CN108683684B - Method, device and system for logging in target instant messaging application - Google Patents
Method, device and system for logging in target instant messaging application Download PDFInfo
- Publication number
- CN108683684B CN108683684B CN201810608438.6A CN201810608438A CN108683684B CN 108683684 B CN108683684 B CN 108683684B CN 201810608438 A CN201810608438 A CN 201810608438A CN 108683684 B CN108683684 B CN 108683684B
- Authority
- CN
- China
- Prior art keywords
- terminal
- login
- security number
- instant messaging
- credential information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/04—Real-time or near real-time messaging, e.g. instant messaging [IM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The invention discloses a method, a device and a system for logging in a target instant messaging application, and belongs to the technical field of communication. The method comprises the following steps: when a target instant messaging application is started, if the security number of the terminal is not stored in the target instant messaging application, sending a security number distribution request to an instant messaging server, and receiving the security number of the terminal sent by the instant messaging server; when a login verification instruction triggered by user operation is received, requesting login verification to a service server based on the security number, login information input by a user and the security number, and receiving login credential information of the terminal sent by the service server; and sending a login request to the instant messaging server, wherein the login request carries the security number of the terminal and login credential information of the terminal. By adopting the invention, the safety of the instant messaging application can be improved.
Description
Technical Field
The present invention relates to communications technologies, and in particular, to a method, an apparatus, and a system for logging in a target instant messaging application.
Background
With the development of communication technology, a user can communicate with another user in an instant manner through a chat tool on a terminal.
Generally, the chat tool is an instant messaging application, and the corresponding servers include an instant messaging server and a service server. The instant messaging server is only responsible for managing communication related services, such as forwarding chat data. And the service server manages other services besides communication, including login authentication services. When a user needs to log in an account, login information such as an account and a password can be input in a login interface, and login is confirmed. Further, the terminal may add the login information to the login authentication request and transmit the login authentication request to the service server. When the login authentication is successful, the service server may request login credential information from the instant messaging server, and the login credential information may be used to log in the instant messaging server. And after receiving the login credential information sent by the instant messaging server, the service server forwards the login credential information to the terminal. The terminal can locally store the login credential information and log in the instant messaging server based on the login credential information.
In the process of implementing the invention, the inventor finds that the prior art has at least the following problems:
if the login credential information of the terminal is stolen, the stolen terminal can copy the account corresponding to the login credential information to log in the instant messaging server based on the login credential information, so that the security of the instant messaging application is low.
Disclosure of Invention
In order to solve the problems in the prior art, embodiments of the present invention provide a method, an apparatus, and a system for logging in a target instant messaging application. The technical scheme is as follows:
in a first aspect, a method for logging in a target instant messaging application is provided, where the method is applied to a terminal, and the method includes:
when a target instant messaging application is started, if the security number of the terminal is not stored in the target instant messaging application, sending a security number distribution request to an instant messaging server, and receiving the security number of the terminal sent by the instant messaging server;
when a login verification instruction triggered by user operation is received, requesting login verification from a service server based on the security number and login information input by a user, and receiving login credential information of the terminal sent by the service server;
and sending a login request to the instant messaging server, wherein the login request carries the security number of the terminal and login credential information of the terminal.
Optionally, the method further includes:
and when the target instant messaging application is started, if the security number of the terminal is stored in the target instant messaging application and the login credential information of the terminal is stored in the target instant messaging application, sending the login request to the instant messaging server.
Optionally, the security number allocation request carries device information of the terminal, where the device information includes a device manufacturer identifier and a device model; the login request also carries the equipment information.
Optionally, the requesting login verification from the service server based on the security number and login information input by the user includes:
sending a login verification request carrying login information to a service server, and receiving a verification success character string sent by the service server after the login information is verified;
and sending a login credential acquisition request carrying the verification success character string and the security number to the service server.
Optionally, the sending a login request to the instant messaging server includes:
and encrypting the login request, calculating a corresponding hash signature for the encrypted login request, and sending the encrypted login request and the hash signature corresponding to the encrypted login request to the instant messaging server.
Optionally, the login request further carries the number of times of use corresponding to the login credential information.
In a second aspect, a method for logging in a target instant messaging application is provided, where the method is applied to a service server, and the method includes:
receiving login information and a security number sent by a terminal;
if the login information is verified, sending a login certificate distribution request corresponding to the terminal to an instant messaging server, wherein the login certificate distribution request carries the security number;
and receiving login credential information of the terminal sent by the instant messaging server, and forwarding the login credential information to the terminal.
Optionally, the receiving the login information and the security number sent by the terminal includes:
receiving a login verification request which is sent by a terminal and carries login information, and if the login information is verified to be passed, sending a verification success character string to the terminal;
and receiving a login credential acquisition request which is sent by the terminal and carries the verification success character string and the security number.
In a third aspect, a method for logging in a target instant messaging application is provided, where the method is applied to an instant messaging server, and the method includes:
when a security number distribution request sent by a terminal is received, determining the security number of the terminal, and sending the security number to the terminal;
when a login credential distribution request which is sent by a service server and carries a security number of the terminal is received, determining login credential information of the terminal, sending the login credential information of the terminal to the service server, and adding a corresponding item of the security number of the terminal and the login credential information of the terminal in a pre-established corresponding relation between the security number and the login credential information;
and receiving a login request which is sent by the terminal and carries the security number of the terminal and the login credential information of the terminal, and if the corresponding item of the security number of the terminal and the login credential information of the terminal exists in the pre-established corresponding relation between the security number and the login credential information, determining that the terminal is successfully logged in.
Optionally, the security number allocation request carries device information of the terminal, where the device information includes a device manufacturer identifier and a device model; the login request also carries the equipment information;
after the determining the security number of the terminal, the method further includes: adding a corresponding item of the security number of the terminal and the equipment information of the terminal in a pre-established corresponding relation between the security number and the equipment information;
if the corresponding item of the terminal security number and the terminal login credential information exists in the pre-established corresponding relationship between the security number and the login credential information, determining that the terminal login is successful, including: and if the corresponding item of the terminal security number and the login credential information of the terminal exists in the pre-established corresponding relationship between the security number and the login credential information, and the corresponding item of the terminal security number and the device information exists in the pre-established corresponding relationship between the security number and the device information, determining that the terminal login is successful.
Optionally, the receiving a login request sent by the terminal and carrying the device number of the terminal and the login credential information of the terminal includes:
and receiving the encrypted login request sent by the terminal and a hash signature corresponding to the encrypted login request, and if the hash signature is verified correctly based on the encrypted login request, decrypting the encrypted login request to obtain the login request carrying the security number of the terminal and the login credential information of the terminal.
Optionally, the login request further carries the number of times of use corresponding to the login credential information;
if the corresponding item of the terminal security number and the terminal login credential information exists in the pre-established corresponding relationship between the security number and the login credential information, determining that the terminal login is successful, including: and if the corresponding item of the security number of the terminal and the login credential information of the terminal exists in the pre-established corresponding relation between the security number and the login credential information, and the using frequency corresponding to the login credential information is equal to the using frequency corresponding to the locally stored login credential information plus 1, determining that the terminal is successfully logged in.
In a fourth aspect, a terminal is provided, which includes:
the system comprises a first sending module, a second sending module and a third sending module, wherein the first sending module is used for sending a security number distribution request to an instant messaging server and receiving the security number of the terminal sent by the instant messaging server when a target instant messaging application is started and if the security number of the terminal is not stored in the target instant messaging application;
the second sending module is used for requesting login verification to a service server based on the security number and login information input by a user when a login verification instruction triggered by user operation is received, and receiving login credential information of the terminal sent by the service server;
and the third sending module is used for sending a login request to the instant messaging server, wherein the login request carries the security number of the terminal and the login credential information of the terminal.
Optionally, the terminal further includes:
and the fourth sending module is used for sending the login request to the instant messaging server if the security number of the terminal is stored in the target instant messaging application and the login credential information of the terminal is stored in the target instant messaging application when the target instant messaging application is started.
Optionally, the security number allocation request is carried with device information of the terminal, where the device information includes a device manufacturer identifier and a device model; the login request also carries the equipment information.
Optionally, the second sending module is configured to:
sending a login verification request carrying login information to a service server, and receiving a verification success character string sent by the service server after the login information is verified;
and sending a login credential acquisition request carrying the verification success character string and the security number to the service server.
Optionally, the third sending module is configured to:
and encrypting the login request, calculating a corresponding hash signature for the encrypted login request, and sending the encrypted login request and the hash signature corresponding to the encrypted login request to the instant messaging server.
Optionally, the login request further carries the number of times of use corresponding to the login credential information.
In a fifth aspect, a service server is provided, which includes:
the first receiving module is used for receiving login information and a security number sent by a terminal;
the sending module is used for sending a login credential distribution request corresponding to the terminal to an instant messaging server if the login information is verified, wherein the login credential distribution request carries the security number;
and the second receiving module is used for receiving the login credential information of the terminal sent by the instant messaging server and forwarding the login credential information to the terminal.
