CN106357588A - Method and system for logging in to application - Google Patents

Method and system for logging in to application Download PDF

Info

Publication number
CN106357588A
CN106357588A CN201510409728.4A CN201510409728A CN106357588A CN 106357588 A CN106357588 A CN 106357588A CN 201510409728 A CN201510409728 A CN 201510409728A CN 106357588 A CN106357588 A CN 106357588A
Authority
CN
China
Prior art keywords
equipment
application
activated
identification information
encrypted message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510409728.4A
Other languages
Chinese (zh)
Other versions
CN106357588B (en
Inventor
王磊
刘杨辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Advantageous New Technologies Co Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201510409728.4A priority Critical patent/CN106357588B/en
Publication of CN106357588A publication Critical patent/CN106357588A/en
Application granted granted Critical
Publication of CN106357588B publication Critical patent/CN106357588B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations

Abstract

The invention provides a method and system for logging in to an application, wherein the method comprises: after receiving, by a first device, an application activating command of a second device in connection to the first device, performing identity authentication on the first device to activate the application in the second device; after authentication succeeds, acquiring from the first device, identifier information and password information corresponding to the application to be activated in the second device; transmitting the identifier information and password information corresponding to the application to be activated to the second device in order to activate and log in to the application to be activated in the second device. The local identifier information and password information of the second device are avoided being stolen or mistakenly logged in to, and application login safety is improved at the premise of ensuring application login speed and convenience.

