CN107147644A - It is a kind of to realize the method that mobile APP user logs in single equipment - Google Patents

It is a kind of to realize the method that mobile APP user logs in single equipment Download PDF

Info

Publication number
CN107147644A
CN107147644A CN201710326598.7A CN201710326598A CN107147644A CN 107147644 A CN107147644 A CN 107147644A CN 201710326598 A CN201710326598 A CN 201710326598A CN 107147644 A CN107147644 A CN 107147644A
Authority
CN
China
Prior art keywords
token
user
app
stack
legal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710326598.7A
Other languages
Chinese (zh)
Other versions
CN107147644B (en
Inventor
康钟荣
李伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan Changhong Electric Co Ltd
Original Assignee
Sichuan Changhong Electric Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Changhong Electric Co Ltd filed Critical Sichuan Changhong Electric Co Ltd
Priority to CN201710326598.7A priority Critical patent/CN107147644B/en
Publication of CN107147644A publication Critical patent/CN107147644A/en
Application granted granted Critical
Publication of CN107147644B publication Critical patent/CN107147644B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The method that mobile APP user logs in single equipment is realized the invention discloses a kind of, one token stack is safeguarded to the user of each login, and arrange legal token and position of the illegal token in token stack, same account is logged on the mobile APP of distinct device, it will be updated by the token position pairing method token of agreement is corresponding with illegal token progress, and in the service request that APP ends are initiated, verification according to token stack to its entrained User Token, by the term of validity directly to token, legitimacy is judged, particularly limitation will be made in distinct device APP login to account, realize the uniqueness of service request after account is logged on single equipment, reduce the security risk of account, improve the reliability of APP systems.