Optionally, the first receiving module is configured to:
receiving a login verification request which is sent by a terminal and carries login information, and if the login information is verified to be passed, sending a verification success character string to the terminal;
and receiving a login credential acquisition request which is sent by the terminal and carries the verification success character string and the security number.
In a sixth aspect, there is provided an instant messaging server comprising:
the terminal comprises a first determining module, a second determining module and a third determining module, wherein the first determining module is used for determining a security number of a terminal and sending the security number to the terminal when receiving a security number distribution request sent by the terminal;
a second determining module, configured to determine login credential information of the terminal when receiving a login credential allocation request sent by a service server and carrying a security number of the terminal, send the login credential information of the terminal to the service server, and add a corresponding item between the security number of the terminal and the login credential information of the terminal in a pre-established correspondence between the security number and the login credential information;
and the third determining module is used for receiving a login request which is sent by the terminal and carries the security number of the terminal and the login credential information of the terminal, and if the corresponding item of the security number of the terminal and the login credential information of the terminal exists in the pre-established corresponding relation between the security number and the login credential information, the terminal is determined to be successfully logged in.
Optionally, the security number allocation request carries device information of the terminal, where the device information includes a device manufacturer identifier and a device model; the login request also carries the equipment information;
the first determining module is further configured to: adding a corresponding item of the security number of the terminal and the equipment information of the terminal in a pre-established corresponding relation between the security number and the equipment information;
the third determining module is configured to: and if the corresponding item of the terminal security number and the login credential information of the terminal exists in the pre-established corresponding relationship between the security number and the login credential information, and the corresponding item of the terminal security number and the device information exists in the pre-established corresponding relationship between the security number and the device information, determining that the terminal login is successful.
Optionally, the third determining module is configured to:
and receiving the encrypted login request sent by the terminal and a hash signature corresponding to the encrypted login request, and if the hash signature is verified correctly based on the encrypted login request, decrypting the encrypted login request to obtain the login request carrying the security number of the terminal and the login credential information of the terminal.
Optionally, the login request further carries the number of times of use corresponding to the login credential information;
the third determining module is configured to: and if the corresponding item of the security number of the terminal and the login credential information of the terminal exists in the pre-established corresponding relation between the security number and the login credential information, and the using frequency corresponding to the login credential information is equal to the using frequency corresponding to the locally stored login credential information plus 1, determining that the terminal is successfully logged in.
A seventh aspect provides a system for logging in a target instant messaging application, where the system includes a terminal, a service server, and an instant messaging server, where:
the terminal is used for sending a security number distribution request to an instant messaging server and receiving the security number of the terminal sent by the instant messaging server if the security number of the terminal is not stored in the target instant messaging application when the target instant messaging application is started; when a login verification instruction triggered by user operation is received, requesting login verification from a service server based on the security number and login information input by a user, and receiving login credential information of the terminal sent by the service server; sending a login request to the instant messaging server, wherein the login request carries a security number of the terminal and login credential information of the terminal;
the service server is used for receiving login information and a security number sent by the terminal; if the login information is verified, sending a login certificate distribution request corresponding to the terminal to an instant messaging server, wherein the login certificate distribution request carries the security number; receiving login credential information of the terminal sent by the instant messaging server, and forwarding the login credential information to the terminal;
the instant messaging server is used for determining the security number of the terminal and sending the security number to the terminal when receiving a security number distribution request sent by the terminal; when a login credential distribution request which is sent by a service server and carries a security number of the terminal is received, determining login credential information of the terminal, sending the login credential information of the terminal to the service server, and adding a corresponding item of the security number of the terminal and the login credential information of the terminal in a pre-established corresponding relation between the security number and the login credential information; and receiving a login request which is sent by the terminal and carries the security number of the terminal and the login credential information of the terminal, and if the corresponding item of the security number of the terminal and the login credential information of the terminal exists in the pre-established corresponding relation between the security number and the login credential information, determining that the terminal is successfully logged in.
In an eighth aspect, a terminal is provided, where the terminal includes a processor and a memory, and the memory stores at least one instruction, where the instruction is loaded and executed by the processor to implement the method for logging in a target instant messaging application according to the first aspect.
In a ninth aspect, there is provided a computer readable storage medium having stored therein at least one instruction, which is loaded and executed by a processor to implement the method for logging in a target instant messaging application according to the first aspect.
In a tenth aspect, a service server is provided, which includes a processor and a memory, where the memory stores at least one instruction, and the instruction is loaded and executed by the processor to implement the method for logging in a target instant messaging application according to the second aspect.
In an eleventh aspect, there is provided a computer-readable storage medium having at least one instruction stored therein, the instruction being loaded and executed by a processor to implement the method for logging in a target instant messaging application according to the second aspect.
In a twelfth aspect, an instant messaging server is provided, which includes a processor and a memory, where the memory stores at least one instruction, and the instruction is loaded and executed by the processor to implement the method for logging in a target instant messaging application according to the third aspect.
In a thirteenth aspect, there is provided a computer-readable storage medium, wherein at least one instruction is stored in the storage medium, and the instruction is loaded and executed by a processor to implement the method for logging in a target instant messaging application according to the fourth aspect.
The technical scheme provided by the embodiment of the invention has the following beneficial effects:
in the embodiment of the invention, the instant messaging server can allocate corresponding security numbers for each terminal provided with the target instant messaging application, when the terminal requests login verification to the service server, the security numbers can be sent to the service server, and further when the service server exchanges login credential information with the instant messaging server, the security numbers can be sent to the instant messaging server, and the instant messaging server can store the corresponding relation between the security numbers of the terminal and the login credential information, so that when the terminal requests to log in the instant messaging server, the instant messaging server can judge whether the security numbers correspond to the login credentials. Therefore, even if the login credential information of the terminal is stolen, when the corresponding relationship between the security number and the login credential information is not verified, the terminal which steals the login credential information cannot imitate the account corresponding to the login credential information to log in the instant messaging server, so that the security of the instant messaging application is improved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a flowchart of a method for logging in a target instant messaging application according to an embodiment of the present invention;
fig. 2 is a flowchart of a method for logging in a target instant messaging application according to an embodiment of the present invention;
fig. 3 is a flowchart for determining a terminal login result according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of an apparatus for logging in a target instant messaging application according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of an apparatus for logging in a target instant messaging application according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of an apparatus for logging in a target instant messaging application according to an embodiment of the present invention;
fig. 7 is a schematic structural diagram of an apparatus for logging in a target instant messaging application according to an embodiment of the present invention;
fig. 8 is a schematic structural diagram of a terminal according to an embodiment of the present invention;
fig. 9 is a schematic structural diagram of a service server according to an embodiment of the present invention;
fig. 10 is a schematic structural diagram of an instant messaging server according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, embodiments of the present invention will be described in detail with reference to the accompanying drawings.
The embodiment of the invention provides a method for logging in target instant messaging application, which can be realized by a terminal, a service server and an instant messaging server together.
The terminal may include components such as a processor, memory, screen, etc. The processor, which may be a Central Processing Unit (CPU), may be configured to determine whether a security number is stored in the target instant messaging application, determine whether login credential information is stored in the target instant messaging application, and perform other processes. The Memory may be a RAM (Random Access Memory), a Flash Memory, or the like, and may be configured to store received data, data required by the processing procedure, data generated in the processing procedure, or the like, such as a security number, login credential information, or the like. The screen may be a touch screen, may be used to display device lists, control pages, and may also be used to detect touch signals, etc. The terminal may further include a transceiver, an image detection part, an audio output part, an audio input part, and the like. The transceiver may be used for data transmission with other devices, for example, sending a security number assignment request to the instant messaging server, requesting login authentication from the service server, sending a login request to the instant messaging server, and may include an antenna, a matching circuit, a modem, and the like. The image detection means may be a camera or the like. The audio output component may be a speaker, headphones, or the like. The audio input means may be a microphone or the like.
The traffic server may include a processor, memory, transceiver, etc. The processor, which may be a CPU or the like, may be used for processing such as authenticating login information. The memory may be RAM, Flash, etc., and may be used to store received data, data required by the processing procedure, data generated in the processing procedure, etc., such as login information and security number of the terminal. The transceiver may be configured to perform data transmission with a terminal or an instant messaging server, for example, receive login information and a security number sent by the terminal, send a login credential allocation request to the instant messaging server, receive login credential information sent by the instant messaging server, forward the login credential information to the terminal, and the like.