Description

A kind of method and system logging in application
Technical field
The present invention relates to communication technical field, more particularly to a kind of method and system logging in application.
Background technology
At present, most internet application, no matter be on PC, on mobile phone or flat On plate computer, it is required for user's input account and password carries out authorizing access.Generally user is using electricity Sub-voice mailbox, social media, even the internet application such as shopping online when it is necessary to first register account number And password;Wherein password arranges to obtain the appropriate whether safe coefficient concerning account;General Password Length is longer, Code characters composition distribution is more random, and Cipher Strength is stronger, and account is also safer.But high intensity Password also has its weakness, the higher password of intensity, user memory difficulty also bigger, forgetting general Rate is also higher.
Different internet applications is different to the intensity requirement of password, the password of usual program a accreditation Strength test cannot be passed through in program b, this requires user to program a and program b using different Cipher Strength setting;Although this enhances the security of user account, considerably increase user's Memory burden, also considerably increases the probability forgeing password.In a practical situation, user often selects to hold Easily remember to meet the simple password of the Internet, applications minimum requirements simultaneously;And this simple password, hold very much Easily by illegal hacker, decoded easily so that the network security of user is subject to using modes such as dictionary, rainbow tables Threaten to serious.
The complicated password of user can be remembered by some technical schemes that prior art provides, in user using mutually During working application, Auto-writing password is it is not necessary to user remembers high intensity password;On the surface, this A little technical schemes seem to solve the problems, such as cipher memory, but the enforcement of this technical scheme and equipment for surfing the net Tight binding, once equipment for surfing the net is lost, or is illegally used it is possible to user without permission Network security constitute a latent danger.
Content of the invention
The present invention provides a kind of method and system logging in application, to solve the security that existing application logs in With sex chromosome mosaicism easy to use.
In order to solve the above problems, the invention discloses a kind of method logging in application, comprising:
After first equipment receives the instruction of activation application of the second equipment being connected with described first equipment, Carry out the authentication for activating the application in described second equipment on said first device;
After certification success, obtain application to be activated in described second equipment in described first equipment right The identification information answered and encrypted message;
Send the corresponding identification information of described application to be activated and encrypted message extremely described second equipment, with Activate and log in application to be activated in described second equipment.
Preferably, described first equipment receive the second equipment being connected with described first equipment activation should Before instruction, methods described also includes:
Arranged by the application in described first equipment and preserve main password;Wherein, in described first equipment Application for activating application in described second equipment;Described main password is used for setting to using described first The user of the application in standby carries out authentication.
Preferably, described first equipment receive the second equipment being connected with described first equipment activation should After instruction, methods described also includes:
Represent request circle activating the application in described second equipment by the application in described first equipment Face.
Preferably, carry out the identity for activating the application in described second equipment on said first device Certification, comprising:
By main password or the biological knowledge of the request interface receives input of the application in described first equipment Other information;
Using receive described main password or biometric information, carry out on said first device for Activate the authentication of the application in described second equipment.
Preferably, after arranging and preserve main password by the application in described first equipment, described side Method also includes:
Add the corresponding identification information of application to be activated and the encrypted message in described second equipment;
Using described main password to the corresponding identification information of application to be activated in described second equipment and Encrypted message is encrypted and stores.
Preferably, described first equipment obtains the corresponding mark of application to be activated in described second equipment Knowledge information and encrypted message, comprising:
The list of application of the application in described first equipment select to be activated in described second equipment Application, obtains the corresponding identification information through encryption of application to be activated;Wherein, described to be activated The corresponding identification information through encryption of application is corresponding close through encryption with described application to be activated There is corresponding relation in code information;
Through identification information encryption and warp using described main password is corresponding to described application to be activated The encrypted message crossing encryption is decrypted operation, the corresponding mark of application described to be activated after being deciphered Knowledge information and encrypted message.
Preferably, described corresponding to the application to be activated in described second equipment using described main password After identification information and encrypted message are encrypted, methods described also includes:
Identification information after encryption and encrypted message are synchronized in the 3rd equipment.
The invention also discloses a kind of system logging in application, comprising: the first equipment and the second equipment;Its In, described first equipment includes:
Active module, for receiving, in described first equipment, described second being connected with described first equipment After the instruction of activation application of equipment, carry out on said first device for activating in described second equipment Application authentication;
Acquisition module, for when the certification success after, obtaining in described second equipment in described first equipment The corresponding identification information of application to be activated and encrypted message;
Sending module, for sending the corresponding identification information of described application to be activated and encrypted message to institute State the second equipment, to activate and to log in application to be activated in described second equipment.
Preferably, described first equipment also includes:
Main password arranges preserving module, is connected with described first equipment for receiving in described first equipment The second equipment activation application instruction before, arrange and preserve by the application in described first equipment Main password;Wherein, the application in described first equipment is for activating the application in described second equipment;Institute State main password for carrying out authentication to using the user of the application in described first equipment.
Preferably, described first equipment also includes:
Display module, for receiving, in described first equipment, the second equipment being connected with described first equipment Activation application instruction after, by the application in described first equipment represent activation described second equipment In application request interface.
