CN108647501A - Multiple utility program shares password unlocking method, device, equipment and storage medium - Google Patents

Multiple utility program shares password unlocking method, device, equipment and storage medium Download PDF

Info

Publication number
CN108647501A
CN108647501A CN201810439259.4A CN201810439259A CN108647501A CN 108647501 A CN108647501 A CN 108647501A CN 201810439259 A CN201810439259 A CN 201810439259A CN 108647501 A CN108647501 A CN 108647501A
Authority
CN
China
Prior art keywords
password
program
logging request
login name
association
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810439259.4A
Other languages
Chinese (zh)
Inventor
白益仲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN201810439259.4A priority Critical patent/CN108647501A/en
Priority to PCT/CN2018/094413 priority patent/WO2019214030A1/en
Publication of CN108647501A publication Critical patent/CN108647501A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/41User authentication where a single sign-on provides access to a plurality of computers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • User Interface Of Digital Computer (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The present invention discloses a kind of multiple utility program and shares password unlocking method, device, equipment and storage medium.This method includes:Authentication is carried out based on the first user login name, the first login password and the first program identification, when authentication passes through, association password corresponding with the first user login name is obtained, and association password and terminal iidentification and the first program identification are stored in program information record sheet;The second logging request of the second application program transmission is obtained, the second logging request includes second user login name, the second program identification and terminal iidentification;If on the corresponding terminal device of terminal iidentification, the second application program is the affiliate application of the first application program, and when the first user login name and associated second user login name, then the verification of the second logging request is completed based on association password.This method can realize the quick login of application program, save user and log in the login time of multiple utility program, while ensure that the safety of user's login application program.

Description

Multiple utility program shares password unlocking method, device, equipment and storage medium
Technical field
The present invention relates to field of mobile terminals more particularly to a kind of multiple utility program to share password unlocking method, device, sets Standby and storage medium.
Background technology
Existing application program unlock is only capable of realizing the login of an application program or platform, when user is answered using multiple Different passwords is carried out to different application programs to be arranged, the password of setting can be caused excessive, user occur with needs when program Note mixes the case where password, so that user can not quickly log in corresponding application program.When user is to multiple application programs When same login password is arranged, if the login password leakage of an application program, the login password of other applications also can Leakage, there are security risks.Meanwhile when second application program logs in, gesture password solution locked application may be used, this When, if gesture password setting is fairly simple so that in gesture password input process, gesture motion reveals the gesture password, So that the gesture password safety is not high;If gesture password setting it is more complicated when, user's operation complexity will certainly be increased, It causes inconvenience to the user.
Invention content
A kind of multiple utility program of offer of the embodiment of the present invention shares password unlocking method, device, equipment and storage medium, with It solves the problems, such as that occurring login password note when different login passwords are arranged to multiple application programs in user mixes, while solving to log in The problem that password is complicated, safety is not high.
In a first aspect, the embodiment of the present invention provides a kind of shared password unlocking method of multiple utility program, including:
The first logging request of the first application program transmission is obtained, first logging request is logged in including the first user Name, the first login password, the first program identification and terminal iidentification;
Authentication is carried out based on first user login name, first login password and the first program identification, Authentication by when, obtain corresponding with first user login name association password, and by the association password and institute It states terminal iidentification and first program identification is stored in program information record sheet;
The second logging request of the second application program transmission is obtained, second logging request includes that second user logs in Name, the second program identification and the terminal iidentification;
If on the corresponding terminal device of the terminal iidentification, second application program is first application program Affiliate application, and when first user login name and the associated second user login name, then it is based on the association Password completes the verification of second logging request.
Second aspect, the embodiment of the present invention provide a kind of shared password tripper of multiple utility program, including:
First logging request acquisition module, the first logging request for obtaining the transmission of the first application program, described first Logging request includes the first user login name, the first login password, the first program identification and terminal iidentification;
It is associated with password acquisition module, for being based on first user login name, first login password and the first journey Sequence mark carries out authentication, authentication by when, obtain corresponding with first user login name association password, And the association password and the terminal iidentification and first program identification are stored in program information record sheet;
Second logging request acquisition module, the second logging request for obtaining the transmission of the second application program, described second Logging request includes second user login name, the second program identification and the terminal iidentification;
Second logging request authentication module, if for being answered in the corresponding terminal device of the terminal iidentification, described second It is the affiliate application of first application program with program, and first user login name and the second user log in When name is associated, then the verification of second logging request is completed based on the association password.
The third aspect, the embodiment of the present invention provide a kind of computer equipment, including memory, processor and are stored in institute The computer program that can be run in memory and on the processor is stated, the processor executes real when the computer program The step of existing multiple utility program shares password unlocking method.
Fourth aspect, the embodiment of the present invention provide a kind of computer readable storage medium, the computer-readable storage medium Matter is stored with computer program, and the computer program realizes that the multiple utility program shares password unlock when being executed by processor The step of method.
Multiple utility program provided in an embodiment of the present invention shares password unlocking method, device, equipment and storage medium, passes through It determines that the second application program is logged in the first application program on same terminal device, is between each other affiliate application, and And the second corresponding second user login name of application program and when the corresponding first user login name association of the first application program, First application program verification by when, the logins of multiple application programs is realized based on association password so that multiple application programs can To share a login password.User only needs to input a login password to a certain application program in terminal device, is answered with this It can be realized with the associated other applications of program and exempt from password login, realized the quick login of application program, save The login time of user's login application program, it is user-friendly, moreover, also may be used using association password login affiliate application To ensure the safety of user's login application program.
Description of the drawings
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below by institute in the description to the embodiment of the present invention Attached drawing to be used is needed to be briefly described, it should be apparent that, the accompanying drawings in the following description is only some implementations of the present invention Example, for those of ordinary skill in the art, without having to pay creative labor, can also be according to these attached drawings Obtain other attached drawings.
Fig. 1 is the flow chart that multiple utility program shares password unlocking method in the embodiment of the present invention 1.
Fig. 2 is another flow chart that multiple utility program shares password unlocking method in the embodiment of the present invention 1.
Fig. 3 is the another flow chart that multiple utility program shares password unlocking method in the embodiment of the present invention 1.
Fig. 4 is a particular flow sheet of step S40 in Fig. 1.
Fig. 5 is the functional block diagram that multiple utility program shares password tripper in the embodiment of the present invention 2;
Fig. 6 is a schematic diagram of 4 Computer equipment of the embodiment of the present invention.
Specific implementation mode
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation describes, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair Embodiment in bright, the every other implementation that those of ordinary skill in the art are obtained without creative efforts Example, shall fall within the protection scope of the present invention.
Embodiment 1
Fig. 1 shows the flow chart of the shared password unlocking method of multiple utility program in the present embodiment.The multiple utility program is shared Password unlocking method is applied when logging in multiple affiliate applications on same terminal device, and multiple affiliate applications can make Login authentication process is completed with a login password, is tested to realize that affiliate application is based on a login password completion login The purpose of card.The multiple utility program is shared password unlocking method and be can be applicable on the terminal devices such as computer, smart mobile phone and tablet, For being logged in by shared password to multiple affiliate applications on same terminal device.As shown in Figure 1, applying journey more Sequence is shared password unlocking method and is included the following steps:
S10:The first logging request of the first application program transmission is obtained, the first logging request is logged in including the first user Name, the first login password, the first program identification and terminal iidentification.
First application program is mounted in an application program on terminal device.First logging request refers to login first The request of application program.The first of the transmission of the first application program is being obtained by the first server that network is connected with terminal device When logging request, which also carries the first user login name, the first login password, the first program identification and terminal mark Know.Wherein, first server refers to the corresponding server of the first application program.First user login name refers to logging in the first application The user login name of program.First login password refers to logging in the corresponding with the first user login name of the first application program to step on Record password.First program identification refers to the corresponding mark of the first application program for identification, which can be unique Identify the first application program.Terminal iidentification refers to the mark for the terminal device for logging in the first application program, the terminal iidentification packet Include but be not limited to IMEI code (International MobileEquipment Identity, the world mobile end of mobile terminal End equipment identity) and SN (Serial Number, sequence number).
Wherein, IMEI code is stored in the terminal devices such as smart mobile phone and tablet, and a mobile terminal device corresponds to one IMEI code, the IMEI code can be used for unique identification mobile terminal device.SN codes are product IDs, for verifying the legal of product The product of identity, a set of legal copy only corresponds to a set product sequence number.When user downloads application program on the mobile terminal device, answer The corresponding IME I codes of mobile terminal device and SN codes can be obtained with the corresponding first server of program.
S20:Authentication is carried out based on the first user login name, the first login password and the first program identification, in identity When being verified, association password corresponding with the first user login name is obtained, and will association password and terminal iidentification and first Program identification is stored in program information record sheet.
Specifically, when user is when logging in the first application program, first server corresponding with the first application program is based on First user login name, the first login password and the first program identification carry out carrying out authentication to user, if the first user steps on When recording name, the first login password and the first program identification consistent with the information that first server stores, then to the identity of the user It is verified.For example, first server can first determine that sending the first of first logging request answers based on the first program identification With program, then, in the first application program of inquiry all user informations whether there is steps on the first user login name and first Record the user information of code matches, and if it exists, then authentication passes through.
User authentication by when, corresponding with the first application program first server obtains one and is used with first The corresponding association password of family login name.Wherein, association password refers to that the first application program and other affiliate applications can be with Share the password that the same password is logged in.Affiliate application refers to pre-stored associated with the first application program Application program, the affiliate application are defined by developer, can be the different application programs developed under same company. For example, vehicle insurance APP, the life insurance APP and financing APP etc. of the exploitation of safety group belong to the application program that is mutually related, if this implementation The first application program in example is vehicle insurance APP, then its affiliate application is life insurance APP, financing APP or safety group are developed Other APP.Association password specifically refers to the first application program and after authentication passes through, installed on same terminal device The password that can share of affiliate application.
The association password is the password that server generates at random.After first server obtains association password, first Server will be associated with password and is stored in program information record sheet with terminal iidentification and the first program identification.Wherein, program information Record sheet is the table for records application program information, including the download situation of records application program be associated with password.Record is answered Situations such as with the download situation of program including the first program identification, terminal iidentification and the download time of records application program.
The association password, terminal iidentification and the first program identification of first application program are stored in program information record sheet In, convenient for subsequently identifying whether the second application program is the affiliate application of the first application program and completes the second application program The second logging request verification.
S30:The second logging request of the second application program transmission is obtained, the second logging request includes that second user logs in Name, the second program identification and terminal iidentification.
Second application program refer to logged on the corresponding terminal device of same terminal iidentification be not belonging to first apply journey The application program of sequence.Second logging request refers to the logging request of the second application program.With the second application program associated second Server obtains the second logging request that the second application program is sent, which carries second user login name, second Program identification and terminal iidentification.Wherein, second server refers to the corresponding server of the second application program.Second user login name It refer to the corresponding user login name of the second application program.Second program identification refers to the corresponding program identification of the second application program, For the second application program of unique identification.
In the present embodiment, if the first application program and the second application program are same group, enterprise in exploitation or open The affiliate application of originator exploitation, and when the first application program and the second application program share a server, first service Device and second server are same server.If the first application program and the second application program are in exploitation, although same collection The affiliate application of group, enterprise or developer's exploitation, but the first application program and the second application program do not share one A server then needs one associated server of setting to realize the information exchange between first server and second server.Its In, associated server refers to the server for referring to information interaction for realizing first server and second server, association Server is connected with first server and second server.
S40:If on the corresponding terminal device of terminal iidentification, the second application program is the associated application of the first application program Program, and when the first user login name and associated second user login name, be then based on association password and complete the second logging request Verification.
Second server is then inquired based on the second program identification in the second logging request when obtaining the second logging request Pre-stored affiliate application information table, with ensure the second application program whether be the first application program associated application journey Sequence.Wherein, affiliate application information table refers to that whether there is between the first application program and the second application program for recording The table of incidence relation.In affiliate application information table, each group of affiliate application information includes that there are incidence relations At least two program identifications.
In the present embodiment, when first server and second server are the same server, affiliate application information Table is stored in the server;When first server and second server are not belonging to the same server, then associated application journey Sequence table is stored in associated server.Affiliate application information table is stored in associated server, convenient for associated application Data in program information table are managed concentratedly, and a association of storage in the corresponding server of each application program is avoided to answer Use program information table.According to affiliate application information table, it may be determined that the first program identification and the second program identification are corresponding Whether the first application program and the second application program are affiliate application.
If it is determined that when the second application program is the affiliate application of the first application program, then pre-set association is based on Whether username information table inquiry user login name is associated with second user login name, is determining the first user login name and second When user login name is associated, then it will be associated with password in program information record sheet and be sent to the corresponding terminal device of terminal iidentification. Association user name information table refers to the table that whether there is incidence relation for recording user login name.If any user is in advance in vehicle It, need to be relevant by institute when being logged in using respective user login name and login password on dangerous APP, life insurance APP and financing APP The corresponding user login name of application program and login password are stored on association user name information table, to obtain the second login After the second user login name of request, association user name information table is inquired according to the second user login name, to determine that second uses Whether family login name and the first user login name are associated.
In the present embodiment, when first server and second server are the same server, association user name information table It is stored in the server;When first server and second server are not belonging to the same server, then affiliate application Table is stored in associated server.Association user name information table is stored in associated server, convenient for believing association user name Data in breath table are managed concentratedly, avoid storing a association user name letter in the corresponding server of each application program Cease table.Judge that the relevance of the first user login name and second user login name can determine the login identity of user, avoids not The second application program and the first application program are logged in same station terminal equipment with user, the association password can be also obtained, ensure The login safety and information security of user.
Further, the shared password unlocking method of the multiple utility program further includes:The effective time of association password is set.Have The effect time refers to be associated with after password is sent to the corresponding terminal device of terminal iidentification, for verify be associated with password it is effective when Between, the effective time of setting association password can further ensure the information security of user.Within defined effective time, the After the corresponding server of two application programs gets the association password that the corresponding terminal device of terminal iidentification is sent, stepped on by second Record the verification of request.Association password is sent to the corresponding terminal device of terminal iidentification, it is close convenient for association of the user based on acquisition Code carries out the login of the second application program, simplifies the process of verification, ensures that user logs in the safety of the second application program.
After the second logging request that second server obtains the second application program, second server need to be logged in second and be asked It asks the terminal iidentification of carrying to be compared with the program information record sheet being stored in first server, judges the second application program Terminal iidentification terminal iidentification whether corresponding with the first application program it is consistent, if unanimously, second server by second log in Ask the second program identification carried and second user login name and affiliate application information table and association user name information table Inquiry comparison is carried out, when determining that the second application program is the affiliate application of the first application program, and second user login name When associated with the first user login name, second server is sent to the corresponding terminal device of terminal iidentification by password is associated with.It can To understand ground, when first server belongs to same server with second server, then the server will be stored in program information Association password in record sheet is sent to the corresponding terminal device of terminal iidentification.When first server and second server are not belonging to When the same server, then associated server obtains the association password stored in first server, and is sent to second server. When sending association password to second server, which can all have a corresponding effective time, therefore, be associated with sending When password, it can will also be sent to second server effective time, second server gets terminal within defined effective time The association password that equipment is sent, then second logging request be verified.