Description

It is a kind of to realize the method that mobile APP user logs in single equipment
Technical field
It is more particularly to a kind of to realize that mobile APP user exists the present invention relates to computer technology and platform safety technical field The method that single equipment is logged in.
Background technology
Under the overall situation that mobile Internet is rapidly popularized, Mobile solution is fast-developing, while being also faced with numerous choose War and problem, one of FAQs is exactly the safety issue of user account, realizes that user is in the login of single equipment The basic guarantee of user account safety.Consider from service layer, if the mechanism logged in without account in single equipment, then use Family many equipment login after, at the same time requested service operate when, just occur business datum disorder with conflict, it is more serious very It may extremely trigger whole system to collapse, cause unthinkable consequence;Consider from the aspect of user account safety and uniqueness, use Family will not simultaneously be logged in and requested service in many equipment under normal circumstances, and the exactly system that user needs can exist to its account The login of other equipment is limited, to ensure the security of its account information.The present invention will set for mobile APP user single Standby secure log provides a set of efficient solution with business operation.
The content of the invention
The purpose of the present invention is to realize the method that mobile APP user logs in single equipment, by being safeguarded for each user One token stack, legal token, illegal token, expired token to deposit user etc., according to user login operation behavior management And the position of the various tokens of user is adjusted, the legitimacy of incoming token is verified, assists to realize that account is set single by MAC Address The standby validity logged in.
In order to reach above-mentioned technique effect, the present invention takes following technical scheme:One kind realizes mobile APP user in list The method that one equipment is logged in, comprises the following steps:
Step S1, user are logged in first, create and initialize token stack, and token is returned to APP ends;
According to user, successful log operates obtained data first, is that user creates the unique token stack in an address, And the legal token PUSH of generation will be logged in first to this token stack, in this, as the initialization operation of User Token stack;Together When for the storage user's particulars of token creation one in each token stack sub- token, and return and step on first to APP ends The legal token of terrestrial production.
Step S2, user is non-logs in first, and the element of User Token stack is changed, and returns to token to APP ends, right In same account, compared with last login, it is divided into same equipment and logs in and distinct device two kinds of situations of login, it is specific as follows:
B1. compared with the last Successful login, if account is logged in the equipment at same APP ends, service end incite somebody to action this It is secondary to log in reported device mac address and memory database, the MAC Address in subscriber data corresponding to the legal token of user Matched, after the match is successful, the element of legal token position in token stack is updated to the newest use that this login is produced Family token, that is, the newest legal token of user, the corresponding sub- token of subscriber data of storage User Token after operating successfully, and The newest User Token of this Successful login generation is returned to APP ends;
B2. compared with the last Successful login, if account is logged in the equipment at different APP ends, service end by this Log in reported device mac address and memory database, the MAC Address in subscriber data corresponding to the legal token of user enters Row matching, it is rear that it fails to match, and the element of legal token position in token stack is updated into the newest use that this login is produced Family token, and the legal token of the user of last login is extruded into second position in token stack, the i.e. position of illegal token, and The newest User Token of this Successful login generation is returned to APP ends.
Token when step S3, service end are to APP ends service request is verified, to judge that this login of user is reported Token it is whether legal, specifically comprising following sub-step:
C1. service end intercepts the User Token that APP ends are reported, and inquires the legal of user in token stack according to user name Token, and illegal token;
If the legal token c2. in c1 is not present with illegal token, then the token stack of user has been cleared, show to use Family reports token to exceed the term of validity, and current token is expired, returns to the expired error message of token to APP ends, points out APP ends to use Family is logged in again;
If legal token c3. in c1 is not sky, legal token is matched with reporting token, the match is successful then school Test and pass through, be that the service request at APP ends is let pass, while the sub- token of the corresponding subscriber data of query token, is asked with auxiliary activities Processing;
If c4. in c3 token matched fail, token will be reported to be matched with illegal token, it fails to match then show on Report token to exceed the term of validity, return to the expired error message of token to APP ends, point out APP end subscribers to log in again;
If c5. the match is successful with illegal token in c4, show that current account is logged in other equipment, current token For illegal token, the illegal error message of token is returned to APP ends, points out APP end subscribers account to be logged in other equipment, builds View is logged in again, or account number safety is on the hazard, and points out it to give password or contact APP keepers for change.