Preferably, the request interface receives input by the application in described first equipment for the described active module Main password or biometric information, using receive described main password or biometric information, Authentication for activating the application in described second equipment is carried out on described first equipment.
Preferably, described first equipment also includes:
Add module, for arranging preserving module by the application in described first equipment in described main password After arranging and preserve main password, add the application corresponding mark letter to be activated in described second equipment Breath and encrypted message;
Encryption memory module, for using described main password to the application to be activated in described second equipment Corresponding identification information and encrypted message are encrypted and store.
Preferably, described acquisition module, comprising:
Application selecting module, for selecting described the in the list of application of the application in described first equipment Application to be activated in two equipment, obtains the corresponding identification information through encryption of application to be activated;Its In, the corresponding identification information through encryption of described to be activated application is corresponding with described application to be activated Through encryption encrypted message there is corresponding relation;
Deciphering module, for being encrypted to described to be activated corresponding process of applying using described main password Identification information and the encrypted message through encrypting are decrypted operation, described to be activated after being deciphered Apply corresponding identification information and encrypted message.
Preferably, described first equipment also includes:
Synchronization module, for using described main password in described second equipment in described encryption memory module The corresponding identification information of application to be activated and after encrypted message is encrypted, by the mark after encryption Information and encrypted message are synchronized in the 3rd equipment.
Compared with background technology, the present invention includes advantages below:
To activate the application of the second equipment, by activate and log in the second equipment application identification information and Encrypted message is saved in the first equipment, ensures to connect between the first equipment and the second equipment.
Second equipment sends the instruction of activation application to the first equipment, enters line activating second on the first device The authentication of application in equipment;After certification success, obtain in the second equipment in the first equipment and wait to swash The corresponding identification information of application lived and encrypted message, send the corresponding identification information of application to be activated and Encrypted message to the second equipment, to activate and to log in application to be activated in the second equipment.
In second equipment, the corresponding identification information of application to be activated and encrypted message are arranged on and set with second In standby the first equipment connecting, it is not preserved in the second equipment local, it is to avoid the local mark letter of the second equipment Cease problem that is stolen with encrypted message or being logged in by mistake, in the agility and the side that ensure that application logs in Just, on the premise of property, improve the security that application logs in.
Brief description
Fig. 1 is the schematic diagram of the main password of setting of technical solution of the present invention;
Fig. 2 is the schematic diagram adding the identification information applied and encrypted message of technical solution of the present invention;
Fig. 3 is the entire flow schematic diagram of technical solution of the present invention;
Fig. 4 is the method and step flow chart that one of embodiment of the present invention one logs in application;
Fig. 5 is the method and step flow chart that one of embodiment of the present invention two logs in application;
Fig. 6 is the structural representation of the system that one of embodiment of the present invention three logs in application;
Fig. 7 is the structural representation of the system that one of embodiment of the present invention four logs in application.
Specific embodiment
Understandable for enabling the above objects, features and advantages of the present invention to become apparent from, below in conjunction with the accompanying drawings The present invention is further detailed explanation with specific embodiment.
In order to describe conveniently, the present invention temporarily represents identification information and encrypted message using server equipment Management, and the equipment of authentication, client equipment represents that needs carry out applying the equipment automatically logging in. But it should be understood by those skilled in the art that server equipment and client equipment can be setting of same type Standby, such as it is all mobile terminal or different types of equipment, such as one is server, and another Individual for client.
Technical solution of the present invention can be divided into following several stages on using flow process.
1) main password setting.
First, user needs to install a server app (service end application) on server equipment, is Server app arranges a main password.After setting up main password, user can by input main password Lai Log in server app it is also possible to according to server equipment provide bio-identification function such as fingerprint or face Identification carries out logging in of server app.
As shown in figure 1, user starts server app, server app inputs main password, server App preserves main password, and user completes main password setting.
2) application identities (identity, id) and password add.
After logging in server app, the application that user can will need on client equipment to realize automatically logging in Corresponding identification information and encrypted message are entered in server app, for improving identification information and message in cipher The security of breath, server app can also be encrypted using master key further and preserve these information, Some cloud synchronous applications can also be passed through by encrypted synchronizing information to high in the clouds.
As shown in Fig. 2 user starts server app, in server app, input main password, or Carry out the authentication of server app using bio-identification, server app judges identity authentication result, If authentification failure, generate and show the prompting of authentication failure;If certification success, can add Client equipment needs the corresponding identification information of application and the encrypted message realizing automatically logging in, and is stored in server app.For improving security further, main password encryption identification information and password can also be used Information is simultaneously stored in server app, completes application identities and the interpolation of password.
Wherein, identification information can be unique knowledge of the application needing to realize automatically logging on client equipment Other information, for determining which application concrete in client equipment is realized automatically logging in.Encrypted message can To include login name and the password of application.
3) equipment connects.
User prepares to carry out applying automatically logging on a client equipment, needs first in client equipment One client app (client application) of upper installation, then using USB (universal serial Bus, usb), bluetooth, the mode such as wireless network (wireless-fidelity, wifi) set with server Standby foundation connects.
4) request authorizes.
Client app after connection establishment between client equipment and server equipment, on client equipment Can be automatically activated, and wait to step on in server device request client equipment by the connection of foundation The identification information of the application in land and encrypted message;Server app on server equipment shows to user please Seek content, and require user to carry out authentication by inputting the mode such as main password or bio-identification.
