CN106657068A - Login authorization method and device, login method and device - Google Patents
Login authorization method and device, login method and device Download PDFInfo
- Publication number
- CN106657068A CN106657068A CN201611208735.9A CN201611208735A CN106657068A CN 106657068 A CN106657068 A CN 106657068A CN 201611208735 A CN201611208735 A CN 201611208735A CN 106657068 A CN106657068 A CN 106657068A
- Authority
- CN
- China
- Prior art keywords
- proof
- register
- login
- terminal
- terminal iidentification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
Abstract
The invention relates to a login authorization method and device, a login method and device. The login authorization method comprises the following steps: receiving a login request sent by a terminal; extracting a login credential and a terminal identifier from the login request, wherein the extracted login credential is generated and issued to the terminal when the terminal finishes the previous login authorization; querying the login credential, which is generated and stored when finishing the previous login authorization, corresponding to the terminal identifier; when the extracted login credential is consistent with the queried login credential, performing the login authorization corresponding to the terminal identifier; updating the stored login credential corresponding to the terminal identifier; and issuing the updated login credential to the terminal. By use of the login authorization method and device, the login method and device provided by the invention, a user can rapidly and safely login.
Description
Technical field
The present invention relates to computer security technique field, more particularly to login techniques field, it is more particularly to a kind of to log in
Authorization method and device, login method and device.
Background technology
Login is a kind of important means for verifying user identity, is sent after logging request, by server with user orientation server
User identity is verified, so that user obtains to perform the authority of operation by the identity of verification.It is common at present
Login mode is to be input into the mode that user account and user cipher are logged in.
In order to avoid user frequently enters user account and user cipher, simple operation is improved, browser is provided certainly
The dynamic function of preserving user account and user cipher.User is entered after login interface, and browser can automatically enter user account
And user cipher, so as to realize quick registration.
However, user account and user cipher are preserved by the browser in addition to user and server, increased exposure and use
The risk of family password, safety is relatively low.
The content of the invention
Based on this, it is necessary to which preserving user account and user cipher for current browser causes that safety is relatively low to ask
Topic, there is provided one kind logs in authorization method and device, login method and device.
One kind logs in authorization method, including:
The logging request that receiving terminal sends;
The proof of Register and terminal iidentification are extracted from the logging request, and the proof of Register for extracting is previous in the terminal
Complete to log in and generate and be issued to the terminal when authorizing;
The inquiry previous the proof of Register for completing to generate and store when login is authorized corresponding with the terminal iidentification;
When the proof of Register for extracting is consistent with the proof of Register for inquiring, carries out login corresponding to the terminal iidentification and award
Power;
Update the proof of Register corresponding with the terminal iidentification of storage;
The proof of Register of renewal is issued to into the terminal.
One kind logs in authorization device, including:
Logging request processing module, for the logging request that receiving terminal sends;Extract from the logging request and log in
Authority and terminal iidentification, and extract the proof of Register the terminal it is previous complete log in authorize when generate and be issued to the end
End;
The proof of Register enquiry module, for inquire about it is corresponding with the terminal iidentification it is previous complete log in authorize when generate simultaneously
The proof of Register of storage;
Authorization module is logged in, for when the proof of Register for extracting is consistent with the proof of Register for inquiring, corresponding to described
Terminal iidentification carries out login mandate;
The proof of Register management module, for updating the proof of Register corresponding with the terminal iidentification of storage;By what is updated
The proof of Register is issued to the terminal.
A kind of login method, including:
Obtain local terminal iidentification;
Locally stored the proof of Register is obtained, the proof of Register is in local previous login being serviced device mandate by described
Server is issued;
The first logging request for carrying the proof of Register and the terminal iidentification is sent to the server so that institute
State server according to carry the proof of Register and terminal iidentification authentication success after carry out login mandate;
Receive the server to complete to log in the proof of Register for updating and sending when authorizing;
The proof of Register that locally stored the proof of Register is updated to receive.
A kind of entering device, including:
Acquisition module, for obtaining local terminal iidentification;Locally stored the proof of Register is obtained, the proof of Register exists
Issued by the server during local previous login being serviced device mandate;
Sending module, steps on for carrying the first of the proof of Register and the terminal iidentification to server transmission
Record request so that the server is authenticated according to the proof of Register and terminal iidentification that carry and carry out login mandate after success;
Receiver module, for receiving the proof of Register for updating and sending when the server completes and logs in and authorize;
Update module, for the proof of Register for being updated to receive by locally stored the proof of Register.
Above-mentioned login authorization method and device, login method and device, using the front login for once issuing when logging in every time
Authority is simultaneously logged in reference to terminal iidentification, is completed login and is authorized the proof of Register that can then issue renewal, is made when logging in for next time
With.So User logs in when need not just frequently enter user account and user cipher, can realize quickly stepping in same terminal
Record, has ensured the convenience for logging in, and has taken into account the safety for logging in a certain extent.And, even if previous log in what is issued
The proof of Register is compromised, but user when logging on the proof of Register will update, therefore safety is further improved.
Description of the drawings
Fig. 1 is the applied environment figure that authorization method and login method are logged in one embodiment;
Fig. 2 is the internal structure schematic diagram of server in one embodiment;
Fig. 3 is the internal structure schematic diagram of terminal in one embodiment;
Fig. 4 is the schematic flow sheet that authorization method is logged in one embodiment;
Fig. 5 be one embodiment in when logging request does not carry the proof of Register, logged in using user's intervening mode
The schematic flow sheet of the step of mandate;
Fig. 6 is in one embodiment when logging request does not carry the proof of Register, then to obtain user according to logging request defeated
The schematic flow sheet of the step of entering type verification data and terminal iidentification, and verified according to user input type verification data;
Fig. 7 is in one embodiment when the proof of Register for extracting is consistent with the proof of Register for inquiring, corresponding to terminal
Mark carries out logging in the schematic flow sheet of the step of authorizing;
Fig. 8 is the schematic flow sheet of login method in one embodiment;
Fig. 9 is the step of being logged in using user's intervening mode when the proof of Register is not locally stored in one embodiment
Schematic flow sheet;
Figure 10 is the schematic diagram of login page in a concrete application scene;
Figure 11 is the structured flowchart that authorization device is logged in one embodiment;
Figure 12 is the structured flowchart that authorization device is logged in another embodiment;
Figure 13 is the structured flowchart of entering device in one embodiment;
Figure 14 is the structured flowchart of entering device in another embodiment.
Specific embodiment
In order that the objects, technical solutions and advantages of the present invention become more apparent, it is right below in conjunction with drawings and Examples
The present invention is further elaborated.It should be appreciated that specific embodiment described herein is only to explain the present invention, and
It is not used in the restriction present invention.
Fig. 1 is the applied environment figure that authorization method and login method are logged in one embodiment.With reference to Fig. 2, the login is awarded
Power method and login method are applied to a kind of login system, and the login system includes terminal 110, mobile terminal 1 20, electronic equipment
130 and server 140.Terminal 110, mobile terminal 1 20 and electronic equipment 130 can be by network connections to server 140.Eventually
End 110 can be personal computer or be different from another mobile terminal of mobile terminal 1 20.Terminal 110 and mobile terminal
120 can be held by identical or different personnel, such as application developer.Electronic equipment 130 is held by manager.Login system
Can be applicable to the login of program development platform.