Further technical scheme is:A kind of to realize the method that mobile APP user logs in single equipment, step S1 is specific Realized by following sub-step:
A1.APP ends collect user input user name, password, and equipment MAC Address, to service end initiate log in Request;
A2. service end intercepts the user name, password, device mac address that APP ends report, in user name, the conjunction of MAC Address After method verification passes through, the correctness of password is judged;
If a3. code error, the prompt message of code error is returned to APP ends;If password is correct, inquiry user is detailed Thin information, obtains generation token and data needed for sub- token;
A4. the necessary data in a3, generates User Token and the sub- token of subscriber data;
A5. using identification strings and login name string-concatenation with APP ends business correlation as KEY, with raw in a4 Into User Token initiate to create User Token stack to memory database as VALUE and initialize the request of token stack, and After the completion of operation, using User Token as KEY, the sub- token generated using in a4 initiates the storage request of sub- token as VALUE;
A6. memory database creates User Token stack, and the legal token PUSH for logging in generation first is grasped to token stack After making successfully, the corresponding sub- token of subscriber data is stored;
A7. the user profile needed for the legal token of the user generated in a4 and other business of APP ends is returned into APP End.
Further technical scheme is:It is a kind of to realize in the method that mobile APP user logs in single equipment, token stack The corresponding sub- token of User Token is one-to-one subordinate relation, and their term of validity is identical, and token expiration is according to industry Business demand is set.
Further technical scheme is:It is a kind of to realize the method that mobile APP user logs in single equipment, token stack and son Token is stored in internal memory, or in memory database such as Redis.
Further technical scheme is:A kind of realize is used in the method that mobile APP user logs in single equipment, token stack The data that family token packet contains have Crypted password, token expiration etc., after being handled by AES, obtain a BASE64 character String, i.e. User Token;Sub- token contains the particulars data of user, there is user name, user type, the MAC of beaching accommodation Address and the related user profile of APP business, after being handled by AES, obtain a BASE64 character string, i.e. user The corresponding sub- token stored data of token.
Further technical scheme is:The token of top in token stack is set as the legal token of user;Second token For user's illegal token, i.e. account token when forcing down line is logged in by those in other equipment;The token of other positions is nothing Imitate token.
The present invention compared with prior art, with following beneficial effect:It is disclosed by the invention to realize that mobile APP user exists The method that single equipment is logged in, safeguards a token stack, and arrange legal token and illegal token to the user of each login Position in token stack, same account is logged on the mobile APP of distinct device, by by the token position pairing decree of agreement Board is corresponding with illegal token progress to be updated, and in the service request that APP ends are initiated, according to token stack to its entrained user The verification of token, the term of validity directly to token, legitimacy are judged, particularly by account distinct device APP's Limitation is made in login, realizes the uniqueness of service request after account is logged on single equipment, reduces the safety wind of account Danger, improves the reliability of APP systems.
Brief description of the drawings
Fig. 1 is the flow chart of the inventive method;
Fig. 2 is the flowage structure schematic diagram of the inventive method.
Embodiment
With reference to embodiments of the invention, the invention will be further elaborated.
Embodiment:
It is a kind of to realize the method that mobile APP user logs in single equipment, as shown in Figure 1 and Figure 2, comprise the following steps:
Step S1, according to user, successful log operates obtained data first, and it is unique to be that user creates an address Token stack 300, and the legal token 301PUSH of generation will be logged in first to this token stack, in this, as User Token stack Initialization operation, legal token is 301 in Fig. 2, while detailed for one storage user of token creation in each token stack The sub- token 3011 of thin data.The flow specifically included has:
A1, APP end 100 collect user input user name, password, and equipment MAC Address, sent out to service end 200 Play logging request;A2, service end 200 intercept user name, password, device mac address that APP ends 100 are reported etc., user name, The legitimacy verifies of MAC Address judge the correctness of password by rear;If a3, code error, password is returned to APP ends wrong Prompt message by mistake;If password is correct, User Detail is inquired about, generation token and data needed for sub- token are obtained;A4, root According to the necessary data in a3, the sub- token 3011 of the generation legal token 301 of user and storage subscriber data;A5, APP ends will be carried The related identification strings of business with login name string-concatenation as KEY, the User Token generated using in a4 as VALUE to Memory database is initiated to create User Token stack and initializes the request of token stack, and after the completion of operation, is made with User Token For KEY, the sub- token generated using in a4 initiates the storage request of sub- token as VALUE;A6, memory database create user's order Board stack, and the legal token 301PUSH for logging in generation first after operating successfully, is stored into subscriber data correspondence to token stack 300 Sub- token 3011;A7, by the legal token 301 of the user generated in a4, and user profile needed for other business of APP ends is returned Back to APP ends 100.
Accordingly, the data that User Token is included have Crypted password, token expiration etc., after being handled by AES, Obtain a BASE64 character string, i.e. User Token;Sub- token contains the particulars data of user, there is user name, user The related user profile of type, the MAC Address of beaching accommodation and APP business, after being handled by AES, obtains one BASE64 character strings, that is, store the corresponding sub- token of User Token data.
Accordingly, the corresponding sub- token of User Token in token stack is one-to-one subordinate relation, and its term of validity Identical, token expiration is set according to business demand.The token for arranging top in token stack is the legal token of user, second Token is that user's illegal token, i.e. account log in token when forcing down line, the token of other positions by those in other equipment For invalid token.As shown in Fig. 2 position 1 is legal token 301, corresponding sub- token is 3011;Position 2 is illegal token 302, corresponding sub- token is 3021;Position 1 is legal token 301, and corresponding sub- token is 3011;Follow-up other positions are it His expired or illegal token 303,304, corresponding sub- token is 3031,3041 respectively, wherein 303,304 be only intended to represent should Position is other expired or illegal tokens, is not used to specific restriction.
Accordingly, token stack is stored in internal memory with the suggestion of sub- token, or in memory database such as Redis.
S2, user is non-logs in first, and the element to User Token stack 300 is changed, for same account, and upper Secondary login is compared, and is divided into same equipment and is logged in and distinct device two kinds of situations of login.
If compared with the last Successful login, account is logged in the equipment at same APP ends, and service end 200 will This is logged in reported device mac address and memory database, in subscriber data corresponding to the legal token 301 of user MAC Address is matched, after the match is successful, and the element of legal token position in token stack is updated into what this login was produced Newest User Token, that is, the newest legal token 301 of user, the corresponding subscriber data of storage User Token after operating successfully Sub- token, and return to the token that this Successful login is generated to APP ends.
If compared with the last Successful login, account is logged in the equipment at different APP ends, and service end 200 will be by This is logged in reported device mac address and memory database, the MAC in subscriber data corresponding to the legal token of user Location is matched, and it is rear that it fails to match, and the element of legal token position in token stack is updated into this login and produced most New User Token, and the legal token 301 of the user of last login is extruded into second position in token stack, i.e. illegal token 302 position, the new legal token 301 of this Successful login generation is returned to APP ends 100;If continuously appearing in multiple set Standby upper login, then the legal token 301 in token stack 300 and the token on the position of illegal token 302 will be pressed against 303 or 304 Position, new legal token is with illegal token by by PUSH to 301 and 302 position.
S3, service end 200 are verified to the service request token at APP ends 100, to judge that this login of user is reported Token it is whether legal, comprising flow have:C1, service end 200 intercept the User Token that APP ends 100 are reported, and according to user Name inquires the legal token 301 of user in token stack, and illegal token 302;If legal token 301 in c2, c1 with it is non- Decree board 302 is not present, then the token stack of user has been cleared, and shows that reporting of user token exceeds the term of validity, currently Token is expired, returns to the expired error message of token to APP ends 100, points out APP end subscribers to log in again;If the conjunction in c3, c1 Decree board 301 not for sky, then by legal token 301 with reporting token to be matched, the match is successful then verify pass through, be APP ends Service request let pass, while the sub- token 3011 of the corresponding subscriber data of query token, the processing asked with auxiliary activities;c4、 If token matched fails in c3, token will be reported to be matched with illegal token 302, it fails to match then shows to report token to surpass The term of validity is crossed, the expired error message of token is returned to APP ends 100, points out APP end subscribers to log in again;If in c5, c4 with it is non- The match is successful for decree board 302, then show that current account is logged in other equipment, current token is illegal token, to APP ends 100 return to the illegal error message of token, point out APP end subscribers account to be logged in other equipment, it is proposed that to log in again, or account Number safety is on the hazard, and points out it to give password or contact APP keepers etc. for change, so same account can only be in an equipment APP on requested service.
It is understood that the principle that embodiment of above is intended to be merely illustrative of the present and the exemplary implementation that uses Mode, but the invention is not limited in this.For those skilled in the art, the essence of the present invention is not being departed from In the case of refreshing and essence, various changes and modifications can be made therein, and these variations and modifications are also considered as protection scope of the present invention.

