CN107454040A - The login method and device of application - Google Patents

The login method and device of application Download PDF

Info

Publication number
CN107454040A
CN107454040A CN201610375655.6A CN201610375655A CN107454040A CN 107454040 A CN107454040 A CN 107454040A CN 201610375655 A CN201610375655 A CN 201610375655A CN 107454040 A CN107454040 A CN 107454040A
Authority
CN
China
Prior art keywords
application
information
terminal
lan
logged
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610375655.6A
Other languages
Chinese (zh)
Other versions
CN107454040B (en
Inventor
陈慧明
李伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201610375655.6A priority Critical patent/CN107454040B/en
Publication of CN107454040A publication Critical patent/CN107454040A/en
Application granted granted Critical
Publication of CN107454040B publication Critical patent/CN107454040B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0876Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint

Abstract

The invention discloses a kind of login method of application and device.The login method of the application includes:The accounts information that the first application is logged in by LAN in terminal is obtained, wherein, accounts information is the identity for identifying the user for logging in the first application;Whether the application of detection second asks by accounts information the registration terminal in LAN;When detecting the second application request by accounts information registration terminal in LAN, accounts information is sent to the second application by LAN, wherein, the second application performs login according to accounts information in terminal.The present invention solves the low technical problem of login ratio of the application in terminal in correlation technique.