The instant messaging server may include a processor, memory, transceiver, etc. The processor, which may be a CPU or the like, may be configured to determine a security number of the terminal, determine login credential information of the terminal, add a correspondence between the security number of the terminal and the login credential information of the terminal to a correspondence between the security number and the login credential information that is established in advance, determine that the terminal has successfully logged in, and the like. The memory may be a RAM, a Flash, or the like, and may be configured to store received data, data required by the processing procedure, data generated in the processing procedure, or the like, such as a security number, login credential information, a correspondence between the security number and the login credential information, or the like. The transceiver may be used for data transmission with a terminal or a service server, for example, to receive a security number assignment request sent by the terminal, send a security number to the terminal, receive a login credential assignment request sent by the service server, send login credential information of the terminal to the service server, receive a login request sent by the terminal, and the like, and may include an antenna, a matching circuit, a modem, and the like.
With reference to the flowchart of the method for logging in the target instant messaging application shown in fig. 1 and fig. 2, the processing flow of the method may include the following steps:
in step 101, when a target instant messaging application is started, if a terminal does not store a security number of the terminal in the target instant messaging application, a security number allocation request is sent to an instant messaging server by the terminal.
In implementation, the terminal is provided with a target instant messaging application, and when the target instant messaging application is started, the terminal can judge whether the target instant messaging application stores a security number of the terminal. The security number corresponds to the terminal one by one, and can uniquely represent the terminal. If the security number of the terminal is not stored in the target instant messaging application, for example, the target instant messaging application is installed for the first time by the terminal or the target instant messaging application is initialized, the terminal may send a security number allocation request to the instant messaging server.
Optionally, the security number allocation request carries device information of the terminal, where the device information includes a device manufacturer identifier and a device model. In order to enable the instant messaging server to improve the accuracy of distinguishing the terminals, the terminals can also add the device information related to the terminals into the security number allocation request before sending the security number allocation request to the instant messaging server.
Optionally, if the terminal determines that the security number of the terminal is stored in the target instant messaging application, the process may jump to step 103.
In step 102, when receiving a security number allocation request sent by a terminal, an instant messaging server determines the security number of the terminal and sends the security number to the terminal.
In implementation, when receiving a security number allocation request sent by a terminal, the instant messaging server may determine a unique security number for the terminal. The instant messaging server can be a security number pool which is established in advance, wherein enough security numbers which are different from each other are stored, and when a security number distribution request sent by a terminal is received, one security number can be selected from the security number pool to serve as the security number of the terminal. Or, the instant messaging server may further randomly generate a non-repeating UUID (universal Unique Identifier) for the terminal as the security number of the terminal when receiving the security number assignment request sent by the terminal. And then, the instant communication server can establish the corresponding relation between the security number and the terminal and store the security number and the terminal. Then, the instant messaging server may transmit the generated security number to the terminal.
Optionally, for a case that the security number allocation request carries the device information of the terminal, the corresponding processing of the instant messaging server may be as follows: and adding a corresponding item of the security number of the terminal and the equipment information of the terminal in the pre-established corresponding relation between the security number and the equipment information.
In implementation, the instant messaging server may pre-establish a corresponding relationship between the security number and the device information, where the corresponding relationship between the device information of the terminal to which the security number is assigned and the security number is stored. When the instant messaging server determines the security number of the terminal in the process, the corresponding item of the security number of the terminal and the equipment information can be added into the corresponding relation between the security number and the equipment information.
Through the process, the terminal can receive the security number sent by the instant messaging server and store the security number in the local.
Optionally, the terminal and the instant messaging server may transmit sensitive data such as a security number through an HTTPS (Hyper Text Transfer Protocol over Secure Socket Layer), so as to prevent the sensitive data from being hijacked by an intermediate network device.
In step 103, when receiving a login authentication instruction triggered by a user operation, the terminal requests a service server for login authentication based on the security number and login information input by the user.
In implementation, when the terminal determines that the security number is stored in the target instant messaging application or receives the security number sent by the instant messaging server, the terminal may determine whether the login credential information is stored in the target instant messaging application. If the login credential information is not stored, the terminal can display the login interface of the target instant messaging application. The user can input login information such as an account and/or a password in the login interface, click a login confirmation option and trigger a login verification instruction. Furthermore, the terminal may send both the security number and login information input by the user to the service server to request login authentication.
Optionally, the specific processing that the terminal requests the service server for login verification based on the security number and the login information input by the user may be as follows: sending a login verification request carrying login information to a service server, and receiving a verification success character string sent by the service server after the login information is verified; and sending a login credential acquisition request carrying the verification success character string and the security number to the service server.
In an implementation, the terminal may add login information input by the user to the login authentication request and transmit the login authentication request to the service server. If the login information passes the verification, the terminal can receive a verification success character string fed back by the service server, and the verification success character string is used for representing a login result and indicating that the terminal can log in the service server. When the terminal receives the successful verification character string, the security number can be obtained, the successful verification character string and the security number are added into the login certificate obtaining request, and the login certificate obtaining request is sent to the service server.
Optionally, if the terminal determines that the login credential information of the terminal is stored in the target instant messaging application, it may jump to step 107.
The service server may receive the login information and the security number sent by the terminal, may receive the login information and the security number simultaneously, or may notify the security number sent by the terminal after the login information is verified.
Optionally, the service server may receive a login authentication request carrying login information sent by the terminal, and send an authentication success string to the terminal if the login information is authenticated; and receiving a login credential acquisition request which is sent by the terminal and carries the verification success character string and the security number.
In implementation, when the service server receives a login authentication request sent by the terminal, the service server can acquire login information therein and authenticate the login information. If the authentication is passed, a string of authentication success characters may be determined for the terminal.
Optionally, when the user registers the account, the account may be composed of numbers and/or letters, and the service server may generate a user number for the account so as to identify the account in the service server and the instant messaging server. After the verification is passed, the service server can also acquire the account in the login information to determine the corresponding user number. The service server may store the user number and the verification success string in the verification record in a corresponding manner. The business service can also establish the corresponding relation between the user number and the terminal to indicate that the terminal logs in the account corresponding to the user number.
The service server can send the verification result to the terminal, and if the verification result is that the verification is passed, the service server can also send the character string with successful verification to the terminal at the same time so as to inform the terminal that the verification is passed. Then, the service server may receive a login credential acquisition request sent by the terminal. The service server can obtain the successful verification character string, inquire whether the successful verification character string exists in the verification record, if so, obtain the user number corresponding to the successful verification character string, and add the user number and the security number to the login credential distribution request.
In step 104, if the login information is verified by the service server, the service server sends a login credential distribution request of the corresponding terminal to the instant messaging server.
Wherein, the login credential distribution request carries the security number. Optionally, the login credential allocation request may further carry a user number, so that the instant messaging server stores a correspondence between the user number and the terminal.
In implementation, if the service server passes the authentication of the terminal in the above process, a login credential allocation request carrying a security number may be sent to the instant messaging server, so as to obtain login credential information that can be used for logging in the instant messaging server for the terminal.
In step 105, when receiving a login credential allocation request carrying a security number of a terminal sent by a service server, an instant messaging server determines login credential information of the terminal, sends the login credential information of the terminal to the service server, and adds a corresponding item between the security number of the terminal and the login credential information of the terminal in a pre-established corresponding relationship between the security number and the login credential information.
In implementation, the instant messaging server may be pre-established with a corresponding relationship between the security number and the login credential information, in which the security number and the login credential information of the authenticated terminal are stored. When receiving a login certificate allocation request sent by a service server, the instant messaging server can randomly generate a non-repeated UUID for the terminal as login certificate information of the terminal. The login credential information and the security number may be UUIDs with different formats, and are not limited herein. Furthermore, the instant messaging server can add the corresponding item of the security number of the terminal and the login credential information of the terminal in the corresponding relation of the security number and the login credential information. Then, the instant messaging server can send login credential information of the terminal to the service server, so that the service server forwards the login credential information to the terminal.
Optionally, for a case that the login credential allocation request sent by the service server also carries the user number, the instant messaging server may further store the user number when storing the security number of the terminal and the corresponding item of the login credential information of the terminal.
In step 106, the service server receives the login credential information of the terminal sent by the instant messaging server, and forwards the login credential information to the terminal.
In implementation, after the service server forwards the login credential information to the terminal, the terminal may receive the login credential information sent by the service server and store the login credential information in the local.
In step 107, the terminal sends a login request to the instant messaging server.
The login request carries a security number of the terminal and login credential information of the terminal.
In implementation, when the terminal determines that the target instant messaging application stores the login credential information or receives the login credential information sent by the service server, the terminal may add the security number and the login credential information of the terminal to the login request and send the login request to the instant messaging server.
Optionally, in a possible scenario, when the target instant messaging application is started, if the security number of the terminal is stored in the target instant messaging application and the login credential information of the terminal is stored in the target instant messaging application, a login request is sent to the instant messaging server.
Optionally, the login request further carries the device information, so that the instant messaging server is used to distinguish different terminals. In addition, the login request can also carry the use times corresponding to the login credential information.