By judging whether the second application program is the affiliate application of the first application program, while judging second user Whether login name and the first user login name are associated with, when determining that the second application program is the affiliate application of the first application program And when determining second user login name and associated the first user login name, then association of second logging request based on acquisition is close Code carries out the verification of the second logging request.Specifically, due to being pre-configured with the effective time of association password, and password will be associated with After being sent to the corresponding terminal device of terminal iidentification, if user inputs second user on affiliate application in preset time Login name and the association password, you can complete the verification of corresponding second logging request of second user login name.
The shared password unlocking method of the multiple utility program, which realizes multiple application programs only, needs login password and an association Password can make user complete the login for the multiple application programs installed on same terminal device, solve multiple using journey The problem of multiple login passwords are easy to obscure is arranged in sequence.Meanwhile solve user to multiple application programs setting similarly log in it is close When code, if the login password leakage of an application program, the security risk that the login password of other applications can also be revealed are asked Topic, ensure that the safety of user's login application program.
In a specific embodiment, the shared password unlocking method of multiple utility program further includes:In login password, circle is set The first login password corresponding with the first user login name is configured on face, the first login password includes gesture password.
Specifically, login password setting interface refers to the interface for login password to be arranged.If user does not register first When the first user login name of application program and the first login password, the first application program may require that user enters login password and sets Interface is set, user registers the first user login name on login password setting interface, while being arranged and the first user login name phase Corresponding first login password.
First login password includes gesture password, and the setting rule of gesture password refers to being based on a preset specific pattern Whether the coordinate of case, the coordinate for verifying target pattern meet a kind of verification mode of pre-set matching rule.Wherein, target Pattern refers to the pattern for unlocking the first login password of user's selection.Pre-set matching rule refers to for verifying mesh The whether matched rule of position coordinates and initial position for case of marking on a map.
Gesture password in the present embodiment includes picture bottom, dynamic coordinate layer and animation layers.
Specifically, which specifically includes three layers, and first layer is picture bottom, and the second layer is dynamic coordinate layer, Third layer is animation layers.Wherein, picture bottom refers to user when gesture password is arranged in gesture password setting interface, is selected in advance The picture layer containing specific pattern taken.The specific pattern includes the pattern of special shape, such as button and plate etc., is used for Help user's memory.Dynamic coordinate layer refers to the coordinate layer of the position for positioning third layer animation layers, the dynamic coordinate layer Coordinate be moveable coordinate.Animation layers refer to the figure layer where the target pattern that user chooses, and animation layers include circle Shape profile and character pattern etc..Wherein, each character pattern is all located in a circular contour, and the character pattern of the animation layers exists It can be positioned by dynamic coordinate layer by full frame dragging, the position coordinates of circular contour in terminal device screen.
In a specific embodiment, as shown in Fig. 2, being configured and the first user login name on login password setting interface Corresponding first login password, specifically comprises the following steps:
S51:The initial position of gesture password is obtained in picture bottom.
Initial position refers to the position of the specific pattern selected on picture bottom.When gesture password is arranged, Ying Xian Picture bottom arbitrarily one specific pattern of selection, and determine the initial position of the specific pattern.
Specifically, picture bottom determine the initial position of gesture password be by picture bottom in the specific pattern chosen Location determination.In order to more easily determine the position of specific pattern, each specific pattern of picture bottom can be all arranged One specific circular contour, the initial position of gesture password is determined by the shape and radius size of circular contour.Circular wheel Exterior feature more preferably can more completely reflect the size of specific pattern compared to other shapes of profile, it is easier to be determined by the center of circle special Determine the position of pattern.
S52:Obtain the position coordinates of the target pattern in animation layers.
Specifically, after the initial position of gesture password is determined, it is also necessary to choose target pattern and true in animation layers Set the goal the position coordinates of pattern.The target pattern is the pattern that user selects according to personal like.Wherein, the position of target pattern Setting coordinate can be obtained by dynamic coordinate layer.After user has chosen target pattern on animation layers, dynamic coordinate layer then can The position of target pattern is determined based on rectangular coordinate system.
The character pattern of animation layers includes but not limited to Chinese word figure, Chinese small letter number, Arabic numerals, life The character patterns such as Xiao and Chinese era (ten the Heavenly Stems, twelve earthly branches).Specifically, the position coordinates of target character pattern are also to pass through What its corresponding circular contour determined.
S53:Whether the initial position based on dynamic coordinate layer, the position coordinates and gesture password that judge target pattern meets Pre-set matching rule;If meeting, the first login password corresponding with the first user login name is arranged successfully.
Specifically, it needs to carry out test verification to the target pattern of selection after the initial position for determining gesture password.It should Test verification refers to the process of carrying out test verification to the position coordinates and initial position of the target pattern on animation layers.If symbol Matching rule is closed, then is proved to be successful, corresponding first login password of the first user login name is arranged successfully.The verification of matching rule Standard is specially:When the center of circle of a certain specific pattern of the central coordinate of circle and initial position of the corresponding circular contour of target pattern is sat When subject distance is less than or equal to preset value (0.15 times of such as pre-set radius), then it is verified.Wherein, pre-set radius refers to circular wheel Wide radius size, it is possible to understand that ground, 0.15 times can also be other concrete numerical values.
Association password in the present embodiment can also refer to gesture password, which is to be randomly assigned one every time in system The pattern consistent with target pattern chosen in the character pattern of fixed number amount.When user is when logging in the second application program, service Device can be to sending a certain number of character patterns on the corresponding terminal device of terminal iidentification, user needs on the terminal device more Pattern consistent with target pattern is chosen in a character pattern, then moves the target pattern so that the position coordinates of target pattern The validation criteria for meeting pre-set matching rule with initial position then second is answered when the validation criteria for meeting matching rule It is proved to be successful with corresponding second logging request of program.
Further, in the target pattern on mobile animation layers, target pattern cannot be moved individually, therefore, It when verifying target pattern, needs integrally to move animation layers, then be sat by calculating the position of target pattern Whether the coordinate of mark and initial position meets the validation criteria of matching rule, if meeting the validation criteria of matching rule, second Corresponding second logging request of application program is proved to be successful.Target figure is determined since animation layers are necessarily dependent upon dynamic coordinate layer The position coordinates of case, and only there are one coordinate systems for dynamic coordinate layer, therefore, in mobile target pattern, corresponding animation layers It moves integrally, the convenient position coordinates that target pattern is obtained based on dynamic coordinate layer, the position coordinates for verifying target pattern Whether the validation criteria of matching rule is met.
By judging whether the position coordinates of target pattern and the initial position of gesture password meet pre-set matching Rule realizes the setting of login password, if meeting matching rule, login application program passes through.It is realized to application using the program The unlock of program.The verification that gesture password is completed using target pattern reduces the operation complexity of application program unlock.Together When, due to the uncertainty of target pattern position, improve the safety of gesture password unlock.
In a specific embodiment, as shown in figure 3, in step S20, pass corresponding with the first user login name is obtained After the step of joining password, it further includes following steps which, which shares password unlocking method,:
S21:The effective time of association password is set.
If the first application program and the corresponding first server of the second application program and second server belong to the same clothes When business device, server can be arranged one after obtaining association password corresponding with the first user login name to the association password Effective time sends the time for being associated with password to server whether within effective time for verifying terminal device.
If the first application program and the corresponding first server of the second application program and second server are not belonging to same When server, then the association password can be arranged after obtaining association password one effective time for verifying end in associated server End equipment send association password to server time whether within effective time.
Association password in the present embodiment is provided at least 6 characters, which may include Arabic numerals and/or English The character string that word mother's random combine is formed.Effective time is set as 30s, is based on this set, due to 6 Arabic numerals and The exhaustive number of English alphabet is in 30s impossible exhaustive complete, therefore, sets association password at least 6 English Letter and/or the character string of Arabic numerals combination, and effective time is arranged to association password, association password can be increased and broken The difficulty of solution improves the safety of association password authentification.
In step S30, after the step of obtaining the second logging request that the second application program is sent, the multiple utility program is total It further includes following steps to enjoy password unlocking method:
S22:It is stepped on based on association password completion second if the acquisition time of the second logging request within effective time, executes The step of recording the verification of request.
When the first application program and the corresponding first server of the second application program and second server belong to the same clothes When business device, the terminal device of the second logging request is sent to corresponding service within effective time, by the association password got When device, server can execute the step of completing the verification of the second log on request based on association password.
When the first application program and the corresponding first server of the second application program and second server be not belonging to it is same When server, the association password got from first server and effective time can be sent to the second login and asked by associated server The terminal device of the terminal iidentification of carrying is sought, while terminal iidentification and effective time are sent to second service by associated server Device.Second server is within defined effective time, after getting the association password that the corresponding terminal device of terminal iidentification is sent, Second server executes the step of completing the verification of the second logging request based on association password.
After association password is proved to be successful within effective time, the verification that the second logging request is completed based on association password is executed The step of, it ensure that the safety that the second logging request is verified.
S23:If the acquisition time of the second logging request is more than effective time, need to re-execute acquisition first using journey The step of the first logging request that sequence is sent.
Specifically, if the acquisition time of the second logging request is more than effective time, illustrate based on association password pair second When the verification of logging request has been more than effective time, at this point, the association password fails, it can not be stepped on based on the association password pair second Record request is verified, it is therefore desirable to which user retransmits the first logging request, and when the first logging request is verified, obtains Association password is taken, then verifies whether the second program identification in the second logging request is associated with the first program identification, first uses Whether family login name is associated with second user login name.
Step S21-S23 is then executed within effective time based on association password by the way that effective time is arranged to association password Complete the verification of the second logging request;The step of obtaining the first logging request more than effective time, is then being re-executed, is being improved By the safety for being associated with the second logging request of password authentification.
In a specific embodiment, as shown in figure 4, step S40, if on the corresponding terminal device of terminal iidentification, Two application programs are the affiliate application of the first application program, and the first user login name and second user login name are associated When, then the verification of the second logging request is completed based on association password, is specifically comprised the following steps:
S41:According to the terminal iidentification in the second logging request, whether there is and terminal mark in polling routine information record sheet Know corresponding first program identification.
Specifically, if the first application program and the corresponding first server of the second application program and second server belong to same When one server, for server after obtaining the terminal iidentification that the second logging request carries, it is pre- that clothes can be based on terminal iidentification inquiry The program information record sheet being first stored in server determines the terminal iidentification in program information record sheet with the presence or absence of with the Corresponding first program identification of two program identifications, indicate the first application program the first logging request and the second application program the Two logging requests log on same terminal device.
If the first application program and the corresponding first server of the second application program and second server are not belonging to same When server, the terminal iidentification stored in the terminal iidentification of acquisition and first server can be compared by second server, if There are the terminal iidentifications consistent with the terminal iidentification of the second logging request in first server, it is determined that the first application program Second logging request of the first logging request and the second application program logs on same terminal device.
S42:If in the presence of the first program identification corresponding with terminal iidentification, based on the second program in the second logging request Mark and the first program identification, inquire pre-set affiliate application information table, determine the second program identification and the first journey Sequence identifies whether to be associated with.
After determining that the first logging request and the second logging request come from the corresponding terminal device of same terminal iidentification, then Based on the second program identification that the first program identification carried in the first logging request and the second logging request carry, inquiry is advance The affiliate application information table of setting, determines whether the second program identification is associated with the first program identification.
It is to be appreciated that total in the first application program and the corresponding first server of the second application program and second server When with the same server, affiliate application information table stores on that server;It is applied in the first application program and second When the corresponding first server of program and second server do not share a server, affiliate application information table is stored in pass Join on server.Affiliate application information table is stored in associated server, it can be to avoid when first server and second When server is not belonging to the same server, what affiliate application information table needed to be stored on each server asks Topic, facilitates inquiry and acquisition.
S43:If the second program identification is associated with the first program identification, on the corresponding terminal device of terminal iidentification, really Fixed second application program is the affiliate application of the first application program.
It, then can be with when inquiring the second program identification based on affiliate application information table and being associated with the first program identification Determine that corresponding second application program of the second program identification and corresponding first application program of the first program identification have relevance, Second application program is the affiliate application of the first application program.
S44:Based on the second user login name and the first user login name in the second logging request, inquiry is pre-set Association user name information table, determines whether second user login name and the first user login name are associated with.
First application program and the corresponding first server of the second application program and second server belong to the same service When device, association user name information table is stored on corresponding server;First application program and the second application program corresponding When one server and second server are not belonging to the same server, association user name information table is stored in associated server.
Specifically, after determining the affiliate application that the second application program is the first application program, it is also necessary to which inquiry is pre- The association user name information table being first arranged, determines whether second user login name and the first user login name are associated with, and avoids difference User log in affiliate application on same terminal device so that the safety of user's login application program is on the hazard.
Such as on a terminal device, without second user login name and the whether associated verification of the first user login name, It then will appear user A and logged in the first application program on the terminal device, user B has logged in second on the terminal device and answered With program, in the case of the second application program and interrelated the first application program, it is close which will receive an association Code can cause user A in the second application program if user's B input association passwords carry out the verification of the second logging request Information leakage so that the second application program of user A occurs logging in safety uncertainty, therefore, is determining the second application program After affiliate application for the first application program, it is also necessary to inquire pre-set association user name information table, determine second Whether user login name and the first user login name are associated with, and could send association password and give the terminal device, ensure that user logs in Safety.
S45:If second user login name and the first user login name are associated, complete second based on association password and log in The verification of request.
Determining second user login name and the association of the first user login name, and the first application program and second applies journey After the corresponding first server of sequence and second server belong to the same server, server can be based in program information record sheet Association password complete the second logging request verification.
Determining second user login name and the association of the first user login name, and the first application program and second applies journey After the corresponding first server of sequence and second server are not belonging to the same server, second server can pass through association service Device obtains the association password for being stored in first server, is then sent to the corresponding terminal device of terminal iidentification.Terminal device exists It will be associated with password in effective time and be sent to the verification that second server completes the second logging request.
Pass through the verification process of step S41-S45 so that the second application program can be based on association password completion second and step on Record the verification of request so that user can still complete second in the case of need not inputting the login password of the second application program The verification of logging request, facilitates user to log in.
The multiple utility program shares password unlocking method, by determining the second application program with the first application program same Logged on terminal device, be between each other affiliate application, and the corresponding second user login name of the second application program and When the corresponding first user login name association of the first application program, the first application program verification by when, based on association password Realize the login of multiple application programs so that multiple application programs can share a login password.User only needs in terminal Equipment inputs a login password to a certain application program, can realize and exempt from the associated other applications of the application program Password login realizes the quick login of multiple utility program.Login password is verified using gesture password, is saved user and is logged in application The login time of program, it is user-friendly.When sending association password, corresponding effective time is set to association password, is carried The high safety of user's login application program.
It should be understood that the size of the serial number of each step is not meant that the order of the execution order in above-described embodiment, each process Execution sequence should be determined by its function and internal logic, the implementation process without coping with the embodiment of the present invention constitutes any limit It is fixed.
Embodiment 2
Fig. 5 shows that sharing the one-to-one multiple utility program of password unlocking method with multiple utility program in embodiment 1 shares The functional block diagram of password tripper.As shown in figure 5, it includes the first logging request that the multiple utility program, which shares password tripper, Acquisition module 10, association password acquisition module 20, the second logging request acquisition module 30 and the second logging request authentication module 40. Wherein, the first logging request acquisition module 10, association password acquisition module 20, the second logging request acquisition module 30 and second are stepped on Record corresponding with the shared password unlocking method of multiple utility program in the embodiment step 1 of realization function one of requests verification module 40 Corresponding, to avoid repeating, the present embodiment is not described in detail one by one.
First logging request acquisition module 10, the first logging request for obtaining the transmission of the first application program, first steps on Record request includes the first user login name, the first login password, the first program identification and terminal iidentification.
It is associated with password acquisition module 20, for being based on the first user login name, the first login password and the first program identification Carry out authentication, authentication by when, obtain corresponding with the first user login name association password, and will be associated with close Code is stored in terminal iidentification and the first program identification in program information record sheet.
Second logging request acquisition module 30, the second logging request for obtaining the transmission of the second application program, second steps on Record request includes second user login name, the second program identification and terminal iidentification.
Second logging request authentication module 40, if in the corresponding terminal device of terminal iidentification, the second application program For the affiliate application of the first application program, and when the first user login name and associated second user login name, then it is based on It is associated with the verification that password completes the second logging request.
Preferably, multiple utility program shares password tripper and is additionally operable to configure and first on login password setting interface Corresponding first login password of user login name, the first login password includes gesture password.
Preferably, it further includes initial password setting unit 51, target pattern which, which shares password tripper, Position coordinates acquiring unit 52 and the first login password setting unit 53.
Initial password setting unit 51, the initial position for obtaining gesture password in picture bottom.
The position coordinates acquiring unit 52 of target pattern, the position coordinates for obtaining the target pattern in animation layers.
First login password setting unit 53 judges the position coordinates and hand of target pattern for being based on dynamic coordinate layer Whether the initial position of gesture password meets pre-set matching rule;If meeting, corresponding with the first user login name One login password is arranged successfully.
Preferably, it further includes effective time setting unit 21 that multiple utility program, which shares password tripper,.
Effective time setting unit 21, the effective time for association password to be arranged.
Preferably, after the second logging request acquisition module 30, multiple utility program shares password tripper and further includes First effective time judging unit 22 and the second effective time judging unit 23.
First effective time judging unit 22, if for the second logging request the acquisition time within effective time, hold The step of row completes the verification of the second logging request based on association password.
Second effective time judging unit 23 needs if the acquisition time for the second logging request is more than effective time Re-execute the step of obtaining the first logging request that the first application program is sent.
Preferably, the second logging request authentication module 40 includes program information record sheet query unit 41, associated application journey Sequence information table query unit 42, affiliate application determination unit 43, association user name information table query unit 44 and second are stepped on Land requests verification unit 45.
Program information record sheet query unit 41, for according to the terminal iidentification in the second logging request, polling routine letter It ceases and whether there is the first program identification corresponding with terminal iidentification in record sheet.
Affiliate application information table query unit 42, if being used in the presence of the first program identification corresponding with terminal iidentification, Then based on the second program identification and the first program identification in the second logging request, pre-set affiliate application letter is inquired Table is ceased, determines whether the second program identification is associated with the first program identification.
Affiliate application determination unit 43, if being associated with the first program identification for the second program identification, in terminal It identifies on corresponding terminal device, determines that the second application program is the affiliate application of the first application program.
Association user name information table query unit 44, for based on the second user login name and the in the second logging request One user login name inquires pre-set association user name information table, determines that second user login name and the first user log in Whether name is associated with.
Second log on request authentication unit 45, if associated for second user login name and the first user login name, The verification of the second logging request is completed based on association password.
Embodiment 3
The present embodiment provides a computer readable storage medium, computer journey is stored on the computer readable storage medium Sequence realizes that multiple utility program shares password unlocking method in embodiment 1, to avoid weight when the computer program is executed by processor Multiple, which is not described herein again.Alternatively, realizing that multiple utility program is shared close in embodiment 2 when the computer program is executed by processor The function of each module/unit in code tripper, to avoid repeating, which is not described herein again.
It is to be appreciated that the computer readable storage medium may include:The computer program code can be carried Any entity or device, recording medium, USB flash disk, mobile hard disk, magnetic disc, CD, computer storage, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), electric carrier signal and telecommunications letter Number etc..
Embodiment 4
Fig. 6 is the schematic diagram for the computer equipment that one embodiment of the invention provides.As shown in fig. 6, the calculating of the embodiment Machine equipment 60 includes:Processor 61, memory 62 and it is stored in the calculating that can be run in memory 62 and on processor 61 Machine program 63.Processor 61 realizes that multiple utility program shares password unlock side in above-described embodiment 1 when executing computer program 63 The step of method, such as step S10 to S40 shown in FIG. 1.Alternatively, being realized when the execution computer program 63 of processor 61 above-mentioned each The function of each module/unit in device embodiment, such as the first logging request acquisition module 10 shown in Fig. 5, association password obtain The function of module 20, the second logging request acquisition module 30 and the second logging request authentication module 40.
It is apparent to those skilled in the art that for convenience of description and succinctly, only with above-mentioned each work( Can unit, module division progress for example, in practical application, can be as needed and by above-mentioned function distribution by different Functional unit, module are completed, i.e., the internal structure of described device are divided into different functional units or module, more than completion The all or part of function of description.
Embodiment described above is merely illustrative of the technical solution of the present invention, rather than its limitations;Although with reference to aforementioned reality Applying example, invention is explained in detail, it will be understood by those of ordinary skill in the art that:It still can be to aforementioned each Technical solution recorded in embodiment is modified or equivalent replacement of some of the technical features;And these are changed Or replace, the spirit and scope for various embodiments of the present invention technical solution that it does not separate the essence of the corresponding technical solution should all It is included within protection scope of the present invention.