Description

The login method and device of application
Technical field
The present invention relates to internet arena, in particular to the login method and device of a kind of application.
Background technology
At present, the user account in internet is the user identity for identifying user in specific project Account, such as, the user account in Tengxun's video mobile phones version, Tengxun's video TV versions.When Same account is generally used when being mounted with different terminals with the application equally serviced is provided in user Family logs in application, such as, the application such as wechat, QQ.As user using same account in different terminals During upper login application, there is following way at present:
(1) application in each terminal needs to individually enter the username and password of user account to enter Row logs in.
(2) two terminals, the application input username and password in one of terminal are logged in, Same application in another terminal can provide Quick Response Code to registration terminal, registration terminal Quick Response Code is scanned, so as to realize the login of the application in terminal.
For needing the application in the terminal that user repeatedly logs in, especially similar to this use of TV Application in the terminal of remote control, there are operation inconvenience, entrance unobvious, therefore, to upper It is relatively low to state user's ratio that the application of terminal is logged in, causes the popularization of paid service and based on account number The implementation progress of the personalized recommendation of backstage big data is slow.
For the application in terminal in correlation technique login ratio it is low the problem of, at present not yet propose have The solution of effect.
The content of the invention
The embodiments of the invention provide a kind of login method of application and device, at least to solve related skill The low technical problem of the login ratio of application in art in terminal.
A kind of one side according to embodiments of the present invention, there is provided login method of application.The application Login method include:The accounts information that the first application is logged in by LAN in terminal is obtained, its In, accounts information is the identity for identifying the user for logging in the first application;The application of detection second Whether request by accounts information the registration terminal in LAN;When detecting that the second application request passes through During registration terminal, accounts information is sent by LAN in LAN to the second application for accounts information, Wherein, the second application performs login according to accounts information in terminal.
Another aspect according to embodiments of the present invention, additionally provide a kind of entering device of application.It should answer Entering device includes:First acquisition unit, for obtaining the first application by LAN in terminal The accounts information of upper login, wherein, accounts information is the body for identifying the user for logging in the first application Part mark;Detection unit, for detecting whether the second application is asked by accounts information in LAN Registration terminal;Transmitting element, detect the second application request by accounts information in LAN for working as During interior registration terminal, accounts information is sent to the second application by LAN, wherein, second applies root According to accounts information login is performed in terminal.
In embodiments of the present invention, the account logged in using the first application is obtained by LAN in terminal Family information, accounts information are the identity for identifying the user for logging in the first application;Detection second Using whether asking by accounts information the registration terminal in LAN;When detecting the second application request During registration terminal, account is sent in LAN by accounts information to the second application by LAN and believed Breath, the second application perform login in terminal according to accounts information, reached by sharing in LAN The account information of first application is so that the second application performs the purpose logged in, it is achieved thereby that improving terminal On application login ratio technique effect, and then solve the application in correlation technique in terminal Log in the low technical problem of ratio.
Brief description of the drawings
Accompanying drawing described herein is used for providing a further understanding of the present invention, forms the one of the application Part, schematic description and description of the invention are used to explain the present invention, not formed to this hair Bright improper restriction.In the accompanying drawings:
Fig. 1 is the hardware configuration of the terminal of the login method of application according to embodiments of the present invention Block diagram;
Fig. 2 is the flow chart of the login method of application according to a first embodiment of the present invention;
Fig. 3 is whether the application of detection second according to embodiments of the present invention is asked by accounts information in office The flow chart of the method for registration terminal in the net of domain;
Fig. 4 be it is according to embodiments of the present invention judge the first application and the second application whether legal method Flow chart;
Fig. 5 is the flow chart of the login method of application according to a second embodiment of the present invention;
Fig. 6 is that judgement according to embodiments of the present invention whether there is and secondary route information in LAN The flow chart of the method for having logged in application corresponding to identical routing iinformation;
Fig. 7 is the flow chart of the login method of application according to a third embodiment of the present invention;
Fig. 8 is the stream according to the login method of the application of the login method fourth embodiment of the invention of application Cheng Tu;
Fig. 9 is the schematic diagram of the entering device of application according to a first embodiment of the present invention;
Figure 10 is the schematic diagram of the entering device of application according to a second embodiment of the present invention;
Figure 11 is the schematic diagram of the entering device of application according to a third embodiment of the present invention;
Figure 12 is the schematic diagram of the entering device of application according to a fourth embodiment of the present invention;
Figure 13 is the schematic diagram of the entering device of application according to a fifth embodiment of the present invention;And
Figure 14 is a kind of structured flowchart of terminal according to embodiments of the present invention.
Embodiment
In order that those skilled in the art more fully understand the present invention program, below in conjunction with the present invention Accompanying drawing in embodiment, the technical scheme in the embodiment of the present invention is clearly and completely described, Obviously, described embodiment only a part of embodiment of the present invention, rather than whole implementation Example.Based on the embodiment in the present invention, those of ordinary skill in the art are not making creative work Under the premise of the every other embodiment that is obtained, should all belong to the scope of protection of the invention.
It should be noted that the term in description and claims of this specification and above-mentioned accompanying drawing " first ", " second " etc. be for distinguishing similar object, without for describe specific order or Precedence.It should be appreciated that the data so used can exchange in the appropriate case, to retouch here The embodiments of the invention stated can be real with the order in addition to those for illustrating or describing herein Apply.In addition, term " comprising " and " having " and their any deformation, it is intended that covering is not arranged His includes, for example, contain the process of series of steps or unit, method, system, product or Equipment is not necessarily limited to those steps clearly listed or unit, but may include not list clearly Or for the intrinsic other steps of these processes, method, product or equipment or unit.
According to embodiments of the present invention, there is provided a kind of embodiment of the login method of application is, it is necessary to illustrate , can be in the meter of such as one group computer executable instructions the flow of accompanying drawing illustrates the step of Performed in calculation machine system, although also, show logical order in flow charts, in some feelings , can be with the step shown or described by being performed different from order herein under condition.
The embodiment of the method that the embodiment of the present application one is provided can mobile terminal, terminal or Performed in the similar arithmetic unit of person.Exemplified by running on computer terminals, Fig. 1 is according to this hair The hardware block diagram of the terminal of the login method of the application of bright embodiment.As shown in figure 1, Terminal 1 can include one or more (one is only shown in figure) processor 102 (processing Device 102 can include but is not limited to Micro-processor MCV or PLD FPGA etc. place Manage device), the memory 104 for data storage and the transmitting device 106 for communication function. It will appreciated by the skilled person that the structure shown in Fig. 1 is only to illustrate, it is not to above-mentioned The structure of electronic installation causes to limit.For example, terminal 1 may also include than shown in Fig. 1 more More either less components have the configuration different from shown in Fig. 1.
Memory 104 can be used for the software program and module of storage application software, and such as present invention is implemented Programmed instruction/module corresponding to the login method of application in example, processor 102 are stored in by operation Software program and module in memory 104, so as to perform various function application and data processing, Realize the login method of above-mentioned application.Memory 104 may include high speed random access memory, may be used also Including nonvolatile memory, such as one or more magnetic storage device, flash memory or other are non- Volatile solid-state.In some instances, memory 104 can further comprise relative to processing The remotely located memory of device 102, these remote memories can be whole to computer by network connection End 1.The example of above-mentioned network includes but is not limited to internet, intranet, LAN, movement Communication network and combinations thereof.
Transmitting device 106 is used to data are received or sent via a network.Above-mentioned network is specific Example may include the wireless network that the communication providerses of terminal 1 provide.In an example, Transmitting device 106 includes a network adapter and (Network Interface Controller, is referred to as NIC), it can be connected so as to be communicated with internet by base station with other network equipments.One In individual example, transmitting device 106 can be radio frequency (Radio Frequency, referred to as RF) mould Block, it is used to wirelessly be communicated with internet.
Under above-mentioned running environment, this application provides the login method of application as shown in Figure 2.Should Method can apply in intelligent terminal, by the computing device in intelligent terminal, intelligence Terminal device can be smart mobile phone, tablet personal computer etc..It is provided with intelligent terminal at least one Application program, the species of not defining application of the embodiment of the present invention, can be system class application journey Sequence, or software class application program.Application program in the embodiment of the present invention includes at least one Application function.
Fig. 2 is the flow chart of the login method of application according to a first embodiment of the present invention.Such as Fig. 2 institutes Show, a kind of optional scheme of the login method of the application comprises the following steps:
Step S202, obtain the accounts information that the first application is logged in by LAN in terminal.
In the scheme that the application above-mentioned steps S202 is provided, obtain the first application and existed by LAN The accounts information logged in terminal, wherein, accounts information is the user that the first application is logged in for identifying Identity.First application is application in terminal, such as, installed in mobile terminal or Wechat, QQ on person's computer etc. are applied.This first apply in terminal log in when pass through account information Logged in, the account information is first to apply the log-on message in terminal, is in specific project The mark of user identity, can be the account name of user and the password corresponding with account name.First should Logined successfully with by LAN in terminal, can by Wireless Fidelity (Wireless Fidelity, Referred to as WIFI) logged in terminal, the accounts information of user is have recorded in terminal, is obtained from terminal Take account information.Alternatively, after account information is obtained, account information is stored.
Whether step S204, the application of detection second ask to log in LAN by accounts information eventually End.
In the scheme that the application above-mentioned steps S204 is provided, the second application is not logged in terminal Application, after the accounts information that the first application is logged in terminal by LAN is obtained, detection Whether the second application asks by accounts information the registration terminal in LAN.Second application can be with First application is identical, can also be different from the first application, can apply with first and be stepped in same terminal Record, can also apply with first and be logged on different terminals.When the first application and second is applied same When being logged in terminal, the first application and the second application are different applications, when the first application and second should With when being logged on different terminals, the first application and the second application can be the same or different, wherein, First application and the second application refer to the first application and the second application for identical application and provide same clothes Business, the first application and second refer to the first application service different with the second application offer using different.But It is that second applies the accounts information and first when being logged in terminal to apply the account logged in terminal Information is identical.