Described request content can include title and icon of application to be logged in client equipment etc..
5) complete automatically to log in.
After the authentication success in above-mentioned 4) stage, server equipment is by the identification information of application to be logged in And encrypted message returns to client equipment, client app determines application to be logged in using identification information, Complete logging in of application using encrypted message by way of automation.
It should be noted that the above-mentioned 3) stage can execute in any time period before the stage of above-mentioned 4), I.e. the above-mentioned 3) stage can execute it is also possible to hold before the stage of above-mentioned 1) before the stage of above-mentioned 2) OK.
The entire flow schematic diagram of technical solution of the present invention as shown in figure 3, user by server equipment with Client equipment passes through usb or other modes connect;The client app of client equipment has detected and has set Standby connection, sends activation instruction by the connection set up to server app;Server app receives client The activation instruction that app sends, starts authentication interface;User inputs main password on interface or passes through The mode of bio-identification completes authentication;Server app judges authentication result, if authentification failure, Prompting authenticating user identification failure;If certification success, server app ejects list of application interface;With Family selects the application that automatically will be logged on client equipment in list of application interface;server app It is sent to client app after the identification information of the application selected using the deciphering of main password and encrypted message; Client app passes through the identification information that gets and encrypted message automatically log on client equipment selected Application.
Below by enumerate several specific embodiments be discussed in detail the present invention offer one kind log in application Method and system.
Embodiment one
A kind of provided in an embodiment of the present invention method that log in application is discussed in detail.
The first equipment in the embodiment of the present invention can be above-mentioned server equipment, and the second equipment can be Above-mentioned client equipment.
With reference to Fig. 4, show a kind of method and step flow chart logging in application in the embodiment of the present invention.
Step 100, the first equipment receives the activation application of the second equipment being connected with described first equipment Instruction after, carry out on said first device recognizing for the identity activating the application in described second equipment Card.
Keep being connected between described first equipment and described second equipment, can be connected by way of wired Connect, such as set up using usb and connect it is also possible to wirelessly connect, such as using bluetooth or wifi Set up and connect.
Described instruction can be for the second equipment after being connected with the first equipment foundation, by the second equipment actively It is sent to the instruction of the first equipment, recognized by the identity that described instruction carries out the first equipment on the first device Card operation.
Step 102, after certification success, obtains in described second equipment in described first equipment and waits to swash The corresponding identification information of application lived and encrypted message.
In second equipment, the corresponding identification information of application to be activated and encrypted message can be pre-stored in In first equipment.
Wherein, identification information can be the unique identifying information of application to be activated in the second equipment, is used for Determine which application concrete in the second equipment is realized activation and automatically logged in.Encrypted message can include should Login name and password.
Step 104, sends the corresponding identification information of described application to be activated and encrypted message to described the Two equipment, to activate and to log in application to be activated in described second equipment.
Application to be activated is determined by identification information, in applications exploiting encrypted message to be activated Login name and password enter line activating and logon operation.
In sum, embodiment of the present invention technical scheme, to activate the application of the second equipment, will activate And log in the identification information of the application of the second equipment and encrypted message is saved in the first equipment, the first equipment and Ensure between second equipment to connect.
Second equipment sends the instruction of activation application to the first equipment, enters line activating second on the first device The authentication of application in equipment;After certification success, obtain in the second equipment in the first equipment and wait to swash The corresponding identification information of application lived and encrypted message, send the corresponding identification information of application to be activated and Encrypted message to the second equipment, to activate and to log in application to be activated in the second equipment.
In second equipment, the corresponding identification information of application to be activated and encrypted message are arranged on and set with second In standby the first equipment connecting, it is not preserved in the second equipment local, it is to avoid the local mark letter of the second equipment Cease problem that is stolen with encrypted message or being logged in by mistake, before ensureing the agility that application logs in Put, improve the security that application logs in.
Embodiment two
A kind of provided in an embodiment of the present invention method that log in application is discussed in detail.
The first equipment in the embodiment of the present invention can be above-mentioned server equipment, and the second equipment can be Above-mentioned client equipment.Keep being connected between described first equipment and described second equipment, can pass through Wired mode connects, and is such as set up using usb and connects it is also possible to wirelessly connect, such as Set up using bluetooth or wifi and connect.
With reference to Fig. 5, show a kind of method and step flow chart logging in application in the embodiment of the present invention.
Step 200, is arranged by the application in described first equipment and preserves main password.
Wherein, the application in described first equipment can be used for activating the application in described second equipment;Institute State main password to can be used for carrying out authentication to using the user of the application in described first equipment.
Application in described first equipment can be above-mentioned server app.Described main password can for letter, At least one password of numeral, symbol or Chinese combination, in addition to for authentication, can also be to follow-up Identification information and encrypted message be encrypted.User must keep main password firmly in mind, and main password is once lost, All will be unable to be reduced using the information that main password is encrypted.
Preferably, after above-mentioned steps 200, described for activating when carrying out on said first device After the authentication success of the application in the second equipment, interpolation, encryption and storage second can be executed and set The to be activated operation applying corresponding identification information and encrypted message in standby.
1st, add the corresponding identification information of application to be activated and the encrypted message in described second equipment.
2nd, use described main password to the corresponding identification information of application to be activated in described second equipment It is encrypted with encrypted message and store.
Wherein, identification information can be the unique identifying information of application to be activated in the second equipment, is used for Determine which application concrete in the second equipment is realized activation and automatically logged in.Encrypted message can include should Login name and password.