Fig. 2 is the internal structure schematic diagram of server 140 in one embodiment.With reference to Fig. 2, the server 140 includes logical
Cross processor, non-volatile memory medium, built-in storage and the network interface of system bus connection.Wherein, the server 140
Non-volatile memory medium be stored with operating system, data base and log in authorization device.Be stored with data base terminal iidentification and
The corresponding relation of the corresponding relation of the proof of Register, the proof of Register and user account, and user account and manager's account is right
Should be related to.Logging in authorization device is used to realize a kind of login authorization method.The processor of the server 140 be used for provide calculate and
Control ability, supports the operation of whole server 140.The built-in storage of the server 140 is in non-volatile memory medium
The operation for logging in authorization device provides environment, and computer-readable instruction can be stored in the built-in storage, and the computer-readable refers to
Order is when executed by, and can cause a kind of login authorization method of computing device.The network interface of the server 140 is used for evidence
To carry out network service, such as the logging request that receiving terminal 110 sends, to feedback the proof of Register of terminal 110 etc. with outside.Clothes
Business device 140 can with independent server or multiple server groups into server cluster realizing.People in the art
Member is appreciated that the structure illustrated in Fig. 2, only the block diagram of the part-structure related to application scheme, and it is right not constitute
The restriction of the server that application scheme is applied thereon, specific server can include more more or less than shown in figure
Part, or combine some parts, or arrange with different parts.
Fig. 3 is the internal structure schematic diagram of terminal 110 in one embodiment.With reference to Fig. 3, the terminal 110 is included by being
Processor, non-volatile memory medium, built-in storage, network interface, display screen and input equipment that system bus connects.Wherein,
The non-volatile memory medium of terminal 110 is stored with operating system, and be also stored with a kind of entering device.The entering device is used for real
A kind of existing login method.The processor of terminal 110 is used to provide calculating and control ability, supports the operation of whole terminal 110.Eventually
Built-in storage in end 110 provides environment for the operation of the entering device in non-volatile memory medium.Can in the built-in storage
Be stored with computer-readable instruction, and the computer-readable instruction is when executed by, and can cause a kind of login of computing device
Method.The network interface of terminal is used to carry out network service with server, such as sends logging request or receives the proof of Register.Eventually
The display screen at end 110 can be LCDs or electric ink display screen, and the input equipment of terminal 110 can be display screen
Button, trace ball or the Trackpad arranged on the touch layer, or the shell of terminal 110 of upper covering, can also be external
Keyboard, Trackpad or mouse etc..The terminal 110 can be personal computer or mobile terminal, and mobile terminal includes mobile phone, puts down
At least one in plate computer, personal digital assistant or Wearable etc..It will be understood by those skilled in the art that in Fig. 3
The structure for illustrating, only the block diagram of the part-structure related to application scheme, does not constitute and application scheme is applied
The restriction of terminal thereon, specific terminal can be included than more or less of part shown in figure, or combine some
Part, or arrange with different parts.
Fig. 4 is the schematic flow sheet that authorization method is logged in one embodiment.The present embodiment is mainly applied in this way
Server 140 in above-mentioned Fig. 1 is illustrating.With reference to Fig. 4, the login authorization method specifically includes following steps:
S402, the logging request that receiving terminal sends.
Specifically, terminal can pass through the browser run in terminal, or the application program for passing through non-browser, and triggering is stepped on
Record request, and logging request is sent to server, received by server.The logging request is asked to initiating logging request
Terminal carries out logging in the request of mandate.
S404, extracts the proof of Register and terminal iidentification from logging request, and the proof of Register for extracting is previous complete in terminal
Terminal is generated and is issued to when logging in and authorizing.
Specifically, terminal generate logging request when, by terminal local store the proof of Register and terminal terminal mark
Knowledge is added in logging request;Server extracts the proof of Register and end after logging request is received from the logging request
End mark.The proof of Register and terminal iidentification can obtain the proof of Register and terminal iidentification during extraction through encryption through decryption.
Wherein, terminal iidentification is used for unique mark terminal, can be MAC (Media Access Control, the matchmaker of terminal
Body access control) address or IMEI (International Mobile Equipment Identity, international mobile device
Identity code).The proof of Register is the data for verifying user identity.The proof of Register is different from user account and user cipher, steps on
Record authority can change when logging in and authorizing every time.The proof of Register can be random number, can be specifically regular length with
Machine number, or length exceed preset value and the inconstant random number of length.Terminal is previous to be completed to authorize when logging in, and refers to phase
Same user sends logging request by the way that this terminal is last to server, and server is carried out according to the logging request to terminal
Log in and authorize.
The proof of Register is corresponding with user account, and the corresponding the proof of Register of different user accounts is different.Different user
The authority after login corresponding to each self-corresponding the proof of Register of account is different.Terminal can be by user account and the proof of Register
Correspondence storage.In terminal or server, a user account corresponds to unique the proof of Register.There may be more than one in terminal
Individual the proof of Register, in such cases each the proof of Register correspond to different user accounts respectively.
In one embodiment, terminal initiate logging request when, if only existing in terminal corresponding to a user account
The proof of Register when, then the proof of Register directly according to corresponding to a user account and terminal iidentification generate logging request.
In one embodiment, terminal initiate logging request when, if existing in terminal corresponding to multiple user accounts
During the proof of Register, then each self-corresponding option of multiple user accounts is shown, obtain selection instruction, obtained the selection instruction and chosen
An option, the proof of Register according to corresponding to user account corresponding with the option and terminal iidentification generate logging request.
S406, inquires about the previous the proof of Register for completing to generate and store when login is authorized corresponding with terminal iidentification.
Specifically, user it is previous by terminal logs in server and by server complete log in authorize when, by server
Generate corresponding the proof of Register, server by the proof of Register storage corresponding with terminal iidentification on the server.The proof of Register with
Terminal iidentification can be stored correspondingly in data base on the server or file.Server is extracting the proof of Register and terminal mark
After knowledge, directly from server lookup the proof of Register corresponding with the terminal iidentification for extracting.
S408, when the proof of Register for extracting is consistent with the proof of Register for inquiring, is logged in corresponding to terminal iidentification
Authorize.
Server is authenticated according to the proof of Register and terminal iidentification that extract.The proof of Register that service implement body will be extracted
Compare with the proof of Register corresponding with terminal iidentification is inquired, judge that the proof of Register for extracting is with the proof of Register for inquiring
It is no consistent.When the proof of Register for extracting is consistent with the proof of Register for inquiring, authenticate successfully, then to terminal iidentification corresponding end
End carries out login mandate so that the terminal is provided with the authority after logging in corresponding to the proof of Register.
When the proof of Register for extracting is inconsistent with the proof of Register for inquiring, failed authentication, refusal carries out login mandate.
In one embodiment, when the proof of Register for extracting is inconsistent with the proof of Register for inquiring, terminal deletion terminal can be notified
On corresponding the proof of Register.
S410, updates the proof of Register corresponding with terminal iidentification of storage.
Specifically, server generates new the proof of Register, and the new the proof of Register completes to be generated when login is authorized with previous
And the proof of Register difference for storing.Server by it is corresponding with terminal iidentification it is previous complete log in authorize when generate and store step on
Record authority, replaces with the new the proof of Register of generation, realizes the renewal of the proof of Register.
S412, by the proof of Register of renewal terminal is issued to.
Specifically, the proof of Register of renewal is issued to server the terminal for initiating logging request so that terminal is by terminal
The proof of Register of upper storage is updated to the proof of Register that server is issued.Terminal can pass through to initiate the browser used by logging request
Or the application program storage the proof of Register of non-browser.In one embodiment, terminal the proof of Register can exceed in advance thereon
If deleting the proof of Register when duration does not update.
Above-mentioned login authorization method, is carried out when logging in every time using the front the proof of Register for once issuing and with reference to terminal iidentification
Log in, complete login and authorize the proof of Register that can then issue renewal, use when logging in for next time.So User logs in when just need not
User account and user cipher are frequently entered, the convenience of login can be ensured.And, even if it is previous log in the login that issues with
According to compromised, but user when logging on the proof of Register will update, therefore safety is further improved.
In one embodiment, after step S402, the login authorization method is also included when logging request does not carry login
During authority, carry out logging in the step of authorizing using user's intervening mode.With reference to Fig. 5, deserve logging request and do not carry the proof of Register
When, the step of logging in mandate is carried out using user's intervening mode and specifically includes following steps:
S502, when logging request does not carry the proof of Register, then obtains user input type verification data according to logging request
And terminal iidentification, and verified according to user input type verification data.
Specifically, server judges whether the logging request carries the proof of Register after logging request is received.If logging in
Request carries the proof of Register, server then execution step S404.If logging request does not carry the proof of Register, execution step
S502.Wherein, user input type verification data is referred to by the verification data of user input, and such as user account and user is close
Code.
In one embodiment, user input type verification data can be user account and user cipher.Specifically, service
Device can extract user account, user cipher and terminal iidentification from logging request, according to the user account and user cipher that extract
Verified.Server according to extract user account and user cipher verified when, specifically can inquire about on server with
The corresponding user cipher of user account, the user cipher of extraction and the user cipher for inquiring are compared, if comparative result is one
Cause then verification to pass through, verify if being inconsistent if comparative result and do not pass through.
S504, when verification passes through, then carries out login mandate corresponding to terminal iidentification, generates step on corresponding with terminal iidentification
Record authority is simultaneously stored, and the proof of Register being currently generated is issued to into terminal.
Specifically, server is when verification passes through, and login mandate is carried out to terminal, generates brand-new the proof of Register, and
By brand-new the proof of Register storage corresponding with terminal iidentification on server, and the proof of Register being currently generated is issued to into end
End so that the terminal storage the proof of Register.Further, server, can be to terminal feedback login failure when verification does not pass through
Notice.
In the present embodiment, when lacking the proof of Register in terminal so that terminal cannot carry out quick registration by the proof of Register,
So terminal can also be completed to log in and authorized by user input type verification data.And when completing to log in mandate, can generate and step on
Record authority is simultaneously issued to terminal, then SS later just can carry out quick registration by the proof of Register.
As shown in fig. 6, in one embodiment, step S502 specifically includes following steps:
S602, according to logging request terminal iidentification is obtained.
Specifically, terminal can from logging request extracting directly terminal iidentification.
S604, generates bar code corresponding with terminal iidentification.
Wherein, bar code (Bar Code) be by character according to preset rules coding obtain it is reducible go out character figure,
Bar code can include bar code and two-dimensional bar code (2-Dimensional Bar Code).Bar code is by width
Multiple secret notes and blank, arrange, to the graphical identifier for expressing a group information according to certain coding rule.Two-dimensional bar code letter
Claim Quick Response Code, refer to certain specific geometric figure according to certain rules in the graphic recording data symbols of planar directional spreding
The bar code of number information.
S606, bar code is sent to terminal and is shown so that the mobile terminal logged in user account is gathered bar code and solved
Analysis obtains verifying address.
Specifically, server adopt default barcode encoding mode, will also terminal iidentification it is corresponding verification geocoding shape
Into bar code, and bar code is sent to terminal, the bar code is shown by terminal.User logs in mobile terminal with user account, and passes through
Mobile terminal gathers the bar code by shown by terminal, and mobile terminal parses verification address from bar code.Verification address can be
URL (Uniform Resource Locator, URL) form.
S608, when receiving the login authorization notification that mobile terminal is initiated according to verification address, verification passes through.
Specifically, mobile terminal sends the login authorization page for carrying user account to server according to verification address
Request.Server receives login authorization page request, therefrom extracts user account, and to mobile terminal feedback and the user
The corresponding login authorization page of account.The login that acquisition for mobile terminal is triggered in the login authorization page confirms instruction, according to
The login confirms that instruction triggers log in authorization notification, and the login authorization notification is sent to server.If server is received
The login authorization notification that mobile terminal sends, then it represents that verification passes through.It is user input type that authorization notification is logged in the present embodiment
Verification data.
In the present embodiment, convenient login is realized by way of mobile scanning terminal bar code, and when completing to log in mandate,
The proof of Register can be generated and terminal is issued to, then SS later just can carry out quick registration by the proof of Register.
In one embodiment, the login authorization method also includes:When verification passes through, the positional information of terminal is obtained simultaneously
Corresponding to terminal iidentification record;Step S408 includes:The positional information of terminal is extracted from logging request;When the position letter for extracting
Breath with record positional information match, and extraction the proof of Register it is consistent with the proof of Register for inquiring when, corresponding to terminal mark
Knowledge carries out login mandate.
Wherein, positional information is the information for representing terminal location, can be IP (Internet Protocol, internet association
View) section, or geographical position coordinates.Geographical position coordinates can be represented with the longitude of terminal position and latitude.Ground
Reason position coordinateses can be by terminal active reporting, it is also possible to be calculated according to the IP address of terminal.The positional information of extraction with
The positional information matching of record, can be identical or difference is in preset range.When the positional information for extracting and the position of record
When confidence breath mismatch and/or the proof of Register for extracting inconsistent with the proof of Register for inquiring, refusal carries out login mandate.
In the present embodiment, do not verified only with the proof of Register, herein in connection with the adjacent positional information for logging in twice
Verified with situation, can avoid causing illegal login because of lost terminal as far as possible, can further improve safety.
As shown in fig. 7, in one embodiment, step S408 comprises the steps:
S702, when the proof of Register for extracting is consistent with the proof of Register for inquiring, to the electricity corresponding to manager's account
Sub- equipment sends to log in and notifies;Manager's account is corresponding with the user account corresponding to the proof of Register.
Specifically, server can store the corresponding relation between user account and the proof of Register, and store user account and
Corresponding relation between manager's account.Corresponding relation wherein between user account and manager's account is used to represent manager
With the relation being managed between user.
Further, when the proof of Register for determining extraction is consistent with the proof of Register for inquiring, inquiry should for server
The corresponding user account of the proof of Register, and the corresponding manager's account of the user account is inquired about, so as to manager's account
The electronic equipment of login sends to log in and notifies.Electronic equipment can be personal computer, mobile terminal or special equipment.
S704, receives electronic equipment and notifies fed back authorization command in response to logging in.
Specifically, electronic equipment, can be according to entrained by the login notifies acquisition logging request after login notice is received
The proof of Register corresponding to user account, show the user account and/or the user profile corresponding to the user account, and show
Show the option that the option and refusal of grant authorizations are authorized.
Further, detectable selection operation of the user to rendering preferences of electronics, choose grant authorizations option or
The option that refusal is authorized.When the option of grant authorizations in choosing, authorization command is sent to server, the mandate is received by server
Order.When the option for authorizing is refused in choosing or when non-selected more than preset duration, refusal log on command is sent to server,
Received by server.
Wherein electronic equipment obtains user account according to notice is logged in, and specifically can obtain user account from logging in notice,
Can also be from server request obtaining user account.Server can with from server request obtaining corresponding to user account
User profile.User profile such as address name, user's position and user department etc..
S706, according to authorization command, corresponding to terminal iidentification login mandate is carried out.
Specifically, server after the authorization command for receiving electronic equipment transmission, enter by the terminal to initiating logging request
Row is logged in and authorized.If server receives refusal log on command, or does not receive the life of electronic equipment feedback more than scheduled duration
Order, then refuse to carry out login mandate to terminal.
In the present embodiment, not only ensure to log in safety by the proof of Register for changing, also by stepping on manager's account
Login of the electronic equipment unification of record to user is managed, and further increases the safety of login.And it is being applied to journey
During sequence development field, user account is application developer's account, and manager's account is then that program development project is managed
Account, it is ensured that the safety that logs in and convenience during exploitation program.
In one embodiment, after step S706, the method also includes:Receive electronic equipment send for terminal mark
The offline order known;According to offline order, cancel the login mandate corresponding to terminal iidentification, and corresponding with terminal iidentification will step on
Record authority is removed.
Specifically, electronic equipment can store the terminal iidentification through logging in mandate, or from server lookup through logging in
The terminal iidentification of mandate.Electronic equipment can detect selection operation, and according to selection operation terminal iidentification is chosen, so as to initiate for being somebody's turn to do
The offline order of the terminal iidentification chosen, and offline order is sent to server.Server, can after offline order is received
Cancel the login mandate to terminal corresponding to terminal iidentification, and remove all the proof of Register corresponding with terminal iidentification, or
Only remove the proof of Register used by current login corresponding with terminal iidentification.
In the present embodiment, by the electronic equipment corresponding to manager's account, under can directly controlling the terminal after logging in
Line, prevents electronic equipment from being used by malicious user.
In one embodiment, after step S408 or step S504, the login authorization method also includes:Receive the end
The operation requests of the request assigned operation that end is initiated;User input type verification data is obtained according to the operation requests;According to institute
State user input type verification data to be verified;When verification passes through, the assigned operation that the operation requests are asked is performed.
Specifically, terminal after login, can ask two kinds of operation.A type of operation can be initiated in terminal
Afterwards, by server directly in response to if desired can be with to terminal feedback operating result.For another type of operation namely
Assigned operation, terminal needs server to award to the assigned operation using user's intervening mode when the assigned operation is initiated
Power.Assigned operation can be the sensitive operation that can result in significant impact, such as pocket transmission news.Whether operation is that assigned operation can be pre-
First configure.Server can be after assigned operation be performed, to the corresponding operating result of terminal feedback.Server is according to user input
Type verification data verified and verified not by when, can be to the message of terminal feedback operation failure.
In one embodiment, user input type verification data can be user account and user cipher.Specifically, service
Device can extract user account, user cipher and terminal iidentification from operation requests, according to the user account and user cipher that extract
Verified.Server according to extract user account and user cipher verified when, specifically can inquire about on server with
The corresponding user cipher of user account, the user cipher of extraction and the user cipher for inquiring are compared, if comparative result is one
Cause then verification to pass through, verify if being inconsistent if comparative result and do not pass through.
In one embodiment, server can obtain terminal iidentification according to operation requests, generate corresponding with terminal iidentification
Bar code, bar code is sent to terminal and is shown so that the mobile terminal logged in user account gathers bar code and parsing obtains school
Test address.When the authorization notice that mobile terminal is initiated according to verification address is received, verification passes through server.
In the present embodiment, when asking assigned operation after login, verified using user's intervening mode, after verification passes through
Assigned operation is performed, safety can be further ensured that.
Fig. 8 is the schematic flow sheet of login method in one embodiment.The present embodiment is mainly applied to the login method
Terminal 110 in Fig. 1 is illustrating.With reference to Fig. 8, the login method specifically includes following steps:
S802, obtains local terminal iidentification.
Specifically, terminal obtains the terminal iidentification of terminal local.
S804, obtains locally stored the proof of Register, and the proof of Register is in local previous login being serviced device mandate
Issued by the server.
Specifically, server can pass through the application program of browser or non-browser, and storage is locally previous to be completed to log in
The proof of Register issued by server during mandate.
S806, the first logging request for carrying the proof of Register and terminal iidentification is sent to server so that server root
Authenticate according to the proof of Register and terminal iidentification that carry and carry out login mandate after success.
Specifically, server extracts the proof of Register and terminal iidentification, and the proof of Register for extracting from the first logging request
Terminal it is previous complete log in authorize when generate and be issued to terminal.Server lookup is corresponding with terminal iidentification previous to be completed to step on
The proof of Register that record is generated and stored when authorizing.When the proof of Register for extracting is consistent with the proof of Register for inquiring, server
Login mandate is carried out corresponding to terminal iidentification.
In one embodiment, server can be recorded in the proof of Register entrained by the first logging request and terminal iidentification
When on server, judgement is authenticated successfully.In one embodiment, server can be with stepping on entrained by the first logging request
When record authority and terminal iidentification are recorded on server and there is corresponding relation, judgement is authenticated successfully.
S808, the reception server completes to log in the proof of Register for updating and sending when authorizing.
S810, the proof of Register that locally stored the proof of Register is updated to receive.
Above-mentioned login method, is stepped on when logging in every time using the front the proof of Register for once issuing and with reference to terminal iidentification
Record, completes login and authorizes the proof of Register that can then issue renewal, uses when logging in for next time.So User logs in when just need not frequency
Numerous input user account and user cipher, can realize quick registration in same terminal, ensure the convenience for logging in, and one
Determine to have taken into account the safety for logging in degree.And, even if the previous the proof of Register for issuing that logs in is compromised, but user steps on again
The proof of Register will update during record, therefore safety is further improved.
In one embodiment, after step S802, the method also includes being adopted when the proof of Register is not locally stored
The step of user's intervening mode is logged in.With reference to Fig. 9, entered using user's intervening mode when should not locally store the proof of Register
The step of row is logged in specifically includes following steps:
S902, when the proof of Register is not locally stored, then the second login for carrying terminal iidentification to server transmission please
Ask.
Specifically, when the corresponding the proof of Register of active user is not locally stored, generation carries the second of terminal iidentification
Logging request, and the second logging request is sent to server.
S804, the bar code that the reception server is fed back according to the second logging request.
S906, shows bar code so that the mobile terminal collection bar code and parsing logged in user account obtains verifying address,
Sent to server according to verification address and log in authorization notification so that server is logged in after login authorization notification is received
Authorize.
S908, the reception server completes to log in the proof of Register generated and sent after mandate, and execution step S810.
In the present embodiment, when lacking the proof of Register in terminal so that terminal cannot carry out quick registration by the proof of Register,
So terminal can also be completed to log in and authorized by user input type verification data.And when completing to log in mandate, can generate and step on
Record authority is simultaneously issued to terminal, then SS later just can carry out quick registration by the proof of Register.
In one embodiment, after step S806, the login method also includes:When assigned operation is asked, to clothes
Business device sends the operation requests for carrying terminal iidentification.The bar code that the reception server is fed back according to operation requests.Bar code is shown, is made
The mobile terminal collection bar code and parsing for being able to user account login obtains verifying address, is sent to server according to verification address
Log in authorization notification so that server performs assigned operation after login authorization notification is received.
In the present embodiment, when asking assigned operation after login, verified using user's intervening mode, after verification passes through
Assigned operation is performed, safety can be further ensured that.
Illustrate the principle of above-mentioned login authorization method and login method with a concrete application scene below.Reference picture
10, user A is logged in terminal, and terminal storage has the proof of Register that user A previous logins are issued when completing by server.With
Family B was not logged in terminal, and terminal does not store the proof of Register of user B.Terminal, can be by user A used as a kind of trusted devices
Log in user B.User A or user B accesses login page as shown in Figure 10, shows corresponding to user in the login page
The quick registration button 1001 of A.User account input frame 1002, user cipher input frame 1003 can also be shown in login page
With login button 1004, or show for log in Quick Response Code 1005.User A can click directly on quick registration button and carry out
Log in.User B then can be input into by being input into user account in account input frame 1002 in user cipher input frame 1003
User cipher, and login button 1004 is clicked on, complete to log in.User B can also realize logging in mobile phone scanning Quick Response Code 1005.
Terminal completes to be obtained after logging in the proof of Register that server issues and is stored in local in user B.Subsequent user A or user
When B accesses login page, login page will show the quick registration button corresponding to user A and user B.
Figure 11 is the structured flowchart that authorization device 1100 is logged in one embodiment.With reference to Figure 11, the login authorization device
1100 include:Logging request processing module 1101, the proof of Register enquiry module 1102, login authorization module 1103 and the proof of Register
Management module 1104.
Logging request processing module 1101, for the logging request that receiving terminal sends;Extract from logging request and log in
Authority and terminal iidentification, and extract the proof of Register terminal it is previous complete log in authorize when generate and be issued to terminal.
The proof of Register enquiry module 1102, for inquire about it is corresponding with terminal iidentification it is previous complete log in authorize when generation simultaneously
The proof of Register of storage.
Authorization module 1103 is logged in, for when the proof of Register for extracting is consistent with the proof of Register for inquiring, corresponding to
Terminal iidentification carries out login mandate.
The proof of Register management module 1104, for updating the proof of Register corresponding with terminal iidentification of storage;By what is updated
The proof of Register is issued to terminal.
In one embodiment, log in authorization module 1103 to be additionally operable to when logging request does not carry the proof of Register, then root
User input type verification data and terminal iidentification are obtained according to logging request, and is verified according to user input type verification data;
When verification passes through, then login mandate is carried out corresponding to terminal iidentification, generates the proof of Register corresponding with terminal iidentification and store,
And the proof of Register being currently generated is issued to into terminal.
In one embodiment, log in authorization module 1103 to be additionally operable to obtain terminal iidentification according to logging request;Generate with
The corresponding bar code of terminal iidentification;Bar code is sent to terminal and shown so that with the mobile terminal pick-up slip that user account is logged in
Code and parsing obtain verification address;When receiving the login authorization notification that mobile terminal is initiated according to verification address, verification is logical
Cross.
In one embodiment, log in authorization module 1103 to be additionally operable to obtain the positional information of terminal when verification passes through
And corresponding to terminal iidentification record.
Logging request processing module 1101 is additionally operable to extract the positional information of terminal from logging request.
Log in authorization module 1103 be additionally operable to when extract positional information with record positional information match, and extraction step on
When record authority is consistent with the proof of Register for inquiring, corresponding to terminal iidentification login mandate is carried out.
In one embodiment, log in authorization module 1103 be additionally operable to when extract the proof of Register and the login for inquiring with
According to it is consistent when, to corresponding to manager's account electronic equipment send log in notify;Corresponding to manager's account and the proof of Register
User account correspondence;Receive electronic equipment and notify fed back authorization command in response to logging in;According to authorization command, correspond to
Terminal iidentification carries out login mandate.
Figure 12 is the structured flowchart that authorization device 1100 is logged in one embodiment.With reference to Figure 12, the login authorization device
1100 also include:Offline processing module 1105, for receiving the offline order for terminal iidentification of electronic equipment transmission;According to
Offline order, cancels the login mandate corresponding to terminal iidentification, and the proof of Register corresponding with terminal iidentification is removed.
In one embodiment, log in authorization module 1103 and be additionally operable to what receiving terminal was initiated when assigned operation is asked
Operation requests;User input type verification data is obtained according to operation requests;Verified according to user input type verification data;When
When verification passes through, assigned operation is performed.
Above-mentioned login authorization device 1100, using the front the proof of Register for once issuing and terminal iidentification is combined when logging in every time
Logged in, complete login and authorize the proof of Register that can then issue renewal, used when logging in for next time.So User logs in when just
User account and user cipher need not be frequently entered, quick registration can be realized in same terminal, ensure the convenient of login
Property, and the safety for logging in has been taken into account to a certain extent.And, even if the previous the proof of Register for issuing that logs in is compromised, but use
The proof of Register will update when family logs on, therefore safety is further improved.
Figure 13 is the structured flowchart of entering device 1300 in one embodiment.With reference to Figure 13, the entering device 1300 includes:
Acquisition module 1301, sending module 1302, receiver module 1303 and update module 1304.
Acquisition module 1301, for obtaining local terminal iidentification;Obtain locally stored the proof of Register, the login with
According to being issued by the server in local previous login being serviced device mandate.
Sending module 1302, for sending the first logging request for carrying the proof of Register and terminal iidentification to server,
So that server is authenticated according to the proof of Register and terminal iidentification that carry carry out login mandate after success.
Receiver module 1303, the proof of Register for updating and sending when completing and log in and authorize for the reception server.
Update module 1304, for the proof of Register for being updated to receive by locally stored the proof of Register.
Figure 14 is the structured flowchart of entering device 1300 in one embodiment.With reference to Figure 14, the entering device 1300 is also wrapped
Include display module 1305.
Sending module 1302 is additionally operable to when the proof of Register is not locally stored, then send to server and carry terminal iidentification
The second logging request.
Receiver module 1303 is additionally operable to the bar code that the reception server is fed back according to the second logging request.
Display module 1305 is used to show bar code so that the mobile terminal logged in user account is gathered bar code and parsed
To verification address, sent to server according to verification address and log in authorization notification so that server authorizes logical receiving to log in
Login mandate is carried out after knowing.
Receiver module 1303 is additionally operable to the reception server and completes to log in the proof of Register generated and sent after mandate, and notifies
The proof of Register that locally stored the proof of Register is updated to receive by update module.
Above-mentioned entering device 1300, is carried out when logging in every time using the front the proof of Register for once issuing and with reference to terminal iidentification
Log in, complete login and authorize the proof of Register that can then issue renewal, use when logging in for next time.So User logs in when just need not
User account and user cipher are frequently entered, quick registration can be realized in same terminal, ensured the convenience for logging in, and
The safety for logging in has been taken into account to a certain extent.And, even if the previous the proof of Register for issuing that logs in is compromised, but user is again
The proof of Register will update during login, therefore safety is further improved.
One of ordinary skill in the art will appreciate that realizing all or part of flow process in above-described embodiment method, can be
Related hardware is instructed to complete by computer program, the computer program can be stored in embodied on computer readable storage and be situated between
In matter, the program is upon execution, it may include such as the flow process of the embodiment of above-mentioned each method.Wherein, aforesaid storage medium can be
The non-volatile memory mediums such as magnetic disc, CD, read-only memory (Read-Only Memory, ROM), or random storage note
Recall body (Random Access Memory, RAM) etc..
Each technical characteristic of above example can be combined arbitrarily, to make description succinct, not to above-described embodiment
In each technical characteristic it is all possible combination be all described, as long as however, there is no lance in the combination of these technical characteristics
Shield, is all considered to be the scope of this specification record.
Above example only expresses the several embodiments of the present invention, and its description is more concrete and detailed, but can not
Therefore it is construed as limiting the scope of the patent.It should be pointed out that for the person of ordinary skill of the art,
On the premise of without departing from present inventive concept, some deformations and improvement can also be made, these belong to protection scope of the present invention.
Therefore, the protection domain of patent of the present invention should be defined by claims.
Claims (18)
1. a kind of to log in authorization method, methods described includes:
The logging request that receiving terminal sends;
Extract the proof of Register and terminal iidentification from the logging request, and the proof of Register for extracting is completed the terminal is previous
Log in and generate and be issued to the terminal when authorizing;
The inquiry previous the proof of Register for completing to generate and store when login is authorized corresponding with the terminal iidentification;
When the proof of Register for extracting is consistent with the proof of Register for inquiring, corresponding to the terminal iidentification login mandate is carried out;
Update the proof of Register corresponding with the terminal iidentification of storage;
The proof of Register of renewal is issued to into the terminal.
2. method according to claim 1, it is characterised in that described after the logging request that the receiving terminal sends
Method also includes:
When the logging request does not carry the proof of Register, then according to the logging request obtain user input type verification data and
Terminal iidentification, and verified according to the user input type verification data;
When verification passes through, then login mandate is carried out corresponding to the terminal iidentification, generate step on corresponding with the terminal iidentification
Record authority is simultaneously stored, and the proof of Register being currently generated is issued to into the terminal.
3. method according to claim 2, it is characterised in that described that user input type school is obtained according to the logging request
Testing data and terminal iidentification, and carry out verification according to the user input type verification data includes:
Terminal iidentification is obtained according to the logging request;
Generate bar code corresponding with the terminal iidentification;
The bar code is sent to the terminal and shown so that the bar code is gathered simultaneously with the mobile terminal that user account is logged in
Parsing obtains verifying address;
When receiving the login authorization notification that the mobile terminal is initiated according to the verification address, verification passes through.
4. method according to claim 2, it is characterised in that methods described also includes:
When verification passes through, the positional information of the terminal is obtained and corresponding to terminal iidentification record;
It is described when extract the proof of Register it is consistent with the proof of Register for inquiring when, carry out login corresponding to the terminal iidentification and award
Power includes:
The positional information of the terminal is extracted from the logging request;
When the positional information for extracting is matched with the positional information of record, and the proof of Register and the proof of Register one for inquiring of extraction
During cause, corresponding to the terminal iidentification login mandate is carried out.
5. method according to claim 1, it is characterised in that it is described when the proof of Register for extracting and the login for inquiring with
According to it is consistent when, corresponding to the terminal iidentification carry out log in mandate include:
When the proof of Register for extracting is consistent with the proof of Register for inquiring, send to the electronic equipment corresponding to manager's account
Log in and notify;Manager's account is corresponding with the user account corresponding to the proof of Register;
Receive the electronic equipment and notify fed back authorization command in response to described login;
According to the authorization command, corresponding to the terminal iidentification login mandate is carried out.
6. method according to claim 5, it is characterised in that described to carry out logging in mandate corresponding to the terminal iidentification
Afterwards, methods described also includes:
Receive the offline order for the terminal iidentification that the electronic equipment sends;
According to the offline order, cancel the login mandate corresponding to the terminal iidentification, and will be corresponding with the terminal iidentification
The proof of Register remove.
7. method according to claim 1, it is characterised in that described to carry out logging in mandate corresponding to the terminal iidentification
Afterwards, methods described also includes:
Receive the operation requests of the request assigned operation that the terminal is initiated;
User input type verification data is obtained according to the operation requests;
Verified according to the user input type verification data;
When verification passes through, the assigned operation that the operation requests are asked is performed.
8. a kind of login method, methods described includes:
Obtain local terminal iidentification;
Locally stored the proof of Register is obtained, the proof of Register is in local previous login being serviced device mandate by the service
Device is issued;
The first logging request for carrying the proof of Register and the terminal iidentification is sent to the server so that the clothes
Business device is authenticated according to the proof of Register and terminal iidentification that carry and carry out login mandate after success;
Receive the server to complete to log in the proof of Register for updating and sending when authorizing;
The proof of Register that locally stored the proof of Register is updated to receive.
9. method according to claim 8, it is characterised in that after the local terminal iidentification of the acquisition, methods described
Also include:
When the proof of Register is not locally stored, then
The second logging request for carrying the terminal iidentification is sent to the server;
Receive the bar code that the server feeds back according to second logging request;
Show the bar code so that the mobile terminal logged in user account gathers the bar code and parsing obtains verifying address,
According to the verification address to the server send log in authorization notification so that the server receive it is described login award
Power carries out login mandate after notifying;
Receive the server to complete to log in the proof of Register generated and sent after mandate;
Perform described the step of locally stored the proof of Register is updated to into the proof of Register for receiving.
10. it is a kind of to log in authorization device, it is characterised in that to include:
Logging request processing module, for the logging request that receiving terminal sends;The proof of Register is extracted from the logging request
And terminal iidentification, and extract the proof of Register the terminal it is previous complete log in authorize when generate and be issued to the terminal;
The proof of Register enquiry module, for inquire about it is corresponding with the terminal iidentification it is previous complete log in authorize when generate and store
The proof of Register;
Authorization module is logged in, for when the proof of Register for extracting is consistent with the proof of Register for inquiring, corresponding to the terminal
Mark carries out login mandate;
The proof of Register management module, for updating the proof of Register corresponding with the terminal iidentification of storage;The login that will be updated
Authority is issued to the terminal.
11. devices according to claim 10, it is characterised in that the login authorization module is additionally operable to when the login please
Ask when not carrying the proof of Register, then user input type verification data and terminal iidentification are obtained according to the logging request, and according to
The user input type verification data is verified;When verification passes through, then login mandate is carried out corresponding to the terminal iidentification,
Generate the proof of Register corresponding with the terminal iidentification and store, and the proof of Register being currently generated is issued to into the terminal.
12. devices according to claim 11, it is characterised in that the login authorization module is additionally operable to according to the login
Acquisition request terminal iidentification;Generate bar code corresponding with the terminal iidentification;The bar code is sent to the terminal and is shown,
So that the mobile terminal logged in user account gathers the bar code and parsing obtains verifying address;Receive the mobile terminal
During the login authorization notification initiated according to the verification address, verification passes through.
13. devices according to claim 11, it is characterised in that the login authorization module is additionally operable to when verification passes through
When, obtain the positional information of the terminal and corresponding to terminal iidentification record;
The logging request processing module is additionally operable to from the logging request extract the positional information of the terminal;
It is described log in authorization module be additionally operable to when extract positional information with record positional information match, and extraction login with
According to it is consistent with the proof of Register for inquiring when, carry out login mandate corresponding to the terminal iidentification.
14. devices according to claim 10, it is characterised in that the login authorization module is additionally operable to when the login extracted
When authority is consistent with the proof of Register for inquiring, sends to the electronic equipment corresponding to manager's account and log in notice;The pipe
Reason person's account is corresponding with the user account corresponding to the proof of Register;Receive the electronic equipment to notify in response to described login
The authorization command fed back;According to the authorization command, corresponding to the terminal iidentification login mandate is carried out.
15. devices according to claim 14, it is characterised in that described device also includes:
Offline processing module, for receiving the offline order for the terminal iidentification that the electronic equipment sends;According to institute
Offline order is stated, cancels the login mandate corresponding to the terminal iidentification, and will the proof of Register corresponding with the terminal iidentification
Remove.
16. devices according to claim 10, it is characterised in that the login authorization module is additionally operable to receive the terminal
The operation requests of the request assigned operation of initiation;User input type verification data is obtained according to the operation requests;According to described
User input type verification data is verified;When verification passes through, the assigned operation that the operation requests are asked is performed.
17. a kind of entering devices, it is characterised in that include:
Acquisition module, for obtaining local terminal iidentification;Locally stored the proof of Register is obtained, the proof of Register is local
Issued by the server during previous login being serviced device mandate;
Sending module, please for sending the first login for carrying the proof of Register and the terminal iidentification to the server
Ask so that the server is authenticated according to the proof of Register and terminal iidentification that carry and carry out login mandate after success;
Receiver module, for receiving the proof of Register for updating and sending when the server completes and logs in and authorize;
Update module, for the proof of Register for being updated to receive by locally stored the proof of Register.
18. devices according to claim 17, it is characterised in that described device also includes display module;
The sending module is additionally operable to when the proof of Register is not locally stored, then sent to the server described in carrying
Second logging request of terminal iidentification;
The receiver module is additionally operable to receive the bar code that the server feeds back according to second logging request;
The display module is used to show the bar code so that the mobile terminal logged in user account is gathered the bar code and solved
Analysis obtains verifying address, is sent to the server according to the verification address and logs in authorization notification so that the server exists
Receive and carry out login mandate after the login authorization notification;
The receiver module is additionally operable to receive the proof of Register that the server completes to be generated and sent after login is authorized, and notifies
The proof of Register that locally stored the proof of Register is updated to receive by the update module.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611208735.9A CN106657068A (en) | 2016-12-23 | 2016-12-23 | Login authorization method and device, login method and device |
PCT/CN2017/117397 WO2018113690A1 (en) | 2016-12-23 | 2017-12-20 | Login authorisation method and apparatus, and login method and apparatus |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611208735.9A CN106657068A (en) | 2016-12-23 | 2016-12-23 | Login authorization method and device, login method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106657068A true CN106657068A (en) | 2017-05-10 |
Family
ID=58827024
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611208735.9A Pending CN106657068A (en) | 2016-12-23 | 2016-12-23 | Login authorization method and device, login method and device |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN106657068A (en) |
WO (1) | WO2018113690A1 (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018113690A1 (en) * | 2016-12-23 | 2018-06-28 | 腾讯科技(深圳)有限公司 | Login authorisation method and apparatus, and login method and apparatus |
CN108322461A (en) * | 2018-01-31 | 2018-07-24 | 百度在线网络技术(北京)有限公司 | Method, system, device, equipment and the medium of application program automated log on |
CN108616360A (en) * | 2018-03-22 | 2018-10-02 | 阿里巴巴集团控股有限公司 | User identity verification, register method and device |
CN109218326A (en) * | 2018-10-10 | 2019-01-15 | 广州虎牙信息科技有限公司 | Login validation method, device, storage medium and server |
CN111600858A (en) * | 2020-05-06 | 2020-08-28 | 腾讯科技(深圳)有限公司 | Application login method, device and system |
CN112187811A (en) * | 2020-09-30 | 2021-01-05 | 湖南快乐阳光互动娱乐传媒有限公司 | App login method and system |
CN112272167A (en) * | 2020-10-09 | 2021-01-26 | 深圳安泰创新科技股份有限公司 | System login method, terminal device and computer readable storage medium |
CN112417405A (en) * | 2020-11-30 | 2021-02-26 | 北京小熊博望科技有限公司 | Multi-cloud disk aggregation method |
CN114124382A (en) * | 2021-12-01 | 2022-03-01 | 深圳市大头兄弟科技有限公司 | Voucher updating method, system, equipment and storage medium |
WO2023016414A1 (en) * | 2021-08-12 | 2023-02-16 | 阿里云计算有限公司 | Credential rotation method, computing device, and storage medium |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109992601B (en) * | 2019-03-12 | 2023-10-27 | 中国平安财产保险股份有限公司 | To-do information pushing method and device and computer equipment |
CN110995416A (en) * | 2019-10-12 | 2020-04-10 | 武汉信安珞珈科技有限公司 | Method for associating mobile terminal with client |
CN111523862B (en) * | 2020-04-27 | 2024-02-23 | 广东电网有限责任公司培训与评价中心 | Method and related equipment for acquiring talent data |
CN112019505A (en) * | 2020-07-22 | 2020-12-01 | 北京达佳互联信息技术有限公司 | Login method, device, server, electronic equipment and storage medium |
CN114640880B (en) * | 2020-11-30 | 2023-06-30 | 腾讯科技(深圳)有限公司 | Account login control method, device and medium |
CN113992353B (en) * | 2021-09-27 | 2024-01-09 | 北京达佳互联信息技术有限公司 | Login certificate processing method and device, electronic equipment and storage medium |
CN114793177B (en) * | 2022-04-28 | 2024-01-05 | 阿里巴巴(中国)有限公司 | Service login method and device and electronic equipment |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1385781A (en) * | 2001-05-11 | 2002-12-18 | 范平志 | Dynamic password based authentication identifying method |
CN1411224A (en) * | 2001-09-29 | 2003-04-16 | 华为技术有限公司 | Safe identification method of PC customer's terminal |
CN1610290A (en) * | 2004-11-25 | 2005-04-27 | 郑维 | Key changing type one time one key cipher system |
CN101166094A (en) * | 2007-08-10 | 2008-04-23 | 林明辉 | A method for client to automatically log in the server via intelligent encryption mode |
US8156546B2 (en) * | 2009-10-29 | 2012-04-10 | Satyam Computer Services Limited Of Mayfair Centre | System and method for flying squad re authentication of enterprise users |
CN105530224A (en) * | 2014-09-30 | 2016-04-27 | 中国电信股份有限公司 | Method and device for terminal authentication |
CN105991559A (en) * | 2015-02-05 | 2016-10-05 | 同济大学 | User safety login method based on image encryption technology |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8510813B2 (en) * | 2006-12-15 | 2013-08-13 | Yahoo! Inc. | Management of network login identities |
CN103973652A (en) * | 2013-02-01 | 2014-08-06 | 深圳市天时通科技有限公司 | Login method and login system |
KR20130039745A (en) * | 2013-03-28 | 2013-04-22 | 삼성에스디에스 주식회사 | System and method for authentication interworking |
CN103327115B (en) * | 2013-07-05 | 2016-05-25 | 百度在线网络技术(北京)有限公司 | The log-in control method of application program and device |
CN106059776A (en) * | 2016-07-07 | 2016-10-26 | 乐视控股(北京)有限公司 | Website login method and device |
CN106657068A (en) * | 2016-12-23 | 2017-05-10 | 腾讯科技(深圳)有限公司 | Login authorization method and device, login method and device |
-
2016
- 2016-12-23 CN CN201611208735.9A patent/CN106657068A/en active Pending
-
2017
- 2017-12-20 WO PCT/CN2017/117397 patent/WO2018113690A1/en active Application Filing
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1385781A (en) * | 2001-05-11 | 2002-12-18 | 范平志 | Dynamic password based authentication identifying method |
CN1411224A (en) * | 2001-09-29 | 2003-04-16 | 华为技术有限公司 | Safe identification method of PC customer's terminal |
CN1610290A (en) * | 2004-11-25 | 2005-04-27 | 郑维 | Key changing type one time one key cipher system |
CN101166094A (en) * | 2007-08-10 | 2008-04-23 | 林明辉 | A method for client to automatically log in the server via intelligent encryption mode |
US8156546B2 (en) * | 2009-10-29 | 2012-04-10 | Satyam Computer Services Limited Of Mayfair Centre | System and method for flying squad re authentication of enterprise users |
CN105530224A (en) * | 2014-09-30 | 2016-04-27 | 中国电信股份有限公司 | Method and device for terminal authentication |
CN105991559A (en) * | 2015-02-05 | 2016-10-05 | 同济大学 | User safety login method based on image encryption technology |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018113690A1 (en) * | 2016-12-23 | 2018-06-28 | 腾讯科技(深圳)有限公司 | Login authorisation method and apparatus, and login method and apparatus |
CN108322461B (en) * | 2018-01-31 | 2020-10-27 | 百度在线网络技术(北京)有限公司 | Method, system, device, equipment and medium for automatically logging in application program |
CN108322461A (en) * | 2018-01-31 | 2018-07-24 | 百度在线网络技术(北京)有限公司 | Method, system, device, equipment and the medium of application program automated log on |
CN108616360A (en) * | 2018-03-22 | 2018-10-02 | 阿里巴巴集团控股有限公司 | User identity verification, register method and device |
CN108616360B (en) * | 2018-03-22 | 2020-12-18 | 创新先进技术有限公司 | User identity verification and registration method and device |
CN109218326A (en) * | 2018-10-10 | 2019-01-15 | 广州虎牙信息科技有限公司 | Login validation method, device, storage medium and server |
CN111600858A (en) * | 2020-05-06 | 2020-08-28 | 腾讯科技(深圳)有限公司 | Application login method, device and system |
CN112187811A (en) * | 2020-09-30 | 2021-01-05 | 湖南快乐阳光互动娱乐传媒有限公司 | App login method and system |
CN112187811B (en) * | 2020-09-30 | 2023-02-24 | 湖南快乐阳光互动娱乐传媒有限公司 | App login method and system |
CN112272167A (en) * | 2020-10-09 | 2021-01-26 | 深圳安泰创新科技股份有限公司 | System login method, terminal device and computer readable storage medium |
CN112272167B (en) * | 2020-10-09 | 2023-02-03 | 深圳安泰创新科技股份有限公司 | System login method, terminal device and computer readable storage medium |
CN112417405A (en) * | 2020-11-30 | 2021-02-26 | 北京小熊博望科技有限公司 | Multi-cloud disk aggregation method |
WO2023016414A1 (en) * | 2021-08-12 | 2023-02-16 | 阿里云计算有限公司 | Credential rotation method, computing device, and storage medium |
CN114124382A (en) * | 2021-12-01 | 2022-03-01 | 深圳市大头兄弟科技有限公司 | Voucher updating method, system, equipment and storage medium |
CN114124382B (en) * | 2021-12-01 | 2024-04-09 | 深圳市闪剪智能科技有限公司 | Credential updating method, system, device and storage medium |
Also Published As
Publication number | Publication date |
---|---|
WO2018113690A1 (en) | 2018-06-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106657068A (en) | Login authorization method and device, login method and device | |
CN110324276B (en) | Method, system, terminal and electronic device for logging in application | |
CN108322461B (en) | Method, system, device, equipment and medium for automatically logging in application program | |
US8079069B2 (en) | Cardspace history validator | |
KR102390108B1 (en) | Information processing system and control method therefor | |
US9529985B2 (en) | Global authentication service using a global user identifier | |
JP4659806B2 (en) | Security authentication system and method | |
CN104283841B (en) | The method, apparatus and system of service access control are carried out to third-party application | |
CN101227468B (en) | Method, device and system for authenticating user to network | |
CN106534143A (en) | Method and system capable of realizing cross-application authentication authorization | |
US10063538B2 (en) | System for secure login, and method and apparatus for same | |
EP3997597A1 (en) | System and method for identifying a browser instance in a browser session with a server | |
CN108880822A (en) | A kind of identity identifying method, device, system and a kind of intelligent wireless device | |
US10637805B2 (en) | Instant messaging method, server, and storage medium | |
JP2017225054A (en) | Profile data distribution control device, profile data distribution control method, and profile data distribution control program | |
US9059987B1 (en) | Methods and systems of using single sign-on for identification for a web server not integrated with an enterprise network | |
CN107809438A (en) | A kind of network authentication method, system and its user agent device used | |
CN109417471B (en) | Password generation device and password verification device | |
CN109861968A (en) | Resource access control method, device, computer equipment and storage medium | |
US20140101772A1 (en) | Input method, input apparatus, and input program | |
CA3122376A1 (en) | Systems and methods for securing login access | |
CN103036852A (en) | Method and device for achieving network login | |
KR101803535B1 (en) | Single Sign-On Service Authentication Method Using One-Time-Token | |
CN109495458A (en) | A kind of method, system and the associated component of data transmission | |
CN116915493A (en) | Secure login method, device, system, computer equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170510 |
|
RJ01 | Rejection of invention patent application after publication |