Optionally, the terminal may encrypt the login request, and the corresponding processing may be as follows: and encrypting the login request, calculating a corresponding hash signature for the encrypted login request, and sending the encrypted login request and the hash signature corresponding to the encrypted login request to the instant messaging server.
In implementation, the terminal may encrypt the login request based on a set encryption method, and then calculate a corresponding hash signature based on a set hash algorithm according to the encrypted login request. Furthermore, the terminal can send the encrypted login request and the corresponding hash signature to the instant messaging server together.
In step 108, the instant messaging server receives a login request which is sent by the terminal and carries the security number of the terminal and the login credential information of the terminal, and if a corresponding item between the security number of the terminal and the login credential information of the terminal exists in the pre-established corresponding relationship between the security number and the login credential information, the terminal is determined to be successfully logged in.
In implementation, after receiving a login request sent by a terminal, the instant messaging server can obtain a security number and a login credential therein. Then, the instant messaging server can judge whether the corresponding item of the security number and the login credential information of the terminal exists in the corresponding relation of the security number and the login credential information. If the terminal is successful in login, the terminal is indicated to pass login verification. After the terminal successfully logs in the instant messaging server, the user can use the target instant messaging application in the terminal to carry out instant messaging with other users.
If the terminal does not exist, the terminal may steal login credential information of other terminals, so that the security number and the login credential do not have a corresponding relationship, the instant messaging server may determine that the terminal has failed to log in, and avoid the terminal stealing the login credential information from logging in the instant messaging server.
Optionally, a flowchart of determining the terminal login result by the instant messaging server may be as shown in fig. 3, where the process in fig. 3 is described as follows:
for the above encryption situation, the instant messaging server may decrypt the login request, and the corresponding processing may be as follows: and receiving the encrypted login request sent by the terminal and a hash signature corresponding to the encrypted login request, and if the hash signature is verified correctly based on the encrypted login request, decrypting the encrypted login request to obtain the login request carrying the security number of the terminal and the login credential information of the terminal.
In implementation, the instant messaging server may receive the encrypted login request sent by the terminal and the hash signature corresponding to the encrypted login request, and then the instant messaging server may calculate the hash signature corresponding to the encrypted login request according to the received encrypted login request based on the same hash algorithm as the terminal. Generally, the hash signature calculated by the instant messaging server is the same as the hash signature sent by the terminal, that is, the instant messaging server can verify the hash signature correctly. If the login request sent by the terminal is hijacked and tampered in the transmission process, the instant messaging server calculates a hash signature according to the tampered login request, the hash signature is generally different from the hash signature sent by the terminal, and the instant messaging server can determine that the hash signature fails to be verified. Once the verification of the hash signature is determined to fail, the instant messaging server can determine that the terminal login fails.
If the instant communication server determines that the hash signature verification is successful, the login request can be decrypted based on a set decryption mode, so that the security number and the login credential information of the terminal are obtained, and the next step of processing is carried out.
Optionally, the login request may further carry the number of times of use corresponding to the login credential information, and the instant messaging server may obtain the number of times of use, compare the number of times of use corresponding to the locally stored login credential information, and determine whether the number of times of use of the login request is equal to the number of times of use of the local storage plus 1. If not, the instant messaging server can determine that the terminal fails to log in. If so, further processing may be performed. In a possible situation, after the login request is hijacked, data playback may be performed, the number of times of use in the login request during normal data playback does not change, and when the instant messaging server receives the login request with the number of times of use for the second time, the instant messaging server may determine that the terminal has failed to login, so as to avoid the influence of the data playback on the security of the instant messaging application.
Similar to the step 108, after determining that the number of usage times of the login request is equal to the number of usage times of the local storage plus 1, the instant messaging server may determine whether the security number of the terminal and the corresponding item of the login credential information exist in the corresponding relationship between the security number and the login credential information. If not, it may be determined that the terminal has failed to log in. If the user number exists, the corresponding user number can be obtained, and the next step of processing is carried out.
Optionally, for a case that the login request further carries the device information, corresponding processing of the instant messaging server may be as follows: and determining whether a corresponding item of the security number of the terminal and the equipment information of the terminal exists in the pre-established corresponding relation between the security number and the equipment information.
In implementation, the instant messaging server may obtain the security number and the device information in the login request, and then may determine whether a corresponding item between the security number of the terminal and the device information of the terminal exists in a corresponding relationship between the locally stored security number and the device information. In a possible situation, the login credential information of the legal terminal is hijacked, and when the malicious terminal uses the login credential information, because the device information of the malicious terminal is different from that of the legal terminal, the instant messaging server cannot search for the corresponding item of the security number of the malicious terminal and the device information of the terminal. If the terminal does not exist, the instant communication server can determine that the terminal login fails, and the login credential information can only be used by the corresponding terminal. If so, the terminal login success can be determined, and the connection between the obtained user number and the terminal can be calibrated. Therefore, the user can use the account corresponding to the user number to carry out instant messaging on the terminal.
It should be noted that, the verification of the number of times of use and the verification of the corresponding relationship between the security number and the device information may exist in one process at the same time as the above-described process, so as to further improve the security of the login target instant messaging application, and may also be used in one process alternatively, and the processing procedure is similar to the above-described content, and is not described in detail here.
In the case of verification of the number of uses, the processing of the instant messaging server may be as follows: and if the corresponding item of the security number of the terminal and the login credential information of the terminal exists in the pre-established corresponding relation between the security number and the login credential information, and the using frequency corresponding to the login credential information is equal to the using frequency corresponding to the locally stored login credential information plus 1, determining that the terminal is successfully logged in.
In the case of verifying the corresponding relationship between the security number and the device information, the processing of the instant messaging server may be as follows: and if the corresponding item of the terminal security number and the login credential information of the terminal exists in the pre-established corresponding relationship between the security number and the login credential information, and the corresponding item of the terminal security number and the terminal device information exists in the pre-established corresponding relationship between the security number and the device information, determining that the terminal login is successful.
In addition, if the terminal is lost, the user may input the device information and the loss report information such as an account of the lost terminal through a security center of the instant messaging application, and then send a loss report request, which may include the loss report information, to the instant messaging server. After receiving the loss report request, the instant messaging server can acquire loss report information in the loss report request, delete a corresponding item in the corresponding relation between the security number and the equipment information according to the equipment information, determine a corresponding user number according to the account, and delete a corresponding item in the corresponding relation between the security number and the login credential information according to the user number. After the above processing, when other users find the lost terminal, the instant messaging application cannot be used through the account which the terminal has logged in, so that the information security of the user is ensured.
In the embodiment of the invention, the instant messaging server can allocate corresponding security numbers for each terminal provided with the target instant messaging application, when the terminal requests login verification to the service server, the security numbers can be sent to the service server, and further when the service server exchanges login credential information with the instant messaging server, the security numbers can be sent to the instant messaging server, and the instant messaging server can store the corresponding relation between the security numbers of the terminal and the login credential information, so that when the terminal requests to log in the instant messaging server, the instant messaging server can judge whether the security numbers correspond to the login credentials. Therefore, even if the login credential information of the terminal is stolen, when the corresponding relationship between the security number and the login credential information is not verified, the terminal which steals the login credential information cannot imitate the account corresponding to the login credential information to log in the instant messaging server, so that the security of the instant messaging application is improved.
Based on the same technical concept, the embodiment of the invention also provides a device for logging in the target instant messaging application, and the device can be the terminal in the embodiment. As shown in fig. 4, the apparatus includes:
a first sending module 410, configured to send a security number allocation request to an instant messaging server and receive a security number of a terminal sent by an instant messaging server when a target instant messaging application is started and if the security number of the terminal is not stored in the target instant messaging application;
a second sending module 420, configured to, when a login verification instruction triggered by a user operation is received, request login verification from a service server based on the security number and login information input by the user, and receive login credential information of the terminal sent by the service server;
a third sending module 430, configured to send a login request to the instant messaging server, where the login request carries a security number of the terminal and login credential information of the terminal.
Optionally, as shown in fig. 5, the terminal further includes:
a fourth sending module 440, configured to send the login request to the instant messaging server if the security number of the terminal is stored in the target instant messaging application and the login credential information of the terminal is stored in the target instant messaging application when the target instant messaging application is started.
Optionally, the security number allocation request carries device information of the terminal, where the device information includes a device manufacturer identifier and a device model; the login request also carries the equipment information.
Optionally, the second sending module 420 is configured to:
sending a login verification request carrying login information to a service server, and receiving a verification success character string sent by the service server after the login information is verified;
and sending a login credential acquisition request carrying the verification success character string and the security number to the service server.
Optionally, the third sending module 430 is configured to:
and encrypting the login request, calculating a corresponding hash signature for the encrypted login request, and sending the encrypted login request and the hash signature corresponding to the encrypted login request to the instant messaging server.