For example, there is two applications to be activated, respectively application a and application b in the second equipment, should Can be 001 with the identification information of a, the identification information of application b can be 002, the password of application a Information can be multigroup login name and password, and the encrypted message of application b can be multigroup login name and close Code.
In second equipment, the corresponding identification information of application to be activated and encrypted message can be after encryption Be saved in the first equipment, it is possible to use synchronous applications or other modes by the identification information after encrypting and Encrypted message is synchronized in the 3rd equipment, so that when the first equipment breaks down, can be from the 3rd equipment The corresponding identification information of application to be activated and encrypted message in middle recovery the second equipment, thus improve mark Knowledge information and the security of encrypted message.
3rd equipment can be cloud device, for example, keep the Cloud Server of network connection with the first equipment Deng.
Step 202, described first equipment receives the activation of the second equipment being connected with described first equipment After the instruction of application, represented by the application in described first equipment and activate answering in described second equipment Request interface.
Described instruction can be for the second equipment after being connected with the first equipment foundation, by the second equipment Client app is actively sent to the instruction of the server app in the first equipment, is instructed first by described The authentication operation of the first equipment is carried out on the server app of equipment.
The request interface of the application in activation the second equipment is represented on server app, can wrap in interface Include input frame or bio-identification instruction of main password etc..
Step 204, carries out the body for activating the application in described second equipment on said first device Part certification.
Preferably, described step 204 can be:
By main password or the biological knowledge of the request interface receives input of the application in described first equipment Other information, using the described main password receiving or biometric information, is carried out on said first device For activating the authentication of the application in described second equipment.
Described biometric information can be known for execution fingerprint recognition operation, recognition of face operation or sound Not Cao Zuo etc. and produce identification information.
Step 206, after certification success, obtains in described second equipment in described first equipment and waits to swash The corresponding identification information of application lived and encrypted message.
Preferably, described step 206 may include that
Step 2061, selects in described second equipment in the list of application of the application in described first equipment Application to be activated, obtains the corresponding identification information through encryption of application to be activated.
Wherein, the described corresponding identification information through encryption of application to be activated and described to be activated answering There may be corresponding relation with the corresponding encrypted message through encryption.
After execution authentication success on server app, can eject to be activated in client equipment The list of application of application, by selecting the mark that application to be activated determines the encryption of the application to be activated selected Knowledge information.
Step 2062, passes through, using described main password is corresponding to described application to be activated, the mark encrypted Information and the encrypted message through encrypting are decrypted operation, the application described to be activated after being deciphered Corresponding identification information and encrypted message.
It should be noted that the embodiment of the present invention is to the encryption adopting in above-mentioned cryptographic operation and decryption oprerations Algorithm and decipherment algorithm are not specifically limited.
Step 208, sends the corresponding identification information of described application to be activated and encrypted message to described the Two equipment, to activate and to log in application to be activated in described second equipment.
Identification information after deciphering determines application to be activated, for applications exploiting solution to be activated The login name in encrypted message after close and password enter line activating and logon operation.
In sum, embodiment of the present invention technical scheme, to activate the application of the second equipment, will activate And log in the identification information of the application of the second equipment and encrypted message is saved in the first equipment, the first equipment and Ensure between second equipment to connect.
Second equipment sends the instruction of activation application to the first equipment, enters line activating second on the first device The authentication of application in equipment;After certification success, obtain in the second equipment in the first equipment and wait to swash The corresponding identification information of application lived and encrypted message, send the corresponding identification information of application to be activated and Encrypted message to the second equipment, to activate and to log in application to be activated in the second equipment.
In second equipment, the corresponding identification information of application to be activated and encrypted message are arranged on and set with second In standby the first equipment connecting, it is not preserved in the second equipment local, it is to avoid the local mark letter of the second equipment Cease problem that is stolen with encrypted message or being logged in by mistake, before ensureing the agility that application logs in Put, improve the security that application logs in.
Embodiment three
A kind of provided in an embodiment of the present invention system that log in application is discussed in detail.
With reference to Fig. 6, show a kind of structural representation of the system logging in application in the embodiment of the present invention.
Described system can include the first equipment 300 and the second equipment 302;Described first equipment 300 He Keep between second equipment 302 connecting, can be connected by way of wired, such as be set up using usb Connect it is also possible to wirelessly connect, such as set up using bluetooth or wifi and connect.
Wherein, described first equipment 300 may include that active module 3001, acquisition module 3002, Sending module 3003.
The relation function of each module and each module between is discussed in detail separately below.
Active module 3001, for receiving and described first equipment 300 in described first equipment 300 After the instruction of activation application of described second equipment 302 connecting, described first equipment 300 is carried out For activating the authentication of the application in described second equipment 302.
Acquisition module 3002, for when the certification success after, obtaining described in described first equipment 300 The corresponding identification information of application to be activated in two equipment 302 and encrypted message.
Sending module 3003, for sending the corresponding identification information of described application to be activated and encrypted message To described second equipment 302, to activate and to log in application to be activated in described second equipment 302.
In sum, embodiment of the present invention technical scheme, to activate the application of the second equipment, will activate And log in the identification information of the application of the second equipment and encrypted message is saved in the first equipment, the first equipment and Ensure between second equipment to connect.