Claims (7)

1. a kind of realize the method that mobile APP user logs in single equipment, it is characterised in that comprises the following steps:
Step S1, user are logged in first, create and initialize token stack, and token is returned to APP ends;
According to user, successful log operates obtained data first, is that user creates the unique token stack in an address, and will The legal token PUSH of generation is logged in first to this token stack, in this, as the initialization operation of User Token stack;It is simultaneously The sub- token of one storage user's particulars of token creation in each token stack, and life is logged in first to the return of APP ends The legal token of production;
Step S2, user is non-logs in first, and the element of User Token stack is changed, and returns to token to APP ends,
For same account, compared with last login, it is divided into same equipment and logs in and distinct device two kinds of situations of login, specifically It is as follows:
B1. compared with the last Successful login, if account is logged in the equipment at same APP ends, service end steps on this In record reported device mac address and memory database, the MAC Address in subscriber data corresponding to the legal token of user is carried out Matching, after the match is successful, the newest user order that this login is produced is updated to by the element of legal token position in token stack Board, that is, the newest legal token of user, the corresponding sub- token of subscriber data of storage User Token after operating successfully, and to APP ends return to the newest User Token of this Successful login generation;
B2. compared with the last Successful login, if account is logged in the equipment at different APP ends, service end logs in this In the device mac address and memory database that are reported, the MAC Address progress in subscriber data corresponding to the legal token of user Match somebody with somebody, it is rear that it fails to match, the element of legal token position in token stack is updated to the newest user order that this login is produced Board, and the legal token of the user of last login is extruded into second position in token stack, the i.e. position of illegal token, and to APP ends return to the newest User Token of this Successful login generation;
Token when step S3, service end are to APP ends service request is verified, and to judge user, this logs in reported order Whether board is legal, specifically comprising following sub-step:
C1. service end intercepts the User Token that APP ends are reported, and inquires according to user name the legal order of user in token stack Board, and illegal token;
If the legal token c2. in c1 is not present with illegal token, then the token stack of user has been cleared, and shows on user Report token to exceed the term of validity, current token is expired, return to the expired error message of token to APP ends, point out APP end subscriber weights New login;
If legal token c3. in c1 is not sky, legal token is matched with reporting token, the match is successful then verification lead to Cross, be that the service request at APP ends is let pass, while the sub- token of the corresponding subscriber data of query token, the place asked with auxiliary activities Reason;
If c4. token matched fails in c3, token will be reported to be matched with illegal token, it fails to match then shows to report order Board exceedes the term of validity, returns to the expired error message of token to APP ends, points out APP end subscribers to log in again;
If c5. the match is successful with illegal token in c4, show that current account is logged in other equipment, current token is non- Method token, the illegal error message of token is returned to APP ends, points out APP end subscribers account to be logged in other equipment, it is proposed that weight New login, or account number safety are on the hazard, and point out it to give password or contact APP keepers for change.
2. a kind of the method that mobile APP user logs in single equipment is realized according to claim 1, it is characterised in that: Step S1 is realized especially by following sub-step:
A1.APP ends collect user input user name, password, and equipment MAC Address, to service end initiate logging request;
A2. service end intercepts the user name, password, device mac address that APP ends report, in user name, the legitimacy of MAC Address After verification passes through, the correctness of password is judged;
If a3. code error, the prompt message of code error is returned to APP ends;If password is correct, inquiry user believes in detail Breath, obtains generation token and data needed for sub- token;
A4. the necessary data in a3, generates User Token and the sub- token of subscriber data;
A5. using identification strings and login name string-concatenation with APP ends business correlation as KEY, with what is generated in a4 User Token is initiated to create User Token stack and initializes the request of token stack as VALUE to memory database, and in operation After the completion of, using User Token as KEY, the sub- token generated using in a4 initiates the storage request of sub- token as VALUE;
A6. memory database creates User Token stack, and the legal token PUSH for logging in generation first is operated into token stack After work(, the corresponding sub- token of subscriber data is stored;
A7. the legal token of the user generated in a4 is returned into APP ends.
3. a kind of the method that mobile APP user logs in single equipment is realized according to claim 1, it is characterised in that: The corresponding sub- token of User Token in token stack is one-to-one subordinate relation, and their term of validity is identical.
4. a kind of the method that mobile APP user logs in single equipment is realized according to claim 1, it is characterised in that: Token stack is stored in internal memory with sub- token, or in memory database.
5. a kind of the method that mobile APP user logs in single equipment is realized according to claim 4, it is characterised in that: Token stack is stored in database Redis with sub- token.
6. a kind of according to claim 1 or 3 realizes the method that movement APP user logs in single equipment, its feature exists In:The data that User Token is included in token stack have Crypted password, token expiration;Sub- token contains the particulars of user Data, there is the related user profile of user name, user type, the MAC Address of beaching accommodation and APP business.
7. a kind of the method that mobile APP user logs in single equipment is realized according to claim 1, it is characterised in that: The token of top in token stack is set as the legal token of user;Second token is user's illegal token, i.e., account is by those Token when forcing down line is logged in other equipment;The token of other positions is invalid token.
CN201710326598.7A 2017-05-10 2017-05-10 Method for realizing login of mobile APP user in single device Active CN107147644B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710326598.7A CN107147644B (en) 2017-05-10 2017-05-10 Method for realizing login of mobile APP user in single device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710326598.7A CN107147644B (en) 2017-05-10 2017-05-10 Method for realizing login of mobile APP user in single device

Publications (2)

Publication Number Publication Date
CN107147644A true CN107147644A (en) 2017-09-08
CN107147644B CN107147644B (en) 2020-07-28

Family

ID=59777970

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710326598.7A Active CN107147644B (en) 2017-05-10 2017-05-10 Method for realizing login of mobile APP user in single device

Country Status (1)

Country Link
CN (1) CN107147644B (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107481126A (en) * 2017-09-27 2017-12-15 北京同城必应科技有限公司 A kind of single method of anti-brush, server and client side
CN108023881A (en) * 2017-12-04 2018-05-11 泰康保险集团股份有限公司 Login method, device, medium and the electronic equipment of application program
CN108418821A (en) * 2018-03-06 2018-08-17 北京焦点新干线信息技术有限公司 Redis and Kafka-based high-concurrency scene processing method and device for online shopping system
CN108848113A (en) * 2018-08-15 2018-11-20 广州视源电子科技股份有限公司 Client device login control method and device, storage medium and server
CN109218326A (en) * 2018-10-10 2019-01-15 广州虎牙信息科技有限公司 Login validation method, device, storage medium and server
CN109587249A (en) * 2018-12-07 2019-04-05 北京金山云网络技术有限公司 Information sending, receiving method, device, server, client and storage medium
CN110032855A (en) * 2019-02-28 2019-07-19 招银云创(深圳)信息技术有限公司 Login method, device, computer equipment and the storage medium of application
CN112511563A (en) * 2020-12-22 2021-03-16 四川长虹电器股份有限公司 Method for logging in terminal equipment by cloud user
CN112910854A (en) * 2021-01-18 2021-06-04 深圳万物安全科技有限公司 Method and device for safe operation and maintenance of Internet of things, terminal equipment and storage medium
CN112948783A (en) * 2021-02-26 2021-06-11 平安消费金融有限公司 Client login management method, device, server and storage medium
CN113923010A (en) * 2021-09-30 2022-01-11 上海影创信息科技有限公司 Head display equipment single sign-on method and system based on virtual reality
CN114745133A (en) * 2018-03-27 2022-07-12 杭州蚂蚁聚慧网络技术有限公司 Method and device for identifying uniqueness of equipment
CN115344851A (en) * 2022-10-13 2022-11-15 海看网络科技(山东)股份有限公司 Method for realizing non-inductive refreshing of token based on dynamic proxy
CN117579254A (en) * 2024-01-16 2024-02-20 金财数科(北京)信息技术有限公司 Encryption method, system and device for data transmission

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101075864A (en) * 2007-07-16 2007-11-21 腾讯科技(深圳)有限公司 Method for synchronizing and processing data, customer terminal equipment and servo
CN104796408A (en) * 2015-03-25 2015-07-22 广州视睿电子科技有限公司 Single-point live login method and single-point live login device
CN104821937A (en) * 2015-03-26 2015-08-05 腾讯科技(北京)有限公司 Token acquisition method, device and system
US20150381618A1 (en) * 2014-06-27 2015-12-31 Gerard Lin Method of mutual verification between a client and a server
CN105978682A (en) * 2016-06-27 2016-09-28 武汉斗鱼网络科技有限公司 Mobile terminal token generation system and method thereof for judging identity of login user
CN106104532A (en) * 2014-01-23 2016-11-09 洛茨平有限公司 For creating the computer system and method for multiple information token

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101075864A (en) * 2007-07-16 2007-11-21 腾讯科技(深圳)有限公司 Method for synchronizing and processing data, customer terminal equipment and servo
CN106104532A (en) * 2014-01-23 2016-11-09 洛茨平有限公司 For creating the computer system and method for multiple information token
US20150381618A1 (en) * 2014-06-27 2015-12-31 Gerard Lin Method of mutual verification between a client and a server
CN104796408A (en) * 2015-03-25 2015-07-22 广州视睿电子科技有限公司 Single-point live login method and single-point live login device
CN104821937A (en) * 2015-03-26 2015-08-05 腾讯科技(北京)有限公司 Token acquisition method, device and system
CN105978682A (en) * 2016-06-27 2016-09-28 武汉斗鱼网络科技有限公司 Mobile terminal token generation system and method thereof for judging identity of login user

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107481126A (en) * 2017-09-27 2017-12-15 北京同城必应科技有限公司 A kind of single method of anti-brush, server and client side
CN108023881A (en) * 2017-12-04 2018-05-11 泰康保险集团股份有限公司 Login method, device, medium and the electronic equipment of application program
CN108023881B (en) * 2017-12-04 2020-12-15 泰康保险集团股份有限公司 Application login method, device, medium and electronic equipment
CN108418821A (en) * 2018-03-06 2018-08-17 北京焦点新干线信息技术有限公司 Redis and Kafka-based high-concurrency scene processing method and device for online shopping system
CN108418821B (en) * 2018-03-06 2021-06-18 北京焦点新干线信息技术有限公司 Redis and Kafka-based high-concurrency scene processing method and device for online shopping system
CN114745133B (en) * 2018-03-27 2024-09-17 杭州蚂蚁聚慧网络技术有限公司 Method and device for identifying equipment uniqueness
CN114745133A (en) * 2018-03-27 2022-07-12 杭州蚂蚁聚慧网络技术有限公司 Method and device for identifying uniqueness of equipment
CN108848113B (en) * 2018-08-15 2021-03-26 广州视源电子科技股份有限公司 Client device login control method and device, storage medium and server
CN108848113A (en) * 2018-08-15 2018-11-20 广州视源电子科技股份有限公司 Client device login control method and device, storage medium and server
CN109218326A (en) * 2018-10-10 2019-01-15 广州虎牙信息科技有限公司 Login validation method, device, storage medium and server
CN109587249A (en) * 2018-12-07 2019-04-05 北京金山云网络技术有限公司 Information sending, receiving method, device, server, client and storage medium
CN110032855A (en) * 2019-02-28 2019-07-19 招银云创(深圳)信息技术有限公司 Login method, device, computer equipment and the storage medium of application
CN112511563A (en) * 2020-12-22 2021-03-16 四川长虹电器股份有限公司 Method for logging in terminal equipment by cloud user
CN112910854A (en) * 2021-01-18 2021-06-04 深圳万物安全科技有限公司 Method and device for safe operation and maintenance of Internet of things, terminal equipment and storage medium
CN112948783A (en) * 2021-02-26 2021-06-11 平安消费金融有限公司 Client login management method, device, server and storage medium
CN113923010A (en) * 2021-09-30 2022-01-11 上海影创信息科技有限公司 Head display equipment single sign-on method and system based on virtual reality
CN115344851A (en) * 2022-10-13 2022-11-15 海看网络科技(山东)股份有限公司 Method for realizing non-inductive refreshing of token based on dynamic proxy
CN117579254A (en) * 2024-01-16 2024-02-20 金财数科(北京)信息技术有限公司 Encryption method, system and device for data transmission
CN117579254B (en) * 2024-01-16 2024-03-12 金财数科(北京)信息技术有限公司 Encryption method, system and device for data transmission

Also Published As

Publication number Publication date
CN107147644B (en) 2020-07-28

Similar Documents

Publication Publication Date Title
CN107147644A (en) It is a kind of to realize the method that mobile APP user logs in single equipment
CN101316169B (en) Network identity verification method based on internet third party biological characteristic validation
CN102624705B (en) A kind of intelligent image verification method and system
US5841970A (en) Authentication method for networks
CN101047503B (en) Method and system for fetching cipher
KR20200105997A (en) System and method for blockchain-based authentication
CN103544074A (en) Method and device for verifying service
NZ550381A (en) Authentication device and/or method
WO2004049144A3 (en) Generic security infrastructure for com based systems
CN101316166A (en) Dynamic password identity authentication method based on accidental character set
CN103607416A (en) Method and application system for authenticating identity of network terminal machine
CN104899499A (en) Internet image search based Web verification code generation method
CN101689994A (en) Multiple user authentications on a communications device
CN108260015B (en) Voting data processing method and device and electronic equipment
CN106534119A (en) Method and device for prompting client software login information
CN106161348A (en) A kind of method of single-sign-on, system and terminal
CN105162604A (en) Feature image identification based verification method and system, and verification server
CN111934881B (en) Data right determining method and device, storage medium and electronic device
CN106656969A (en) Payment state management method and system thereof, and network payment system
CN106330448A (en) User legality verification method and system, and devices
EP3796613A1 (en) Techniques for repeat authentication
CN105225328A (en) Based on mobile terminal electronic voting method and the system of face characteristic identification
CN112199412A (en) Payment bill processing method based on block chain and block chain bill processing system
US7757080B1 (en) User validation using cookies and isolated backup validation
CN107580002B (en) Double-factor authentication security manager login system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant