CN108647501A - Multiple utility program shares password unlocking method, device, equipment and storage medium - Google Patents
Multiple utility program shares password unlocking method, device, equipment and storage medium Download PDFInfo
- Publication number
- CN108647501A CN108647501A CN201810439259.4A CN201810439259A CN108647501A CN 108647501 A CN108647501 A CN 108647501A CN 201810439259 A CN201810439259 A CN 201810439259A CN 108647501 A CN108647501 A CN 108647501A
- Authority
- CN
- China
- Prior art keywords
- password
- program
- logging request
- login name
- association
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 45
- 238000003860 storage Methods 0.000 title claims abstract description 15
- 238000012795 verification Methods 0.000 claims abstract description 42
- 230000005540 biological transmission Effects 0.000 claims abstract description 14
- 238000004590 computer program Methods 0.000 claims description 13
- 230000006870 function Effects 0.000 description 7
- 238000010200 validation analysis Methods 0.000 description 5
- 238000010586 diagram Methods 0.000 description 4
- 230000010485 coping Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000005304 joining Methods 0.000 description 1
- 238000002360 preparation method Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/41—User authentication where a single sign-on provides access to a plurality of computers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- User Interface Of Digital Computer (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The present invention discloses a kind of multiple utility program and shares password unlocking method, device, equipment and storage medium.This method includes:Authentication is carried out based on the first user login name, the first login password and the first program identification, when authentication passes through, association password corresponding with the first user login name is obtained, and association password and terminal iidentification and the first program identification are stored in program information record sheet;The second logging request of the second application program transmission is obtained, the second logging request includes second user login name, the second program identification and terminal iidentification;If on the corresponding terminal device of terminal iidentification, the second application program is the affiliate application of the first application program, and when the first user login name and associated second user login name, then the verification of the second logging request is completed based on association password.This method can realize the quick login of application program, save user and log in the login time of multiple utility program, while ensure that the safety of user's login application program.
Description
Technical field
The present invention relates to field of mobile terminals more particularly to a kind of multiple utility program to share password unlocking method, device, sets
Standby and storage medium.
Background technology
Existing application program unlock is only capable of realizing the login of an application program or platform, when user is answered using multiple
Different passwords is carried out to different application programs to be arranged, the password of setting can be caused excessive, user occur with needs when program
Note mixes the case where password, so that user can not quickly log in corresponding application program.When user is to multiple application programs
When same login password is arranged, if the login password leakage of an application program, the login password of other applications also can
Leakage, there are security risks.Meanwhile when second application program logs in, gesture password solution locked application may be used, this
When, if gesture password setting is fairly simple so that in gesture password input process, gesture motion reveals the gesture password,
So that the gesture password safety is not high;If gesture password setting it is more complicated when, user's operation complexity will certainly be increased,
It causes inconvenience to the user.
Invention content
A kind of multiple utility program of offer of the embodiment of the present invention shares password unlocking method, device, equipment and storage medium, with
It solves the problems, such as that occurring login password note when different login passwords are arranged to multiple application programs in user mixes, while solving to log in
The problem that password is complicated, safety is not high.
In a first aspect, the embodiment of the present invention provides a kind of shared password unlocking method of multiple utility program, including:
The first logging request of the first application program transmission is obtained, first logging request is logged in including the first user
Name, the first login password, the first program identification and terminal iidentification;
Authentication is carried out based on first user login name, first login password and the first program identification,
Authentication by when, obtain corresponding with first user login name association password, and by the association password and institute
It states terminal iidentification and first program identification is stored in program information record sheet;
The second logging request of the second application program transmission is obtained, second logging request includes that second user logs in
Name, the second program identification and the terminal iidentification;
If on the corresponding terminal device of the terminal iidentification, second application program is first application program
Affiliate application, and when first user login name and the associated second user login name, then it is based on the association
Password completes the verification of second logging request.
Second aspect, the embodiment of the present invention provide a kind of shared password tripper of multiple utility program, including:
First logging request acquisition module, the first logging request for obtaining the transmission of the first application program, described first
Logging request includes the first user login name, the first login password, the first program identification and terminal iidentification;
It is associated with password acquisition module, for being based on first user login name, first login password and the first journey
Sequence mark carries out authentication, authentication by when, obtain corresponding with first user login name association password,
And the association password and the terminal iidentification and first program identification are stored in program information record sheet;
Second logging request acquisition module, the second logging request for obtaining the transmission of the second application program, described second
Logging request includes second user login name, the second program identification and the terminal iidentification;
Second logging request authentication module, if for being answered in the corresponding terminal device of the terminal iidentification, described second
It is the affiliate application of first application program with program, and first user login name and the second user log in
When name is associated, then the verification of second logging request is completed based on the association password.
The third aspect, the embodiment of the present invention provide a kind of computer equipment, including memory, processor and are stored in institute
The computer program that can be run in memory and on the processor is stated, the processor executes real when the computer program
The step of existing multiple utility program shares password unlocking method.
Fourth aspect, the embodiment of the present invention provide a kind of computer readable storage medium, the computer-readable storage medium
Matter is stored with computer program, and the computer program realizes that the multiple utility program shares password unlock when being executed by processor
The step of method.
Multiple utility program provided in an embodiment of the present invention shares password unlocking method, device, equipment and storage medium, passes through
It determines that the second application program is logged in the first application program on same terminal device, is between each other affiliate application, and
And the second corresponding second user login name of application program and when the corresponding first user login name association of the first application program,
First application program verification by when, the logins of multiple application programs is realized based on association password so that multiple application programs can
To share a login password.User only needs to input a login password to a certain application program in terminal device, is answered with this
It can be realized with the associated other applications of program and exempt from password login, realized the quick login of application program, save
The login time of user's login application program, it is user-friendly, moreover, also may be used using association password login affiliate application
To ensure the safety of user's login application program.
Description of the drawings
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below by institute in the description to the embodiment of the present invention
Attached drawing to be used is needed to be briefly described, it should be apparent that, the accompanying drawings in the following description is only some implementations of the present invention
Example, for those of ordinary skill in the art, without having to pay creative labor, can also be according to these attached drawings
Obtain other attached drawings.
Fig. 1 is the flow chart that multiple utility program shares password unlocking method in the embodiment of the present invention 1.
Fig. 2 is another flow chart that multiple utility program shares password unlocking method in the embodiment of the present invention 1.