, can be by after the accounts information that the first application is logged in by LAN in terminal is obtained The accounts information of the first application logged in is shared in LAN.Whether the application of detection second asks to pass through The accounts information of first Application share registration terminal in LAN.Alternatively, detecting the second application is It is no to meet preparatory condition, when second terminal meets preparatory condition, it is determined that detecting the second application request By accounts information in LAN registration terminal, when second terminal does not meet preparatory condition, it is determined that Detect that the registration terminal in LAN is not asked by accounts information in the second application, so as to realize in office The second application that is not logged in and can be logged in by accounts information is determined whether there is in the net of domain.
Step S206, logged in when detecting the second application request by accounts information in LAN eventually During end, accounts information is sent to the second application by LAN.
In the scheme that the application above-mentioned steps S206 is provided, whether ask to lead in the application of detection second Cross after accounts information logs in LAN, when detecting that the second application request existed by accounts information In LAN during registration terminal, the accounts information of the first application is sent to the second application by LAN, Second applies after the accounts information of the first application is received, and is existed according to the accounts information of the first application Terminal performs login, and the process does not need user's intervention, you can realizes that second applies stepping in terminal Record, stepped on it is achieved thereby that being not logged in applying being performed in terminal according to the accounts information for having logged in application Record, improves the login ratio of the application in terminal, and then improves the experience property that user logs in application Energy.
By above-mentioned steps S202 to step S206, scheme provided by the invention can be realized by obtaining The accounts information for taking the first application to be logged in by LAN in terminal, accounts information are to be stepped on for identifying The identity of the user of the application of record first;Whether the application of detection second is asked by accounts information in office Registration terminal in the net of domain;Logged in when detecting the second application request by accounts information in LAN eventually During end, accounts information is sent to the second application by LAN, the second application is according to accounts information at end End performs login, has reached the technique effect for the login ratio for improving the application in terminal, and then solve The low technical problem of the login ratio of application in correlation technique in terminal.
As an alternative embodiment, whether the application of step S204 detections second asks to pass through account Information registration terminal in LAN in family includes:Pass through the first routing iinformation and second of the application of detection one The secondary route information of route and judge that the first application and second whether all legal determines whether to examine Measure the second application request by accounts information the registration terminal in LAN.
Fig. 3 is whether the application of detection second according to embodiments of the present invention is asked by accounts information in office The flow chart of the method for registration terminal in the net of domain.As shown in figure 3, whether the detection second application asks By accounts information, registration terminal comprises the following steps in LAN:
Step S301, the first routing iinformation of the first application and the second tunnel of the second application are obtained respectively By information.
In the scheme that the application above-mentioned steps S301 is provided, the first application logged in terminal can be with Accounts information and the first routing iinformation are reported, the second application being not logged in terminal is only to second Routing iinformation is reported, wherein, the first routing iinformation and secondary route information include the phase of router Close information.The first routing iinformation of the first application and the secondary route information of the second application are obtained respectively, And stored the first routing iinformation and secondary route information, so as to pass through the first routing iinformation and the Two routing iinformations determine the route of the first application and the second application access.
Step S302, judge whether the first routing iinformation and secondary route information are identical routing iinformation.
In the scheme that the application above-mentioned steps S302 is provided, the first of the first application is being obtained respectively After routing iinformation and the secondary route information of the second application, the first routing iinformation and secondary route are judged Whether information is identical routing iinformation, that is, judging to wrap in the first routing iinformation and secondary route information Whether the information included is identical, so as to by judging whether the first routing iinformation and secondary route information are phase With routing iinformation to ensure that the routing iinformation being collected into has uniqueness, and then ensure the first application and the Two applications access same route.
Step S303, judge whether the first application and the second application are legal.
In the scheme that the application above-mentioned steps S303 is provided, judge that the first application and the second application are It is no legal, that is, judge first application and second application whether be terminal allow log in application, can Judge whether the first application and the second application are legal with the identification code by the first application and the second application.
Step S304, it is determined that detecting that the second application request is logged in by accounts information in LAN Terminal.
The application above-mentioned steps S304 provide scheme in, if it is judged that the first routing iinformation and Secondary route information is identical routing iinformation, and the first application and the second application are legal, then by legal Listed first application and legal be not logged in second apply and accessing the situation of same route Under, it is determined that detect the second application request by accounts information the registration terminal in LAN.
The embodiment by obtain respectively the first application the first routing iinformation and second application second Routing iinformation;Judge whether the first routing iinformation and secondary route information are identical routing iinformation;Judge Whether the first application and the second application are legal;If it is judged that the first routing iinformation and secondary route information For identical routing iinformation, and the first application and the second application are legal, it is determined that detecting the second application request By accounts information in LAN registration terminal, realize and be not logged in local area network using can be with The determination that accounts information by having logged in application is logged in.
As another optional embodiment, step S303 judges that the first application and the second application are It is no it is legal can by first application the first identification information and second application the second identification information sentence Whether disconnected first application and the second application are legal.
Fig. 4 be it is according to embodiments of the present invention judge the first application and the second application whether legal method Flow chart.As shown in figure 4, this judges whether the first application and the second application are legal including following step Suddenly:
Step S401, obtains the first identification information of the first application respectively and the second of the second application is known Other information.
In the scheme that the application above-mentioned steps S401 is provided, the first knowledge of the first application is obtained respectively Other information and the second identification information of the second application.First identification information is the mark letter of the first application Breath, the second identification information are the identification information of the second application, the first identification information and the second identification information Can be GUID (Globally Unique Identifier, referred to as GUID), GUID It is the numeric identifier that a kind of binary length by algorithm generation is 128, GUID is mainly used in In multiple nodes, the more networks calculated or system, any computer and computer cluster are all without life Into two identical GUID, therefore, the first application and the second application can be represented by GUID. First identification information and the second identification information can also be QUA identification codes.
Step S402, respectively according to the first identification information and the second identification information judge first application and Whether the second application is legal.
In the scheme that the application above-mentioned steps S402 is provided, the first of the first application is being obtained respectively After identification information and the second identification information of the second application, respectively according to the first identification information and second Identification information judges whether the first application and the second application legal, that is, by the first identification information and Second identification information judge first application and second application whether be terminal allow log in application.It is optional Ground, if the second application is illegal, the second application is not allowed to exist by the accounts information of the first user Logged in terminal.
The embodiment by obtain respectively the first application the first identification information and second application second Identification information, judge that the first application and second should according to the first identification information and the second identification information respectively With whether legal, it is achieved thereby that to the first application and the judgement of the legitimacy of the second application.
As an alternative embodiment, logged in obtaining the first application by LAN in terminal Accounts information before, by second application identification information judgment second apply legitimacy, and Determine whether in LAN exist with secondary route information identical routing iinformation corresponding to stepped on Record application, so as to realize the determination to the first application.
Fig. 5 is the flow chart of the login method of application according to a second embodiment of the present invention.Such as Fig. 5 institutes Show, the login method of the application comprises the following steps:
Step S501, obtain the second identification information of the second application.
In the scheme that the application above-mentioned steps S501 is provided, pass through LAN obtaining the first application Before the accounts information logged in terminal, what is be not logged in second applies access to LAN, obtains second Second identification information of application.Second identification information includes but is not limited to GUID and QUA.
Step S502, judge whether the second application is legal according to the second identification information.
In the scheme that the application above-mentioned steps S502 is provided, the second identification of the second application is being obtained After information, judge whether the second application is legal according to the second identification information.If according to the second identification Information judges that the second application is legal, performs step S503.
Step S503, judge to whether there is to route with secondary route information identical in LAN to believe The corresponding login application of breath.
In the scheme that the application above-mentioned steps S503 is provided, if judged according to the second identification information It is legal to go out the second application, judges to whether there is to route with secondary route information identical in LAN to believe The corresponding login application of breath, that is, having been searched whether in LAN and secondary route information phase With routing iinformation, if found in LAN and secondary route information identical route believe Breath, judges whether the application corresponding to the routing iinformation has logged in, if it is judged that the routing iinformation institute Corresponding application has logged in, it is determined that existing and secondary route information identical routing iinformation in LAN Corresponding login application.
Step S504, applied it is determined that having logged in using for first.
In the scheme that the application above-mentioned steps S504 is provided, if it is judged that existing in LAN With the login application corresponding to secondary route information identical routing iinformation, it is determined that having logged in using being First application, it is achieved thereby that identical with secondary route information to routing iinformation in LAN and at end Listed first application is searched on end.
The embodiment is by obtaining first using the accounts information logged in by LAN in terminal Before, the second identification information of the second application is obtained, judges that the second application is according to the second identification information It is no legal, if according to the second identification information judge second application it is legal, judge be in LAN The no login application existed corresponding to secondary route information identical routing iinformation, if it is judged that The login application corresponding to secondary route information identical routing iinformation in LAN be present, really Fixed logged in is applied using for first, it is achieved thereby that to the listed first application in LAN Search.
As an alternative embodiment, step S503 judges to whether there is and the in LAN Login corresponding to two routing iinformation identical routing iinformations apply including:By obtaining secondary route MAC Address, SSID and subscriber's outlet IP in information are determined in the presence of identical with secondary route information Routing iinformation corresponding to login application.
Fig. 6 is that judgement according to embodiments of the present invention whether there is and secondary route information in LAN The flow chart of the method for having logged in application corresponding to identical routing iinformation.As shown in fig. 6, this is sentenced Break in LAN with the presence or absence of the login corresponding to secondary route information identical routing iinformation The method of application comprises the following steps:
Step S601, obtain MAC Address, SSID and subscriber's outlet IP in secondary route information.
In the scheme that the application above-mentioned steps S601 is provided, secondary route information is included in LAN Router media access control (Media Access Control, referred to as MAC) address, that is, The physical address of router, a main frame has a MAC Address, and each network site has One IP address for being specific to it;Obtain service set (the Service Set of wireless router Identifier, referred to as SSID), WLAN is divided into by SSID several needs different identity to verify Sub-network, each sub-network is required for independent identity to be verified, only passes through authentication User can just enter corresponding sub-network, so as to prevent unauthorized user from entering Home Network;Obtain Subscriber's outlet IP is taken, that is, obtaining the internet address of user.
Step S602, searched whether in presetting database and MAC Address, SSID and user Export IP identical routing iinformations.
In the scheme that the application above-mentioned steps S602 is provided, MAC is stored with presetting database Address, SSID and subscriber's outlet IP.MAC Address, SSID in secondary route information is obtained After subscriber's outlet IP, searched whether in presetting database with secondary route information MAC Address, SSID and subscriber's outlet IP identical routing iinformations, are realized to secondary route information In MAC Address, SSID and subscriber's outlet IP verified.
Step S603, it is determined that in the presence of with secondary route information identical routing iinformation corresponding to stepped on Record application.
In the scheme that the application above-mentioned steps S603 is provided, if found in presetting database Have with MAC Address, SSID and subscriber's outlet IP identical routing iinformations, it is determined that in the presence of with second Login application corresponding to routing iinformation identical routing iinformation, this has been logged in should using as first With.
The embodiment is by obtaining MAC Address, SSID and subscriber's outlet in secondary route information IP;Searched whether in presetting database identical with MAC Address, SSID and subscriber's outlet IP Routing iinformation;Go out if found in presetting database with MAC Address, SSID and user Mouthful IP identical routing iinformations, it is determined that in the presence of with secondary route information identical routing iinformation corresponding to Login application, realize in LAN whether there is and secondary route information identical route The judgement for having logged in application corresponding to information.
As an alternative embodiment, accounts information bag is sent to the second application by LAN Include:The OPENID to second for sending the first application is applied, wherein, the second application is according to the first application OPENID acquisition requests first apply TOKEN, second application get the first application After TOKEN, export for prompting to log in the second prompt message applied.
It is determined that applying it in the presence of with the login corresponding to secondary route information identical routing iinformation Afterwards, the OPENID of the first application is obtained, OPENID is the identity numeral identification of customer-centric Framework, there is open and dispersiveness.The OPENID to second for sending the first application is applied, and second Apply after the OPENID of the first application is received, asked according to the OPENID of the first application Obtain the computer token (TOKEN) of the first application.The first application is got in the second application After TOKEN, export for prompting to log in the second prompt message applied, to prompt user at end The second application can be logged on end.
As an alternative embodiment, obtain what the first application was logged in by LAN in terminal Accounts information includes:The accounts information that the first application is logged in by LAN on first terminal is obtained, Whether the application of detection second asks that registration terminal includes in LAN by accounts information:Detection second Using whether asking to log in second terminal in LAN by accounts information.
First applies and is logged on first terminal, and second applies and logged in second terminal, first terminal It is different terminals with second terminal, such as, first terminal is mobile terminal, and second terminal is and the One terminal is in the computer of same LAN.First application has been stepped on by LAN on first terminal Record, obtain the accounts information that the first application is logged in by LAN on first terminal.Second application is logical The accounts information for crossing the first application logs in second terminal, and whether the application of detection second asks to pass through account Information logs in second terminal in LAN, that is, whether the application of detection second meets login second eventually End meets preparatory condition, such as, the of the secondary route information of the application of detection second and the first application One routing iinformation it is whether identical and first application and the second application it is whether legal, if detecting second The secondary route information of application is identical with the first routing iinformation of the first application and the first application and the Two should be legal, then detects that the second application meets the preparatory condition logged in second terminal, so as to Detect that the second application request logs in second terminal by accounts information in LAN, realize in office The purpose that accounts information carries out quick registration is shared in multiple terminals in the net of domain, improves user in multiple terminals The upper experience performance for logging in application, and then improve the technology of the login ratio of the application in terminal Effect.
Technical scheme is illustrated with reference to preferred embodiment.
Fig. 7 is the flow chart of the login method of application according to a third embodiment of the present invention.Such as Fig. 7 institutes Show, the login method of the application comprises the following steps:
Step S701, determine the first application of first terminal.
Determine to need the first of shared accounts information to apply on first terminal.
Step S702, judges whether the first application logs in.
It is determined that after the first application of first terminal, judge whether the first application logs in.If it is determined that Go out the first application to have logged on, perform step S703.
Step S703, collect the accounts information of the first application.
If the first application has logged on, there is the accounts information of the first application on first terminal, That is, there is the log-on message of the first application on first terminal, such as, first applies on first terminal The account name of login and the password corresponding with account name.When judging that first applies in first terminal During through logging in, the accounts information of the first application is collected.
Step S704, collect the first routing iinformation of the first application.
While the accounts information of the first application is collected, the first routing iinformation of the first application is collected. The first via included but is not limited to by information the MAC Address of router, wireless router SSID, Subscriber's outlet IP.
Step S705, determine the second application of second terminal.
While step S701 to step S704 is performed, the second application is determined in second terminal, Second application carries out application to be logged in second terminal to receive the accounts information of the first application.
Step S706, judges whether the second application logs in.
It is determined that after the second application of second terminal, judge whether the second application logs in.If it is determined that Go out the second application to log in, perform step S707.
Step S707, collect the secondary route information of the second application.
The secondary route information of the second application is collected, the secondary route information includes but is not limited to router MAC Address, SSID, the subscriber's outlet IP of wireless router.
Step S708, the first routing iinformation and secondary route information are reported to account management system.
After the first routing iinformation and secondary route information is collected, the first routing iinformation and second are reported Routing iinformation is stored and verified to account management system.
Step S709, judge whether the first routing iinformation and secondary route information are identical, and judge Whether one application and the second application are legal.
Judge the MAC Address of the first routing iinformation and the router in secondary route information, without circuit It is whether identical by the SSID of device, subscriber's outlet IP, and can be respectively according to the first of the first application Identification information and the second identification information of the second application judge whether the first application and the second application are legal. If it is judged that the first routing iinformation is identical with secondary route information, and judge the first application and second Using legal, execution step S710.
Step S710, the first accounts information applied is sent to the second application.
If it is judged that the first routing iinformation is identical with secondary route information, and judge the first application and Second application is legal, sends the accounts information of the first application to the second application, makes the second application according to the The accounts information of one application realizes automated log on, that is, when it is legal logged in using and it is legal not Log in application to bring into operation and in LAN during the same route of access, account management system can return to The accounts information of application is logged in the application being not logged in, make to be not logged in has logged in application using basis Accounts information realize automated log on.
The embodiment is applied to account and shares login system, realize it is a kind of realized in LAN it is how whole The shared quick registration technical scheme logged in end, for the listed accounts information of user in LAN Shared.The application run in different terminals reports to current accounts information and routing iinformation Account management backstage, account management backstage are stored and verified to accounts information and routing iinformation. When it is legal logged in using and it is legal be not logged in using bringing into operation, and access is same in LAN During individual route, account management system is that can return to have logged in the accounts information of application to being not logged in applying, It is not logged in applying and automated log on is realized according to accounts information.
The embodiment is applied by determining the first of first terminal, judges whether the first application logs in, when Judge that the first application when having logged in, collects the accounts information of the first application, collect the of the first application One routing iinformation, at the same time, the second application of second terminal is determined, judges whether the second application steps on Record, when judging that the second application is not logged in, the secondary route information of the second application is collected, reports the One routing iinformation and secondary route information judge the first routing iinformation and the second tunnel to account management system It is whether identical by information, and judge whether the first application and the second application are legal, when judging the first via It is identical with secondary route information by information, and judge first application and second application it is legal when, send The accounts information of first application makes the second application real according to the accounts information of the first application to the second application Existing automated log on, the shared quick registration logged in the multiple terminals in LAN is realized, improves user Log in the experience performance of application over multiple terminals, and then improve the login of the application in terminal The technique effect of ratio.
Fig. 8 is the stream according to the login method of the application of the login method fourth embodiment of the invention of application Cheng Tu.As shown in figure 8, the login method of the application comprises the following steps:
Step S801, the application of access second.
Second application is the application being not logged in terminal, and second application is accessed in LAN.
Step S802, obtain the second identification information of the second application.
After the application of access second, the second identification information of the second application is obtained, the second mark letter Breath includes but is not limited to GUID and QUA.
Step S803, it is whether legal according to second the second application of identification information judgment.
, should according to the second identification information judgment second after the second identification information of the second application is obtained With whether legal, if it is legal to go out the second application according to the second identification information judgment, step S804 is performed.
Step S804, verification is performed to the secondary route information of the second application.
If gone out according to the second identification information judgment, the second application is legal, obtains the second tunnel of the second application By information, verification is performed to secondary route information.
Step S805, MAC Address, SSID, IP with the second application are searched in presetting database The consistent routing iinformation for having logged in application.
MAC Address, SSID, IP of application are stored in presetting database.To the of the second application Two routing iinformations perform verification when, in presetting database search with second application MAC Address, SSID, IP consistent routing iinformation for having logged in application.
Step S806, judge whether to find the first application.
If found in presetting database consistent with MAC Address, SSID, IP of the second application The routing iinformation for having logged in application when, it is determined that find the first application, first application is passes through office The application that domain net has logged in terminal, then perform step S807.
Step S807, access first are applied and issue the OPENID of the first application.
If it is judged that finding the first application, then the first application is accessed, obtain the first application OPENID and the OPENID for issuing the first application.