Optionally, the login request further carries the number of times of use corresponding to the login credential information.
Based on the same technical concept, the embodiment of the invention also provides a device for logging in the target instant messaging application, and the device can be the service server in the embodiment. As shown in fig. 6, the apparatus includes:
a first receiving module 610, configured to receive login information and a security number sent by a terminal;
a sending module 620, configured to send a login credential allocation request corresponding to the terminal to an instant messaging server if the login information is verified, where the login credential allocation request carries the security number;
a second receiving module 630, configured to receive login credential information of the terminal sent by the instant messaging server, and forward the login credential information to the terminal.
Optionally, the first receiving module 610 is configured to:
receiving a login verification request which is sent by a terminal and carries login information, and if the login information is verified to be passed, sending a verification success character string to the terminal;
and receiving a login credential acquisition request which is sent by the terminal and carries the verification success character string and the security number.
Based on the same technical concept, the embodiment of the invention also provides a device for logging in the target instant messaging application, and the device can be the instant messaging server in the embodiment. As shown in fig. 7, the apparatus includes:
a first determining module 710, configured to determine a security number of a terminal when receiving a security number allocation request sent by the terminal, and send the security number to the terminal;
a second determining module 720, configured to determine login credential information of the terminal when receiving a login credential allocation request sent by a service server and carrying a security number of the terminal, send the login credential information of the terminal to the service server, and add a corresponding item between the security number of the terminal and the login credential information of the terminal in a pre-established correspondence between the security number and the login credential information;
a third determining module 730, configured to receive a login request sent by the terminal and carrying the security number of the terminal and the login credential information of the terminal, and determine that the terminal has successfully logged in if a corresponding item between the security number of the terminal and the login credential information of the terminal exists in the pre-established correspondence between the security number and the login credential information.
Optionally, the security number allocation request carries device information of the terminal, where the device information includes a device manufacturer identifier and a device model; the login request also carries the equipment information;
the first determining module 710 is further configured to: adding a corresponding item of the security number of the terminal and the equipment information of the terminal in a pre-established corresponding relation between the security number and the equipment information;
the third determining module 730, configured to: and if the corresponding item of the terminal security number and the login credential information of the terminal exists in the pre-established corresponding relationship between the security number and the login credential information, and the corresponding item of the terminal security number and the device information exists in the pre-established corresponding relationship between the security number and the device information, determining that the terminal login is successful.
Optionally, the third determining module 730 is configured to:
and receiving the encrypted login request sent by the terminal and a hash signature corresponding to the encrypted login request, and if the hash signature is verified correctly based on the encrypted login request, decrypting the encrypted login request to obtain the login request carrying the security number of the terminal and the login credential information of the terminal.
Optionally, the login request further carries the number of times of use corresponding to the login credential information;
the third determining module 730, configured to: and if the corresponding item of the security number of the terminal and the login credential information of the terminal exists in the pre-established corresponding relation between the security number and the login credential information, and the using frequency corresponding to the login credential information is equal to the using frequency corresponding to the locally stored login credential information plus 1, determining that the terminal is successfully logged in.
With regard to the apparatus in the above-described embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment related to the method, and will not be elaborated here.
In the embodiment of the invention, the instant messaging server can allocate corresponding security numbers for each terminal provided with the target instant messaging application, when the terminal requests login verification to the service server, the security numbers can be sent to the service server, and further when the service server exchanges login credential information with the instant messaging server, the security numbers can be sent to the instant messaging server, and the instant messaging server can store the corresponding relation between the security numbers of the terminal and the login credential information, so that when the terminal requests to log in the instant messaging server, the instant messaging server can judge whether the security numbers correspond to the login credentials. Therefore, even if the login credential information of the terminal is stolen, when the corresponding relationship between the security number and the login credential information is not verified, the terminal which steals the login credential information cannot imitate the account corresponding to the login credential information to log in the instant messaging server, so that the security of the instant messaging application is improved.
It should be noted that: the device for logging in a target instant messaging application provided in the above embodiment is exemplified by only the division of the above functional modules when logging in the target instant messaging application, and in practical applications, the function distribution may be completed by different functional modules according to needs, that is, the internal structures of the terminal, the service server and the instant messaging server are divided into different functional modules to complete all or part of the above described functions. In addition, the device for logging in the target instant messaging application and the method embodiment for logging in the target instant messaging application provided by the above embodiments belong to the same concept, and specific implementation processes thereof are detailed in the method embodiment and are not described herein again.
Based on the same technical concept, the embodiment of the invention also provides a system for logging in target instant messaging application, which is characterized in that the system comprises a terminal, a service server and an instant messaging server, wherein:
the terminal is used for sending a security number distribution request to an instant messaging server and receiving the security number of the terminal sent by the instant messaging server if the security number of the terminal is not stored in the target instant messaging application when the target instant messaging application is started; when a login verification instruction triggered by user operation is received, requesting login verification from a service server based on the security number and login information input by a user, and receiving login credential information of the terminal sent by the service server; sending a login request to the instant messaging server, wherein the login request carries a security number of the terminal and login credential information of the terminal;
the service server is used for receiving login information and a security number sent by the terminal; if the login information is verified, sending a login certificate distribution request corresponding to the terminal to an instant messaging server, wherein the login certificate distribution request carries the security number; receiving login credential information of the terminal sent by the instant messaging server, and forwarding the login credential information to the terminal;
the instant messaging server is used for determining the security number of the terminal and sending the security number to the terminal when receiving a security number distribution request sent by the terminal; when a login credential distribution request which is sent by a service server and carries a security number of the terminal is received, determining login credential information of the terminal, sending the login credential information of the terminal to the service server, and adding a corresponding item of the security number of the terminal and the login credential information of the terminal in a pre-established corresponding relation between the security number and the login credential information; and receiving a login request which is sent by the terminal and carries the security number of the terminal and the login credential information of the terminal, and if the corresponding item of the security number of the terminal and the login credential information of the terminal exists in the pre-established corresponding relation between the security number and the login credential information, determining that the terminal is successfully logged in.
In the embodiment of the invention, the instant messaging server can allocate corresponding security numbers for each terminal provided with the target instant messaging application, when the terminal requests login verification to the service server, the security numbers can be sent to the service server, and further when the service server exchanges login credential information with the instant messaging server, the security numbers can be sent to the instant messaging server, and the instant messaging server can store the corresponding relation between the security numbers of the terminal and the login credential information, so that when the terminal requests to log in the instant messaging server, the instant messaging server can judge whether the security numbers correspond to the login credentials. Therefore, even if the login credential information of the terminal is stolen, when the corresponding relationship between the security number and the login credential information is not verified, the terminal which steals the login credential information cannot imitate the account corresponding to the login credential information to log in the instant messaging server, so that the security of the instant messaging application is improved.
Fig. 8 is a block diagram illustrating a terminal 800 according to an exemplary embodiment of the present invention. The terminal 800 may be: a smart phone, a tablet computer, an MP3 player (Moving Picture Experts Group Audio Layer III, motion video Experts compression standard Audio Layer 3), an MP4 player (Moving Picture Experts Group Audio Layer IV, motion video Experts compression standard Audio Layer 4), a notebook computer, or a desktop computer. The terminal 800 may also be referred to by other names such as user equipment, portable terminal, laptop terminal, desktop terminal, etc.
In general, the terminal 800 includes: a processor 801 and a memory 802.
The processor 801 may include one or more processing cores, such as a 4-core processor, an 8-core processor, and so forth. The processor 801 may be implemented in at least one hardware form of a DSP (Digital Signal Processing), an FPGA (Field-Programmable Gate Array), and a PLA (Programmable Logic Array). The processor 801 may also include a main processor and a coprocessor, where the main processor is a processor for Processing data in an awake state, and is also called a Central Processing Unit (CPU); a coprocessor is a low power processor for processing data in a standby state. In some embodiments, the processor 801 may be integrated with a GPU (Graphics Processing Unit), which is responsible for rendering and drawing the content required to be displayed on the display screen. In some embodiments, the processor 801 may further include an AI (Artificial Intelligence) processor for processing computing operations related to machine learning.
In some embodiments, the terminal 800 may further include: a peripheral interface 803 and at least one peripheral. The processor 801, memory 802 and peripheral interface 803 may be connected by bus or signal lines. Various peripheral devices may be connected to peripheral interface 803 by a bus, signal line, or circuit board. Specifically, the peripheral device includes: at least one of a radio frequency circuit 804, a touch screen display 805, a camera 806, an audio circuit 807, a positioning component 808, and a power supply 809.
The peripheral interface 803 may be used to connect at least one peripheral related to I/O (Input/Output) to the processor 801 and the memory 802. In some embodiments, the processor 801, memory 802, and peripheral interface 803 are integrated on the same chip or circuit board; in some other embodiments, any one or two of the processor 801, the memory 802, and the peripheral interface 803 may be implemented on separate chips or circuit boards, which are not limited by this embodiment.
The Radio Frequency circuit 804 is used for receiving and transmitting RF (Radio Frequency) signals, also called electromagnetic signals. The radio frequency circuitry 804 communicates with communication networks and other communication devices via electromagnetic signals. The rf circuit 804 converts an electrical signal into an electromagnetic signal to be transmitted, or converts a received electromagnetic signal into an electrical signal. Optionally, the radio frequency circuit 804 includes: an antenna system, an RF transceiver, one or more amplifiers, a tuner, an oscillator, a digital signal processor, a codec chipset, a subscriber identity module card, and so forth. The radio frequency circuit 804 may communicate with other terminals via at least one wireless communication protocol. The wireless communication protocols include, but are not limited to: metropolitan area networks, various generation mobile communication networks (2G, 3G, 4G, and 5G), Wireless local area networks, and/or WiFi (Wireless Fidelity) networks. In some embodiments, the radio frequency circuit 804 may further include NFC (Near Field Communication) related circuits, which are not limited in this application.
The display screen 805 is used to display a UI (User Interface). The UI may include graphics, text, icons, video, and any combination thereof. When the display 805 is a touch display, the display 805 also has the ability to capture touch signals on or above the surface of the display 805. The touch signal may be input to the processor 801 as a control signal for processing. At this point, the display 805 may also be used to provide virtual buttons and/or a virtual keyboard, also referred to as soft buttons and/or a soft keyboard. In some embodiments, the display 805 may be one, providing the front panel of the terminal 800; in other embodiments, the display 805 may be at least two, respectively disposed on different surfaces of the terminal 800 or in a folded design; in still other embodiments, the display 805 may be a flexible display disposed on a curved surface or a folded surface of the terminal 800. Even further, the display 805 may be arranged in a non-rectangular irregular pattern, i.e., a shaped screen. The Display 805 can be made of LCD (Liquid Crystal Display), OLED (organic light-Emitting Diode), and other materials.
The camera assembly 806 is used to capture images or video. Optionally, camera assembly 806 includes a front camera and a rear camera. Generally, a front camera is disposed at a front panel of the terminal, and a rear camera is disposed at a rear surface of the terminal. In some embodiments, the number of the rear cameras is at least two, and each rear camera is any one of a main camera, a depth-of-field camera, a wide-angle camera and a telephoto camera, so that the main camera and the depth-of-field camera are fused to realize a background blurring function, and the main camera and the wide-angle camera are fused to realize panoramic shooting and VR (Virtual Reality) shooting functions or other fusion shooting functions. In some embodiments, camera assembly 806 may also include a flash. The flash lamp can be a monochrome temperature flash lamp or a bicolor temperature flash lamp. The double-color-temperature flash lamp is a combination of a warm-light flash lamp and a cold-light flash lamp, and can be used for light compensation at different color temperatures.
The audio circuit 807 may include a microphone and a speaker. The microphone is used for collecting sound waves of a user and the environment, converting the sound waves into electric signals, and inputting the electric signals to the processor 801 for processing or inputting the electric signals to the radio frequency circuit 804 to realize voice communication. For the purpose of stereo sound collection or noise reduction, a plurality of microphones may be provided at different portions of the terminal 800. The microphone may also be an array microphone or an omni-directional pick-up microphone. The speaker is used to convert electrical signals from the processor 801 or the radio frequency circuit 804 into sound waves. The loudspeaker can be a traditional film loudspeaker or a piezoelectric ceramic loudspeaker. When the speaker is a piezoelectric ceramic speaker, the speaker can be used for purposes such as converting an electric signal into a sound wave audible to a human being, or converting an electric signal into a sound wave inaudible to a human being to measure a distance. In some embodiments, the audio circuitry 807 may also include a headphone jack.
The positioning component 808 is used to locate the current geographic position of the terminal 800 for navigation or LBS (Location Based Service). The Positioning component 808 may be a Positioning component based on the GPS (Global Positioning System) in the united states, the beidou System in china, the graves System in russia, or the galileo System in the european union.
In some embodiments, terminal 800 also includes one or more sensors 810. The one or more sensors 810 include, but are not limited to: acceleration sensor 811, gyro sensor 812, pressure sensor 813, fingerprint sensor 814, optical sensor 815 and proximity sensor 816.
The acceleration sensor 811 may detect the magnitude of acceleration in three coordinate axes of the coordinate system established with the terminal 800. For example, the acceleration sensor 811 may be used to detect the components of the gravitational acceleration in three coordinate axes. The processor 801 may control the touch screen 805 to display the user interface in a landscape view or a portrait view according to the gravitational acceleration signal collected by the acceleration sensor 811. The acceleration sensor 811 may also be used for acquisition of motion data of a game or a user.
The gyro sensor 812 may detect a body direction and a rotation angle of the terminal 800, and the gyro sensor 812 may cooperate with the acceleration sensor 811 to acquire a 3D motion of the user with respect to the terminal 800. From the data collected by the gyro sensor 812, the processor 801 may implement the following functions: motion sensing (such as changing the UI according to a user's tilting operation), image stabilization at the time of photographing, game control, and inertial navigation.
Pressure sensors 813 may be disposed on the side bezel of terminal 800 and/or underneath touch display 805. When the pressure sensor 813 is disposed on the side frame of the terminal 800, the holding signal of the user to the terminal 800 can be detected, and the processor 801 performs left-right hand recognition or shortcut operation according to the holding signal collected by the pressure sensor 813. When the pressure sensor 813 is disposed at a lower layer of the touch display screen 805, the processor 801 controls the operability control on the UI interface according to the pressure operation of the user on the touch display screen 805. The operability control comprises at least one of a button control, a scroll bar control, an icon control and a menu control.
The fingerprint sensor 814 is used for collecting a fingerprint of the user, and the processor 801 identifies the identity of the user according to the fingerprint collected by the fingerprint sensor 814, or the fingerprint sensor 814 identifies the identity of the user according to the collected fingerprint. Upon identifying that the user's identity is a trusted identity, the processor 801 authorizes the user to perform relevant sensitive operations including unlocking a screen, viewing encrypted information, downloading software, paying for and changing settings, etc. Fingerprint sensor 814 may be disposed on the front, back, or side of terminal 800. When a physical button or a vendor Logo is provided on the terminal 800, the fingerprint sensor 814 may be integrated with the physical button or the vendor Logo.
The optical sensor 815 is used to collect the ambient light intensity. In one embodiment, the processor 801 may control the display brightness of the touch screen 805 based on the ambient light intensity collected by the optical sensor 815. Specifically, when the ambient light intensity is high, the display brightness of the touch display screen 805 is increased; when the ambient light intensity is low, the display brightness of the touch display 805 is turned down. In another embodiment, the processor 801 may also dynamically adjust the shooting parameters of the camera assembly 806 based on the ambient light intensity collected by the optical sensor 815.
A proximity sensor 816, also known as a distance sensor, is typically provided on the front panel of the terminal 800. The proximity sensor 816 is used to collect the distance between the user and the front surface of the terminal 800. In one embodiment, when the proximity sensor 816 detects that the distance between the user and the front surface of the terminal 800 gradually decreases, the processor 801 controls the touch display 805 to switch from the bright screen state to the dark screen state; when the proximity sensor 816 detects that the distance between the user and the front surface of the terminal 800 becomes gradually larger, the processor 801 controls the touch display 805 to switch from the screen-on state to the screen-on state.
Those skilled in the art will appreciate that the configuration shown in fig. 8 is not intended to be limiting of terminal 800 and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components may be used.
Fig. 9 is a schematic structural diagram of a service server according to an embodiment of the present invention, where the service server 900 may generate a relatively large difference due to different configurations or performances, and may include one or more processors 901 and one or more memories 902, where the memory 902 stores at least one instruction, and the at least one instruction is loaded and executed by the processors 901 to implement the following method steps of image processing:
receiving login information and a security number sent by a terminal;
if the login information is verified, sending a login certificate distribution request corresponding to the terminal to an instant messaging server, wherein the login certificate distribution request carries the security number;
and receiving login credential information of the terminal sent by the instant messaging server, and forwarding the login credential information to the terminal.
Optionally, the at least one instruction is loaded and executed by the processor 901 to implement the following method steps:
receiving a login verification request which is sent by a terminal and carries login information, and if the login information is verified to be passed, sending a verification success character string to the terminal;
and receiving a login credential acquisition request which is sent by the terminal and carries the verification success character string and the security number.
Fig. 10 is a schematic structural diagram of an instant messaging server according to an embodiment of the present invention, where the instant messaging server 1000 may generate a relatively large difference due to different configurations or performances, and may include one or more processors 1001 and one or more memories 1002, where the memory 1002 stores at least one instruction, and the at least one instruction is loaded and executed by the processor 1001 to implement the following method steps of image processing:
when a security number distribution request sent by a terminal is received, determining the security number of the terminal, and sending the security number to the terminal;
when a login credential distribution request which is sent by a service server and carries a security number of the terminal is received, determining login credential information of the terminal, sending the login credential information of the terminal to the service server, and adding a corresponding item of the security number of the terminal and the login credential information of the terminal in a pre-established corresponding relation between the security number and the login credential information;
and receiving a login request which is sent by the terminal and carries the security number of the terminal and the login credential information of the terminal, and if the corresponding item of the security number of the terminal and the login credential information of the terminal exists in the pre-established corresponding relation between the security number and the login credential information, determining that the terminal is successfully logged in.
Optionally, the security number allocation request carries device information of the terminal, where the device information includes a device manufacturer identifier and a device model; the login request also carries the equipment information;
the at least one instruction is loaded and executed by the processor 1001 to implement the following method steps: adding a corresponding item of the security number of the terminal and the equipment information of the terminal in a pre-established corresponding relation between the security number and the equipment information;
and if the corresponding item of the terminal security number and the login credential information of the terminal exists in the pre-established corresponding relationship between the security number and the login credential information, and the corresponding item of the terminal security number and the device information exists in the pre-established corresponding relationship between the security number and the device information, determining that the terminal login is successful.
Optionally, the at least one instruction is loaded and executed by the processor 1001 to implement the following method steps:
and receiving the encrypted login request sent by the terminal and a hash signature corresponding to the encrypted login request, and if the hash signature is verified correctly based on the encrypted login request, decrypting the encrypted login request to obtain the login request carrying the security number of the terminal and the login credential information of the terminal.
Optionally, the login request further carries the number of times of use corresponding to the login credential information;
the at least one instruction is loaded and executed by the processor 1001 to implement the following method steps: and if the corresponding item of the security number of the terminal and the login credential information of the terminal exists in the pre-established corresponding relation between the security number and the login credential information, and the using frequency corresponding to the login credential information is equal to the using frequency corresponding to the locally stored login credential information plus 1, determining that the terminal is successfully logged in.
In the embodiment of the invention, the instant messaging server can allocate corresponding security numbers for each terminal provided with the target instant messaging application, when the terminal requests login verification to the service server, the security numbers can be sent to the service server, and further when the service server exchanges login credential information with the instant messaging server, the security numbers can be sent to the instant messaging server, and the instant messaging server can store the corresponding relation between the security numbers of the terminal and the login credential information, so that when the terminal requests to log in the instant messaging server, the instant messaging server can judge whether the security numbers correspond to the login credentials. Therefore, even if the login credential information of the terminal is stolen, when the corresponding relationship between the security number and the login credential information is not verified, the terminal which steals the login credential information cannot imitate the account corresponding to the login credential information to log in the instant messaging server, so that the security of the instant messaging application is improved.
It will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by a program instructing relevant hardware, where the program may be stored in a computer-readable storage medium, and the above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.
Claims (20)
1. A method for logging in a target instant messaging application is applied to a terminal, and the method comprises the following steps:
when a target instant messaging application is started, if the security number of the terminal is not stored in the target instant messaging application, sending a security number distribution request to an instant messaging server, and receiving the security number of the terminal sent by the instant messaging server;
when a login verification instruction triggered by user operation is received, requesting login verification from a service server based on the security number and login information input by a user, and receiving login credential information of the terminal sent by the service server;
and sending a login request to the instant messaging server so that the instant messaging server determines that the terminal logs in successfully when a corresponding item of the security number of the terminal and login credential information of the terminal exists in a pre-established corresponding relation between the security number and the login credential information, wherein the login request carries the security number of the terminal and the login credential information of the terminal.
2. The method of claim 1, further comprising:
and when the target instant messaging application is started, if the security number of the terminal is stored in the target instant messaging application and the login credential information of the terminal is stored in the target instant messaging application, sending the login request to the instant messaging server.
3. The method according to any one of claims 1-2, wherein the security number assignment request carries device information of the terminal, and the device information includes a device manufacturer identifier and a device model; the login request also carries the equipment information.
4. The method according to any one of claims 1-2, wherein requesting login authentication from the service server based on the security number and login information entered by the user comprises:
sending a login verification request carrying login information to a service server, and receiving a verification success character string sent by the service server after the login information is verified;
and sending a login credential acquisition request carrying the verification success character string and the security number to the service server.
5. The method according to any one of claims 1-2, wherein said sending a login request to said instant messaging server comprises:
and encrypting the login request, calculating a corresponding hash signature for the encrypted login request, and sending the encrypted login request and the hash signature corresponding to the encrypted login request to the instant messaging server.
6. The method according to any of claims 1-2, wherein the login request further carries usage times corresponding to the login credential information.
7. A method for logging in a target instant messaging application, which is applied to a service server, is characterized in that the method comprises the following steps:
receiving login information and a security number sent by a terminal;
if the login information is verified, sending a login certificate distribution request corresponding to the terminal to an instant messaging server, wherein the login certificate distribution request carries the security number;
receiving login credential information of the terminal sent by the instant messaging server, forwarding the login credential information to the terminal so that the terminal sends a login request to the instant messaging server, and when a corresponding item of a security number of the terminal and the login credential information of the terminal exists in a pre-established corresponding relation between the security number and the login credential information, determining that the terminal is successfully logged in by the instant messaging server, wherein the login request carries the security number of the terminal and the login credential information of the terminal.
8. The method of claim 7, wherein the receiving the login information and the security number sent by the terminal comprises:
receiving a login verification request which is sent by a terminal and carries login information, and if the login information is verified to be passed, sending a verification success character string to the terminal;
and receiving a login credential acquisition request which is sent by the terminal and carries the verification success character string and the security number.
9. A method for logging in a target instant messaging application, which is applied to an instant messaging server, and comprises the following steps:
when a security number distribution request sent by a terminal is received, determining the security number of the terminal, and sending the security number to the terminal;
when a login credential distribution request which is sent by a service server and carries a security number of the terminal is received, determining login credential information of the terminal, sending the login credential information of the terminal to the service server, and adding a corresponding item of the security number of the terminal and the login credential information of the terminal in a pre-established corresponding relation between the security number and the login credential information;
and receiving a login request which is sent by the terminal and carries the security number of the terminal and the login credential information of the terminal, and if the corresponding item of the security number of the terminal and the login credential information of the terminal exists in the pre-established corresponding relation between the security number and the login credential information, determining that the terminal is successfully logged in.
10. The method according to claim 9, wherein the security number assignment request carries device information of the terminal, and the device information includes a device manufacturer identifier and a device model; the login request also carries the equipment information;
after the determining the security number of the terminal, the method further includes: adding a corresponding item of the security number of the terminal and the equipment information of the terminal in a pre-established corresponding relation between the security number and the equipment information;
if the corresponding item of the terminal security number and the terminal login credential information exists in the pre-established corresponding relationship between the security number and the login credential information, determining that the terminal login is successful, including: and if the corresponding item of the terminal security number and the login credential information of the terminal exists in the pre-established corresponding relationship between the security number and the login credential information, and the corresponding item of the terminal security number and the device information exists in the pre-established corresponding relationship between the security number and the device information, determining that the terminal login is successful.
11. The method according to claim 9, wherein the receiving the login request sent by the terminal and carrying the device number of the terminal and the login credential information of the terminal comprises:
and receiving the encrypted login request sent by the terminal and a hash signature corresponding to the encrypted login request, and if the hash signature is verified correctly based on the encrypted login request, decrypting the encrypted login request to obtain the login request carrying the security number of the terminal and the login credential information of the terminal.
12. The method according to claim 9, wherein the login request further carries usage times corresponding to the login credential information;
if the corresponding item of the terminal security number and the terminal login credential information exists in the pre-established corresponding relationship between the security number and the login credential information, determining that the terminal login is successful, including: and if the corresponding item of the security number of the terminal and the login credential information of the terminal exists in the pre-established corresponding relation between the security number and the login credential information, and the using frequency corresponding to the login credential information is equal to the using frequency corresponding to the locally stored login credential information plus 1, determining that the terminal is successfully logged in.
13. A terminal, characterized in that the terminal comprises:
the system comprises a first sending module, a second sending module and a third sending module, wherein the first sending module is used for sending a security number distribution request to an instant messaging server and receiving the security number of the terminal sent by the instant messaging server when a target instant messaging application is started and if the security number of the terminal is not stored in the target instant messaging application;
the second sending module is used for requesting login verification to a service server based on the security number and login information input by a user when a login verification instruction triggered by user operation is received, and receiving login credential information of the terminal sent by the service server;
a third sending module, configured to send a login request to the instant messaging server, so that when a corresponding item between the security number of the terminal and login credential information of the terminal exists in a pre-established corresponding relationship between the security number and the login credential information, the instant messaging server determines that the terminal has successfully logged in, where the login request carries the security number of the terminal and the login credential information of the terminal.
