CN106657068A - Login authorization method and device, login method and device - Google Patents

Login authorization method and device, login method and device Download PDF

Info

Publication number
CN106657068A
CN106657068A CN201611208735.9A CN201611208735A CN106657068A CN 106657068 A CN106657068 A CN 106657068A CN 201611208735 A CN201611208735 A CN 201611208735A CN 106657068 A CN106657068 A CN 106657068A
Authority
CN
China
Prior art keywords
proof
register
login
terminal
terminal iidentification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611208735.9A
Other languages
Chinese (zh)
Inventor
王宇
许鑫城
王虎
王晖
孙丰静
孙善鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201611208735.9A priority Critical patent/CN106657068A/en
Publication of CN106657068A publication Critical patent/CN106657068A/en
Priority to PCT/CN2017/117397 priority patent/WO2018113690A1/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations

Abstract

The invention relates to a login authorization method and device, a login method and device. The login authorization method comprises the following steps: receiving a login request sent by a terminal; extracting a login credential and a terminal identifier from the login request, wherein the extracted login credential is generated and issued to the terminal when the terminal finishes the previous login authorization; querying the login credential, which is generated and stored when finishing the previous login authorization, corresponding to the terminal identifier; when the extracted login credential is consistent with the queried login credential, performing the login authorization corresponding to the terminal identifier; updating the stored login credential corresponding to the terminal identifier; and issuing the updated login credential to the terminal. By use of the login authorization method and device, the login method and device provided by the invention, a user can rapidly and safely login.