Second equipment sends the instruction of activation application to the first equipment, enters line activating second on the first device The authentication of application in equipment;After certification success, obtain in the second equipment in the first equipment and wait to swash The corresponding identification information of application lived and encrypted message, send the corresponding identification information of application to be activated and Encrypted message to the second equipment, to activate and to log in application to be activated in the second equipment.
In second equipment, the corresponding identification information of application to be activated and encrypted message are arranged on and set with second In standby the first equipment connecting, it is not preserved in the second equipment local, it is to avoid the local mark letter of the second equipment Cease problem that is stolen with encrypted message or being logged in by mistake, before ensureing the agility that application logs in Put, improve the security that application logs in.
Example IV
A kind of provided in an embodiment of the present invention system that log in application is discussed in detail.
With reference to Fig. 7, show a kind of structural representation of the system logging in application in the embodiment of the present invention.
Described system can include the first equipment 400 and the second equipment 402;Described first equipment 400 He Keep between second equipment 402 connecting, can be connected by way of wired, such as be set up using usb Connect it is also possible to wirelessly connect, such as set up using bluetooth or wifi and connect.
Wherein, described first equipment 400 may include that main password setting preserving module 4001, adds mould Block 4002, encryption memory module 4003, synchronization module 4004, display module 4005, active module 4006, Acquisition module 4007, sending module 4008.
Described acquisition module 4007 may include that application selecting module 40071, deciphering module 40072.
The relation function of each module and each module between is discussed in detail separately below.
Main password arranges preserving module 4001, for receiving and described first in described first equipment 400 Before the instruction of activation application of the second equipment 402 that equipment 400 connects, by described first equipment 400 In application arrange and preserve main password;Wherein, the application in described first equipment 400 is used for activating institute State the application in the second equipment 402;Described main password is used for using answering in described first equipment 400 With user carry out authentication.
Add module 4002, for setting by described first in described main encryption device preserving module 4001 After application in standby 400 arranges and preserves main password, add to be activated in described second equipment 402 The corresponding identification information of application and encrypted message.
Encryption memory module 4003, for being swashed to treating in described second equipment 402 using described main password The corresponding identification information of application lived and encrypted message are encrypted and store.
Synchronization module 4004, for using described main password to described in described encryption memory module 4003 After the corresponding identification information of application to be activated in second equipment 402 and encrypted message are encrypted, Identification information after encryption and encrypted message are synchronized in the 3rd equipment.
Display module 4005, for receiving and described first equipment 400 in described first equipment 400 After the instruction of activation application of the second equipment 402 connecting, by answering in described first equipment 400 With representing the request interface activating the application in described second equipment 402.
Active module 4006, for receiving and described first equipment 400 in described first equipment 400 After the instruction of activation application of described second equipment 402 connecting, described first equipment 400 is carried out For activating the authentication of the application in described second equipment 402.
Preferably, described active module 4006 is connect by the request interface of the application in described first equipment Receive main password or the biometric information of input, using the described main password receiving or bio-identification letter Breath, carries out the authentication for activating the application in described second equipment on said first device.
Acquisition module 4007, for when the certification success after, obtaining described in described first equipment 400 The corresponding identification information of application to be activated in two equipment 402 and encrypted message.
Preferably, described acquisition module 4007 may include that
Application selecting module 40071, in the list of application of the application in described first equipment 400 Select application to be activated in described second equipment 402, obtain corresponding process of application to be activated and encrypt Identification information;Wherein, the described to be activated corresponding identification information through encryption of applying is treated with described There is corresponding relation in the corresponding encrypted message through encryption of application of activation.
Deciphering module 40072, for using described main password to described application to be activated corresponding process The identification information of encryption and the encrypted message through encrypting are decrypted operation, treat described in after being deciphered The corresponding identification information of application of activation and encrypted message.
Sending module 4008, for sending the corresponding identification information of described application to be activated and encrypted message To described second equipment 402, to activate and to log in application to be activated in described second equipment 402.
In sum, embodiment of the present invention technical scheme, to activate the application of the second equipment, will activate And log in the identification information of the application of the second equipment and encrypted message is saved in the first equipment, the first equipment and Ensure between second equipment to connect.
Second equipment sends the instruction of activation application to the first equipment, enters line activating second on the first device The authentication of application in equipment;After certification success, obtain in the second equipment in the first equipment and wait to swash The corresponding identification information of application lived and encrypted message, send the corresponding identification information of application to be activated and Encrypted message to the second equipment, to activate and to log in application to be activated in the second equipment.
In second equipment, the corresponding identification information of application to be activated and encrypted message are arranged on and set with second In standby the first equipment connecting, it is not preserved in the second equipment local, it is to avoid the local mark letter of the second equipment Cease problem that is stolen with encrypted message or being logged in by mistake, before ensureing the agility that application logs in Put, improve the security that application logs in.
For system embodiment, due to itself and embodiment of the method basic simlarity, so the comparison of description Simply, in place of correlation, the part referring to embodiment of the method illustrates.
Each embodiment in this specification is all described by the way of going forward one by one, and each embodiment stresses Be all difference with other embodiment, between each embodiment identical similar partly mutually referring to ?.
A kind of method and system logging in the application above embodiment of the present invention being provided, has been carried out in detail Introduce, specific case used herein is set forth to the principle of the present invention and embodiment, above The explanation of embodiment is only intended to help and understands the method for the present invention and its core concept;Simultaneously for this The those skilled in the art in field, the thought of the foundation present invention, in specific embodiments and applications all Will change, in sum, this specification content should not be construed as limitation of the present invention.

Claims (14)

1. a kind of method logging in application is it is characterised in that include:
After first equipment receives the instruction of activation application of the second equipment being connected with described first equipment, Carry out the authentication for activating the application in described second equipment on said first device;
After certification success, obtain application to be activated in described second equipment in described first equipment right The identification information answered and encrypted message;
Send the corresponding identification information of described application to be activated and encrypted message extremely described second equipment, with Activate and log in application to be activated in described second equipment.
2. method according to claim 1 it is characterised in that described first equipment receive with Before the instruction of activation application of the second equipment that described first equipment connects, methods described also includes:
Arranged by the application in described first equipment and preserve main password;Wherein, in described first equipment Application for activating application in described second equipment;Described main password is used for setting to using described first The user of the application in standby carries out authentication.
3. method according to claim 2 it is characterised in that described first equipment receive with After the instruction of activation application of the second equipment that described first equipment connects, methods described also includes:
Represent request circle activating the application in described second equipment by the application in described first equipment Face.
4. method according to claim 3 is it is characterised in that carry out on said first device For activating the authentication of the application in described second equipment, comprising:
By main password or the biological knowledge of the request interface receives input of the application in described first equipment Other information;
Using receive described main password or biometric information, carry out on said first device for Activate the authentication of the application in described second equipment.
5. method according to claim 2 is it is characterised in that by described first equipment Application arrange and preserve main password after, methods described also includes:
Add the corresponding identification information of application to be activated and the encrypted message in described second equipment;
Using described main password to the corresponding identification information of application to be activated in described second equipment and Encrypted message is encrypted and stores.
6. method according to claim 5 is it is characterised in that obtain in described first equipment The corresponding identification information of application to be activated in described second equipment and encrypted message, comprising:
The list of application of the application in described first equipment select to be activated in described second equipment Application, obtains the corresponding identification information through encryption of application to be activated;Wherein, described to be activated The corresponding identification information through encryption of application is corresponding close through encryption with described application to be activated There is corresponding relation in code information;
Through identification information encryption and warp using described main password is corresponding to described application to be activated The encrypted message crossing encryption is decrypted operation, the corresponding mark of application described to be activated after being deciphered Knowledge information and encrypted message.
7. method according to claim 5 it is characterised in that described using described main password pair After the corresponding identification information of application to be activated in described second equipment and encrypted message are encrypted, Methods described also includes:
Identification information after encryption and encrypted message are synchronized in the 3rd equipment.
8. a kind of system logging in application is it is characterised in that include: the first equipment and the second equipment; Wherein, described first equipment includes:
Active module, for receiving, in described first equipment, described second being connected with described first equipment After the instruction of activation application of equipment, carry out on said first device for activating in described second equipment Application authentication;
Acquisition module, for when the certification success after, obtaining in described second equipment in described first equipment The corresponding identification information of application to be activated and encrypted message;
Sending module, for sending the corresponding identification information of described application to be activated and encrypted message to institute State the second equipment, to activate and to log in application to be activated in described second equipment.
9. system according to claim 8 is it is characterised in that described first equipment also includes:
Main password arranges preserving module, is connected with described first equipment for receiving in described first equipment The second equipment activation application instruction before, arrange and preserve by the application in described first equipment Main password;Wherein, the application in described first equipment is for activating the application in described second equipment;Institute State main password for carrying out authentication to using the user of the application in described first equipment.
10. system according to claim 9 is it is characterised in that described first equipment also includes:
Display module, for receiving, in described first equipment, the second equipment being connected with described first equipment Activation application instruction after, by the application in described first equipment represent activation described second equipment In application request interface.
11. systems according to claim 10 are it is characterised in that described active module passes through institute State the main password of request interface receives input of application or the biometric information in the first equipment, use The described main password receiving or biometric information, carry out described for activating on said first device The authentication of the application in the second equipment.
12. systems according to claim 9 are it is characterised in that described first equipment also includes:
Add module, for arranging preserving module by the application in described first equipment in described main password After arranging and preserve main password, add the application corresponding mark letter to be activated in described second equipment Breath and encrypted message;
Encryption memory module, for using described main password to the application to be activated in described second equipment Corresponding identification information and encrypted message are encrypted and store.
13. systems according to claim 12 are it is characterised in that described acquisition module, comprising:
Application selecting module, for selecting described the in the list of application of the application in described first equipment Application to be activated in two equipment, obtains the corresponding identification information through encryption of application to be activated;Its In, the corresponding identification information through encryption of described to be activated application is corresponding with described application to be activated Through encryption encrypted message there is corresponding relation;
Deciphering module, for being encrypted to described to be activated corresponding process of applying using described main password Identification information and the encrypted message through encrypting are decrypted operation, described to be activated after being deciphered Apply corresponding identification information and encrypted message.
14. systems according to claim 12 are it is characterised in that described first equipment also includes:
Synchronization module, for using described main password in described second equipment in described encryption memory module The corresponding identification information of application to be activated and after encrypted message is encrypted, by the mark after encryption Information and encrypted message are synchronized in the 3rd equipment.
CN201510409728.4A 2015-07-13 2015-07-13 A kind of method and system logging in application Active CN106357588B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510409728.4A CN106357588B (en) 2015-07-13 2015-07-13 A kind of method and system logging in application