Fig. 3 is the another flow chart that multiple utility program shares password unlocking method in the embodiment of the present invention 1.
Fig. 4 is a particular flow sheet of step S40 in Fig. 1.
Fig. 5 is the functional block diagram that multiple utility program shares password tripper in the embodiment of the present invention 2;
Fig. 6 is a schematic diagram of 4 Computer equipment of the embodiment of the present invention.
Specific implementation mode
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation describes, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair
Embodiment in bright, the every other implementation that those of ordinary skill in the art are obtained without creative efforts
Example, shall fall within the protection scope of the present invention.
Embodiment 1
Fig. 1 shows the flow chart of the shared password unlocking method of multiple utility program in the present embodiment.The multiple utility program is shared
Password unlocking method is applied when logging in multiple affiliate applications on same terminal device, and multiple affiliate applications can make
Login authentication process is completed with a login password, is tested to realize that affiliate application is based on a login password completion login
The purpose of card.The multiple utility program is shared password unlocking method and be can be applicable on the terminal devices such as computer, smart mobile phone and tablet,
For being logged in by shared password to multiple affiliate applications on same terminal device.As shown in Figure 1, applying journey more
Sequence is shared password unlocking method and is included the following steps:
S10:The first logging request of the first application program transmission is obtained, the first logging request is logged in including the first user
Name, the first login password, the first program identification and terminal iidentification.
First application program is mounted in an application program on terminal device.First logging request refers to login first
The request of application program.The first of the transmission of the first application program is being obtained by the first server that network is connected with terminal device
When logging request, which also carries the first user login name, the first login password, the first program identification and terminal mark
Know.Wherein, first server refers to the corresponding server of the first application program.First user login name refers to logging in the first application
The user login name of program.First login password refers to logging in the corresponding with the first user login name of the first application program to step on
Record password.First program identification refers to the corresponding mark of the first application program for identification, which can be unique
Identify the first application program.Terminal iidentification refers to the mark for the terminal device for logging in the first application program, the terminal iidentification packet
Include but be not limited to IMEI code (International MobileEquipment Identity, the world mobile end of mobile terminal
End equipment identity) and SN (Serial Number, sequence number).
Wherein, IMEI code is stored in the terminal devices such as smart mobile phone and tablet, and a mobile terminal device corresponds to one
IMEI code, the IMEI code can be used for unique identification mobile terminal device.SN codes are product IDs, for verifying the legal of product
The product of identity, a set of legal copy only corresponds to a set product sequence number.When user downloads application program on the mobile terminal device, answer
The corresponding IME I codes of mobile terminal device and SN codes can be obtained with the corresponding first server of program.
S20:Authentication is carried out based on the first user login name, the first login password and the first program identification, in identity
When being verified, association password corresponding with the first user login name is obtained, and will association password and terminal iidentification and first
Program identification is stored in program information record sheet.
Specifically, when user is when logging in the first application program, first server corresponding with the first application program is based on
First user login name, the first login password and the first program identification carry out carrying out authentication to user, if the first user steps on
When recording name, the first login password and the first program identification consistent with the information that first server stores, then to the identity of the user
It is verified.For example, first server can first determine that sending the first of first logging request answers based on the first program identification
With program, then, in the first application program of inquiry all user informations whether there is steps on the first user login name and first
Record the user information of code matches, and if it exists, then authentication passes through.
User authentication by when, corresponding with the first application program first server obtains one and is used with first
The corresponding association password of family login name.Wherein, association password refers to that the first application program and other affiliate applications can be with
Share the password that the same password is logged in.Affiliate application refers to pre-stored associated with the first application program
Application program, the affiliate application are defined by developer, can be the different application programs developed under same company.
For example, vehicle insurance APP, the life insurance APP and financing APP etc. of the exploitation of safety group belong to the application program that is mutually related, if this implementation
The first application program in example is vehicle insurance APP, then its affiliate application is life insurance APP, financing APP or safety group are developed
Other APP.Association password specifically refers to the first application program and after authentication passes through, installed on same terminal device
The password that can share of affiliate application.
The association password is the password that server generates at random.After first server obtains association password, first
Server will be associated with password and is stored in program information record sheet with terminal iidentification and the first program identification.Wherein, program information
Record sheet is the table for records application program information, including the download situation of records application program be associated with password.Record is answered
Situations such as with the download situation of program including the first program identification, terminal iidentification and the download time of records application program.
The association password, terminal iidentification and the first program identification of first application program are stored in program information record sheet
In, convenient for subsequently identifying whether the second application program is the affiliate application of the first application program and completes the second application program
The second logging request verification.
S30:The second logging request of the second application program transmission is obtained, the second logging request includes that second user logs in
Name, the second program identification and terminal iidentification.
Second application program refer to logged on the corresponding terminal device of same terminal iidentification be not belonging to first apply journey
The application program of sequence.Second logging request refers to the logging request of the second application program.With the second application program associated second
Server obtains the second logging request that the second application program is sent, which carries second user login name, second
Program identification and terminal iidentification.Wherein, second server refers to the corresponding server of the second application program.Second user login name
It refer to the corresponding user login name of the second application program.Second program identification refers to the corresponding program identification of the second application program,
For the second application program of unique identification.
In the present embodiment, if the first application program and the second application program are same group, enterprise in exploitation or open
The affiliate application of originator exploitation, and when the first application program and the second application program share a server, first service
Device and second server are same server.If the first application program and the second application program are in exploitation, although same collection
The affiliate application of group, enterprise or developer's exploitation, but the first application program and the second application program do not share one
A server then needs one associated server of setting to realize the information exchange between first server and second server.Its
In, associated server refers to the server for referring to information interaction for realizing first server and second server, association
Server is connected with first server and second server.
S40:If on the corresponding terminal device of terminal iidentification, the second application program is the associated application of the first application program
Program, and when the first user login name and associated second user login name, be then based on association password and complete the second logging request
Verification.
Second server is then inquired based on the second program identification in the second logging request when obtaining the second logging request
Pre-stored affiliate application information table, with ensure the second application program whether be the first application program associated application journey
Sequence.Wherein, affiliate application information table refers to that whether there is between the first application program and the second application program for recording
The table of incidence relation.In affiliate application information table, each group of affiliate application information includes that there are incidence relations
At least two program identifications.
In the present embodiment, when first server and second server are the same server, affiliate application information
Table is stored in the server;When first server and second server are not belonging to the same server, then associated application journey
Sequence table is stored in associated server.Affiliate application information table is stored in associated server, convenient for associated application
Data in program information table are managed concentratedly, and a association of storage in the corresponding server of each application program is avoided to answer
Use program information table.According to affiliate application information table, it may be determined that the first program identification and the second program identification are corresponding
Whether the first application program and the second application program are affiliate application.
If it is determined that when the second application program is the affiliate application of the first application program, then pre-set association is based on
Whether username information table inquiry user login name is associated with second user login name, is determining the first user login name and second
When user login name is associated, then it will be associated with password in program information record sheet and be sent to the corresponding terminal device of terminal iidentification.
Association user name information table refers to the table that whether there is incidence relation for recording user login name.If any user is in advance in vehicle
It, need to be relevant by institute when being logged in using respective user login name and login password on dangerous APP, life insurance APP and financing APP
The corresponding user login name of application program and login password are stored on association user name information table, to obtain the second login
After the second user login name of request, association user name information table is inquired according to the second user login name, to determine that second uses
Whether family login name and the first user login name are associated.
In the present embodiment, when first server and second server are the same server, association user name information table
It is stored in the server;When first server and second server are not belonging to the same server, then affiliate application
Table is stored in associated server.Association user name information table is stored in associated server, convenient for believing association user name
Data in breath table are managed concentratedly, avoid storing a association user name letter in the corresponding server of each application program
Cease table.Judge that the relevance of the first user login name and second user login name can determine the login identity of user, avoids not
The second application program and the first application program are logged in same station terminal equipment with user, the association password can be also obtained, ensure
The login safety and information security of user.
Further, the shared password unlocking method of the multiple utility program further includes:The effective time of association password is set.Have
The effect time refers to be associated with after password is sent to the corresponding terminal device of terminal iidentification, for verify be associated with password it is effective when
Between, the effective time of setting association password can further ensure the information security of user.Within defined effective time, the
After the corresponding server of two application programs gets the association password that the corresponding terminal device of terminal iidentification is sent, stepped on by second
Record the verification of request.Association password is sent to the corresponding terminal device of terminal iidentification, it is close convenient for association of the user based on acquisition
Code carries out the login of the second application program, simplifies the process of verification, ensures that user logs in the safety of the second application program.
After the second logging request that second server obtains the second application program, second server need to be logged in second and be asked
It asks the terminal iidentification of carrying to be compared with the program information record sheet being stored in first server, judges the second application program
Terminal iidentification terminal iidentification whether corresponding with the first application program it is consistent, if unanimously, second server by second log in
Ask the second program identification carried and second user login name and affiliate application information table and association user name information table
Inquiry comparison is carried out, when determining that the second application program is the affiliate application of the first application program, and second user login name
When associated with the first user login name, second server is sent to the corresponding terminal device of terminal iidentification by password is associated with.It can
To understand ground, when first server belongs to same server with second server, then the server will be stored in program information
Association password in record sheet is sent to the corresponding terminal device of terminal iidentification.When first server and second server are not belonging to
When the same server, then associated server obtains the association password stored in first server, and is sent to second server.
When sending association password to second server, which can all have a corresponding effective time, therefore, be associated with sending
When password, it can will also be sent to second server effective time, second server gets terminal within defined effective time
The association password that equipment is sent, then second logging request be verified.
By judging whether the second application program is the affiliate application of the first application program, while judging second user
Whether login name and the first user login name are associated with, when determining that the second application program is the affiliate application of the first application program
And when determining second user login name and associated the first user login name, then association of second logging request based on acquisition is close
Code carries out the verification of the second logging request.Specifically, due to being pre-configured with the effective time of association password, and password will be associated with
After being sent to the corresponding terminal device of terminal iidentification, if user inputs second user on affiliate application in preset time
Login name and the association password, you can complete the verification of corresponding second logging request of second user login name.
The shared password unlocking method of the multiple utility program, which realizes multiple application programs only, needs login password and an association
Password can make user complete the login for the multiple application programs installed on same terminal device, solve multiple using journey
The problem of multiple login passwords are easy to obscure is arranged in sequence.Meanwhile solve user to multiple application programs setting similarly log in it is close
When code, if the login password leakage of an application program, the security risk that the login password of other applications can also be revealed are asked
Topic, ensure that the safety of user's login application program.
In a specific embodiment, the shared password unlocking method of multiple utility program further includes:In login password, circle is set
The first login password corresponding with the first user login name is configured on face, the first login password includes gesture password.
Specifically, login password setting interface refers to the interface for login password to be arranged.If user does not register first
When the first user login name of application program and the first login password, the first application program may require that user enters login password and sets
Interface is set, user registers the first user login name on login password setting interface, while being arranged and the first user login name phase
Corresponding first login password.
First login password includes gesture password, and the setting rule of gesture password refers to being based on a preset specific pattern
Whether the coordinate of case, the coordinate for verifying target pattern meet a kind of verification mode of pre-set matching rule.Wherein, target
Pattern refers to the pattern for unlocking the first login password of user's selection.Pre-set matching rule refers to for verifying mesh
The whether matched rule of position coordinates and initial position for case of marking on a map.
Gesture password in the present embodiment includes picture bottom, dynamic coordinate layer and animation layers.
Specifically, which specifically includes three layers, and first layer is picture bottom, and the second layer is dynamic coordinate layer,
Third layer is animation layers.Wherein, picture bottom refers to user when gesture password is arranged in gesture password setting interface, is selected in advance
The picture layer containing specific pattern taken.The specific pattern includes the pattern of special shape, such as button and plate etc., is used for
Help user's memory.Dynamic coordinate layer refers to the coordinate layer of the position for positioning third layer animation layers, the dynamic coordinate layer
Coordinate be moveable coordinate.Animation layers refer to the figure layer where the target pattern that user chooses, and animation layers include circle
Shape profile and character pattern etc..Wherein, each character pattern is all located in a circular contour, and the character pattern of the animation layers exists
It can be positioned by dynamic coordinate layer by full frame dragging, the position coordinates of circular contour in terminal device screen.
In a specific embodiment, as shown in Fig. 2, being configured and the first user login name on login password setting interface
Corresponding first login password, specifically comprises the following steps:
S51:The initial position of gesture password is obtained in picture bottom.
Initial position refers to the position of the specific pattern selected on picture bottom.When gesture password is arranged, Ying Xian
Picture bottom arbitrarily one specific pattern of selection, and determine the initial position of the specific pattern.
Specifically, picture bottom determine the initial position of gesture password be by picture bottom in the specific pattern chosen
Location determination.In order to more easily determine the position of specific pattern, each specific pattern of picture bottom can be all arranged
One specific circular contour, the initial position of gesture password is determined by the shape and radius size of circular contour.Circular wheel
Exterior feature more preferably can more completely reflect the size of specific pattern compared to other shapes of profile, it is easier to be determined by the center of circle special
Determine the position of pattern.
S52:Obtain the position coordinates of the target pattern in animation layers.
Specifically, after the initial position of gesture password is determined, it is also necessary to choose target pattern and true in animation layers
Set the goal the position coordinates of pattern.The target pattern is the pattern that user selects according to personal like.Wherein, the position of target pattern
Setting coordinate can be obtained by dynamic coordinate layer.After user has chosen target pattern on animation layers, dynamic coordinate layer then can
The position of target pattern is determined based on rectangular coordinate system.
The character pattern of animation layers includes but not limited to Chinese word figure, Chinese small letter number, Arabic numerals, life
The character patterns such as Xiao and Chinese era (ten the Heavenly Stems, twelve earthly branches).Specifically, the position coordinates of target character pattern are also to pass through
What its corresponding circular contour determined.
S53:Whether the initial position based on dynamic coordinate layer, the position coordinates and gesture password that judge target pattern meets
Pre-set matching rule;If meeting, the first login password corresponding with the first user login name is arranged successfully.
Specifically, it needs to carry out test verification to the target pattern of selection after the initial position for determining gesture password.It should
Test verification refers to the process of carrying out test verification to the position coordinates and initial position of the target pattern on animation layers.If symbol
Matching rule is closed, then is proved to be successful, corresponding first login password of the first user login name is arranged successfully.The verification of matching rule
Standard is specially:When the center of circle of a certain specific pattern of the central coordinate of circle and initial position of the corresponding circular contour of target pattern is sat
When subject distance is less than or equal to preset value (0.15 times of such as pre-set radius), then it is verified.Wherein, pre-set radius refers to circular wheel
Wide radius size, it is possible to understand that ground, 0.15 times can also be other concrete numerical values.
Association password in the present embodiment can also refer to gesture password, which is to be randomly assigned one every time in system
The pattern consistent with target pattern chosen in the character pattern of fixed number amount.When user is when logging in the second application program, service
Device can be to sending a certain number of character patterns on the corresponding terminal device of terminal iidentification, user needs on the terminal device more
Pattern consistent with target pattern is chosen in a character pattern, then moves the target pattern so that the position coordinates of target pattern
The validation criteria for meeting pre-set matching rule with initial position then second is answered when the validation criteria for meeting matching rule
It is proved to be successful with corresponding second logging request of program.
Further, in the target pattern on mobile animation layers, target pattern cannot be moved individually, therefore,
It when verifying target pattern, needs integrally to move animation layers, then be sat by calculating the position of target pattern
Whether the coordinate of mark and initial position meets the validation criteria of matching rule, if meeting the validation criteria of matching rule, second
Corresponding second logging request of application program is proved to be successful.Target figure is determined since animation layers are necessarily dependent upon dynamic coordinate layer
The position coordinates of case, and only there are one coordinate systems for dynamic coordinate layer, therefore, in mobile target pattern, corresponding animation layers
It moves integrally, the convenient position coordinates that target pattern is obtained based on dynamic coordinate layer, the position coordinates for verifying target pattern
Whether the validation criteria of matching rule is met.
By judging whether the position coordinates of target pattern and the initial position of gesture password meet pre-set matching
Rule realizes the setting of login password, if meeting matching rule, login application program passes through.It is realized to application using the program
The unlock of program.The verification that gesture password is completed using target pattern reduces the operation complexity of application program unlock.Together
When, due to the uncertainty of target pattern position, improve the safety of gesture password unlock.
In a specific embodiment, as shown in figure 3, in step S20, pass corresponding with the first user login name is obtained
After the step of joining password, it further includes following steps which, which shares password unlocking method,:
S21:The effective time of association password is set.
If the first application program and the corresponding first server of the second application program and second server belong to the same clothes
When business device, server can be arranged one after obtaining association password corresponding with the first user login name to the association password
Effective time sends the time for being associated with password to server whether within effective time for verifying terminal device.
If the first application program and the corresponding first server of the second application program and second server are not belonging to same
When server, then the association password can be arranged after obtaining association password one effective time for verifying end in associated server
End equipment send association password to server time whether within effective time.
Association password in the present embodiment is provided at least 6 characters, which may include Arabic numerals and/or English
The character string that word mother's random combine is formed.Effective time is set as 30s, is based on this set, due to 6 Arabic numerals and
The exhaustive number of English alphabet is in 30s impossible exhaustive complete, therefore, sets association password at least 6 English
Letter and/or the character string of Arabic numerals combination, and effective time is arranged to association password, association password can be increased and broken
The difficulty of solution improves the safety of association password authentification.
In step S30, after the step of obtaining the second logging request that the second application program is sent, the multiple utility program is total
It further includes following steps to enjoy password unlocking method:
S22:It is stepped on based on association password completion second if the acquisition time of the second logging request within effective time, executes
The step of recording the verification of request.
When the first application program and the corresponding first server of the second application program and second server belong to the same clothes
When business device, the terminal device of the second logging request is sent to corresponding service within effective time, by the association password got
When device, server can execute the step of completing the verification of the second log on request based on association password.
When the first application program and the corresponding first server of the second application program and second server be not belonging to it is same
When server, the association password got from first server and effective time can be sent to the second login and asked by associated server
The terminal device of the terminal iidentification of carrying is sought, while terminal iidentification and effective time are sent to second service by associated server
Device.Second server is within defined effective time, after getting the association password that the corresponding terminal device of terminal iidentification is sent,
Second server executes the step of completing the verification of the second logging request based on association password.
After association password is proved to be successful within effective time, the verification that the second logging request is completed based on association password is executed
The step of, it ensure that the safety that the second logging request is verified.
S23:If the acquisition time of the second logging request is more than effective time, need to re-execute acquisition first using journey
The step of the first logging request that sequence is sent.
Specifically, if the acquisition time of the second logging request is more than effective time, illustrate based on association password pair second
When the verification of logging request has been more than effective time, at this point, the association password fails, it can not be stepped on based on the association password pair second
Record request is verified, it is therefore desirable to which user retransmits the first logging request, and when the first logging request is verified, obtains
Association password is taken, then verifies whether the second program identification in the second logging request is associated with the first program identification, first uses
Whether family login name is associated with second user login name.
Step S21-S23 is then executed within effective time based on association password by the way that effective time is arranged to association password
Complete the verification of the second logging request;The step of obtaining the first logging request more than effective time, is then being re-executed, is being improved
By the safety for being associated with the second logging request of password authentification.
In a specific embodiment, as shown in figure 4, step S40, if on the corresponding terminal device of terminal iidentification,
Two application programs are the affiliate application of the first application program, and the first user login name and second user login name are associated
When, then the verification of the second logging request is completed based on association password, is specifically comprised the following steps:
S41:According to the terminal iidentification in the second logging request, whether there is and terminal mark in polling routine information record sheet
Know corresponding first program identification.
Specifically, if the first application program and the corresponding first server of the second application program and second server belong to same
When one server, for server after obtaining the terminal iidentification that the second logging request carries, it is pre- that clothes can be based on terminal iidentification inquiry
The program information record sheet being first stored in server determines the terminal iidentification in program information record sheet with the presence or absence of with the
Corresponding first program identification of two program identifications, indicate the first application program the first logging request and the second application program the
Two logging requests log on same terminal device.
If the first application program and the corresponding first server of the second application program and second server are not belonging to same
When server, the terminal iidentification stored in the terminal iidentification of acquisition and first server can be compared by second server, if
There are the terminal iidentifications consistent with the terminal iidentification of the second logging request in first server, it is determined that the first application program
Second logging request of the first logging request and the second application program logs on same terminal device.
S42:If in the presence of the first program identification corresponding with terminal iidentification, based on the second program in the second logging request
Mark and the first program identification, inquire pre-set affiliate application information table, determine the second program identification and the first journey
Sequence identifies whether to be associated with.
After determining that the first logging request and the second logging request come from the corresponding terminal device of same terminal iidentification, then
Based on the second program identification that the first program identification carried in the first logging request and the second logging request carry, inquiry is advance
The affiliate application information table of setting, determines whether the second program identification is associated with the first program identification.
It is to be appreciated that total in the first application program and the corresponding first server of the second application program and second server
When with the same server, affiliate application information table stores on that server;It is applied in the first application program and second
When the corresponding first server of program and second server do not share a server, affiliate application information table is stored in pass
Join on server.Affiliate application information table is stored in associated server, it can be to avoid when first server and second
When server is not belonging to the same server, what affiliate application information table needed to be stored on each server asks
Topic, facilitates inquiry and acquisition.
S43:If the second program identification is associated with the first program identification, on the corresponding terminal device of terminal iidentification, really
Fixed second application program is the affiliate application of the first application program.
It, then can be with when inquiring the second program identification based on affiliate application information table and being associated with the first program identification
Determine that corresponding second application program of the second program identification and corresponding first application program of the first program identification have relevance,
Second application program is the affiliate application of the first application program.
S44:Based on the second user login name and the first user login name in the second logging request, inquiry is pre-set
Association user name information table, determines whether second user login name and the first user login name are associated with.
First application program and the corresponding first server of the second application program and second server belong to the same service
When device, association user name information table is stored on corresponding server;First application program and the second application program corresponding
When one server and second server are not belonging to the same server, association user name information table is stored in associated server.
Specifically, after determining the affiliate application that the second application program is the first application program, it is also necessary to which inquiry is pre-
The association user name information table being first arranged, determines whether second user login name and the first user login name are associated with, and avoids difference
User log in affiliate application on same terminal device so that the safety of user's login application program is on the hazard.
Such as on a terminal device, without second user login name and the whether associated verification of the first user login name,
It then will appear user A and logged in the first application program on the terminal device, user B has logged in second on the terminal device and answered
With program, in the case of the second application program and interrelated the first application program, it is close which will receive an association
Code can cause user A in the second application program if user's B input association passwords carry out the verification of the second logging request
Information leakage so that the second application program of user A occurs logging in safety uncertainty, therefore, is determining the second application program
After affiliate application for the first application program, it is also necessary to inquire pre-set association user name information table, determine second
Whether user login name and the first user login name are associated with, and could send association password and give the terminal device, ensure that user logs in
Safety.
S45:If second user login name and the first user login name are associated, complete second based on association password and log in
The verification of request.
Determining second user login name and the association of the first user login name, and the first application program and second applies journey
After the corresponding first server of sequence and second server belong to the same server, server can be based in program information record sheet
Association password complete the second logging request verification.
Determining second user login name and the association of the first user login name, and the first application program and second applies journey
After the corresponding first server of sequence and second server are not belonging to the same server, second server can pass through association service
Device obtains the association password for being stored in first server, is then sent to the corresponding terminal device of terminal iidentification.Terminal device exists
It will be associated with password in effective time and be sent to the verification that second server completes the second logging request.
Pass through the verification process of step S41-S45 so that the second application program can be based on association password completion second and step on
Record the verification of request so that user can still complete second in the case of need not inputting the login password of the second application program
The verification of logging request, facilitates user to log in.
The multiple utility program shares password unlocking method, by determining the second application program with the first application program same
Logged on terminal device, be between each other affiliate application, and the corresponding second user login name of the second application program and
When the corresponding first user login name association of the first application program, the first application program verification by when, based on association password
Realize the login of multiple application programs so that multiple application programs can share a login password.User only needs in terminal
Equipment inputs a login password to a certain application program, can realize and exempt from the associated other applications of the application program
Password login realizes the quick login of multiple utility program.Login password is verified using gesture password, is saved user and is logged in application
The login time of program, it is user-friendly.When sending association password, corresponding effective time is set to association password, is carried
The high safety of user's login application program.
It should be understood that the size of the serial number of each step is not meant that the order of the execution order in above-described embodiment, each process
Execution sequence should be determined by its function and internal logic, the implementation process without coping with the embodiment of the present invention constitutes any limit
It is fixed.
Embodiment 2
Fig. 5 shows that sharing the one-to-one multiple utility program of password unlocking method with multiple utility program in embodiment 1 shares
The functional block diagram of password tripper.As shown in figure 5, it includes the first logging request that the multiple utility program, which shares password tripper,
Acquisition module 10, association password acquisition module 20, the second logging request acquisition module 30 and the second logging request authentication module 40.
Wherein, the first logging request acquisition module 10, association password acquisition module 20, the second logging request acquisition module 30 and second are stepped on
Record corresponding with the shared password unlocking method of multiple utility program in the embodiment step 1 of realization function one of requests verification module 40
Corresponding, to avoid repeating, the present embodiment is not described in detail one by one.
First logging request acquisition module 10, the first logging request for obtaining the transmission of the first application program, first steps on
Record request includes the first user login name, the first login password, the first program identification and terminal iidentification.
It is associated with password acquisition module 20, for being based on the first user login name, the first login password and the first program identification
Carry out authentication, authentication by when, obtain corresponding with the first user login name association password, and will be associated with close
Code is stored in terminal iidentification and the first program identification in program information record sheet.
Second logging request acquisition module 30, the second logging request for obtaining the transmission of the second application program, second steps on
Record request includes second user login name, the second program identification and terminal iidentification.
Second logging request authentication module 40, if in the corresponding terminal device of terminal iidentification, the second application program
For the affiliate application of the first application program, and when the first user login name and associated second user login name, then it is based on
It is associated with the verification that password completes the second logging request.
Preferably, multiple utility program shares password tripper and is additionally operable to configure and first on login password setting interface
Corresponding first login password of user login name, the first login password includes gesture password.
Preferably, it further includes initial password setting unit 51, target pattern which, which shares password tripper,
Position coordinates acquiring unit 52 and the first login password setting unit 53.
Initial password setting unit 51, the initial position for obtaining gesture password in picture bottom.
The position coordinates acquiring unit 52 of target pattern, the position coordinates for obtaining the target pattern in animation layers.
First login password setting unit 53 judges the position coordinates and hand of target pattern for being based on dynamic coordinate layer
Whether the initial position of gesture password meets pre-set matching rule;If meeting, corresponding with the first user login name
One login password is arranged successfully.
Preferably, it further includes effective time setting unit 21 that multiple utility program, which shares password tripper,.
Effective time setting unit 21, the effective time for association password to be arranged.
Preferably, after the second logging request acquisition module 30, multiple utility program shares password tripper and further includes
First effective time judging unit 22 and the second effective time judging unit 23.
First effective time judging unit 22, if for the second logging request the acquisition time within effective time, hold
The step of row completes the verification of the second logging request based on association password.
Second effective time judging unit 23 needs if the acquisition time for the second logging request is more than effective time
Re-execute the step of obtaining the first logging request that the first application program is sent.
Preferably, the second logging request authentication module 40 includes program information record sheet query unit 41, associated application journey
Sequence information table query unit 42, affiliate application determination unit 43, association user name information table query unit 44 and second are stepped on
Land requests verification unit 45.
Program information record sheet query unit 41, for according to the terminal iidentification in the second logging request, polling routine letter
It ceases and whether there is the first program identification corresponding with terminal iidentification in record sheet.
Affiliate application information table query unit 42, if being used in the presence of the first program identification corresponding with terminal iidentification,
Then based on the second program identification and the first program identification in the second logging request, pre-set affiliate application letter is inquired
Table is ceased, determines whether the second program identification is associated with the first program identification.
Affiliate application determination unit 43, if being associated with the first program identification for the second program identification, in terminal
It identifies on corresponding terminal device, determines that the second application program is the affiliate application of the first application program.
Association user name information table query unit 44, for based on the second user login name and the in the second logging request
One user login name inquires pre-set association user name information table, determines that second user login name and the first user log in
Whether name is associated with.
Second log on request authentication unit 45, if associated for second user login name and the first user login name,
The verification of the second logging request is completed based on association password.
Embodiment 3
The present embodiment provides a computer readable storage medium, computer journey is stored on the computer readable storage medium
Sequence realizes that multiple utility program shares password unlocking method in embodiment 1, to avoid weight when the computer program is executed by processor
Multiple, which is not described herein again.Alternatively, realizing that multiple utility program is shared close in embodiment 2 when the computer program is executed by processor
The function of each module/unit in code tripper, to avoid repeating, which is not described herein again.
It is to be appreciated that the computer readable storage medium may include:The computer program code can be carried
Any entity or device, recording medium, USB flash disk, mobile hard disk, magnetic disc, CD, computer storage, read-only memory (ROM,
Read-Only Memory), random access memory (RAM, Random Access Memory), electric carrier signal and telecommunications letter
Number etc..
Embodiment 4
Fig. 6 is the schematic diagram for the computer equipment that one embodiment of the invention provides.As shown in fig. 6, the calculating of the embodiment
Machine equipment 60 includes:Processor 61, memory 62 and it is stored in the calculating that can be run in memory 62 and on processor 61
Machine program 63.Processor 61 realizes that multiple utility program shares password unlock side in above-described embodiment 1 when executing computer program 63
The step of method, such as step S10 to S40 shown in FIG. 1.Alternatively, being realized when the execution computer program 63 of processor 61 above-mentioned each
The function of each module/unit in device embodiment, such as the first logging request acquisition module 10 shown in Fig. 5, association password obtain
The function of module 20, the second logging request acquisition module 30 and the second logging request authentication module 40.
It is apparent to those skilled in the art that for convenience of description and succinctly, only with above-mentioned each work(
Can unit, module division progress for example, in practical application, can be as needed and by above-mentioned function distribution by different
Functional unit, module are completed, i.e., the internal structure of described device are divided into different functional units or module, more than completion
The all or part of function of description.
Embodiment described above is merely illustrative of the technical solution of the present invention, rather than its limitations;Although with reference to aforementioned reality
Applying example, invention is explained in detail, it will be understood by those of ordinary skill in the art that:It still can be to aforementioned each
Technical solution recorded in embodiment is modified or equivalent replacement of some of the technical features;And these are changed
Or replace, the spirit and scope for various embodiments of the present invention technical solution that it does not separate the essence of the corresponding technical solution should all
It is included within protection scope of the present invention.
Claims (10)
1. a kind of multiple utility program shares password unlocking method, which is characterized in that including:
The first logging request of the first application program transmission is obtained, first logging request includes the first user login name, the
One login password, the first program identification and terminal iidentification;
Authentication is carried out based on first user login name, first login password and the first program identification, in identity
When being verified, corresponding with first user login name association password is obtained, and by the association password and the end
End mark and first program identification are stored in program information record sheet;
The second logging request of the second application program transmission is obtained, second logging request includes second user login name, the
Two program identifications and the terminal iidentification;
If on the corresponding terminal device of the terminal iidentification, second application program is the association of first application program
Application program, and when first user login name and the associated second user login name, then it is based on the association password
Complete the verification of second logging request.
2. multiple utility program as described in claim 1 shares password unlocking method, which is characterized in that the acquisition with it is described
After the step of first user login name corresponding association password, the multiple utility program is shared password unlocking method and is also wrapped
It includes:The effective time of the association password is set;
It is described acquisition the second application program send the second logging request the step of after, the multiple utility program shares password
Unlocking method further includes:
If the acquisition time of second logging request within the effective time, executes described based on association password completion institute
The step of stating the verification of the second logging request;
If the acquisition time of second logging request is more than the effective time, needs to re-execute and described obtain first and answer
The step of the first logging request sent with program.
3. multiple utility program as described in claim 1 shares password unlocking method, which is characterized in that the multiple utility program is total
Enjoying password unlocking method further includes:
Configuration the first login password corresponding with first user login name on login password setting interface, described first
Login password includes gesture password.
4. multiple utility program as claimed in claim 3 shares password unlocking method, which is characterized in that the gesture password includes
Picture bottom, dynamic coordinate layer and animation layers;
Configuration first login password corresponding with first user login name on login password setting interface, packet
It includes:
The initial position of the gesture password is obtained in the picture bottom;
Obtain the position coordinates of the target pattern in the animation layers;
Based on the dynamic coordinate layer, judge the position coordinates of the target pattern and the gesture password initial position whether
Meet pre-set matching rule;If meeting, the first login password corresponding with first user login name is arranged to
Work(.
5. multiple utility program as described in claim 1 shares password unlocking method, which is characterized in that if described in the terminal
It identifies on corresponding terminal device, second application program is the affiliate application of first application program, and described
When the first user login name and the associated second user login name, then it is based on the association password and completes second login
The verification of request, including:
According to the terminal iidentification in second logging request, inquires in described program information record sheet and whether there is and the end
End identifies corresponding first program identification;
If in the presence of first program identification corresponding with the terminal iidentification, based on second in second logging request
Program identification and first program identification, inquire pre-set affiliate application information table, determine second program
Whether mark is associated with first program identification;
If second program identification is associated with first program identification, in the corresponding terminal device of the terminal iidentification
On, determine that the second application program is the affiliate application of the first application program;
Based on the second user login name and the first user login name in second logging request, pre-set association is inquired
Username information table, determines whether the second user login name is associated with first user login name;
If the second user login name and first user login name are associated, described second is completed based on association password
The verification of logging request.
6. a kind of multiple utility program shares password tripper, which is characterized in that including:
First logging request acquisition module, the first logging request for obtaining the transmission of the first application program, described first logs in
Request includes the first user login name, the first login password, the first program identification and terminal iidentification;
It is associated with password acquisition module, for being based on first user login name, first login password and the first program mark
Know and carry out authentication, authentication by when, obtain corresponding with first user login name association password, and general
The association password is stored in the terminal iidentification and first program identification in program information record sheet;
Second logging request acquisition module, the second logging request for obtaining the transmission of the second application program, described second logs in
Request includes second user login name, the second program identification and the terminal iidentification;
Second logging request authentication module, if for applying journey in the corresponding terminal device of the terminal iidentification, described second
Sequence is the affiliate application of first application program, and first user login name and the second user log in famous prime minister
When association, then the verification of second logging request is completed based on the association password.
7. multiple utility program as claimed in claim 6 shares password tripper, which is characterized in that the multiple utility program is total
Enjoying password tripper further includes:
Effective time setting unit, the effective time for the association password to be arranged;
First effective time judging unit, if for second logging request the acquisition time within the effective time,
Execute the described the step of verification of second logging request is completed based on association password;
Second effective time judging unit, if the acquisition time for second logging request is more than the effective time,
The step of needing to re-execute the first logging request that the first application program of the acquisition is sent.
8. multiple utility program as claimed in claim 6 shares password tripper, which is characterized in that second logging request
Authentication module, including:
Program information record sheet query unit, for according to the terminal iidentification in second logging request, inquiring described program
It whether there is the first program identification corresponding with the terminal iidentification in information record sheet;
Affiliate application information table query unit, if in the presence of the first program mark corresponding with the terminal iidentification
Know, then based in second logging request the second program identification and first program identification, inquire pre-set pass
Join application information table, determines whether second program identification is associated with first program identification;
Affiliate application determination unit, if being associated with first program identification for second program identification, in institute
It states on the corresponding terminal device of terminal iidentification, determines that the second application program is the affiliate application of the first application program;
Association user name information table query unit, for based on the second user login name and first in second logging request
User login name inquires pre-set association user name information table, determines that the second user login name and described first is used
Whether family login name is associated with;
Second log on request authentication unit, if associated for the second user login name and first user login name,
The verification of second logging request is then completed based on association password.
9. a kind of computer equipment, including memory, processor and it is stored in the memory and can be in the processor
The computer program of upper operation, which is characterized in that the processor realized when executing the computer program as claim 1 to
The step of any one of 5 multiple utility programs share password unlocking method.
10. a kind of computer readable storage medium, the computer-readable recording medium storage has computer program, feature to exist
In realization multiple utility program as described in any one of claim 1 to 5 shares password when the computer program is executed by processor
The step of unlocking method.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810439259.4A CN108647501A (en) | 2018-05-09 | 2018-05-09 | Multiple utility program shares password unlocking method, device, equipment and storage medium |
PCT/CN2018/094413 WO2019214030A1 (en) | 2018-05-09 | 2018-07-04 | Method and apparatus for unlocking multiple applications using shared password, device, and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810439259.4A CN108647501A (en) | 2018-05-09 | 2018-05-09 | Multiple utility program shares password unlocking method, device, equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108647501A true CN108647501A (en) | 2018-10-12 |
Family
ID=63753792
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810439259.4A Pending CN108647501A (en) | 2018-05-09 | 2018-05-09 | Multiple utility program shares password unlocking method, device, equipment and storage medium |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN108647501A (en) |
WO (1) | WO2019214030A1 (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110532742A (en) * | 2019-07-09 | 2019-12-03 | 中国平安财产保险股份有限公司 | Identity identifying method, device, key devices and storage medium |
CN110738499A (en) * | 2019-09-03 | 2020-01-31 | 平安科技(深圳)有限公司 | User identity authentication method and device, computer equipment and storage medium |
CN111241499A (en) * | 2020-01-07 | 2020-06-05 | 腾讯科技(深圳)有限公司 | Application program login method, device, terminal and storage medium |
CN111241527A (en) * | 2020-01-03 | 2020-06-05 | 北京奇艺世纪科技有限公司 | Silent login method and device, electronic equipment and storage medium |
CN112235246A (en) * | 2020-09-14 | 2021-01-15 | 上海硬通网络科技有限公司 | Cross-terminal account login method and device and electronic equipment |
CN113836504A (en) * | 2021-08-25 | 2021-12-24 | 北京新伟佳业科技有限公司 | Authority management authentication method and system applied to multifunctional integrated office system |
CN115242511A (en) * | 2022-07-22 | 2022-10-25 | 成都中科大旗软件股份有限公司 | Multi-environment application management platform and management method |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105072133A (en) * | 2015-08-28 | 2015-11-18 | 北京金山安全软件有限公司 | Login method and device for application program |
CN106209726A (en) * | 2015-04-30 | 2016-12-07 | 中兴通讯股份有限公司 | A kind of Mobile solution single-point logging method and device |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020116648A1 (en) * | 2000-12-14 | 2002-08-22 | Ibm Corporation | Method and apparatus for centralized storing and retrieving user password using LDAP |
CN103065080B (en) * | 2012-12-21 | 2016-01-20 | 广东欧珀移动通信有限公司 | A kind of application program login method and device |
CN105227302B (en) * | 2015-10-28 | 2019-06-14 | Oppo广东移动通信有限公司 | The sharing method of password and the shared system of password |
CN106330918A (en) * | 2016-08-26 | 2017-01-11 | 杭州迪普科技有限公司 | Multi-system login method and device |
-
2018
- 2018-05-09 CN CN201810439259.4A patent/CN108647501A/en active Pending
- 2018-07-04 WO PCT/CN2018/094413 patent/WO2019214030A1/en active Application Filing
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106209726A (en) * | 2015-04-30 | 2016-12-07 | 中兴通讯股份有限公司 | A kind of Mobile solution single-point logging method and device |
CN105072133A (en) * | 2015-08-28 | 2015-11-18 | 北京金山安全软件有限公司 | Login method and device for application program |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110532742A (en) * | 2019-07-09 | 2019-12-03 | 中国平安财产保险股份有限公司 | Identity identifying method, device, key devices and storage medium |
CN110532742B (en) * | 2019-07-09 | 2023-04-14 | 中国平安财产保险股份有限公司 | Identity authentication method, identity authentication device, secret key equipment and storage medium |
CN110738499A (en) * | 2019-09-03 | 2020-01-31 | 平安科技(深圳)有限公司 | User identity authentication method and device, computer equipment and storage medium |
CN111241527A (en) * | 2020-01-03 | 2020-06-05 | 北京奇艺世纪科技有限公司 | Silent login method and device, electronic equipment and storage medium |
CN111241499A (en) * | 2020-01-07 | 2020-06-05 | 腾讯科技(深圳)有限公司 | Application program login method, device, terminal and storage medium |
CN111241499B (en) * | 2020-01-07 | 2023-05-05 | 腾讯科技(深圳)有限公司 | Application program login method, device, terminal and storage medium |
CN112235246A (en) * | 2020-09-14 | 2021-01-15 | 上海硬通网络科技有限公司 | Cross-terminal account login method and device and electronic equipment |
CN113836504A (en) * | 2021-08-25 | 2021-12-24 | 北京新伟佳业科技有限公司 | Authority management authentication method and system applied to multifunctional integrated office system |
CN113836504B (en) * | 2021-08-25 | 2024-02-06 | 北京新伟佳业科技有限公司 | Authority management authentication method and system applied to multifunctional integrated office system |
CN115242511A (en) * | 2022-07-22 | 2022-10-25 | 成都中科大旗软件股份有限公司 | Multi-environment application management platform and management method |
CN115242511B (en) * | 2022-07-22 | 2024-04-12 | 成都中科大旗软件股份有限公司 | Multi-environment application management platform and management method |
Also Published As
Publication number | Publication date |
---|---|
WO2019214030A1 (en) | 2019-11-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108647501A (en) | Multiple utility program shares password unlocking method, device, equipment and storage medium | |
US11003760B2 (en) | User account recovery techniques using secret sharing scheme with trusted referee | |
EP2783319B1 (en) | Providing verification of user identification information | |
CN108183924A (en) | A kind of login validation method and terminal device | |
CN104753894B (en) | A kind of data processing method, apparatus and system | |
CN103139182B (en) | A kind of method that user of permission accesses, client, server and system | |
CN109784031B (en) | Account identity verification processing method and device | |
CN102761549A (en) | Processing method and system of resource sharing and service platforms | |
US20120297470A1 (en) | Access authentication method for multiple devices and platforms | |
CN104348612A (en) | Third-party website login method based on mobile terminal and mobile terminal | |
CN108256303A (en) | Electronic device, auth method and storage medium | |
CN105992204A (en) | Access authentication method of applications of mobile intelligent terminal and device | |
CN105337974A (en) | Account authorization method, account login method, account authorization device and client end | |
CN104184709A (en) | Verification method, device, server, service data center and system | |
CN106130998A (en) | A kind of identifying code transmission method and device | |
CN104579667A (en) | Account password management method, device and system | |
CN105897663A (en) | Method for determining access authority, device and equipment | |
CN110324344A (en) | The method and device of account information certification | |
CN104601582A (en) | File transfer method, device and system | |
CN107707356A (en) | A kind of mobile device secure binding method and application system based on Quick Response Code identification | |
CN109245897A (en) | A kind of node authentication method and device based on noninteractive zero-knowledge proof | |
CN110120928A (en) | A kind of identity authentication method, device, server and computer-readable medium | |
CN107241361A (en) | A kind of unified identity authentication method based on cloud environment | |
CN105162774A (en) | Virtual machine login method and device used for terminal | |
CN102685122A (en) | Software protection method based on cloud server |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181012 |