Description

Log in authorization method and device, login method and device
Technical field
The present invention relates to computer security technique field, more particularly to login techniques field, it is more particularly to a kind of to log in Authorization method and device, login method and device.
Background technology
Login is a kind of important means for verifying user identity, is sent after logging request, by server with user orientation server User identity is verified, so that user obtains to perform the authority of operation by the identity of verification.It is common at present Login mode is to be input into the mode that user account and user cipher are logged in.
In order to avoid user frequently enters user account and user cipher, simple operation is improved, browser is provided certainly The dynamic function of preserving user account and user cipher.User is entered after login interface, and browser can automatically enter user account And user cipher, so as to realize quick registration.
However, user account and user cipher are preserved by the browser in addition to user and server, increased exposure and use The risk of family password, safety is relatively low.
The content of the invention
Based on this, it is necessary to which preserving user account and user cipher for current browser causes that safety is relatively low to ask Topic, there is provided one kind logs in authorization method and device, login method and device.
One kind logs in authorization method, including:
The logging request that receiving terminal sends;
The proof of Register and terminal iidentification are extracted from the logging request, and the proof of Register for extracting is previous in the terminal Complete to log in and generate and be issued to the terminal when authorizing;
The inquiry previous the proof of Register for completing to generate and store when login is authorized corresponding with the terminal iidentification;
When the proof of Register for extracting is consistent with the proof of Register for inquiring, carries out login corresponding to the terminal iidentification and award Power;
Update the proof of Register corresponding with the terminal iidentification of storage;
The proof of Register of renewal is issued to into the terminal.
One kind logs in authorization device, including:
Logging request processing module, for the logging request that receiving terminal sends;Extract from the logging request and log in Authority and terminal iidentification, and extract the proof of Register the terminal it is previous complete log in authorize when generate and be issued to the end End;
The proof of Register enquiry module, for inquire about it is corresponding with the terminal iidentification it is previous complete log in authorize when generate simultaneously The proof of Register of storage;
Authorization module is logged in, for when the proof of Register for extracting is consistent with the proof of Register for inquiring, corresponding to described Terminal iidentification carries out login mandate;
The proof of Register management module, for updating the proof of Register corresponding with the terminal iidentification of storage;By what is updated The proof of Register is issued to the terminal.
A kind of login method, including:
Obtain local terminal iidentification;
Locally stored the proof of Register is obtained, the proof of Register is in local previous login being serviced device mandate by described Server is issued;
The first logging request for carrying the proof of Register and the terminal iidentification is sent to the server so that institute State server according to carry the proof of Register and terminal iidentification authentication success after carry out login mandate;
Receive the server to complete to log in the proof of Register for updating and sending when authorizing;
The proof of Register that locally stored the proof of Register is updated to receive.
A kind of entering device, including:
Acquisition module, for obtaining local terminal iidentification;Locally stored the proof of Register is obtained, the proof of Register exists Issued by the server during local previous login being serviced device mandate;
Sending module, steps on for carrying the first of the proof of Register and the terminal iidentification to server transmission Record request so that the server is authenticated according to the proof of Register and terminal iidentification that carry and carry out login mandate after success;
Receiver module, for receiving the proof of Register for updating and sending when the server completes and logs in and authorize;
Update module, for the proof of Register for being updated to receive by locally stored the proof of Register.
Above-mentioned login authorization method and device, login method and device, using the front login for once issuing when logging in every time Authority is simultaneously logged in reference to terminal iidentification, is completed login and is authorized the proof of Register that can then issue renewal, is made when logging in for next time With.So User logs in when need not just frequently enter user account and user cipher, can realize quickly stepping in same terminal Record, has ensured the convenience for logging in, and has taken into account the safety for logging in a certain extent.And, even if previous log in what is issued The proof of Register is compromised, but user when logging on the proof of Register will update, therefore safety is further improved.
Description of the drawings
Fig. 1 is the applied environment figure that authorization method and login method are logged in one embodiment;
Fig. 2 is the internal structure schematic diagram of server in one embodiment;
Fig. 3 is the internal structure schematic diagram of terminal in one embodiment;
Fig. 4 is the schematic flow sheet that authorization method is logged in one embodiment;
Fig. 5 be one embodiment in when logging request does not carry the proof of Register, logged in using user's intervening mode The schematic flow sheet of the step of mandate;
Fig. 6 is in one embodiment when logging request does not carry the proof of Register, then to obtain user according to logging request defeated The schematic flow sheet of the step of entering type verification data and terminal iidentification, and verified according to user input type verification data;
Fig. 7 is in one embodiment when the proof of Register for extracting is consistent with the proof of Register for inquiring, corresponding to terminal Mark carries out logging in the schematic flow sheet of the step of authorizing;
Fig. 8 is the schematic flow sheet of login method in one embodiment;
Fig. 9 is the step of being logged in using user's intervening mode when the proof of Register is not locally stored in one embodiment Schematic flow sheet;
Figure 10 is the schematic diagram of login page in a concrete application scene;
Figure 11 is the structured flowchart that authorization device is logged in one embodiment;
Figure 12 is the structured flowchart that authorization device is logged in another embodiment;
Figure 13 is the structured flowchart of entering device in one embodiment;
Figure 14 is the structured flowchart of entering device in another embodiment.
Specific embodiment
In order that the objects, technical solutions and advantages of the present invention become more apparent, it is right below in conjunction with drawings and Examples The present invention is further elaborated.It should be appreciated that specific embodiment described herein is only to explain the present invention, and It is not used in the restriction present invention.
Fig. 1 is the applied environment figure that authorization method and login method are logged in one embodiment.With reference to Fig. 2, the login is awarded Power method and login method are applied to a kind of login system, and the login system includes terminal 110, mobile terminal 1 20, electronic equipment 130 and server 140.Terminal 110, mobile terminal 1 20 and electronic equipment 130 can be by network connections to server 140.Eventually End 110 can be personal computer or be different from another mobile terminal of mobile terminal 1 20.Terminal 110 and mobile terminal 120 can be held by identical or different personnel, such as application developer.Electronic equipment 130 is held by manager.Login system Can be applicable to the login of program development platform.
Fig. 2 is the internal structure schematic diagram of server 140 in one embodiment.With reference to Fig. 2, the server 140 includes logical Cross processor, non-volatile memory medium, built-in storage and the network interface of system bus connection.Wherein, the server 140 Non-volatile memory medium be stored with operating system, data base and log in authorization device.Be stored with data base terminal iidentification and The corresponding relation of the corresponding relation of the proof of Register, the proof of Register and user account, and user account and manager's account is right Should be related to.Logging in authorization device is used to realize a kind of login authorization method.The processor of the server 140 be used for provide calculate and Control ability, supports the operation of whole server 140.The built-in storage of the server 140 is in non-volatile memory medium The operation for logging in authorization device provides environment, and computer-readable instruction can be stored in the built-in storage, and the computer-readable refers to Order is when executed by, and can cause a kind of login authorization method of computing device.The network interface of the server 140 is used for evidence To carry out network service, such as the logging request that receiving terminal 110 sends, to feedback the proof of Register of terminal 110 etc. with outside.Clothes Business device 140 can with independent server or multiple server groups into server cluster realizing.People in the art Member is appreciated that the structure illustrated in Fig. 2, only the block diagram of the part-structure related to application scheme, and it is right not constitute The restriction of the server that application scheme is applied thereon, specific server can include more more or less than shown in figure Part, or combine some parts, or arrange with different parts.
Fig. 3 is the internal structure schematic diagram of terminal 110 in one embodiment.With reference to Fig. 3, the terminal 110 is included by being Processor, non-volatile memory medium, built-in storage, network interface, display screen and input equipment that system bus connects.Wherein, The non-volatile memory medium of terminal 110 is stored with operating system, and be also stored with a kind of entering device.The entering device is used for real A kind of existing login method.The processor of terminal 110 is used to provide calculating and control ability, supports the operation of whole terminal 110.Eventually Built-in storage in end 110 provides environment for the operation of the entering device in non-volatile memory medium.Can in the built-in storage Be stored with computer-readable instruction, and the computer-readable instruction is when executed by, and can cause a kind of login of computing device Method.The network interface of terminal is used to carry out network service with server, such as sends logging request or receives the proof of Register.Eventually The display screen at end 110 can be LCDs or electric ink display screen, and the input equipment of terminal 110 can be display screen Button, trace ball or the Trackpad arranged on the touch layer, or the shell of terminal 110 of upper covering, can also be external Keyboard, Trackpad or mouse etc..The terminal 110 can be personal computer or mobile terminal, and mobile terminal includes mobile phone, puts down At least one in plate computer, personal digital assistant or Wearable etc..It will be understood by those skilled in the art that in Fig. 3 The structure for illustrating, only the block diagram of the part-structure related to application scheme, does not constitute and application scheme is applied The restriction of terminal thereon, specific terminal can be included than more or less of part shown in figure, or combine some Part, or arrange with different parts.
Fig. 4 is the schematic flow sheet that authorization method is logged in one embodiment.The present embodiment is mainly applied in this way Server 140 in above-mentioned Fig. 1 is illustrating.With reference to Fig. 4, the login authorization method specifically includes following steps:
S402, the logging request that receiving terminal sends.