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510409728.4A CN106357588B (en) 2015-07-13 2015-07-13 A kind of method and system logging in application

Publications (2)

Publication Number Publication Date
CN106357588A true CN106357588A (en) 2017-01-25
CN106357588B CN106357588B (en) 2019-11-26

Family

ID=57842058

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510409728.4A Active CN106357588B (en) 2015-07-13 2015-07-13 A kind of method and system logging in application

Country Status (1)

Country Link
CN (1) CN106357588B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107451441A (en) * 2017-07-04 2017-12-08 广东欧珀移动通信有限公司 The accounts information acquisition methods and device of application program

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104065653A (en) * 2014-06-09 2014-09-24 韩晟 Interactive authentication method, device, system and related equipment
CN104092550A (en) * 2014-07-23 2014-10-08 三星电子(中国)研发中心 Password protection method, system and device

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104065653A (en) * 2014-06-09 2014-09-24 韩晟 Interactive authentication method, device, system and related equipment
CN104092550A (en) * 2014-07-23 2014-10-08 三星电子(中国)研发中心 Password protection method, system and device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107451441A (en) * 2017-07-04 2017-12-08 广东欧珀移动通信有限公司 The accounts information acquisition methods and device of application program

Also Published As

Publication number Publication date
CN106357588B (en) 2019-11-26

Similar Documents

Publication Publication Date Title
CN106330850B (en) Security verification method based on biological characteristics, client and server
US10601801B2 (en) Identity authentication method and apparatus
CN101262349A (en) SMS-based identity authentication method and device
CN104065621A (en) Identify verification method for third-party service, client and system
US10540487B2 (en) Authentication system
TWI632798B (en) Server, mobile terminal, and network real-name authentication system and method
CN101815291A (en) Method and system for logging on client automatically
CN109922027B (en) Credible identity authentication method, terminal and storage medium
CA2958433C (en) Private data management system and method therefor
CN104426659A (en) Dynamic password generating method, authentication method, authentication system and corresponding equipment
CN101965574A (en) Authentication information generation system, authentication information generation method, and authentication information generation program utilizing a client device and said method
CN103905400A (en) Service authentication method, apparatus and system
CN105429928A (en) Data communication method, data communication system, client and server
KR101792220B1 (en) Method, mobile terminal, device and program for providing user authentication service of combining biometric authentication
CN111901303A (en) Device authentication method and apparatus, storage medium, and electronic apparatus
CN106533677B (en) A kind of user login method, user terminal and server
EP2985712B1 (en) Application encryption processing method, apparatus, and terminal
KR101467746B1 (en) User authentication system and method using smart media
CN106656946B (en) Dynamic authentication method and device
CN110717177A (en) Method for safely unlocking computer in real time by using mobile terminal
CN105072136A (en) Method and system for security authentication between devices based on virtual drive
TWI675579B (en) Network authentication system and method
CN114297597B (en) Account management method, system, equipment and computer readable storage medium
CN106357588A (en) Method and system for logging in to application
CN104113417A (en) Dynamic password identity authentication method and system based on near field communication (NFC)

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20200925

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20200925

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Patentee before: Alibaba Group Holding Ltd.