14. A service server, characterized in that the service server comprises:
the first receiving module is used for receiving login information and a security number sent by a terminal;
the sending module is used for sending a login credential distribution request corresponding to the terminal to an instant messaging server if the login information is verified, wherein the login credential distribution request carries the security number;
the second receiving module is configured to receive login credential information of the terminal sent by the instant messaging server, and forward the login credential information to the terminal, so that the terminal sends a login request to the instant messaging server, and when a corresponding item between a security number of the terminal and the login credential information of the terminal exists in a pre-established correspondence between the security number and the login credential information, the instant messaging server determines that the terminal has successfully logged in, where the login request carries the security number of the terminal and the login credential information of the terminal.
15. An instant messaging server, the instant messaging server comprising:
the terminal comprises a first determining module, a second determining module and a third determining module, wherein the first determining module is used for determining a security number of a terminal and sending the security number to the terminal when receiving a security number distribution request sent by the terminal;
a second determining module, configured to determine login credential information of the terminal when receiving a login credential allocation request sent by a service server and carrying a security number of the terminal, send the login credential information of the terminal to the service server, and add a corresponding item between the security number of the terminal and the login credential information of the terminal in a pre-established correspondence between the security number and the login credential information;
and the third determining module is used for receiving a login request which is sent by the terminal and carries the security number of the terminal and the login credential information of the terminal, and if the corresponding item of the security number of the terminal and the login credential information of the terminal exists in the pre-established corresponding relation between the security number and the login credential information, the terminal is determined to be successfully logged in.
16. A system for logging in target instant messaging application is characterized in that the system comprises a terminal, a service server and an instant messaging server, wherein:
the terminal is used for sending a security number distribution request to an instant messaging server and receiving the security number of the terminal sent by the instant messaging server if the security number of the terminal is not stored in the target instant messaging application when the target instant messaging application is started; when a login verification instruction triggered by user operation is received, requesting login verification from a service server based on the security number and login information input by a user, and receiving login credential information of the terminal sent by the service server; sending a login request to the instant messaging server, wherein the login request carries a security number of the terminal and login credential information of the terminal;
the service server is used for receiving login information and a security number sent by the terminal; if the login information is verified, sending a login certificate distribution request corresponding to the terminal to an instant messaging server, wherein the login certificate distribution request carries the security number; receiving login credential information of the terminal sent by the instant messaging server, and forwarding the login credential information to the terminal;
the instant messaging server is used for determining the security number of the terminal and sending the security number to the terminal when receiving a security number distribution request sent by the terminal; when a login credential distribution request which is sent by a service server and carries a security number of the terminal is received, determining login credential information of the terminal, sending the login credential information of the terminal to the service server, and adding a corresponding item of the security number of the terminal and the login credential information of the terminal in a pre-established corresponding relation between the security number and the login credential information; and receiving a login request which is sent by the terminal and carries the security number of the terminal and the login credential information of the terminal, and if the corresponding item of the security number of the terminal and the login credential information of the terminal exists in the pre-established corresponding relation between the security number and the login credential information, determining that the terminal is successfully logged in.
17. A terminal, characterized in that the terminal comprises a processor and a memory, wherein at least one instruction is stored in the memory, and the instruction is loaded and executed by the processor to realize the method for logging in a target instant messaging application according to any one of claims 1 to 6.
18. A service server, comprising a processor and a memory, wherein the memory stores at least one instruction, and the instruction is loaded and executed by the processor to implement the method for logging in a target instant messaging application according to any one of claims 7 to 8.
19. An instant messaging server comprising a processor and a memory, the memory having stored therein at least one instruction which is loaded and executed by the processor to implement a method of logging into a target instant messaging application as claimed in any one of claims 9 to 12.
20. A computer-readable storage medium having stored thereon at least one instruction which is loaded and executed by a processor to implement a method of logging into a target instant messaging application according to any one of claims 1 to 12.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810608438.6A CN108683684B (en) | 2018-06-13 | 2018-06-13 | Method, device and system for logging in target instant messaging application |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810608438.6A CN108683684B (en) | 2018-06-13 | 2018-06-13 | Method, device and system for logging in target instant messaging application |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108683684A CN108683684A (en) | 2018-10-19 |
CN108683684B true CN108683684B (en) | 2021-03-09 |
Family
ID=63811043
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810608438.6A Active CN108683684B (en) | 2018-06-13 | 2018-06-13 | Method, device and system for logging in target instant messaging application |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108683684B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111683072A (en) * | 2020-05-29 | 2020-09-18 | 呱呱网络科技(大连)有限公司 | Remote verification method and remote verification system |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102231716A (en) * | 2011-06-30 | 2011-11-02 | 重庆新媒农信科技有限公司 | Instant communication service login method |
CN103391292A (en) * | 2013-07-18 | 2013-11-13 | 百度在线网络技术(北京)有限公司 | Mobile-application-oriented safe login method, system and device |
CN105828327A (en) * | 2015-01-04 | 2016-08-03 | 中国移动通信集团安徽有限公司 | Login authentication method, login authentication device, and login authentication system |
CN106506433A (en) * | 2015-09-06 | 2017-03-15 | 中兴通讯股份有限公司 | Login authentication method, certificate server, Authentication Client and login client |
CN107493280A (en) * | 2017-08-15 | 2017-12-19 | 中国联合网络通信集团有限公司 | Method, intelligent gateway and the certificate server of user authentication |
CN107645486A (en) * | 2016-12-28 | 2018-01-30 | 平安科技(深圳)有限公司 | Login authentication method and device |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140297787A1 (en) * | 2013-03-29 | 2014-10-02 | Kevin A. Baugh | Systems, methods, and mediums for components and applications comprising components |
-
2018
- 2018-06-13 CN CN201810608438.6A patent/CN108683684B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102231716A (en) * | 2011-06-30 | 2011-11-02 | 重庆新媒农信科技有限公司 | Instant communication service login method |
CN103391292A (en) * | 2013-07-18 | 2013-11-13 | 百度在线网络技术(北京)有限公司 | Mobile-application-oriented safe login method, system and device |
CN105828327A (en) * | 2015-01-04 | 2016-08-03 | 中国移动通信集团安徽有限公司 | Login authentication method, login authentication device, and login authentication system |
CN106506433A (en) * | 2015-09-06 | 2017-03-15 | 中兴通讯股份有限公司 | Login authentication method, certificate server, Authentication Client and login client |
CN107645486A (en) * | 2016-12-28 | 2018-01-30 | 平安科技(深圳)有限公司 | Login authentication method and device |
CN107493280A (en) * | 2017-08-15 | 2017-12-19 | 中国联合网络通信集团有限公司 | Method, intelligent gateway and the certificate server of user authentication |
Also Published As
Publication number | Publication date |
---|---|
CN108683684A (en) | 2018-10-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109615515B (en) | Credit right certificate transfer method, device, electronic equipment and storage medium | |
CN110245144B (en) | Protocol data management method, device, storage medium and system | |
CN108833607B (en) | Physical address acquisition method, device and readable medium | |
CN108769992B (en) | User authentication method, device, terminal and storage medium | |
CN109547495B (en) | Sensitive operation processing method, device, server, terminal and storage medium | |
CN111506884A (en) | User invitation method, device, computer equipment and computer readable storage medium | |
CN109688147A (en) | Using login method, device, terminal, server, system and storage medium | |
CN110365501B (en) | Method and device for group joining processing based on graphic code | |
CN110690999B (en) | Bandwidth allocation method, device and equipment based on block chain and storage medium | |
CN110598386B (en) | Block chain-based data processing method, device, equipment and storage medium | |
CN111404991A (en) | Method, device, electronic equipment and medium for acquiring cloud service | |
CN110677262B (en) | Information notarization method, device and system based on blockchain | |
CN111193702B (en) | Method and device for data encryption transmission | |
CN115329309A (en) | Verification method, verification device, electronic equipment and storage medium | |
CN110290191B (en) | Resource transfer result processing method, device, server, terminal and storage medium | |
CN111062725A (en) | Face payment method, device and system and computer readable storage medium | |
CN113852459A (en) | Key agreement method, device and computer readable storage medium | |
CN111198922B (en) | Game resource management method and device based on block chain | |
CN108683684B (en) | Method, device and system for logging in target instant messaging application | |
CN110727894A (en) | Target material setting method, device, equipment and storage medium | |
CN112528311B (en) | Data management method, device and terminal | |
CN111131619B (en) | Account switching processing method, device and system | |
CN110971692B (en) | Method and device for opening service and computer storage medium | |
CN110555924B (en) | Method and device for unlocking processing | |
CN113630405A (en) | Network access authentication method and device, electronic equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |