeing password.In a practical situation, user often selects to hold
Easily remember to meet the simple password of the Internet, applications minimum requirements simultaneously;And this simple password, hold very much
Easily by illegal hacker, decoded easily so that the network security of user is subject to using modes such as dictionary, rainbow tables
Threaten to serious.
The complicated password of user can be remembered by some technical schemes that prior art provides, in user using mutually
During working application, Auto-writing password is it is not necessary to user remembers high intensity password;On the surface, this
A little technical schemes seem to solve the problems, such as cipher memory, but the enforcement of this technical scheme and equipment for surfing the net
Tight binding, once equipment for surfing the net is lost, or is illegally used it is possible to user without permission
Network security constitute a latent danger.
Content of the invention
The present invention provides a kind of method and system logging in application, to solve the security that existing application logs in
With sex chromosome mosaicism easy to use.
In order to solve the above problems, the invention discloses a kind of method logging in application, comprising:
After first equipment receives the instruction of activation application of the second equipment being connected with described first equipment,
Carry out the authentication for activating the application in described second equipment on said first device;
After certification success, obtain application to be activated in described second equipment in described first equipment right
The identification information answered and encrypted message;
Send the corresponding identification information of described application to be activated and encrypted message extremely described second equipment, with
Activate and log in application to be activated in described second equipment.
Preferably, described first equipment receive the second equipment being connected with described first equipment activation should
Before instruction, methods described also includes:
Arranged by the application in described first equipment and preserve main password;Wherein, in described first equipment
Application for activating application in described second equipment;Described main password is used for setting to using described first
The user of the application in standby carries out authentication.
Preferably, described first equipment receive the second equipment being connected with described first equipment activation should
After instruction, methods described also includes:
Represent request circle activating the application in described second equipment by the application in described first equipment
Face.
Preferably, carry out the identity for activating the application in described second equipment on said first device
Certification, comprising:
By main password or the biological knowledge of the request interface receives input of the application in described first equipment
Other information;
Using receive described main password or biometric information, carry out on said first device for
Activate the authentication of the application in described second equipment.
Preferably, after arranging and preserve main password by the application in described first equipment, described side
Method also includes:
Add the corresponding identification information of application to be activated and the encrypted message in described second equipment;
Using described main password to the corresponding identification information of application to be activated in described second equipment and
Encrypted message is encrypted and stores.
Preferably, described first equipment obtains the corresponding mark of application to be activated in described second equipment
Knowledge information and encrypted message, comprising:
The list of application of the application in described first equipment select to be activated in described second equipment
Application, obtains the corresponding identification information through encryption of application to be activated;Wherein, described to be activated
The corresponding identification information through encryption of application is corresponding close through encryption with described application to be activated
There is corresponding relation in code information;
Through identification information encryption and warp using described main password is corresponding to described application to be activated
The encrypted message crossing encryption is decrypted operation, the corresponding mark of application described to be activated after being deciphered
Knowledge information and encrypted message.
Preferably, described corresponding to the application to be activated in described second equipment using described main password
After identification information and encrypted message are encrypted, methods described also includes:
Identification information after encryption and encrypted message are synchronized in the 3rd equipment.
The invention also discloses a kind of system logging in application, comprising: the first equipment and the second equipment;Its
In, described first equipment includes:
Active module, for receiving, in described first equipment, described second being connected with described first equipment
After the instruction of activation application of equipment, carry out on said first device for activating in described second equipment
Application authentication;
Acquisition module, for when the certification success after, obtaining in described second equipment in described first equipment
The corresponding identification information of application to be activated and encrypted message;
Sending module, for sending the corresponding identification information of described application to be activated and encrypted message to institute
State the second equipment, to activate and to log in application to be activated in described second equipment.
Preferably, described first equipment also includes:
Main password arranges preserving module, is connected with described first equipment for receiving in described first equipment
The second equipment activation application instruction before, arrange and preserve by the application in described first equipment
Main password;Wherein, the application in described first equipment is for activating the application in described second equipment;Institute
State main password for carrying out authentication to using the user of the application in described first equipment.
Preferably, described first equipment also includes:
Display module, for receiving, in described first equipment, the second equipment being connected with described first equipment
Activation application instruction after, by the application in described first equipment represent activation described second equipment
In application request interface.
Preferably, the request interface receives input by the application in described first equipment for the described active module
Main password or biometric information, using receive described main password or biometric information,
Authentication for activating the application in described second equipment is carried out on described first equipment.
Preferably, described first equipment also includes:
Add module, for arranging preserving module by the application in described first equipment in described main password
After arranging and preserve main password, add the application corresponding mark letter to be activated in described second equipment
Breath and encrypted message;
Encryption memory module, for using described main password to the application to be activated in described second equipment
Corresponding identification information and encrypted message are encrypted and store.
Preferably, described acquisition module, comprising:
Application selecting module, for selecting described the in the list of application of the application in described first equipment
Application to be activated in two equipment, obtains the corresponding identification information through encryption of application to be activated;Its
In, the corresponding identification information through encryption of described to be activated application is corresponding with described application to be activated
Through encryption encrypted message there is corresponding relation;
Deciphering module, for being encrypted to described to be activated corresponding process of applying using described main password
Identification information and the encrypted message through encrypting are decrypted operation, described to be activated after being deciphered
Apply corresponding identification information and encrypted message.
Preferably, described first equipment also includes:
Synchronization module, for using described main password in described second equipment in described encryption memory module
The corresponding identification information of application to be activated and after encrypted message is encrypted, by the mark after encryption
Information and encrypted message are synchronized in the 3rd equipment.
Compared with background technology, the present invention includes advantages below:
To activate the application of the second equipment, by activate and log in the second equipment application identification information and
Encrypted message is saved in the first equipment, ensures to connect between the first equipment and the second equipment.
Second equipment sends the instruction of activation application to the first equipment, enters line activating second on the first device
The authentication of application in equipment;After certification success, obtain in the second equipment in the first equipment and wait to swash
The corresponding identification information of application lived and encrypted message, send the corresponding identification information of application to be activated and
Encrypted message to the second equipment, to activate and to log in application to be activated in the second equipment.
In second equipment, the corresponding identification information of application to be activated and encrypted message are arranged on and set with second
In standby the first equipment connecting, it is not preserved in the second equipment local, it is to avoid the local mark letter of the second equipment
Cease problem that is stolen with encrypted message or being logged in by mistake, in the agility and the side that ensure that application logs in
Just, on the premise of property, improve the security that application logs in.
Brief description
Fig. 1 is the schematic diagram of the main password of setting of technical solution of the present invention;
Fig. 2 is the schematic diagram adding the identification information applied and encrypted message of technical solution of the present invention;
Fig. 3 is the entire flow schematic diagram of technical solution of the present invention;
Fig. 4 is the method and step flow chart that one of embodiment of the present invention one logs in application;
Fig. 5 is the method and step flow chart that one of embodiment of the present invention two logs in application;
Fig. 6 is the structural representation of the system that one of embodiment of the present invention three logs in application;
Fig. 7 is the structural representation of the system that one of embodiment of the present invention four logs in application.
Specific embodiment
Understandable for enabling the above objects, features and advantages of the present invention to become apparent from, below in conjunction with the accompanying drawings
The present invention is further detailed explanation with specific embodiment.
In order to describe conveniently, the present invention temporarily represents identification information and encrypted message using server equipment
Management, and the equipment of authentication, client equipment represents that needs carry out applying the equipment automatically logging in.
But it should be understood by those skilled in the art that server equipment and client equipment can be setting of same type
Standby, such as it is all mobile terminal or different types of equipment, such as one is server, and another
Individual for client.
Technical solution of the present invention can be divided into following several stages on using flow process.
1) main password setting.
First, user needs to install a server app (service end application) on server equipment, is
Server app arranges a main password.After setting up main password, user can by input main password Lai
Log in server app it is also possible to according to server equipment provide bio-identification function such as fingerprint or face
Identification carries out logging in of server app.
As shown in figure 1, user starts server app, server app inputs main password, server
App preserves main password, and user completes main password setting.
2) application identities (identity, id) and password add.
After logging in server app, the application that user can will need on client equipment to realize automatically logging in
Corresponding identification information and encrypted message are entered in server app, for improving identification information and message in cipher
The security of breath, server app can also be encrypted using master key further and preserve these information,
Some cloud synchronous applications can also be passed through by encrypted synchronizing information to high in the clouds.
As shown in Fig. 2 user starts server app, in server app, input main password, or
Carry out the authentication of server app using bio-identification, server app judges identity authentication result,
If authentification failure, generate and show the prompting of authentication failure;If certification success, can add
Client equipment needs the corresponding identification information of application and the encrypted message realizing automatically logging in, and is stored in
server app.For improving security further, main password encryption identification information and password can also be used
Information is simultaneously stored in server app, completes application identities and the interpolation of password.
Wherein, identification information can be unique knowledge of the application needing to realize automatically logging on client equipment
Other information, for determining which application concrete in client equipment is realized automatically logging in.Encrypted message can
To include login name and the password of application.
3) equipment connects.
User prepares to carry out applying automatically logging on a client equipment, needs first in client equipment
One client app (client application) of upper installation, then using USB (universal serial
Bus, usb), bluetooth, the mode such as wireless network (wireless-fidelity, wifi) set with server
Standby foundation connects.
4) request authorizes.
Client app after connection establishment between client equipment and server equipment, on client equipment
Can be automatically activated, and wait to step on in server device request client equipment by the connection of foundation
The identification information of the application in land and encrypted message;Server app on server equipment shows to user please
Seek content, and require user to carry out authentication by inputting the mode such as main password or bio-identification.
Described request content can include title and icon of application to be logged in client equipment etc..
5) complete automatically to log in.
After the authentication success in above-mentioned 4) stage, server equipment is by the identification information of application to be logged in
And encrypted message returns to client equipment, client app determines application to be logged in using identification information,
Complete logging in of application using encrypted message by way of automation.
It should be noted that the above-mentioned 3) stage can execute in any time period before the stage of above-mentioned 4),
I.e. the above-mentioned 3) stage can execute it is also possible to hold before the stage of above-mentioned 1) before the stage of above-mentioned 2)
OK.
The entire flow schematic diagram of technical solution of the present invention as shown in figure 3, user by server equipment with
Client equipment passes through usb or other modes connect;The client app of client equipment has detected and has set
Standby connection, sends activation instruction by the connection set up to server app;Server app receives client
The activation instruction that app sends, starts authentication interface;User inputs main password on interface or passes through
The mode of bio-identification completes authentication;Server app judges authentication result, if authentification failure,
Prompting authenticating user identification failure;If certification success, server app ejects list of application interface;With
Family selects the application that automatically will be logged on client equipment in list of application interface;server app
It is sent to client app after the identification information of the application selected using the deciphering of main password and encrypted message;
Client app passes through the identification information that gets and encrypted message automatically log on client equipment selected
Application.
Below by enumerate several specific embodiments be discussed in detail the present invention offer one kind log in application
Method and system.
Embodiment one
A kind of provided in an embodiment of the present invention method that log in application is discussed in detail.
The first equipment in the embodiment of the present invention can be above-mentioned server equipment, and the second equipment can be
Above-mentioned client equipment.
With reference to Fig. 4, show a kind of method and step flow chart logging in application in the embodiment of the present invention.
Step 100, the first equipment receives the activation application of the second equipment being connected with described first equipment
Instruction after, carry out on said first device recognizing for the identity activating the application in described second equipment
Card.
Keep being connected between described first equipment and described second equipment, can be connected by way of wired
Connect, such as set up using usb and connect it is also possible to wirelessly connect, such as using bluetooth or wifi
Set up and connect.
Described instruction can be for the second equipment after being connected with the first equipment foundation, by the second equipment actively
It is sent to the instruction of the first equipment, recognized by the identity that described instruction carries out the first equipment on the first device
Card operation.
Step 102, after certification success, obtains in described second equipment in described first equipment and waits to swash
The corresponding identification information of application lived and encrypted message.
In second equipment, the corresponding identification information of application to be activated and encrypted message can be pre-stored in
In first equipment.
Wherein, identification information can be the unique identifying information of application to be activated in the second equipment, is used for
Determine which application concrete in the second equipment is realized activation and automatically logged in.Encrypted message can include should
Login name and password.
Step 104, sends the corresponding identification information of described application to be activated and encrypted message to described the
Two equipment, to activate and to log in application to be activated in described second equipment.
Application to be activated is determined by identification information, in applications exploiting encrypted message to be activated
Login name and password enter line activating and logon operation.
In sum, embodiment of the present invention technical scheme, to activate the application of the second equipment, will activate
And log in the identification information of the application of the second equipment and encrypted message is saved in the first equipment, the first equipment and
Ensure between second equipment to connect.
Second equipment sends the instruction of activation application to the first equipment, enters line activating second on the first device
The authentication of application in equipment;After certification success, obtain in the second equipment in the first equipment and wait to swash
The corresponding identification information of application lived and encrypted message, send the corresponding identification information of application to be activated and
Encrypted message to the second equipment, to activate and to log in application to be activated in the second equipment.
In second equipment, the corresponding identification information of application to be activated and encrypted message are arranged on and set with second
In standby the first equipment connecting, it is not preserved in the second equipment local, it is to avoid the local mark letter of the second equipment
Cease problem that is stolen with encrypted message or being logged in by mistake, before ensureing the agility that application logs in
Put, improve the security that application logs in.
Embodiment two
A kind of provided in an embodiment of the present invention method that log in application is discussed in detail.
The first equipment in the embodiment of the present invention can be above-mentioned server equipment, and the second equipment can be
Above-mentioned client equipment.Keep being connected between described first equipment and described second equipment, can pass through
Wired mode connects, and is such as set up using usb and connects it is also possible to wirelessly connect, such as
Set up using bluetooth or wifi and connect.
With reference to Fig. 5, show a kind of method and step flow chart logging in application in the embodiment of the present invention.
Step 200, is arranged by the application in described first equipment and preserves main password.
Wherein, the application in described first equipment can be used for activating the application in described second equipment;Institute
State main password to can be used for carrying out authentication to using the user of the application in described first equipment.
Application in described first equipment can be above-mentioned server app.Described main password can for letter,
At least one password of numeral, symbol or Chinese combination, in addition to for authentication, can also be to follow-up
Identification information and encrypted message be encrypted.User must keep main password firmly in mind, and main password is once lost,
All will be unable to be reduced using the information that main password is encrypted.
Preferably, after above-mentioned steps 200, described for activating when carrying out on said first device
After the authentication success of the application in the second equipment, interpolation, encryption and storage second can be executed and set
The to be activated operation applying corresponding identification information and encrypted message in standby.
1st, add the corresponding identification information of application to be activated and the encrypted message in described second equipment.
2nd, use described main password to the corresponding identification information of application to be activated in described second equipment
It is encrypted with encrypted message and store.
Wherein, identification information can be the unique identifying information of application to be activated in the second equipment, is used for
Determine which application concrete in the second equipment is realized activation and automatically logged in.Encrypted message can include should
Login name and password.
For example, there is two applications to be activated, respectively application a and application b in the second equipment, should
Can be 001 with the identification information of a, the identification information of application b can be 002, the password of application a
Information can be multigroup login name and password, and the encrypted message of application b can be multigroup login name and close
Code.
In second equipment, the corresponding identification information of application to be activated and encrypted message can be after encryption
Be saved in the first equipment, it is possible to use synchronous applications or other modes by the identification information after encrypting and
Encrypted message is synchronized in the 3rd equipment, so that when the first equipment breaks down, can be from the 3rd equipment
The corresponding identification information of application to be activated and encrypted message in middle recovery the second equipment, thus improve mark
Knowledge information and the security of encrypted message.
3rd equipment can be cloud device, for example, keep the Cloud Server of network connection with the first equipment
Deng.
Step 202, described first equipment receives the activation of the second equipment being connected with described first equipment
After the instruction of application, represented by the application in described first equipment and activate answering in described second equipment
Request interface.
Described instruction can be for the second equipment after being connected with the first equipment foundation, by the second equipment
Client app is actively sent to the instruction of the server app in the first equipment, is instructed first by described
The authentication operation of the first equipment is carried out on the server app of equipment.
The request interface of the application in activation the second equipment is represented on server app, can wrap in interface
Include input frame or bio-identification instruction of main password etc..
Step 204, carries out the body for activating the application in described second equipment on said first device
Part certification.
Preferably, described step 204 can be:
By main password or the biological knowledge of the request interface receives input of the application in described first equipment
Other information, using the described main password receiving or biometric information, is carried out on said first device
For activating the authentication of the application in described second equipment.
Described biometric information can be known for execution fingerprint recognition operation, recognition of face operation or sound
Not Cao Zuo etc. and produce identification information.
Step 206, after certification success, obtains in described second equipment in described first equipment and waits to swash
The corresponding identification information of application lived and encrypted message.
Preferably, described step 206 may include that
Step 2061, selects in described second equipment in the list of application of the application in described first equipment
Application to be activated, obtains the corresponding identification information through encryption of application to be activated.
Wherein, the described corresponding identification information through encryption of application to be activated and described to be activated answering
There may be corresponding relation with the corresponding encrypted message through encryption.
After execution authentication success on server app, can eject to be activated in client equipment
The list of application of application, by selecting the mark that application to be activated determines the encryption of the application to be activated selected
Knowledge information.
Step 2062, passes through, using described main password is corresponding to described application to be activated, the mark encrypted
Information and the encrypted message through encrypting are decrypted operation, the application described to be activated after being deciphered
Corresponding identification information and encrypted message.
It should be noted that the embodiment of the present invention is to the encryption adopting in above-mentioned cryptographic operation and decryption oprerations
Algorithm and decipherment algorithm are not specifically limited.
Step 208, sends the corresponding identification information of described application to be activated and encrypted message to described the
Two equipment, to activate and to log in application to be activated in described second equipment.
Identification information after deciphering determines application to be activated, for applications exploiting solution to be activated
The login name in encrypted message after close and password enter line activating and logon operation.
In sum, embodiment of the present invention technical scheme, to activate the application of the second equipment, will activate
And log in the identification information of the application of the second equipment and encrypted message is saved in the first equipment, the first equipment and
Ensure between second equipment to connect.
Second equipment sends the instruction of activation application to the first equipment, enters line activating second on the first device
The authentication of application in equipment;After certification success, obtain in the second equipment in the first equipment and wait to swash
The corresponding identification information of application lived and encrypted message, send the corresponding identification information of application to be activated and
Encrypted message to the second equipment, to activate and to log in application to be activated in the second equipment.
In second equipment, the corresponding identification information of application to be activated and encrypted message are arranged on and set with second
In standby the first equipment connecting, it is not preserved in the second equipment local, it is to avoid the local mark letter of the second equipment
Cease problem that is stolen with encrypted message or being logged in by mistake, before ensureing the agility that application logs in
Put, improve the security that application logs in.
Embodiment three
A kind of provided in an embodiment of the present invention system that log in application is discussed in detail.
With reference to Fig. 6, show a kind of structural representation of the system logging in application in the embodiment of the present invention.
Described system can include the first equipment 300 and the second equipment 302;Described first equipment 300 He
Keep between second equipment 302 connecting, can be connected by way of wired, such as be set up using usb
Connect it is also possible to wirelessly connect, such as set up using bluetooth or wifi and connect.
Wherein, described first equipment 300 may include that active module 3001, acquisition module 3002,
Sending module 3003.
The relation function of each module and each module between is discussed in detail separately below.
Active module 3001, for receiving and described first equipment 300 in described first equipment 300
After the instruction of activation application of described second equipment 302 connecting, described first equipment 300 is carried out
For activating the authentication of the application in described second equipment 302.
Acquisition module 3002, for when the certification success after, obtaining described in described first equipment 300
The corresponding identification information of application to be activated in two equipment 302 and encrypted message.
Sending module 3003, for sending the corresponding identification information of described application to be activated and encrypted message
To described second equipment 302, to activate and to log in application to be activated in described second equipment 302.
In sum, embodiment of the present invention technical scheme, to activate the application of the second equipment, will activate
And log in the identification information of the application of the second equipment and encrypted message is saved in the first equipment, the first equipment and
Ensure between second equipment to connect.
Second equipment sends the instruction of activation application to the first equipment, enters line activating second on the first device
The authentication of application in equipment;After certification success, obtain in the second equipment in the first equipment and wait to swash
The corresponding identification information of application lived and encrypted message, send the corresponding identification information of application to be activated and
Encrypted message to the second equipment, to activate and to log in application to be activated in the second equipment.
In second equipment, the corresponding identification information of application to be activated and encrypted message are arranged on and set with second
In standby the first equipment connecting, it is not preserved in the second equipment local, it is to avoid the local mark letter of the second equipment
Cease problem that is stolen with encrypted message or being logged in by mistake, before ensureing the agility that application logs in
Put, improve the security that application logs in.
Example IV
A kind of provided in an embodiment of the present invention system that log in application is discussed in detail.
With reference to Fig. 7, show a kind of structural representation of the system logging in application in the embodiment of the present invention.
Described system can include the first equipment 400 and the second equipment 402;Described first equipment 400 He
Keep between second equipment 402 connecting, can be connected by way of wired, such as be set up using usb
Connect it is also possible to wirelessly connect, such as set up using bluetooth or wifi and connect.
Wherein, described first equipment 400 may include that main password setting preserving module 4001, adds mould
Block 4002, encryption memory module 4003, synchronization module 4004, display module 4005, active module 4006,
Acquisition module 4007, sending module 4008.
Described acquisition module 4007 may include that application selecting module 40071, deciphering module 40072.
The relation function of each module and each module between is discussed in detail separately below.
Main password arranges preserving module 4001, for receiving and described first in described first equipment 400
Before the instruction of activation application of the second equipment 402 that equipment 400 connects, by described first equipment 400
In application arrange and preserve main password;Wherein, the application in described first equipment 400 is used for activating institute
State the application in the second equipment 402;Described main password is used for using answering in described first equipment 400
With user carry out authentication.
Add module 4002, for setting by described first in described main encryption device preserving module 4001
After application in standby 400 arranges and preserves main password, add to be activated in described second equipment 402
The corresponding identification information of application and encrypted message.
Encryption memory module 4003, for being swashed to treating in described second equipment 402 using described main password
The corresponding identification information of application lived and encrypted message are encrypted and store.
Synchronization module 4004, for using described main password to described in described encryption memory module 4003
After the corresponding identification information of application to be activated in second equipment 402 and encrypted message are encrypted,
Identification information after encryption and encrypted message are synchronized in the 3rd equipment.
Display module 4005, for receiving and described first equipment 400 in described first equipment 400
After the instruction of activation application of the second equipment 402 connecting, by answering in described first equipment 400
With representing the request interface activating the application in described second equipment 402.
Active module 4006, for receiving and described first equipment 400 in described first equipment 400
After the instruction of activation application of described second equipment 402 connecting, described first equipment 400 is carried out
For activating the authentication of the application in described second equipment 402.
Preferably, described active module 4006 is connect by the request interface of the application in described first equipment
Receive main password or the biometric information of input, using the described main password receiving or bio-identification letter
Breath, carries out the authentication for activating the application in described second equipment on said first device.
Acquisition module 4007, for when the certification success after, obtaining described in described first equipment 400
The corresponding identification information of application to be activated in two equipment 402 and encrypted message.
Preferably, described acquisition module 4007 may include that
Application selecting module 40071, in the list of application of the application in described first equipment 400
Select application to be activated in described second equipment 402, obtain corresponding process of application to be activated and encrypt
Identification information;Wherein, the described to be activated corresponding identification information through encryption of applying is treated with described
There is corresponding relation in the corresponding encrypted message through encryption of application of activation.
Deciphering module 40072, for using described main password to described application to be activated corresponding process
The identification information of encryption and the encrypted message through encrypting are decrypted operation, treat described in after being deciphered
The corresponding identification information of application of activation and encrypted message.
Sending module 4008, for sending the corresponding identification information of described application to be activated and encrypted message
To described second equipment 402, to activate and to log in application to be activated in described second equipment 402.
In sum, embodiment of the present invention technical scheme, to activate the application of the second equipment, will activate
And log in the identification information of the application of the second equipment and encrypted message is saved in the first equipment, the first equipment and
Ensure between second equipment to connect.
Second equipment sends the instruction of activation application to the first equipment, enters line activating second on the first device
The authentication of application in equipment;After certification success, obtain in the second equipment in the first equipment and wait to swash
The corresponding identification information of application lived and encrypted message, send the corresponding identification information of application to be activated and
Encrypted message to the second equipment, to activate and to log in application to be activated in the second equipment.
In second equipment, the corresponding identification information of application to be activated and encrypted message are arranged on and set with second
In standby the first equipment connecting, it is not preserved in the second equipment local, it is to avoid the local mark letter of the second equipment
Cease problem that is stolen with encrypted message or being logged in by mistake, before ensureing the agility that application logs in
Put, improve the security that application logs in.
For system embodiment, due to itself and embodiment of the method basic simlarity, so the comparison of description
Simply, in place of correlation, the part referring to embodiment of the method illustrates.
Each embodiment in this specification is all described by the way of going forward one by one, and each embodiment stresses
Be all difference with other embodiment, between each embodiment identical similar partly mutually referring to
?.
A kind of method and system logging in the application above embodiment of the present invention being provided, has been carried out in detail
Introduce, specific case used herein is set forth to the principle of the present invention and embodiment, above
The explanation of embodiment is only intended to help and understands the method for the present invention and its core concept;Simultaneously for this
The those skilled in the art in field, the thought of the foundation present invention, in specific embodiments and applications all
Will change, in sum, this specification content should not be construed as limitation of the present invention.