Specifically, terminal can pass through the browser run in terminal, or the application program for passing through non-browser, and triggering is stepped on Record request, and logging request is sent to server, received by server.The logging request is asked to initiating logging request Terminal carries out logging in the request of mandate.
S404, extracts the proof of Register and terminal iidentification from logging request, and the proof of Register for extracting is previous complete in terminal Terminal is generated and is issued to when logging in and authorizing.
Specifically, terminal generate logging request when, by terminal local store the proof of Register and terminal terminal mark Knowledge is added in logging request;Server extracts the proof of Register and end after logging request is received from the logging request End mark.The proof of Register and terminal iidentification can obtain the proof of Register and terminal iidentification during extraction through encryption through decryption.
Wherein, terminal iidentification is used for unique mark terminal, can be MAC (Media Access Control, the matchmaker of terminal Body access control) address or IMEI (International Mobile Equipment Identity, international mobile device Identity code).The proof of Register is the data for verifying user identity.The proof of Register is different from user account and user cipher, steps on Record authority can change when logging in and authorizing every time.The proof of Register can be random number, can be specifically regular length with Machine number, or length exceed preset value and the inconstant random number of length.Terminal is previous to be completed to authorize when logging in, and refers to phase Same user sends logging request by the way that this terminal is last to server, and server is carried out according to the logging request to terminal Log in and authorize.
The proof of Register is corresponding with user account, and the corresponding the proof of Register of different user accounts is different.Different user The authority after login corresponding to each self-corresponding the proof of Register of account is different.Terminal can be by user account and the proof of Register Correspondence storage.In terminal or server, a user account corresponds to unique the proof of Register.There may be more than one in terminal Individual the proof of Register, in such cases each the proof of Register correspond to different user accounts respectively.
In one embodiment, terminal initiate logging request when, if only existing in terminal corresponding to a user account The proof of Register when, then the proof of Register directly according to corresponding to a user account and terminal iidentification generate logging request.
In one embodiment, terminal initiate logging request when, if existing in terminal corresponding to multiple user accounts During the proof of Register, then each self-corresponding option of multiple user accounts is shown, obtain selection instruction, obtained the selection instruction and chosen An option, the proof of Register according to corresponding to user account corresponding with the option and terminal iidentification generate logging request.
S406, inquires about the previous the proof of Register for completing to generate and store when login is authorized corresponding with terminal iidentification.
Specifically, user it is previous by terminal logs in server and by server complete log in authorize when, by server Generate corresponding the proof of Register, server by the proof of Register storage corresponding with terminal iidentification on the server.The proof of Register with Terminal iidentification can be stored correspondingly in data base on the server or file.Server is extracting the proof of Register and terminal mark After knowledge, directly from server lookup the proof of Register corresponding with the terminal iidentification for extracting.
S408, when the proof of Register for extracting is consistent with the proof of Register for inquiring, is logged in corresponding to terminal iidentification Authorize.
Server is authenticated according to the proof of Register and terminal iidentification that extract.The proof of Register that service implement body will be extracted Compare with the proof of Register corresponding with terminal iidentification is inquired, judge that the proof of Register for extracting is with the proof of Register for inquiring It is no consistent.When the proof of Register for extracting is consistent with the proof of Register for inquiring, authenticate successfully, then to terminal iidentification corresponding end End carries out login mandate so that the terminal is provided with the authority after logging in corresponding to the proof of Register.
When the proof of Register for extracting is inconsistent with the proof of Register for inquiring, failed authentication, refusal carries out login mandate. In one embodiment, when the proof of Register for extracting is inconsistent with the proof of Register for inquiring, terminal deletion terminal can be notified On corresponding the proof of Register.
S410, updates the proof of Register corresponding with terminal iidentification of storage.
Specifically, server generates new the proof of Register, and the new the proof of Register completes to be generated when login is authorized with previous And the proof of Register difference for storing.Server by it is corresponding with terminal iidentification it is previous complete log in authorize when generate and store step on Record authority, replaces with the new the proof of Register of generation, realizes the renewal of the proof of Register.
S412, by the proof of Register of renewal terminal is issued to.
Specifically, the proof of Register of renewal is issued to server the terminal for initiating logging request so that terminal is by terminal The proof of Register of upper storage is updated to the proof of Register that server is issued.Terminal can pass through to initiate the browser used by logging request Or the application program storage the proof of Register of non-browser.In one embodiment, terminal the proof of Register can exceed in advance thereon If deleting the proof of Register when duration does not update.
Above-mentioned login authorization method, is carried out when logging in every time using the front the proof of Register for once issuing and with reference to terminal iidentification Log in, complete login and authorize the proof of Register that can then issue renewal, use when logging in for next time.So User logs in when just need not User account and user cipher are frequently entered, the convenience of login can be ensured.And, even if it is previous log in the login that issues with According to compromised, but user when logging on the proof of Register will update, therefore safety is further improved.
In one embodiment, after step S402, the login authorization method is also included when logging request does not carry login During authority, carry out logging in the step of authorizing using user's intervening mode.With reference to Fig. 5, deserve logging request and do not carry the proof of Register When, the step of logging in mandate is carried out using user's intervening mode and specifically includes following steps:
S502, when logging request does not carry the proof of Register, then obtains user input type verification data according to logging request And terminal iidentification, and verified according to user input type verification data.
Specifically, server judges whether the logging request carries the proof of Register after logging request is received.If logging in Request carries the proof of Register, server then execution step S404.If logging request does not carry the proof of Register, execution step S502.Wherein, user input type verification data is referred to by the verification data of user input, and such as user account and user is close Code.
In one embodiment, user input type verification data can be user account and user cipher.Specifically, service Device can extract user account, user cipher and terminal iidentification from logging request, according to the user account and user cipher that extract Verified.Server according to extract user account and user cipher verified when, specifically can inquire about on server with The corresponding user cipher of user account, the user cipher of extraction and the user cipher for inquiring are compared, if comparative result is one Cause then verification to pass through, verify if being inconsistent if comparative result and do not pass through.
S504, when verification passes through, then carries out login mandate corresponding to terminal iidentification, generates step on corresponding with terminal iidentification Record authority is simultaneously stored, and the proof of Register being currently generated is issued to into terminal.
Specifically, server is when verification passes through, and login mandate is carried out to terminal, generates brand-new the proof of Register, and By brand-new the proof of Register storage corresponding with terminal iidentification on server, and the proof of Register being currently generated is issued to into end End so that the terminal storage the proof of Register.Further, server, can be to terminal feedback login failure when verification does not pass through Notice.
In the present embodiment, when lacking the proof of Register in terminal so that terminal cannot carry out quick registration by the proof of Register, So terminal can also be completed to log in and authorized by user input type verification data.And when completing to log in mandate, can generate and step on Record authority is simultaneously issued to terminal, then SS later just can carry out quick registration by the proof of Register.
As shown in fig. 6, in one embodiment, step S502 specifically includes following steps:
S602, according to logging request terminal iidentification is obtained.
Specifically, terminal can from logging request extracting directly terminal iidentification.
S604, generates bar code corresponding with terminal iidentification.
Wherein, bar code (Bar Code) be by character according to preset rules coding obtain it is reducible go out character figure, Bar code can include bar code and two-dimensional bar code (2-Dimensional Bar Code).Bar code is by width Multiple secret notes and blank, arrange, to the graphical identifier for expressing a group information according to certain coding rule.Two-dimensional bar code letter Claim Quick Response Code, refer to certain specific geometric figure according to certain rules in the graphic recording data symbols of planar directional spreding The bar code of number information.
S606, bar code is sent to terminal and is shown so that the mobile terminal logged in user account is gathered bar code and solved Analysis obtains verifying address.
Specifically, server adopt default barcode encoding mode, will also terminal iidentification it is corresponding verification geocoding shape Into bar code, and bar code is sent to terminal, the bar code is shown by terminal.User logs in mobile terminal with user account, and passes through Mobile terminal gathers the bar code by shown by terminal, and mobile terminal parses verification address from bar code.Verification address can be URL (Uniform Resource Locator, URL) form.
S608, when receiving the login authorization notification that mobile terminal is initiated according to verification address, verification passes through.
Specifically, mobile terminal sends the login authorization page for carrying user account to server according to verification address Request.Server receives login authorization page request, therefrom extracts user account, and to mobile terminal feedback and the user The corresponding login authorization page of account.The login that acquisition for mobile terminal is triggered in the login authorization page confirms instruction, according to The login confirms that instruction triggers log in authorization notification, and the login authorization notification is sent to server.If server is received The login authorization notification that mobile terminal sends, then it represents that verification passes through.It is user input type that authorization notification is logged in the present embodiment Verification data.
In the present embodiment, convenient login is realized by way of mobile scanning terminal bar code, and when completing to log in mandate, The proof of Register can be generated and terminal is issued to, then SS later just can carry out quick registration by the proof of Register.