Claims (10)

1. a kind of multiple utility program shares password unlocking method, which is characterized in that including:
The first logging request of the first application program transmission is obtained, first logging request includes the first user login name, the One login password, the first program identification and terminal iidentification;
Authentication is carried out based on first user login name, first login password and the first program identification, in identity When being verified, corresponding with first user login name association password is obtained, and by the association password and the end End mark and first program identification are stored in program information record sheet;
The second logging request of the second application program transmission is obtained, second logging request includes second user login name, the Two program identifications and the terminal iidentification;
If on the corresponding terminal device of the terminal iidentification, second application program is the association of first application program Application program, and when first user login name and the associated second user login name, then it is based on the association password Complete the verification of second logging request.
2. multiple utility program as described in claim 1 shares password unlocking method, which is characterized in that the acquisition with it is described After the step of first user login name corresponding association password, the multiple utility program is shared password unlocking method and is also wrapped It includes:The effective time of the association password is set;
It is described acquisition the second application program send the second logging request the step of after, the multiple utility program shares password Unlocking method further includes:
If the acquisition time of second logging request within the effective time, executes described based on association password completion institute The step of stating the verification of the second logging request;
If the acquisition time of second logging request is more than the effective time, needs to re-execute and described obtain first and answer The step of the first logging request sent with program.
3. multiple utility program as described in claim 1 shares password unlocking method, which is characterized in that the multiple utility program is total Enjoying password unlocking method further includes:
Configuration the first login password corresponding with first user login name on login password setting interface, described first Login password includes gesture password.
4. multiple utility program as claimed in claim 3 shares password unlocking method, which is characterized in that the gesture password includes Picture bottom, dynamic coordinate layer and animation layers;
Configuration first login password corresponding with first user login name on login password setting interface, packet It includes:
The initial position of the gesture password is obtained in the picture bottom;
Obtain the position coordinates of the target pattern in the animation layers;
Based on the dynamic coordinate layer, judge the position coordinates of the target pattern and the gesture password initial position whether Meet pre-set matching rule;If meeting, the first login password corresponding with first user login name is arranged to Work(.
5. multiple utility program as described in claim 1 shares password unlocking method, which is characterized in that if described in the terminal It identifies on corresponding terminal device, second application program is the affiliate application of first application program, and described When the first user login name and the associated second user login name, then it is based on the association password and completes second login The verification of request, including:
According to the terminal iidentification in second logging request, inquires in described program information record sheet and whether there is and the end End identifies corresponding first program identification;
If in the presence of first program identification corresponding with the terminal iidentification, based on second in second logging request Program identification and first program identification, inquire pre-set affiliate application information table, determine second program Whether mark is associated with first program identification;
If second program identification is associated with first program identification, in the corresponding terminal device of the terminal iidentification On, determine that the second application program is the affiliate application of the first application program;
Based on the second user login name and the first user login name in second logging request, pre-set association is inquired Username information table, determines whether the second user login name is associated with first user login name;
If the second user login name and first user login name are associated, described second is completed based on association password The verification of logging request.
6. a kind of multiple utility program shares password tripper, which is characterized in that including:
First logging request acquisition module, the first logging request for obtaining the transmission of the first application program, described first logs in Request includes the first user login name, the first login password, the first program identification and terminal iidentification;
It is associated with password acquisition module, for being based on first user login name, first login password and the first program mark Know and carry out authentication, authentication by when, obtain corresponding with first user login name association password, and general The association password is stored in the terminal iidentification and first program identification in program information record sheet;
Second logging request acquisition module, the second logging request for obtaining the transmission of the second application program, described second logs in Request includes second user login name, the second program identification and the terminal iidentification;
Second logging request authentication module, if for applying journey in the corresponding terminal device of the terminal iidentification, described second Sequence is the affiliate application of first application program, and first user login name and the second user log in famous prime minister When association, then the verification of second logging request is completed based on the association password.
7. multiple utility program as claimed in claim 6 shares password tripper, which is characterized in that the multiple utility program is total Enjoying password tripper further includes:
Effective time setting unit, the effective time for the association password to be arranged;
First effective time judging unit, if for second logging request the acquisition time within the effective time, Execute the described the step of verification of second logging request is completed based on association password;
Second effective time judging unit, if the acquisition time for second logging request is more than the effective time, The step of needing to re-execute the first logging request that the first application program of the acquisition is sent.
8. multiple utility program as claimed in claim 6 shares password tripper, which is characterized in that second logging request Authentication module, including:
Program information record sheet query unit, for according to the terminal iidentification in second logging request, inquiring described program It whether there is the first program identification corresponding with the terminal iidentification in information record sheet;
Affiliate application information table query unit, if in the presence of the first program mark corresponding with the terminal iidentification Know, then based in second logging request the second program identification and first program identification, inquire pre-set pass Join application information table, determines whether second program identification is associated with first program identification;
Affiliate application determination unit, if being associated with first program identification for second program identification, in institute It states on the corresponding terminal device of terminal iidentification, determines that the second application program is the affiliate application of the first application program;
Association user name information table query unit, for based on the second user login name and first in second logging request User login name inquires pre-set association user name information table, determines that the second user login name and described first is used Whether family login name is associated with;
Second log on request authentication unit, if associated for the second user login name and first user login name, The verification of second logging request is then completed based on association password.
9. a kind of computer equipment, including memory, processor and it is stored in the memory and can be in the processor The computer program of upper operation, which is characterized in that the processor realized when executing the computer program as claim 1 to The step of any one of 5 multiple utility programs share password unlocking method.
10. a kind of computer readable storage medium, the computer-readable recording medium storage has computer program, feature to exist In realization multiple utility program as described in any one of claim 1 to 5 shares password when the computer program is executed by processor The step of unlocking method.
CN201810439259.4A 2018-05-09 2018-05-09 Multiple utility program shares password unlocking method, device, equipment and storage medium Pending CN108647501A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201810439259.4A CN108647501A (en) 2018-05-09 2018-05-09 Multiple utility program shares password unlocking method, device, equipment and storage medium
PCT/CN2018/094413 WO2019214030A1 (en) 2018-05-09 2018-07-04 Method and apparatus for unlocking multiple applications using shared password, device, and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810439259.4A CN108647501A (en) 2018-05-09 2018-05-09 Multiple utility program shares password unlocking method, device, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN108647501A true CN108647501A (en) 2018-10-12

Family

ID=63753792

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810439259.4A Pending CN108647501A (en) 2018-05-09 2018-05-09 Multiple utility program shares password unlocking method, device, equipment and storage medium

Country Status (2)

Country Link
CN (1) CN108647501A (en)
WO (1) WO2019214030A1 (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110532742A (en) * 2019-07-09 2019-12-03 中国平安财产保险股份有限公司 Identity identifying method, device, key devices and storage medium
CN110738499A (en) * 2019-09-03 2020-01-31 平安科技(深圳)有限公司 User identity authentication method and device, computer equipment and storage medium
CN111241499A (en) * 2020-01-07 2020-06-05 腾讯科技(深圳)有限公司 Application program login method, device, terminal and storage medium
CN111241527A (en) * 2020-01-03 2020-06-05 北京奇艺世纪科技有限公司 Silent login method and device, electronic equipment and storage medium
CN112235246A (en) * 2020-09-14 2021-01-15 上海硬通网络科技有限公司 Cross-terminal account login method and device and electronic equipment
CN113836504A (en) * 2021-08-25 2021-12-24 北京新伟佳业科技有限公司 Authority management authentication method and system applied to multifunctional integrated office system
CN115242511A (en) * 2022-07-22 2022-10-25 成都中科大旗软件股份有限公司 Multi-environment application management platform and management method

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105072133A (en) * 2015-08-28 2015-11-18 北京金山安全软件有限公司 Login method and device for application program
CN106209726A (en) * 2015-04-30 2016-12-07 中兴通讯股份有限公司 A kind of Mobile solution single-point logging method and device

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020116648A1 (en) * 2000-12-14 2002-08-22 Ibm Corporation Method and apparatus for centralized storing and retrieving user password using LDAP
CN103065080B (en) * 2012-12-21 2016-01-20 广东欧珀移动通信有限公司 A kind of application program login method and device
CN105227302B (en) * 2015-10-28 2019-06-14 Oppo广东移动通信有限公司 The sharing method of password and the shared system of password
CN106330918A (en) * 2016-08-26 2017-01-11 杭州迪普科技有限公司 Multi-system login method and device

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106209726A (en) * 2015-04-30 2016-12-07 中兴通讯股份有限公司 A kind of Mobile solution single-point logging method and device
CN105072133A (en) * 2015-08-28 2015-11-18 北京金山安全软件有限公司 Login method and device for application program

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110532742A (en) * 2019-07-09 2019-12-03 中国平安财产保险股份有限公司 Identity identifying method, device, key devices and storage medium
CN110532742B (en) * 2019-07-09 2023-04-14 中国平安财产保险股份有限公司 Identity authentication method, identity authentication device, secret key equipment and storage medium
CN110738499A (en) * 2019-09-03 2020-01-31 平安科技(深圳)有限公司 User identity authentication method and device, computer equipment and storage medium
CN111241527A (en) * 2020-01-03 2020-06-05 北京奇艺世纪科技有限公司 Silent login method and device, electronic equipment and storage medium
CN111241499A (en) * 2020-01-07 2020-06-05 腾讯科技(深圳)有限公司 Application program login method, device, terminal and storage medium
CN111241499B (en) * 2020-01-07 2023-05-05 腾讯科技(深圳)有限公司 Application program login method, device, terminal and storage medium
CN112235246A (en) * 2020-09-14 2021-01-15 上海硬通网络科技有限公司 Cross-terminal account login method and device and electronic equipment
CN113836504A (en) * 2021-08-25 2021-12-24 北京新伟佳业科技有限公司 Authority management authentication method and system applied to multifunctional integrated office system
CN113836504B (en) * 2021-08-25 2024-02-06 北京新伟佳业科技有限公司 Authority management authentication method and system applied to multifunctional integrated office system
CN115242511A (en) * 2022-07-22 2022-10-25 成都中科大旗软件股份有限公司 Multi-environment application management platform and management method
CN115242511B (en) * 2022-07-22 2024-04-12 成都中科大旗软件股份有限公司 Multi-environment application management platform and management method

Also Published As

Publication number Publication date
WO2019214030A1 (en) 2019-11-14

Similar Documents

Publication Publication Date Title
CN108647501A (en) Multiple utility program shares password unlocking method, device, equipment and storage medium
US11003760B2 (en) User account recovery techniques using secret sharing scheme with trusted referee
EP2783319B1 (en) Providing verification of user identification information
CN108183924A (en) A kind of login validation method and terminal device
CN104753894B (en) A kind of data processing method, apparatus and system
CN103139182B (en) A kind of method that user of permission accesses, client, server and system
CN109784031B (en) Account identity verification processing method and device
CN102761549A (en) Processing method and system of resource sharing and service platforms
US20120297470A1 (en) Access authentication method for multiple devices and platforms
CN104348612A (en) Third-party website login method based on mobile terminal and mobile terminal
CN108256303A (en) Electronic device, auth method and storage medium
CN105992204A (en) Access authentication method of applications of mobile intelligent terminal and device
CN105337974A (en) Account authorization method, account login method, account authorization device and client end
CN104184709A (en) Verification method, device, server, service data center and system
CN106130998A (en) A kind of identifying code transmission method and device
CN104579667A (en) Account password management method, device and system
CN105897663A (en) Method for determining access authority, device and equipment
CN110324344A (en) The method and device of account information certification
CN104601582A (en) File transfer method, device and system
CN107707356A (en) A kind of mobile device secure binding method and application system based on Quick Response Code identification
CN109245897A (en) A kind of node authentication method and device based on noninteractive zero-knowledge proof
CN110120928A (en) A kind of identity authentication method, device, server and computer-readable medium
CN107241361A (en) A kind of unified identity authentication method based on cloud environment
CN105162774A (en) Virtual machine login method and device used for terminal
CN102685122A (en) Software protection method based on cloud server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20181012