Step S808, the second application are applied according to the OPENID acquisition requests first of the first application TOKEN。
Second application receives the OPENID of the first application, is obtained according to the OPENID requests of the first application Take the TOKEN of the first application.
Step S809, export the prompt message for prompting the second application to log in.
Second application according to first application OPENID acquisition requests first apply TOKEN it Afterwards, prompt message is exported to prompt user second that application can log in terminal.
The embodiment is used for Accounting system and judged in LAN with the presence or absence of the application of shared accounts information. In this embodiment, it is necessary to which the first application and the second application that are used in 100% confirmation user are legal simultaneously And first accesses in same route using with the second application.To ensure this point, the routing iinformation of collection There is uniqueness, they include but is not limited to:The MAC Address of router, wireless router SSID, subscriber's outlet IP, the second identification information of the second application include but is not limited to GUID, QUA, The OPENID and TOKEN logged in is collected in first application.When the second application being not logged in brings into operation When, account management system has searched whether and MAC Address, SSID, IP mono- in presetting database The login application caused, application has been logged in if having found, and this has logged on as the first application, and second Using the accounts information for obtaining the first application, quick registration is realized according to the accounts information of the first application.
The application of embodiment access second, the second identification information of the second application is obtained, according to the second mark Know information and judge whether the second application is legal, when the second application is legal, to the second tunnel of the second application Verification is performed by information, in presetting database search with second application MAC Address, SSID, The routing iinformation for having logged in application consistent IP, judges whether to find the first application, if found First application, access first are applied and issue the OPENID of the first application, and the second application is according to first The TOKEN that the OPENID acquisition requests first of application are applied, export for prompting the second application can The prompt message of login, the shared quick registration logged in the multiple terminals in LAN is realized, is improved User logs in the experience performance of application over multiple terminals, and then improves the application in terminal Log in the technique effect of ratio.
The embodiment is to accessing the first application and the second application progress accounts information in same LAN Share, it is not necessary to user's intervention may be implemented in terminal login, solves and is stepped in some current terminals The problem of record rate ratio is low, for the payment page and the backstage big data personalized recommendation based on account is real Apply and lay a good foundation.
It should be noted that for foregoing each method embodiment, in order to be briefly described, therefore by it all Be expressed as a series of combination of actions, but those skilled in the art should know, the present invention not by The limitation of described sequence of movement, because according to the present invention, some steps can use other orders Or carry out simultaneously.Secondly, those skilled in the art should also know, reality described in this description Apply example and belong to preferred embodiment, involved action and module not necessarily present invention institute are necessary 's.
Through the above description of the embodiments, those skilled in the art can be understood that root The mode of required general hardware platform can be added by software according to the method for above-described embodiment to realize, when So can also be by hardware, but the former is more preferably embodiment in many cases.Based on such reason Solution, the part that technical scheme substantially contributes to prior art in other words can be with soft The form of part product embodies, and the computer software product is stored in a storage medium, such as readable Memory (Read-Only Memory, referred to as ROM), random access memory (Random Access Memory, referred to as RAM), magnetic disc, in CD, including some instructions are causing One station terminal equipment (can be mobile phone, computer, server, or network equipment etc.) performs sheet Invent the method described in each embodiment.
According to embodiments of the present invention, a kind of dress for being used to implement the login method of above-mentioned application is additionally provided Put.Fig. 9 is the schematic diagram of the entering device of application according to a first embodiment of the present invention.Such as Fig. 9 institutes Show, the entering device of the application includes:First acquisition unit 10, detection unit 20 and transmitting element 30。
First acquisition unit 10, the account logged in for obtaining the first application by LAN in terminal Information, wherein, accounts information is the identity for identifying the user for logging in the first application.
First application is the application in terminal, such as, on mobile terminal or computer Wechat, the application such as QQ.This first is applied and logged in when being logged in terminal by account information, The account information is first to apply the log-on message in terminal, is user identity in specific project Mark, can be the account name of user and the password corresponding with account name.First application passes through local Net is logged in terminal to be logged in by WIFI in terminal, and the account of user is have recorded in terminal Information, account information is obtained from terminal by first acquisition unit 10.Alternatively, obtained first After taking the acquisition account information of unit 10, account information is stored.
Detection unit 20, for detecting whether the second application asks to step in LAN by accounts information Record terminal.
First is obtained in first acquisition unit 10 using the account logged in terminal by LAN to believe After breath, whether asked by the application of the detection of detection unit 20 second by accounts information in LAN Interior registration terminal.Second application can be identical with the first application, can also be different from the first application, It can apply with first and be logged in same terminal, can also apply with first and be stepped on different terminals Record.When the first application is applied with second to be logged in same terminal, the first application and the second application are Different applications, when the first application and second apply logged on different terminals when, the first application and the Two applications can be the same or different, wherein, the first application and the second application refer to for identical application Using same service is provided, the first application and the different fingers first of the second application should for first application and second With the service different with the second application offer.But second applies the account when being logged in terminal to believe Breath applies the accounts information logged in terminal identical with first.
First is obtained in first acquisition unit 10 using the account logged in terminal by LAN to believe After breath, listed first accounts information applied can be shared in LAN.Detection unit Whether 20 the second applications of detection ask to log in LAN by the accounts information of the first Application share Terminal.Alternatively, whether the detection of detection unit 20 second is applied meets preparatory condition, when the second end When end meets preparatory condition, determine that detection unit 20 detects that the second application request passes through accounts information The registration terminal in LAN, when second terminal does not meet preparatory condition, determine detection unit 20 Detect that the registration terminal in LAN is not asked by accounts information in the second application, so as to realize in office The second application that is not logged in and can be logged in by accounts information is determined whether there is in the net of domain.
Transmitting element 30, for being stepped on by accounts information in LAN when detecting the second application request When recording terminal, accounts information is sent to the second application by LAN, wherein, the second application is according to account Family information performs login in terminal.
Whether ask to log in LAN by accounts information in the application of the detection of detection unit 20 second Afterwards, when detecting the second application request by accounts information registration terminal in LAN, send Unit 30 sends the accounts information of the first application by LAN to the second application, and second applies and connecing After the accounts information for receiving the first application, performed and stepped in terminal according to the accounts information of the first application Record, the process do not need user's intervention, you can realize that second applies the login in terminal, so as to real Show to be not logged in applying and login is performed in terminal according to the accounts information for having logged in application, improved end The login ratio of application on end, and then improve the experience performance that user logs in application.
The embodiment obtains the first application by first acquisition unit 10 and stepped on by LAN in terminal The accounts information of record, accounts information are the identity for identifying the user for logging in the first application.It is logical Cross whether the application of the detection of detection unit 20 second asks by accounts information the registration terminal in LAN, When detecting the second application request by accounts information registration terminal in LAN, transmitting element 30 Accounts information is sent to the second application by LAN, the second application performs according to accounts information in terminal Log in, improve the login ratio of the application in terminal, and then solve in correlation technique in terminal The low technical problem of the login ratio of application.
Figure 10 is the schematic diagram of the entering device of application according to a second embodiment of the present invention.Such as Figure 10 Shown, the entering device of the application includes:First acquisition unit 10, detection unit 20 and transmission are single Member 30.Wherein, detection unit 20 includes:First acquisition module 21, the first judge module 22, the Two judge modules 23 and the first determining module 24.
The first acquisition unit 10 of the embodiment, detection unit 20 and transmitting element 30 and the present invention the Effect in the entering device of the application of one embodiment is identical, and here is omitted.
First acquisition module 21, for obtaining the first routing iinformation and the second application of the first application respectively Secondary route information.
First judge module 22, for judging whether the first routing iinformation and secondary route information are identical Routing iinformation.
Second judge module 23, for judging whether the first application and the second application are legal.
First determining module 24, for judging that the first routing iinformation and secondary route information are identical Routing iinformation, and the first application and the second application are legal, it is determined that detecting that the second application request passes through account Family information registration terminal in LAN.
Figure 11 is the schematic diagram of the entering device of application according to a third embodiment of the present invention.Such as Figure 11 Shown, the entering device of the application includes:First acquisition unit 10, detection unit 20 and transmission are single Member 30.Wherein, detection unit 20 includes:First acquisition module 21, the first judge module 22, the Two judge modules 23 and the first determining module 24.Second judge module 23 includes:Acquisition submodule 231 and judging submodule 232.
The first acquisition unit 10 of the embodiment, detection unit 20, transmitting element 30, first obtains Module 21, the first judge module 22, the second judge module 23 and the first determining module 24 and this hair Effect in the entering device of the application of bright second embodiment is identical, and here is omitted.
Acquisition submodule 231, for obtaining the first identification information and the second application of the first application respectively The second identification information.
Judging submodule 232, for judging according to the first identification information and the second identification information respectively Whether one application and the second application are legal.
Figure 12 is the schematic diagram of the entering device of application according to a fourth embodiment of the present invention.Such as Figure 12 Shown, the entering device of the application includes:First acquisition unit 10, detection unit 20 and transmission are single Member 30.Wherein, detection unit 20 includes:First acquisition module 21, the first judge module 22, the Two judge modules 23 and the first determining module 24.The entering device of the application also includes:Second obtains Unit 40, the first judging unit 50, the second judging unit 60 and determining unit 70.
The first acquisition unit 10 of the embodiment, detection unit 20, transmitting element 30, first obtains Module 21, the first judge module 22, the second judge module 23 and the first determining module 24 and this hair Effect in the entering device of the application of bright second embodiment is identical, and here is omitted.
Second obtains single 40, for obtaining first using the account logged in by LAN in terminal Before information, the second identification information of the second application is obtained.
First judging unit 50, for judging whether the second application is legal according to the second identification information.
Second judging unit 60, for judging that the second application is legal according to the second identification information, sentence Break in LAN with the presence or absence of the login corresponding to secondary route information identical routing iinformation Using.
Determining unit 70, for judging exist and secondary route information identical road in LAN As the login application corresponding to information, applied it is determined that having logged in using for first.
Figure 13 is the schematic diagram of the entering device of application according to a fifth embodiment of the present invention.Such as Figure 13 Shown, the entering device of the application includes:First acquisition unit 10, detection unit 20 and transmission are single Member 30.Wherein, detection unit 20 includes:First acquisition module 21, the first judge module 22, the Two judge modules 23 and the first determining module 24.The entering device of the application also includes:Second obtains Unit 40, the first judging unit 50, the second judging unit 60 and determining unit 70.Second judges list Member 60 includes the second acquisition module 61, the determining module 63 of searching modul 62 and second.
The first acquisition unit 10 of the embodiment, detection unit 20, transmitting element 30, first obtains Module 21, the first judge module 22, the second judge module 23 and the first determining module 24, second obtains Take unit 40, the first judging unit 50, the second judging unit 60 and determining unit 70 and the present invention Effect in the entering device of the application of fourth embodiment is identical, and here is omitted.
Second acquisition module 61, for obtain the MAC Address in secondary route information, SSID and Subscriber's outlet IP.
Searching modul 62, for having been searched whether in presetting database and MAC Address, SSID With subscriber's outlet IP identical routing iinformations.
Second determining module 63, for having been found in presetting database and MAC Address, SSID With subscriber's outlet IP identical routing iinformations, it is determined that in the presence of with secondary route information identical route believe The corresponding login application of breath.
Alternatively, transmitting element 30 is used for the applications of OPENID to second for sending the first application, its In, second applies the TOKEN applied according to the OPENID acquisition requests first of the first application, After second application gets the TOKEN of the first application, export for prompting to log in the second application Prompt message.
Alternatively, first acquisition unit 10 is used to obtain the first application by LAN in first terminal The accounts information of upper login, detection unit 20 is used for second that detection does not log in second terminal should With whether asking to log in second terminal in LAN by accounts information.
The embodiment of the present invention is answered by sharing the listed accounts information of user in LAN with realizing With the technical scheme for carrying out quick registration in terminal according to shared account information.Run in different terminals Using account management backstage by current accounts information and routing iinformation, is reported to, obtained by first Take unit 10 to be obtained and stored, be not logged in applying by the detection of detection unit 10 and whether ask to lead to Accounts information registration terminal in LAN is crossed, has logged in using and legal is not logged in when legal Using bringing into operation and when accessing same route, account management system is returned by transmitting element 30 The information of application has been logged in being not logged in applying, has been not logged in applying and is stepped on automatically according to account information realization Record.
In the present invention, it is necessary to detection unit 20 to detect the application that uses of user legal and access same One route, to ensure this point, the routing iinformation of collection will have uniqueness, start when being not logged in applying During operation, account management system searched whether in presetting database with MAC Address, SSID, Login application consistent IP, if finding the login consistent with MAC Address, SSID, IP Using, then be not logged in using start terminal implement quick registration, so as to improve the application in terminal Login ratio.
This programme is shared by carrying out accounts information to the application accessed in same LAN, it is not necessary to uses Family intervention can be achieved to log in, and solve the problems, such as that login rate ratio is low in some current terminals, to pay Take the page and the backstage big data personalized recommendation based on account is implemented to lay the foundation.
Embodiments of the invention additionally provide a kind of storage medium.Alternatively, in the present embodiment, on State the program generation performed by the login method for the application that storage medium can be used for preservation above-described embodiment Code.
Alternatively, in the present embodiment, above-mentioned storage medium can be located at multiple nets of computer network At least one network equipment in network equipment.
Alternatively, in the present embodiment, storage medium is arranged to storage for performing following steps Program code:
The accounts information that the first application is logged in by LAN in terminal is obtained, wherein, accounts information For the identity for identifying the user for logging in the first application.
Whether the application of detection second asks by accounts information the registration terminal in LAN.
When detecting the second application request by accounts information registration terminal in LAN, pass through office Domain net sends accounts information to the second application, wherein, the second application performs according to accounts information in terminal Log in.
Alternatively, storage medium is also configured to the program code that storage is used to perform following steps:Point Huo Qu not the first routing iinformation of the first application and the secondary route information of the second application;Judge the first via Whether it is identical routing iinformation by information and secondary route information;Judging the first application and the second application is It is no legal;If it is judged that the first routing iinformation and secondary route information are identical routing iinformation, and the One application and the second application are legal, it is determined that detecting the second application request by accounts information in LAN Interior registration terminal.
Alternatively, storage medium is also configured to the program code that storage is used to perform following steps:Point Huo Qu not the first identification information of the first application and the second identification information of the second application;Respectively according to One identification information and the second identification information judge whether the first application and the second application are legal.
Alternatively, storage medium is also configured to the program code that storage is used to perform following steps: Before first is obtained using the accounts information logged in by LAN in terminal, the second application is obtained Second identification information;Judge whether the second application is legal according to the second identification information;If according to second Identification information judges that the second application is legal, judges to whether there is and secondary route information in LAN Login application corresponding to identical routing iinformation;If it is judged that exist and second in LAN Login application corresponding to routing iinformation identical routing iinformation, answered it is determined that having logged in using for first With.
Alternatively, storage medium is also configured to the program code that storage is used to perform following steps:Obtain Take MAC Address, SSID and the subscriber's outlet IP in secondary route information;In presetting database Search whether and MAC Address, SSID and subscriber's outlet IP identical routing iinformations;If Find in presetting database and believed with MAC Address, SSID and subscriber's outlet IP identicals route Breath, it is determined that in the presence of the login application corresponding to secondary route information identical routing iinformation.
Alternatively, storage medium is also configured to the program code that storage is used to perform following steps:Hair The OPENID to second of the first application is sent to apply, wherein, the second application is according to the first application The TOKEN that OPENID acquisition requests first are applied, the first application is got in the second application After TOKEN, export for prompting to log in the second prompt message applied.
Alternatively, storage medium is also configured to the program code that storage is used to perform following steps:Obtain The accounts information for taking the first application to be logged in by LAN on first terminal, is detected not in second terminal Whether the second application of upper login asks to log in second terminal in LAN by accounts information.
Alternatively, in the present embodiment, above-mentioned storage medium can include but is not limited to:USB flash disk, only It is various to read memory ROM, random access memory ram, mobile hard disk, magnetic disc or CD etc. Can be with the medium of store program codes.
Embodiments of the invention also provide a kind of terminal, and the terminal can be computer Any one computer terminal in terminal group.Alternatively, in the present embodiment, above-mentioned calculating Machine terminal can also replace with the terminal devices such as mobile terminal.
Alternatively, in the present embodiment, above computer terminal can be located at the multiple of computer network At least one network equipment in the network equipment.
Alternatively, Figure 14 is a kind of structured flowchart of terminal according to embodiments of the present invention. As shown in figure 14, terminal A can include:One or more (one is only shown in figure) Processor 141, memory 143 and transmitting device 145.
Wherein, memory 143 can be used for storage software program and module, in the embodiment of the present invention Application login method and device corresponding to programmed instruction/module, processor 141 pass through run storage Software program and module in memory 143, so as to perform at various function application and data Reason, that is, realize the login method of above-mentioned application.Memory 143 may include high speed random access memory, Nonvolatile memory can also be included, as one or more magnetic storage device, flash memory or Other non-volatile solid state memories.In some instances, memory 143 can further comprise relatively In the remotely located memory of processor 141, these remote memories can pass through network connection to meter Calculation machine terminal A.The example of above-mentioned network include but is not limited to internet, intranet, LAN, Mobile radio communication and combinations thereof.
Above-mentioned transmitting device 145 is used to data are received or sent via a network.Above-mentioned net Network instantiation may include cable network and wireless network.In an example, transmitting device 145 wraps Include a network adapter NIC, its can be connected by netting twine with other network equipments with router so as to It can be communicated with internet or LAN.In an example, transmitting device 145 is radio frequency Module, it is used to wirelessly be communicated with internet.
Wherein, specifically, memory 143 is used to store deliberate action condition and default access user Information and application program.
Processor 141 can call information and the application of the storage of memory 143 by transmitting device 145 Program, to perform following step:
Optionally, above-mentioned processor 141 can also carry out the program code of following steps:
The accounts information that the first application is logged in by LAN in terminal is obtained, wherein, accounts information For the identity for identifying the user for logging in the first application;
Whether the application of detection second asks by accounts information the registration terminal in LAN;
When detecting the second application request by accounts information registration terminal in LAN, pass through office Domain net sends accounts information to the second application, wherein, the second application performs according to accounts information in terminal Log in.
Alternatively, the specific example in the present embodiment may be referred in above-described embodiment 1 and embodiment 2 Described example, the present embodiment will not be repeated here.
The embodiments of the present invention are for illustration only, do not represent the quality of embodiment.
If the integrated unit in above-described embodiment realized in the form of SFU software functional unit and as Independent production marketing or in use, the storage medium that above computer can be read can be stored in. Based on such understanding, what technical scheme substantially contributed to prior art in other words The all or part of part or the technical scheme can be embodied in the form of software product, the meter Calculation machine software product is stored in storage medium, including some instructions are causing one or more calculating Machine equipment (can be personal computer, server or network equipment etc.) performs each implementation of the present invention The all or part of step of example methods described.
In the above embodiment of the present invention, the description to each embodiment all emphasizes particularly on different fields, some reality The part for not having to be described in detail in example is applied, may refer to the associated description of other embodiment.
In several embodiments provided herein, it should be understood that disclosed client, can Realize by another way.Wherein, device embodiment described above is only schematical, Such as the division of the unit, only a kind of division of logic function, can have in addition when actually realizing Dividing mode, such as multiple units or component can combine or be desirably integrated into another system, Or some features can be ignored, or do not perform.Another, shown or discussed mutual coupling Close or direct-coupling or communication connection can be by some interfaces, the INDIRECT COUPLING of unit or module or Communication connection, can be electrical or other forms.
The unit illustrated as separating component can be or may not be it is physically separate, It can be as the part that unit is shown or may not be physical location, you can with positioned at a ground Side, or can also be distributed on multiple NEs.It can select according to the actual needs therein Some or all of unit realizes the purpose of this embodiment scheme.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit In or unit be individually physically present, can also two or more units be integrated in In one unit.Above-mentioned integrated unit can both be realized in the form of hardware, can also use soft The form of part functional unit is realized.
Described above is only the preferred embodiment of the present invention, it is noted that for the art For those of ordinary skill, under the premise without departing from the principles of the invention, some improvement can also be made And retouching, these improvements and modifications also should be regarded as protection scope of the present invention.

Claims (14)

  1. A kind of 1. login method of application, it is characterised in that including:
    The accounts information that the first application is logged in by LAN in terminal is obtained, wherein, it is described Accounts information is the identity for identifying the user for logging in first application;
    Whether the application of detection second asks to log in the LAN by the accounts information The terminal;And
    When detecting second application request by the accounts information in the LAN When logging in the terminal, the account is sent to the described second application by the LAN and believed Breath, wherein, second application performs login according to the accounts information in the terminal.
  2. 2. according to the method for claim 1, it is characterised in that whether detection second application please Ask and the terminal is logged in the LAN by the accounts information included:
    The second of the described first the first routing iinformation applied and second application is obtained respectively Routing iinformation;
    Judge whether first routing iinformation and the secondary route information are identical route letter Breath;
    Judge whether first application and second application are legal;And
    If it is judged that first routing iinformation and the secondary route information are identical route Information, and first application and the described second application are legal, it is determined that detecting that described second should The terminal is logged in the LAN by the accounts information with request.
  3. 3. according to the method for claim 2, it is characterised in that judge it is described first application with it is described Second application whether it is legal including:
    The second of the described first the first identification information applied and second application is obtained respectively Identification information;And
    First application is judged according to first identification information and the second identification information respectively It is whether legal with second application.
  4. 4. according to the method for claim 2, it is characterised in that pass through obtaining first application Before the accounts information that the LAN logs in the terminal, methods described also includes:
    Obtain the second identification information of second application;
    Judge whether second application is legal according to second identification information;
    If judging that second application is legal according to second identification information, judge in institute State whether there is in LAN with the secondary route information identical routing iinformation corresponding to Application is logged in;And
    If it is judged that exist and the secondary route information identical road in the LAN As the login application corresponding to information, it is determined that described logged in is applied using for described first.
  5. 5. according to the method for claim 4, it is characterised in that judge in the LAN whether In the presence of with the login corresponding to the secondary route information identical routing iinformation apply including:
    Obtain MAC Address, SSID and the subscriber's outlet IP in the secondary route information;
    Searched whether in presetting database and the MAC Address, the SSID and institute State subscriber's outlet IP identical routing iinformations;And
    If found in the presetting database and the MAC Address, the SSID With the subscriber's outlet IP identical routing iinformations, it is determined that in the presence of with the secondary route information Login application corresponding to identical routing iinformation.
  6. 6. according to the method for claim 1, it is characterised in that by the LAN to described the Two applications, which send the accounts information, to be included:The OPENID of first application is sent to described Second application, wherein, second application obtains according to the OPENID requests of the described first application The TOKEN of first application is taken, first application is got in the described second application After TOKEN, export for prompting to log in the described second prompt message applied.
  7. 7. according to the method for claim 1, it is characterised in that
    The account that first application is logged in by the LAN in the terminal is obtained to believe Breath includes:Obtain the account that first application is logged in by the LAN on first terminal Information,
    Detect whether second application is asked by the accounts information in the LAN Logging in the terminal includes:Detect whether the second application not logged in second terminal asks to lead to Cross the accounts information and the second terminal is logged in the LAN.
  8. A kind of 8. entering device of application, it is characterised in that including:
    First acquisition unit, the account logged in for obtaining the first application by LAN in terminal Family information, wherein, the accounts information is the user that first application is logged in for identifying Identity;
    Detection unit, for detecting whether the second application is asked by the accounts information described The terminal is logged in LAN;And
    Transmitting element, detect that second application request is existed by the accounts information for working as When the terminal is logged in the LAN, sent by the LAN to the described second application The accounts information, wherein, second application is held according to the accounts information in the terminal Row logs in.
  9. 9. device according to claim 8, it is characterised in that the detection unit includes:
    First acquisition module, for obtaining the first routing iinformation and the institute of first application respectively State the secondary route information of the second application;
    First judge module, for judging first routing iinformation and the secondary route information Whether it is identical routing iinformation;
    Second judge module, for judging whether first application and the described second application close Method;And
    First determining module, for judging first routing iinformation and the secondary route Information is identical routing iinformation, and first application and the described second application are legal, it is determined that inspection Measure described in second application request logged in the LAN by the accounts information Terminal.
  10. 10. device according to claim 9, it is characterised in that second judge module includes:
    Acquisition submodule, for obtaining the first identification information and described of first application respectively Second identification information of the second application;And
    Judging submodule, for being sentenced respectively according to first identification information and the second identification information Whether disconnected first application and second application are legal.
  11. 11. device according to claim 9, it is characterised in that described device also includes:
    Second acquisition unit, for obtaining first application by the LAN described Before the accounts information logged in terminal, the second identification information of second application is obtained;
    First judging unit, for judging that second application is according to second identification information It is no legal;
    Second judging unit, for judging that described second should according to second identification information With legal, judge to whether there is in the LAN and the secondary route information identical road As the login application corresponding to information;And
    Determining unit, for judging exist in the LAN and secondary route letter The login application corresponding to identical routing iinformation is ceased, it is determined that described logged in using being described First application.
  12. 12. device according to claim 11, it is characterised in that second judging unit includes:
    Second acquisition module, for obtaining MAC Address, SSID in the secondary route information With subscriber's outlet IP;
    Searching modul, for searched whether in presetting database with the MAC Address, The SSID and the subscriber's outlet IP identical routing iinformations;And
    Second determining module, for having been found in the presetting database and the MAC Address, the SSID and the subscriber's outlet IP identical routing iinformations, it is determined that in the presence of with institute State the login application corresponding to secondary route information identical routing iinformation.
  13. 13. device according to claim 8, it is characterised in that the transmitting element is used to send institute The OPENID to described second for stating the first application is applied, wherein, second application is according to institute The TOKEN of the first application is stated described in the OPENID acquisition requests of the first application, described the After two applications get the TOKEN of first application, export for prompting described in login The prompt message of second application.
  14. 14. device according to claim 8, it is characterised in that
    The first acquisition unit is used to obtain first application by the LAN the The accounts information logged in one terminal,
    The detection unit is used to detect whether the second application not logged in second terminal asks Ask and the second terminal is logged in the LAN by the accounts information.
CN201610375655.6A 2016-05-30 2016-05-30 Application login method and device Active CN107454040B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610375655.6A CN107454040B (en) 2016-05-30 2016-05-30 Application login method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610375655.6A CN107454040B (en) 2016-05-30 2016-05-30 Application login method and device