In one embodiment, the login authorization method also includes:When verification passes through, the positional information of terminal is obtained simultaneously Corresponding to terminal iidentification record;Step S408 includes:The positional information of terminal is extracted from logging request;When the position letter for extracting Breath with record positional information match, and extraction the proof of Register it is consistent with the proof of Register for inquiring when, corresponding to terminal mark Knowledge carries out login mandate.
Wherein, positional information is the information for representing terminal location, can be IP (Internet Protocol, internet association View) section, or geographical position coordinates.Geographical position coordinates can be represented with the longitude of terminal position and latitude.Ground Reason position coordinateses can be by terminal active reporting, it is also possible to be calculated according to the IP address of terminal.The positional information of extraction with The positional information matching of record, can be identical or difference is in preset range.When the positional information for extracting and the position of record When confidence breath mismatch and/or the proof of Register for extracting inconsistent with the proof of Register for inquiring, refusal carries out login mandate.
In the present embodiment, do not verified only with the proof of Register, herein in connection with the adjacent positional information for logging in twice Verified with situation, can avoid causing illegal login because of lost terminal as far as possible, can further improve safety.
As shown in fig. 7, in one embodiment, step S408 comprises the steps:
S702, when the proof of Register for extracting is consistent with the proof of Register for inquiring, to the electricity corresponding to manager's account Sub- equipment sends to log in and notifies;Manager's account is corresponding with the user account corresponding to the proof of Register.
Specifically, server can store the corresponding relation between user account and the proof of Register, and store user account and Corresponding relation between manager's account.Corresponding relation wherein between user account and manager's account is used to represent manager With the relation being managed between user.
Further, when the proof of Register for determining extraction is consistent with the proof of Register for inquiring, inquiry should for server The corresponding user account of the proof of Register, and the corresponding manager's account of the user account is inquired about, so as to manager's account The electronic equipment of login sends to log in and notifies.Electronic equipment can be personal computer, mobile terminal or special equipment.
S704, receives electronic equipment and notifies fed back authorization command in response to logging in.
Specifically, electronic equipment, can be according to entrained by the login notifies acquisition logging request after login notice is received The proof of Register corresponding to user account, show the user account and/or the user profile corresponding to the user account, and show Show the option that the option and refusal of grant authorizations are authorized.
Further, detectable selection operation of the user to rendering preferences of electronics, choose grant authorizations option or The option that refusal is authorized.When the option of grant authorizations in choosing, authorization command is sent to server, the mandate is received by server Order.When the option for authorizing is refused in choosing or when non-selected more than preset duration, refusal log on command is sent to server, Received by server.
Wherein electronic equipment obtains user account according to notice is logged in, and specifically can obtain user account from logging in notice, Can also be from server request obtaining user account.Server can with from server request obtaining corresponding to user account User profile.User profile such as address name, user's position and user department etc..
S706, according to authorization command, corresponding to terminal iidentification login mandate is carried out.
Specifically, server after the authorization command for receiving electronic equipment transmission, enter by the terminal to initiating logging request Row is logged in and authorized.If server receives refusal log on command, or does not receive the life of electronic equipment feedback more than scheduled duration Order, then refuse to carry out login mandate to terminal.
In the present embodiment, not only ensure to log in safety by the proof of Register for changing, also by stepping on manager's account Login of the electronic equipment unification of record to user is managed, and further increases the safety of login.And it is being applied to journey During sequence development field, user account is application developer's account, and manager's account is then that program development project is managed Account, it is ensured that the safety that logs in and convenience during exploitation program.
In one embodiment, after step S706, the method also includes:Receive electronic equipment send for terminal mark The offline order known;According to offline order, cancel the login mandate corresponding to terminal iidentification, and corresponding with terminal iidentification will step on Record authority is removed.
Specifically, electronic equipment can store the terminal iidentification through logging in mandate, or from server lookup through logging in The terminal iidentification of mandate.Electronic equipment can detect selection operation, and according to selection operation terminal iidentification is chosen, so as to initiate for being somebody's turn to do The offline order of the terminal iidentification chosen, and offline order is sent to server.Server, can after offline order is received Cancel the login mandate to terminal corresponding to terminal iidentification, and remove all the proof of Register corresponding with terminal iidentification, or Only remove the proof of Register used by current login corresponding with terminal iidentification.
In the present embodiment, by the electronic equipment corresponding to manager's account, under can directly controlling the terminal after logging in Line, prevents electronic equipment from being used by malicious user.
In one embodiment, after step S408 or step S504, the login authorization method also includes:Receive the end The operation requests of the request assigned operation that end is initiated;User input type verification data is obtained according to the operation requests;According to institute State user input type verification data to be verified;When verification passes through, the assigned operation that the operation requests are asked is performed.
Specifically, terminal after login, can ask two kinds of operation.A type of operation can be initiated in terminal Afterwards, by server directly in response to if desired can be with to terminal feedback operating result.For another type of operation namely Assigned operation, terminal needs server to award to the assigned operation using user's intervening mode when the assigned operation is initiated Power.Assigned operation can be the sensitive operation that can result in significant impact, such as pocket transmission news.Whether operation is that assigned operation can be pre- First configure.Server can be after assigned operation be performed, to the corresponding operating result of terminal feedback.Server is according to user input Type verification data verified and verified not by when, can be to the message of terminal feedback operation failure.
In one embodiment, user input type verification data can be user account and user cipher.Specifically, service Device can extract user account, user cipher and terminal iidentification from operation requests, according to the user account and user cipher that extract Verified.Server according to extract user account and user cipher verified when, specifically can inquire about on server with The corresponding user cipher of user account, the user cipher of extraction and the user cipher for inquiring are compared, if comparative result is one Cause then verification to pass through, verify if being inconsistent if comparative result and do not pass through.
In one embodiment, server can obtain terminal iidentification according to operation requests, generate corresponding with terminal iidentification Bar code, bar code is sent to terminal and is shown so that the mobile terminal logged in user account gathers bar code and parsing obtains school Test address.When the authorization notice that mobile terminal is initiated according to verification address is received, verification passes through server.
In the present embodiment, when asking assigned operation after login, verified using user's intervening mode, after verification passes through Assigned operation is performed, safety can be further ensured that.
Fig. 8 is the schematic flow sheet of login method in one embodiment.The present embodiment is mainly applied to the login method Terminal 110 in Fig. 1 is illustrating.With reference to Fig. 8, the login method specifically includes following steps:
S802, obtains local terminal iidentification.
Specifically, terminal obtains the terminal iidentification of terminal local.
S804, obtains locally stored the proof of Register, and the proof of Register is in local previous login being serviced device mandate Issued by the server.
Specifically, server can pass through the application program of browser or non-browser, and storage is locally previous to be completed to log in The proof of Register issued by server during mandate.
S806, the first logging request for carrying the proof of Register and terminal iidentification is sent to server so that server root Authenticate according to the proof of Register and terminal iidentification that carry and carry out login mandate after success.
Specifically, server extracts the proof of Register and terminal iidentification, and the proof of Register for extracting from the first logging request Terminal it is previous complete log in authorize when generate and be issued to terminal.Server lookup is corresponding with terminal iidentification previous to be completed to step on The proof of Register that record is generated and stored when authorizing.When the proof of Register for extracting is consistent with the proof of Register for inquiring, server Login mandate is carried out corresponding to terminal iidentification.
In one embodiment, server can be recorded in the proof of Register entrained by the first logging request and terminal iidentification When on server, judgement is authenticated successfully.In one embodiment, server can be with stepping on entrained by the first logging request When record authority and terminal iidentification are recorded on server and there is corresponding relation, judgement is authenticated successfully.
S808, the reception server completes to log in the proof of Register for updating and sending when authorizing.
S810, the proof of Register that locally stored the proof of Register is updated to receive.
Above-mentioned login method, is stepped on when logging in every time using the front the proof of Register for once issuing and with reference to terminal iidentification Record, completes login and authorizes the proof of Register that can then issue renewal, uses when logging in for next time.So User logs in when just need not frequency Numerous input user account and user cipher, can realize quick registration in same terminal, ensure the convenience for logging in, and one Determine to have taken into account the safety for logging in degree.And, even if the previous the proof of Register for issuing that logs in is compromised, but user steps on again The proof of Register will update during record, therefore safety is further improved.
In one embodiment, after step S802, the method also includes being adopted when the proof of Register is not locally stored The step of user's intervening mode is logged in.With reference to Fig. 9, entered using user's intervening mode when should not locally store the proof of Register The step of row is logged in specifically includes following steps:
S902, when the proof of Register is not locally stored, then the second login for carrying terminal iidentification to server transmission please Ask.
Specifically, when the corresponding the proof of Register of active user is not locally stored, generation carries the second of terminal iidentification Logging request, and the second logging request is sent to server.
S804, the bar code that the reception server is fed back according to the second logging request.
S906, shows bar code so that the mobile terminal collection bar code and parsing logged in user account obtains verifying address, Sent to server according to verification address and log in authorization notification so that server is logged in after login authorization notification is received Authorize.
S908, the reception server completes to log in the proof of Register generated and sent after mandate, and execution step S810.
In the present embodiment, when lacking the proof of Register in terminal so that terminal cannot carry out quick registration by the proof of Register, So terminal can also be completed to log in and authorized by user input type verification data.And when completing to log in mandate, can generate and step on Record authority is simultaneously issued to terminal, then SS later just can carry out quick registration by the proof of Register.
In one embodiment, after step S806, the login method also includes:When assigned operation is asked, to clothes Business device sends the operation requests for carrying terminal iidentification.The bar code that the reception server is fed back according to operation requests.Bar code is shown, is made The mobile terminal collection bar code and parsing for being able to user account login obtains verifying address, is sent to server according to verification address Log in authorization notification so that server performs assigned operation after login authorization notification is received.
In the present embodiment, when asking assigned operation after login, verified using user's intervening mode, after verification passes through Assigned operation is performed, safety can be further ensured that.
Illustrate the principle of above-mentioned login authorization method and login method with a concrete application scene below.Reference picture 10, user A is logged in terminal, and terminal storage has the proof of Register that user A previous logins are issued when completing by server.With Family B was not logged in terminal, and terminal does not store the proof of Register of user B.Terminal, can be by user A used as a kind of trusted devices Log in user B.User A or user B accesses login page as shown in Figure 10, shows corresponding to user in the login page The quick registration button 1001 of A.User account input frame 1002, user cipher input frame 1003 can also be shown in login page With login button 1004, or show for log in Quick Response Code 1005.User A can click directly on quick registration button and carry out Log in.User B then can be input into by being input into user account in account input frame 1002 in user cipher input frame 1003 User cipher, and login button 1004 is clicked on, complete to log in.User B can also realize logging in mobile phone scanning Quick Response Code 1005. Terminal completes to be obtained after logging in the proof of Register that server issues and is stored in local in user B.Subsequent user A or user When B accesses login page, login page will show the quick registration button corresponding to user A and user B.
Figure 11 is the structured flowchart that authorization device 1100 is logged in one embodiment.With reference to Figure 11, the login authorization device 1100 include:Logging request processing module 1101, the proof of Register enquiry module 1102, login authorization module 1103 and the proof of Register Management module 1104.
Logging request processing module 1101, for the logging request that receiving terminal sends;Extract from logging request and log in Authority and terminal iidentification, and extract the proof of Register terminal it is previous complete log in authorize when generate and be issued to terminal.
The proof of Register enquiry module 1102, for inquire about it is corresponding with terminal iidentification it is previous complete log in authorize when generation simultaneously The proof of Register of storage.
Authorization module 1103 is logged in, for when the proof of Register for extracting is consistent with the proof of Register for inquiring, corresponding to Terminal iidentification carries out login mandate.
The proof of Register management module 1104, for updating the proof of Register corresponding with terminal iidentification of storage;By what is updated The proof of Register is issued to terminal.
In one embodiment, log in authorization module 1103 to be additionally operable to when logging request does not carry the proof of Register, then root User input type verification data and terminal iidentification are obtained according to logging request, and is verified according to user input type verification data; When verification passes through, then login mandate is carried out corresponding to terminal iidentification, generates the proof of Register corresponding with terminal iidentification and store, And the proof of Register being currently generated is issued to into terminal.
In one embodiment, log in authorization module 1103 to be additionally operable to obtain terminal iidentification according to logging request;Generate with The corresponding bar code of terminal iidentification;Bar code is sent to terminal and shown so that with the mobile terminal pick-up slip that user account is logged in Code and parsing obtain verification address;When receiving the login authorization notification that mobile terminal is initiated according to verification address, verification is logical Cross.
In one embodiment, log in authorization module 1103 to be additionally operable to obtain the positional information of terminal when verification passes through And corresponding to terminal iidentification record.
Logging request processing module 1101 is additionally operable to extract the positional information of terminal from logging request.
Log in authorization module 1103 be additionally operable to when extract positional information with record positional information match, and extraction step on When record authority is consistent with the proof of Register for inquiring, corresponding to terminal iidentification login mandate is carried out.
In one embodiment, log in authorization module 1103 be additionally operable to when extract the proof of Register and the login for inquiring with According to it is consistent when, to corresponding to manager's account electronic equipment send log in notify;Corresponding to manager's account and the proof of Register User account correspondence;Receive electronic equipment and notify fed back authorization command in response to logging in;According to authorization command, correspond to Terminal iidentification carries out login mandate.
Figure 12 is the structured flowchart that authorization device 1100 is logged in one embodiment.With reference to Figure 12, the login authorization device 1100 also include:Offline processing module 1105, for receiving the offline order for terminal iidentification of electronic equipment transmission;According to Offline order, cancels the login mandate corresponding to terminal iidentification, and the proof of Register corresponding with terminal iidentification is removed.
In one embodiment, log in authorization module 1103 and be additionally operable to what receiving terminal was initiated when assigned operation is asked Operation requests;User input type verification data is obtained according to operation requests;Verified according to user input type verification data;When When verification passes through, assigned operation is performed.
Above-mentioned login authorization device 1100, using the front the proof of Register for once issuing and terminal iidentification is combined when logging in every time Logged in, complete login and authorize the proof of Register that can then issue renewal, used when logging in for next time.So User logs in when just User account and user cipher need not be frequently entered, quick registration can be realized in same terminal, ensure the convenient of login Property, and the safety for logging in has been taken into account to a certain extent.And, even if the previous the proof of Register for issuing that logs in is compromised, but use The proof of Register will update when family logs on, therefore safety is further improved.
Figure 13 is the structured flowchart of entering device 1300 in one embodiment.With reference to Figure 13, the entering device 1300 includes: Acquisition module 1301, sending module 1302, receiver module 1303 and update module 1304.
Acquisition module 1301, for obtaining local terminal iidentification;Obtain locally stored the proof of Register, the login with According to being issued by the server in local previous login being serviced device mandate.
Sending module 1302, for sending the first logging request for carrying the proof of Register and terminal iidentification to server, So that server is authenticated according to the proof of Register and terminal iidentification that carry carry out login mandate after success.
Receiver module 1303, the proof of Register for updating and sending when completing and log in and authorize for the reception server.
Update module 1304, for the proof of Register for being updated to receive by locally stored the proof of Register.
Figure 14 is the structured flowchart of entering device 1300 in one embodiment.With reference to Figure 14, the entering device 1300 is also wrapped Include display module 1305.
Sending module 1302 is additionally operable to when the proof of Register is not locally stored, then send to server and carry terminal iidentification The second logging request.
Receiver module 1303 is additionally operable to the bar code that the reception server is fed back according to the second logging request.
Display module 1305 is used to show bar code so that the mobile terminal logged in user account is gathered bar code and parsed To verification address, sent to server according to verification address and log in authorization notification so that server authorizes logical receiving to log in Login mandate is carried out after knowing.
Receiver module 1303 is additionally operable to the reception server and completes to log in the proof of Register generated and sent after mandate, and notifies The proof of Register that locally stored the proof of Register is updated to receive by update module.
Above-mentioned entering device 1300, is carried out when logging in every time using the front the proof of Register for once issuing and with reference to terminal iidentification Log in, complete login and authorize the proof of Register that can then issue renewal, use when logging in for next time.So User logs in when just need not User account and user cipher are frequently entered, quick registration can be realized in same terminal, ensured the convenience for logging in, and The safety for logging in has been taken into account to a certain extent.And, even if the previous the proof of Register for issuing that logs in is compromised, but user is again The proof of Register will update during login, therefore safety is further improved.
One of ordinary skill in the art will appreciate that realizing all or part of flow process in above-described embodiment method, can be Related hardware is instructed to complete by computer program, the computer program can be stored in embodied on computer readable storage and be situated between In matter, the program is upon execution, it may include such as the flow process of the embodiment of above-mentioned each method.Wherein, aforesaid storage medium can be The non-volatile memory mediums such as magnetic disc, CD, read-only memory (Read-Only Memory, ROM), or random storage note Recall body (Random Access Memory, RAM) etc..
Each technical characteristic of above example can be combined arbitrarily, to make description succinct, not to above-described embodiment In each technical characteristic it is all possible combination be all described, as long as however, there is no lance in the combination of these technical characteristics Shield, is all considered to be the scope of this specification record.
Above example only expresses the several embodiments of the present invention, and its description is more concrete and detailed, but can not Therefore it is construed as limiting the scope of the patent.It should be pointed out that for the person of ordinary skill of the art, On the premise of without departing from present inventive concept, some deformations and improvement can also be made, these belong to protection scope of the present invention. Therefore, the protection domain of patent of the present invention should be defined by claims.

Claims (18)

1. a kind of to log in authorization method, methods described includes:
The logging request that receiving terminal sends;
Extract the proof of Register and terminal iidentification from the logging request, and the proof of Register for extracting is completed the terminal is previous Log in and generate and be issued to the terminal when authorizing;
The inquiry previous the proof of Register for completing to generate and store when login is authorized corresponding with the terminal iidentification;
When the proof of Register for extracting is consistent with the proof of Register for inquiring, corresponding to the terminal iidentification login mandate is carried out;
Update the proof of Register corresponding with the terminal iidentification of storage;
The proof of Register of renewal is issued to into the terminal.
2. method according to claim 1, it is characterised in that described after the logging request that the receiving terminal sends Method also includes:
When the logging request does not carry the proof of Register, then according to the logging request obtain user input type verification data and Terminal iidentification, and verified according to the user input type verification data;
When verification passes through, then login mandate is carried out corresponding to the terminal iidentification, generate step on corresponding with the terminal iidentification Record authority is simultaneously stored, and the proof of Register being currently generated is issued to into the terminal.
3. method according to claim 2, it is characterised in that described that user input type school is obtained according to the logging request Testing data and terminal iidentification, and carry out verification according to the user input type verification data includes:
Terminal iidentification is obtained according to the logging request;
Generate bar code corresponding with the terminal iidentification;
The bar code is sent to the terminal and shown so that the bar code is gathered simultaneously with the mobile terminal that user account is logged in Parsing obtains verifying address;
When receiving the login authorization notification that the mobile terminal is initiated according to the verification address, verification passes through.
4. method according to claim 2, it is characterised in that methods described also includes:
When verification passes through, the positional information of the terminal is obtained and corresponding to terminal iidentification record;
It is described when extract the proof of Register it is consistent with the proof of Register for inquiring when, carry out login corresponding to the terminal iidentification and award Power includes:
The positional information of the terminal is extracted from the logging request;
When the positional information for extracting is matched with the positional information of record, and the proof of Register and the proof of Register one for inquiring of extraction During cause, corresponding to the terminal iidentification login mandate is carried out.
5. method according to claim 1, it is characterised in that it is described when the proof of Register for extracting and the login for inquiring with According to it is consistent when, corresponding to the terminal iidentification carry out log in mandate include:
When the proof of Register for extracting is consistent with the proof of Register for inquiring, send to the electronic equipment corresponding to manager's account Log in and notify;Manager's account is corresponding with the user account corresponding to the proof of Register;
Receive the electronic equipment and notify fed back authorization command in response to described login;
According to the authorization command, corresponding to the terminal iidentification login mandate is carried out.
6. method according to claim 5, it is characterised in that described to carry out logging in mandate corresponding to the terminal iidentification Afterwards, methods described also includes:
Receive the offline order for the terminal iidentification that the electronic equipment sends;
According to the offline order, cancel the login mandate corresponding to the terminal iidentification, and will be corresponding with the terminal iidentification The proof of Register remove.
7. method according to claim 1, it is characterised in that described to carry out logging in mandate corresponding to the terminal iidentification Afterwards, methods described also includes:
Receive the operation requests of the request assigned operation that the terminal is initiated;
User input type verification data is obtained according to the operation requests;
Verified according to the user input type verification data;
When verification passes through, the assigned operation that the operation requests are asked is performed.
8. a kind of login method, methods described includes:
Obtain local terminal iidentification;
Locally stored the proof of Register is obtained, the proof of Register is in local previous login being serviced device mandate by the service Device is issued;
The first logging request for carrying the proof of Register and the terminal iidentification is sent to the server so that the clothes Business device is authenticated according to the proof of Register and terminal iidentification that carry and carry out login mandate after success;
Receive the server to complete to log in the proof of Register for updating and sending when authorizing;
The proof of Register that locally stored the proof of Register is updated to receive.
9. method according to claim 8, it is characterised in that after the local terminal iidentification of the acquisition, methods described Also include:
When the proof of Register is not locally stored, then
The second logging request for carrying the terminal iidentification is sent to the server;
Receive the bar code that the server feeds back according to second logging request;
Show the bar code so that the mobile terminal logged in user account gathers the bar code and parsing obtains verifying address, According to the verification address to the server send log in authorization notification so that the server receive it is described login award Power carries out login mandate after notifying;
Receive the server to complete to log in the proof of Register generated and sent after mandate;
Perform described the step of locally stored the proof of Register is updated to into the proof of Register for receiving.
10. it is a kind of to log in authorization device, it is characterised in that to include:
Logging request processing module, for the logging request that receiving terminal sends;The proof of Register is extracted from the logging request And terminal iidentification, and extract the proof of Register the terminal it is previous complete log in authorize when generate and be issued to the terminal;
The proof of Register enquiry module, for inquire about it is corresponding with the terminal iidentification it is previous complete log in authorize when generate and store The proof of Register;
Authorization module is logged in, for when the proof of Register for extracting is consistent with the proof of Register for inquiring, corresponding to the terminal Mark carries out login mandate;
The proof of Register management module, for updating the proof of Register corresponding with the terminal iidentification of storage;The login that will be updated Authority is issued to the terminal.
11. devices according to claim 10, it is characterised in that the login authorization module is additionally operable to when the login please Ask when not carrying the proof of Register, then user input type verification data and terminal iidentification are obtained according to the logging request, and according to The user input type verification data is verified;When verification passes through, then login mandate is carried out corresponding to the terminal iidentification, Generate the proof of Register corresponding with the terminal iidentification and store, and the proof of Register being currently generated is issued to into the terminal.
12. devices according to claim 11, it is characterised in that the login authorization module is additionally operable to according to the login Acquisition request terminal iidentification;Generate bar code corresponding with the terminal iidentification;The bar code is sent to the terminal and is shown, So that the mobile terminal logged in user account gathers the bar code and parsing obtains verifying address;Receive the mobile terminal During the login authorization notification initiated according to the verification address, verification passes through.
13. devices according to claim 11, it is characterised in that the login authorization module is additionally operable to when verification passes through When, obtain the positional information of the terminal and corresponding to terminal iidentification record;
The logging request processing module is additionally operable to from the logging request extract the positional information of the terminal;
It is described log in authorization module be additionally operable to when extract positional information with record positional information match, and extraction login with According to it is consistent with the proof of Register for inquiring when, carry out login mandate corresponding to the terminal iidentification.
14. devices according to claim 10, it is characterised in that the login authorization module is additionally operable to when the login extracted When authority is consistent with the proof of Register for inquiring, sends to the electronic equipment corresponding to manager's account and log in notice;The pipe Reason person's account is corresponding with the user account corresponding to the proof of Register;Receive the electronic equipment to notify in response to described login The authorization command fed back;According to the authorization command, corresponding to the terminal iidentification login mandate is carried out.
15. devices according to claim 14, it is characterised in that described device also includes:
Offline processing module, for receiving the offline order for the terminal iidentification that the electronic equipment sends;According to institute Offline order is stated, cancels the login mandate corresponding to the terminal iidentification, and will the proof of Register corresponding with the terminal iidentification Remove.
16. devices according to claim 10, it is characterised in that the login authorization module is additionally operable to receive the terminal The operation requests of the request assigned operation of initiation;User input type verification data is obtained according to the operation requests;According to described User input type verification data is verified;When verification passes through, the assigned operation that the operation requests are asked is performed.
17. a kind of entering devices, it is characterised in that include:
Acquisition module, for obtaining local terminal iidentification;Locally stored the proof of Register is obtained, the proof of Register is local Issued by the server during previous login being serviced device mandate;
Sending module, please for sending the first login for carrying the proof of Register and the terminal iidentification to the server Ask so that the server is authenticated according to the proof of Register and terminal iidentification that carry and carry out login mandate after success;
Receiver module, for receiving the proof of Register for updating and sending when the server completes and logs in and authorize;
Update module, for the proof of Register for being updated to receive by locally stored the proof of Register.
18. devices according to claim 17, it is characterised in that described device also includes display module;
The sending module is additionally operable to when the proof of Register is not locally stored, then sent to the server described in carrying Second logging request of terminal iidentification;
The receiver module is additionally operable to receive the bar code that the server feeds back according to second logging request;
The display module is used to show the bar code so that the mobile terminal logged in user account is gathered the bar code and solved Analysis obtains verifying address, is sent to the server according to the verification address and logs in authorization notification so that the server exists Receive and carry out login mandate after the login authorization notification;
The receiver module is additionally operable to receive the proof of Register that the server completes to be generated and sent after login is authorized, and notifies The proof of Register that locally stored the proof of Register is updated to receive by the update module.
CN201611208735.9A 2016-12-23 2016-12-23 Login authorization method and device, login method and device Pending CN106657068A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201611208735.9A CN106657068A (en) 2016-12-23 2016-12-23 Login authorization method and device, login method and device
PCT/CN2017/117397 WO2018113690A1 (en) 2016-12-23 2017-12-20 Login authorisation method and apparatus, and login method and apparatus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611208735.9A CN106657068A (en) 2016-12-23 2016-12-23 Login authorization method and device, login method and device

Publications (1)

Publication Number Publication Date
CN106657068A true CN106657068A (en) 2017-05-10

Family

ID=58827024

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611208735.9A Pending CN106657068A (en) 2016-12-23 2016-12-23 Login authorization method and device, login method and device

Country Status (2)

Country Link
CN (1) CN106657068A (en)
WO (1) WO2018113690A1 (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018113690A1 (en) * 2016-12-23 2018-06-28 腾讯科技(深圳)有限公司 Login authorisation method and apparatus, and login method and apparatus
CN108322461A (en) * 2018-01-31 2018-07-24 百度在线网络技术(北京)有限公司 Method, system, device, equipment and the medium of application program automated log on
CN108616360A (en) * 2018-03-22 2018-10-02 阿里巴巴集团控股有限公司 User identity verification, register method and device
CN109218326A (en) * 2018-10-10 2019-01-15 广州虎牙信息科技有限公司 Login validation method, device, storage medium and server
CN111600858A (en) * 2020-05-06 2020-08-28 腾讯科技(深圳)有限公司 Application login method, device and system
CN112187811A (en) * 2020-09-30 2021-01-05 湖南快乐阳光互动娱乐传媒有限公司 App login method and system
CN112272167A (en) * 2020-10-09 2021-01-26 深圳安泰创新科技股份有限公司 System login method, terminal device and computer readable storage medium
CN112417405A (en) * 2020-11-30 2021-02-26 北京小熊博望科技有限公司 Multi-cloud disk aggregation method
CN114124382A (en) * 2021-12-01 2022-03-01 深圳市大头兄弟科技有限公司 Voucher updating method, system, equipment and storage medium
WO2023016414A1 (en) * 2021-08-12 2023-02-16 阿里云计算有限公司 Credential rotation method, computing device, and storage medium

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109992601B (en) * 2019-03-12 2023-10-27 中国平安财产保险股份有限公司 To-do information pushing method and device and computer equipment
CN110995416A (en) * 2019-10-12 2020-04-10 武汉信安珞珈科技有限公司 Method for associating mobile terminal with client
CN111523862B (en) * 2020-04-27 2024-02-23 广东电网有限责任公司培训与评价中心 Method and related equipment for acquiring talent data
CN112019505A (en) * 2020-07-22 2020-12-01 北京达佳互联信息技术有限公司 Login method, device, server, electronic equipment and storage medium
CN114640880B (en) * 2020-11-30 2023-06-30 腾讯科技(深圳)有限公司 Account login control method, device and medium
CN113992353B (en) * 2021-09-27 2024-01-09 北京达佳互联信息技术有限公司 Login certificate processing method and device, electronic equipment and storage medium
CN114793177B (en) * 2022-04-28 2024-01-05 阿里巴巴(中国)有限公司 Service login method and device and electronic equipment

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1385781A (en) * 2001-05-11 2002-12-18 范平志 Dynamic password based authentication identifying method
CN1411224A (en) * 2001-09-29 2003-04-16 华为技术有限公司 Safe identification method of PC customer's terminal
CN1610290A (en) * 2004-11-25 2005-04-27 郑维 Key changing type one time one key cipher system
CN101166094A (en) * 2007-08-10 2008-04-23 林明辉 A method for client to automatically log in the server via intelligent encryption mode
US8156546B2 (en) * 2009-10-29 2012-04-10 Satyam Computer Services Limited Of Mayfair Centre System and method for flying squad re authentication of enterprise users
CN105530224A (en) * 2014-09-30 2016-04-27 中国电信股份有限公司 Method and device for terminal authentication
CN105991559A (en) * 2015-02-05 2016-10-05 同济大学 User safety login method based on image encryption technology

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8510813B2 (en) * 2006-12-15 2013-08-13 Yahoo! Inc. Management of network login identities
CN103973652A (en) * 2013-02-01 2014-08-06 深圳市天时通科技有限公司 Login method and login system
KR20130039745A (en) * 2013-03-28 2013-04-22 삼성에스디에스 주식회사 System and method for authentication interworking
CN103327115B (en) * 2013-07-05 2016-05-25 百度在线网络技术(北京)有限公司 The log-in control method of application program and device
CN106059776A (en) * 2016-07-07 2016-10-26 乐视控股(北京)有限公司 Website login method and device
CN106657068A (en) * 2016-12-23 2017-05-10 腾讯科技(深圳)有限公司 Login authorization method and device, login method and device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1385781A (en) * 2001-05-11 2002-12-18 范平志 Dynamic password based authentication identifying method
CN1411224A (en) * 2001-09-29 2003-04-16 华为技术有限公司 Safe identification method of PC customer's terminal
CN1610290A (en) * 2004-11-25 2005-04-27 郑维 Key changing type one time one key cipher system
CN101166094A (en) * 2007-08-10 2008-04-23 林明辉 A method for client to automatically log in the server via intelligent encryption mode
US8156546B2 (en) * 2009-10-29 2012-04-10 Satyam Computer Services Limited Of Mayfair Centre System and method for flying squad re authentication of enterprise users
CN105530224A (en) * 2014-09-30 2016-04-27 中国电信股份有限公司 Method and device for terminal authentication
CN105991559A (en) * 2015-02-05 2016-10-05 同济大学 User safety login method based on image encryption technology

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018113690A1 (en) * 2016-12-23 2018-06-28 腾讯科技(深圳)有限公司 Login authorisation method and apparatus, and login method and apparatus
CN108322461B (en) * 2018-01-31 2020-10-27 百度在线网络技术(北京)有限公司 Method, system, device, equipment and medium for automatically logging in application program
CN108322461A (en) * 2018-01-31 2018-07-24 百度在线网络技术(北京)有限公司 Method, system, device, equipment and the medium of application program automated log on
CN108616360A (en) * 2018-03-22 2018-10-02 阿里巴巴集团控股有限公司 User identity verification, register method and device
CN108616360B (en) * 2018-03-22 2020-12-18 创新先进技术有限公司 User identity verification and registration method and device
CN109218326A (en) * 2018-10-10 2019-01-15 广州虎牙信息科技有限公司 Login validation method, device, storage medium and server
CN111600858A (en) * 2020-05-06 2020-08-28 腾讯科技(深圳)有限公司 Application login method, device and system
CN112187811A (en) * 2020-09-30 2021-01-05 湖南快乐阳光互动娱乐传媒有限公司 App login method and system
CN112187811B (en) * 2020-09-30 2023-02-24 湖南快乐阳光互动娱乐传媒有限公司 App login method and system
CN112272167A (en) * 2020-10-09 2021-01-26 深圳安泰创新科技股份有限公司 System login method, terminal device and computer readable storage medium
CN112272167B (en) * 2020-10-09 2023-02-03 深圳安泰创新科技股份有限公司 System login method, terminal device and computer readable storage medium
CN112417405A (en) * 2020-11-30 2021-02-26 北京小熊博望科技有限公司 Multi-cloud disk aggregation method
WO2023016414A1 (en) * 2021-08-12 2023-02-16 阿里云计算有限公司 Credential rotation method, computing device, and storage medium
CN114124382A (en) * 2021-12-01 2022-03-01 深圳市大头兄弟科技有限公司 Voucher updating method, system, equipment and storage medium
CN114124382B (en) * 2021-12-01 2024-04-09 深圳市闪剪智能科技有限公司 Credential updating method, system, device and storage medium

Also Published As

Publication number Publication date
WO2018113690A1 (en) 2018-06-28

Similar Documents

Publication Publication Date Title
CN106657068A (en) Login authorization method and device, login method and device
CN110324276B (en) Method, system, terminal and electronic device for logging in application
CN108322461B (en) Method, system, device, equipment and medium for automatically logging in application program
US8079069B2 (en) Cardspace history validator
KR102390108B1 (en) Information processing system and control method therefor
US9529985B2 (en) Global authentication service using a global user identifier
JP4659806B2 (en) Security authentication system and method
CN104283841B (en) The method, apparatus and system of service access control are carried out to third-party application
CN101227468B (en) Method, device and system for authenticating user to network
CN106534143A (en) Method and system capable of realizing cross-application authentication authorization
US10063538B2 (en) System for secure login, and method and apparatus for same
EP3997597A1 (en) System and method for identifying a browser instance in a browser session with a server
CN108880822A (en) A kind of identity identifying method, device, system and a kind of intelligent wireless device
US10637805B2 (en) Instant messaging method, server, and storage medium
JP2017225054A (en) Profile data distribution control device, profile data distribution control method, and profile data distribution control program
US9059987B1 (en) Methods and systems of using single sign-on for identification for a web server not integrated with an enterprise network
CN107809438A (en) A kind of network authentication method, system and its user agent device used
CN109417471B (en) Password generation device and password verification device
CN109861968A (en) Resource access control method, device, computer equipment and storage medium
US20140101772A1 (en) Input method, input apparatus, and input program
CA3122376A1 (en) Systems and methods for securing login access
CN103036852A (en) Method and device for achieving network login
KR101803535B1 (en) Single Sign-On Service Authentication Method Using One-Time-Token
CN109495458A (en) A kind of method, system and the associated component of data transmission
CN116915493A (en) Secure login method, device, system, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170510

RJ01 Rejection of invention patent application after publication