Publications (2)

Publication Number Publication Date
CN107454040A true CN107454040A (en) 2017-12-08
CN107454040B CN107454040B (en) 2020-02-28

Family

ID=60485085

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610375655.6A Active CN107454040B (en) 2016-05-30 2016-05-30 Application login method and device

Country Status (1)

Country Link
CN (1) CN107454040B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108282485A (en) * 2018-01-31 2018-07-13 深圳创维-Rgb电子有限公司 A kind of control user login method, smart television and storage device
CN108881190A (en) * 2018-05-31 2018-11-23 联想(北京)有限公司 A kind of information processing method and device
CN109583181A (en) * 2018-11-29 2019-04-05 新华三技术有限公司 A kind of authentication method, device and machine readable storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101877637A (en) * 2009-04-30 2010-11-03 中国移动通信集团江西有限公司 Single sign-on method and single sign-on system
CN103188237A (en) * 2011-12-30 2013-07-03 盛大计算机(上海)有限公司 Single sign-on system and single sign-on method
CN103457951A (en) * 2013-09-02 2013-12-18 小米科技有限责任公司 Method and device for allowing multiple terminals to login to server
CN103763180A (en) * 2014-01-15 2014-04-30 南京物联传感技术有限公司 Real-time network communication system and method
US20140325628A1 (en) * 2013-04-26 2014-10-30 Tencent Technology (Shenzhen) Company Limited Login method, apparatus, and system
CN104486747A (en) * 2014-12-19 2015-04-01 北京奇艺世纪科技有限公司 Method and device for cross-terminal account login

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101877637A (en) * 2009-04-30 2010-11-03 中国移动通信集团江西有限公司 Single sign-on method and single sign-on system
CN103188237A (en) * 2011-12-30 2013-07-03 盛大计算机(上海)有限公司 Single sign-on system and single sign-on method
US20140325628A1 (en) * 2013-04-26 2014-10-30 Tencent Technology (Shenzhen) Company Limited Login method, apparatus, and system
CN103457951A (en) * 2013-09-02 2013-12-18 小米科技有限责任公司 Method and device for allowing multiple terminals to login to server
CN103763180A (en) * 2014-01-15 2014-04-30 南京物联传感技术有限公司 Real-time network communication system and method
CN104486747A (en) * 2014-12-19 2015-04-01 北京奇艺世纪科技有限公司 Method and device for cross-terminal account login

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108282485A (en) * 2018-01-31 2018-07-13 深圳创维-Rgb电子有限公司 A kind of control user login method, smart television and storage device
WO2019148955A1 (en) * 2018-01-31 2019-08-08 深圳创维-Rgb电子有限公司 User login control method, smart television, and storage apparatus
CN108282485B (en) * 2018-01-31 2020-09-08 深圳创维-Rgb电子有限公司 Method for controlling user login, smart television and storage device
CN108881190A (en) * 2018-05-31 2018-11-23 联想(北京)有限公司 A kind of information processing method and device
CN108881190B (en) * 2018-05-31 2020-12-18 联想(北京)有限公司 Information processing method and device
CN109583181A (en) * 2018-11-29 2019-04-05 新华三技术有限公司 A kind of authentication method, device and machine readable storage medium
CN109583181B (en) * 2018-11-29 2020-07-03 新华三技术有限公司 Authentication method, authentication device and machine-readable storage medium

Also Published As

Publication number Publication date
CN107454040B (en) 2020-02-28

Similar Documents

Publication Publication Date Title
CN104506510B (en) Method and device for equipment authentication and authentication service system
CN101316219B (en) Virtual network connection apparatus, system, method for controlling connection of a virtual network
CN104158824B (en) Genuine cyber identification authentication method and system
CN107454040A (en) The login method and device of application
CN102891826B (en) The control method of web page access, equipment and system
CN104640114B (en) A kind of verification method and device of access request
KR101988477B1 (en) Method of registration of devices for M2M network using M2M gateway and M2M gateway for it
CN107493280A (en) Method, intelligent gateway and the certificate server of user authentication
CN104468487A (en) Communication authentication method and device and terminal device
CN105847277A (en) Service account share management method and system used for third party application
US20140185536A1 (en) Network Provisioning
CN104660557A (en) Operation processing method and device
CN107094088A (en) A kind of loiter network device identification method, device and system
CN105991600A (en) Identity authentication and apparatus, server and terminal
CN108496380A (en) server, mobile terminal and program
CN107135506A (en) A kind of portal authentication methods, apparatus and system
CN105813114A (en) Method and device for confirming sharing host access
CN105744002A (en) Method for pushing page to client strategically
CN108390955A (en) Domain Name acquisition method, Website access method and server
KR20050002292A (en) Internet connection system having connection restricting function in wireless local area network and method thereof
CN106537962A (en) Method, device, and equipment for wireless network configuration, access, and visit
CN106341374A (en) Method and device for restricting access of unlicensed user device to home gateway
CN107833166A (en) Login method, date storage method, learning terminal, server and storage medium
CN104394151A (en) Method, device and system for accessing campus network into operator network
CN106453349A (en) An account number login method and apparatus

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant