CN108900559A - Management method, device, computer equipment and the storage medium of logging on authentication - Google Patents
Management method, device, computer equipment and the storage medium of logging on authentication Download PDFInfo
- Publication number
- CN108900559A CN108900559A CN201811124257.2A CN201811124257A CN108900559A CN 108900559 A CN108900559 A CN 108900559A CN 201811124257 A CN201811124257 A CN 201811124257A CN 108900559 A CN108900559 A CN 108900559A
- Authority
- CN
- China
- Prior art keywords
- authentication
- logging
- server
- application program
- request
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0807—Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
Abstract
The embodiment of the present application discloses management method, device, computer equipment and the storage medium of a kind of logging on authentication, and wherein method includes:The corresponding log-on message of login application program is obtained, the log-on message is sent to server so as to log-on message described in the server authentication and generate logging on authentication after being verified;The logging on authentication that the server is sent is received, the logging on authentication includes timeliness duration;Detection in the timeliness duration whether to the server send network request;If not sending network request to the server in the timeliness duration, judge whether the operating parameter of the application program meets preset operating conditions;If the operating parameter of the application program meets the preset operating conditions, transmission renews request to the server to complete to renew the logging on authentication.This method can avoid the puzzlement for needing to re-operate because logging on authentication is expired, and then improve the Experience Degree of user.
Description
Technical field
This application involves field of communication technology more particularly to a kind of management methods of logging on authentication, device, computer equipment
And storage medium.
Background technique
Currently, needing user to input account and password in login application program and sending the account and password to
The back-end server of application program is verified, and server can return to user one specific login state after being proved to be successful
Token (logging on authentication), subsequent user need to take the token when sending network request to identify the identity of the user.Currently,
Login state token is fixed in industry and did not initiated to request more than ten minutes, which will cease to be in force automatically.But
Under the scene of especially complex time-consuming, for example user is needed once to fill in mass data, if it has been more than very that user, which operates duration,
Clock, will report an error (i.e. token failure) when retransmiting network request, and user needs weight login authentication, thereby result in user experience
It is poor.
Summary of the invention
This application provides a kind of management method of logging on authentication, device, computer equipment and storage mediums, it is intended to improve
The Experience Degree of user.
This application provides a kind of management methods of logging on authentication comprising:
The corresponding log-on message of login application program is obtained, the log-on message is sent to server so that the service
Device verifies the log-on message and generates logging on authentication after being verified;
The logging on authentication that the server is sent is received, the logging on authentication includes timeliness duration;
Detection in the timeliness duration whether to the server send network request;
If not sending network request to the server in the timeliness duration, the operation ginseng of the application program is judged
Whether number meets preset operating conditions;
If the operating parameter of the application program meets the preset operating conditions, transmission renews request to the server
To complete to renew the logging on authentication.
This application provides a kind of managing devices of logging on authentication comprising:
Transmission unit is obtained to be sent to the log-on message for obtaining the corresponding log-on message of login application program
Server after being verified so as to log-on message described in the server authentication and generate logging on authentication;
Voucher receiving unit, the logging on authentication sent for receiving the server, when the logging on authentication includes timeliness
It is long;
Request detection unit, for detect in the timeliness duration whether to the server send network request;
Condition judgment unit, if judging institute for not sending network request to the server in the timeliness duration
Whether the operating parameter for stating application program meets preset operating conditions;
Request transmitting unit is sent continuous if the operating parameter for the application program meets the preset operating conditions
Phase requests to the server to complete to renew the logging on authentication.
Present invention also provides a kind of computer equipments comprising memory, processor and is stored on the memory
And the computer program that can be run on the processor, the processor realize provided by the present application when executing described program
The step of management method of logging on authentication described in meaning one.
Present invention also provides a kind of computer storage mediums, wherein the computer storage medium is stored with computer journey
Sequence, the computer program execute the processor to step on described in any embodiment provided by the present application when being executed by processor
The step of recording the management method of voucher.
The embodiment of the present application provides management method, device, computer equipment and the storage medium of logging on authentication, by obtaining
The corresponding log-on message of login application program is taken, the log-on message is sent to server so that login described in the server
Information verify and generates logging on authentication after being verified;The logging on authentication that the server is sent is received, wherein described
Logging on authentication includes timeliness duration;When detecting the not sent network request in the timeliness duration in logging on authentication, sentence
Whether the operating parameter for the application program of breaking meets preset operating conditions;If described in the operating parameter of the application program meets
Preset operating conditions are completed to renew the logging on authentication according to the corresponding default rule that renews of the preset operating conditions.
The puzzlement for needing to re-operate because logging on authentication is expired is thus avoided, and then improves the Experience Degree of user.
Detailed description of the invention
Technical solution in ord to more clearly illustrate embodiments of the present application, below will be to needed in embodiment description
Attached drawing is briefly described, it should be apparent that, the accompanying drawings in the following description is some embodiments of the present application, general for this field
For logical technical staff, without creative efforts, it is also possible to obtain other drawings based on these drawings.
Fig. 1 is a kind of schematic flow diagram of the management method for logging on authentication that one embodiment of the application provides;
Fig. 2 is the schematic flow diagram for the step of judgement that one embodiment of the application provides meets service condition;
Fig. 3 is the schematic flow diagram for the step of transmission that one embodiment of the application provides renews request;
Fig. 4 is the schematic flow diagram for the step of judgement that another embodiment of the application provides meets service condition;
Fig. 5 is the schematic flow diagram for the step of transmission that another embodiment of the application provides renews request;
Fig. 6 is the schematic block diagram of the managing device for the logging on authentication that another embodiment of the application provides;
Fig. 7 is a kind of schematic block diagram for computer equipment that one embodiment of the application provides.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete
Site preparation description, it is clear that described embodiment is some embodiments of the present application, instead of all the embodiments.Based on this Shen
Please in embodiment, every other implementation obtained by those of ordinary skill in the art without making creative efforts
Example, shall fall in the protection scope of this application.
It should be appreciated that ought use in this specification and in the appended claims, term " includes " and "comprising" instruction
Described feature, entirety, step, operation, the presence of element and/or component, but one or more of the other feature, whole is not precluded
Body, step, operation, the presence or addition of element, component and/or its set.
It is also understood that mesh of the term used in this present specification merely for the sake of description specific embodiment
And be not intended to limit the application.As present specification and it is used in the attached claims, unless on
Other situations are hereafter clearly indicated, otherwise " one " of singular, "one" and "the" are intended to include plural form.
It will be further appreciated that the term "and/or" used in present specification and the appended claims is
Refer to any combination and all possible combinations of one or more of associated item listed, and including these combinations.
Referring to Fig. 1, Fig. 1 is a kind of exemplary flow of the management method for logging on authentication that one embodiment of the application provides
Figure.The management method be applied to terminal in, the terminal can be smart phone, tablet computer, laptop, desktop computer,
The electronic equipments such as personal digital assistant and wearable device.As shown in Figure 1, the management method includes step S101~S105.
S101, the corresponding log-on message of login application program is obtained, the log-on message is sent to server so that institute
It states log-on message described in server authentication and generates logging on authentication after being verified.
Specifically, terminal obtains the log-on message inputted when user's login application program, and the log-on message includes:User
The login account and login password of input, and login account and login password are submitted into the corresponding service of the application program
Device.
Wherein, the server verifies the login account and login password, if the login account and login
Cryptographic check passes through, and generates logging on authentication (token value), the logging on authentication is stored in database, while also stepping on described
Record voucher returns to terminal.After client (client of application program) in terminal receives the token value of return, it can be protected
There are local memories, as common parameter, i.e., after each request server when all carry the token value, submit to server
So that the server verifies the token value.
Wherein, after server receives network request, token value is extracted from the network request and is stored in data
The token value in library compares verification.If two token values are identical, illustrate that user logins successfully, and is currently in login
State, normal returned data, allows application program to show data at this time.If two token values are inconsistent, illustrate original login
It is no longer valid, error status code is returned at this time, is prompted user to jump to login interface and is logged in again.
S102, the logging on authentication that the server is sent is received, the logging on authentication includes timeliness duration.
Specifically, the server verifies the log-on message, according to the log-on message after being verified
Logging on authentication is generated, the logging on authentication includes timeliness duration, which refers to the effective time of logging on authentication, such as should
A length of 10 minutes when timeliness, if after 10 minutes, still do not sent to the server after terminal receives logging on authentication
Network request, the then automatic timeliness of logging on authentication.
S103, detection in the timeliness duration whether to the server send network request.
Specifically, whether terminal detects to server transmission network request in the timeliness duration, wherein described
It include logging on authentication in network request.If detecting and sending the network request in the timeliness duration, continue to repeat to hold
Row step S103;If detecting the not sent network request in the timeliness duration, S104 is thened follow the steps.
S104, judge whether the operating parameter of the application program meets preset operating conditions.
Specifically, if not sending network request to the server in the timeliness duration, judge the application program
Operating parameter whether meet preset operating conditions.Wherein, step S104 includes the steps that judgement meets service condition, such as Fig. 2
Shown, which specifically includes the following contents:
Whether S104a, the detection application program are in the front stage operation state of terminal;If S104b, the application program
Front stage operation state in the terminal detects whether operational motion occurs on the program interface of the application program;
If operational motion occurs on the program interface of S104c, the application program, determine that the operating parameter of the application program meets institute
State preset operating conditions.
Specifically, it when the program interface for the application program being opened is shown on the screen of the terminal, is answered described in judgement
The front stage operation state of terminal is in program.When detecting that user operates described program interface, such as input text
Word information, slide or clicking operation etc. determine that the operating parameter of the application program meets the preset operating conditions.
If the operating parameter of S105, the application program meet the preset operating conditions, transmission, which renews, is requested to described
Server is to complete to renew the logging on authentication.
Specifically, if the operating parameter of the application program meets the preset operating conditions, transmission renews request to institute
It states server and renews request according to complete to renew the logging on authentication.
Wherein, step S105, which includes the steps that sending, renews request, as shown in figure 3, the step specifically includes the following contents:
S1051, preset sending cycle is determined according to the timeliness duration;S1052, request is renewed extremely according to sending cycle transmission
The server is to complete to renew the logging on authentication.
Specifically, it can be determined in the logging on authentication according to corresponding relationship preset between timeliness duration and sending cycle
The corresponding sending cycle of timeliness duration, the corresponding duration of the sending cycle is less than the timeliness duration, such as timeliness duration
It is 10 minutes, sending cycle is 8 minutes.Request is renewed from the transmission of trend server according to determining sending cycle timing, it is described
Renewing request can be common network request, which includes logging on authentication, and thus the server is renewed according to this asks
It asks to complete to renew the logging on authentication.
In the present embodiment, the management method is by obtaining the corresponding log-on message of login application program, by the login
Information is sent to server so that log-on message described in the server verify and generates logging on authentication after being verified;
The logging on authentication that the server is sent is received, the logging on authentication includes timeliness duration;It is detecting in logging on authentication
In timeliness duration when the not sent network request, judge whether the operating parameter of the application program meets default operation item
Part;It is corresponding pre- according to the preset operating conditions if the operating parameter of the application program meets the preset operating conditions
If renewing rule to complete to renew the logging on authentication.Thus avoid because logging on authentication is expired need to re-operate it is tired
It disturbs, and then improves the Experience Degree of user.
In one embodiment, step S104 includes the steps that another judgement meets service condition, as shown in figure 4, the step
Specifically include the following contents:
Whether S1041, the detection application program are in the front stage operation state of terminal;S1042, detection are described using journey
Whether operational motion occurs on the program interface of sequence;Whether S1043, the current task for detecting the application program are completed;
S1044, determine that the operating parameter of the application program meets the preset operating conditions;S1045, determine the application program
Operating parameter meets the preset operating conditions;S1045, determine that the operating parameter of the application program is unsatisfactory for the default fortune
Row condition.
Wherein, the front stage operation the state whether application program is in terminal is detected;If the application program is in institute
The front stage operation state for stating terminal detects whether operational motion occurs on the program interface of the application program;If the application
Program is in the background operation state of the terminal, and whether the current task for detecting the application program is completed;If the application
Operational motion occurs on the program interface of program, determines that the operating parameter of the application program meets the preset operating conditions;
If the current task of the application program does not complete, determine that the operating parameter of the application program meets the default operation item
Part;If operational motion does not occur on the program interface of the application program, determine that the operating parameter of the application program is unsatisfactory for
The preset operating conditions;If the current task of the application program is completed, the operating parameter of the application program is determined not
Meet the preset operating conditions.
Specifically, it when the program interface for the application program being opened is shown on the screen of the terminal, is answered described in judgement
The front stage operation state of terminal is in program.When detecting that user operates described program interface, such as input text
Word information, slide or clicking operation etc. determine that the operating parameter of the application program meets the preset operating conditions.When
The corresponding thread of the application program is there is also in the task stack of terminal system, and the program interface of the application program is not
It is shown in the screen of the terminal, determines that the application program is in the background operation state of terminal.If at the application program
In the background operation state of terminal, whether the current task for detecting the application program is completed, for example, filling registration information whether
Confirmation operation is clicked, if not clicking on confirmation operation, shows that the current task of the application program does not complete;If described apply journey
The current task of sequence does not complete, and determines that the operating parameter of the application program meets the preset operating conditions.Thus further
Improve the experience of user.
In one embodiment, step S105 includes the steps that another transmission renews request, as shown in figure 5, the step is specific
Including the following contents:S105a, request is renewed according to logging on authentication generation;S105b, preset interface is called to send described continue
Phase requests to the server so that the server renews the timeliness duration that request extends the logging on authentication according to.
Specifically, request is renewed according to logging on authentication generation, described renew in request may include extension duration.It can be with
One default api interface is set on the backstage of the application program, the default api interface is used to send to the server continuous
Phase request, by calling default api interface to renew request so that the server is renewed to described to server transmission
Logging on authentication in request is verified rear and is renewed according to extension duration completion to logging on authentication, and returns to execution
Step S103.It is possible thereby to avoid repeating to renew request to server transmission.
In addition, further including after the logging on authentication for receiving the server transmission:Obtain the host of the server
Mark;Based on predetermined encryption rule, the logging on authentication is encrypted according to the host identification;By it is encrypted log in
Card is stored in the local memory of the terminal.The information security that user can be improved avoids illegal verifying.Simultaneously so as to
When renewing request according to logging on authentication generation, specifically, according to the encrypted logging on authentication and default decryption rule
Generation renews request, and the default decryption rule is corresponding with the predetermined encryption rule;It renews and is requested to described described in transmission
Server is so that the server renews request according to and completes to renew the logging on authentication.Thus, it is possible to prevent from stepping on
Record voucher is not practical for a long time and illegally distorted, and then improves the Experience Degree of user.
Fig. 6 is a kind of schematic block diagram of the managing device of logging on authentication provided by the embodiments of the present application.As shown in fig. 6,
Corresponding to the management method of the above logging on authentication, the application also provides a kind of managing device of logging on authentication.The logging on authentication
Managing device includes the unit for executing the management method of above-mentioned logging on authentication, which can be configured in terminal.Such as
Shown in Fig. 6, the managing device 500 of the logging on authentication includes:Obtain transmission unit 501, voucher receiving unit 502, request detection
Unit 503, condition judgment unit 504 and request transmitting unit 505.
Transmission unit 501 is obtained to send the log-on message for obtaining the corresponding log-on message of login application program
To server so as to log-on message described in the server authentication and generate logging on authentication after being verified;
Voucher receiving unit 502, the logging on authentication sent for receiving the server, the logging on authentication includes timeliness
Duration.
Wherein, voucher receiving unit 502, is also used to:Obtain the host identification of the server;It is advised based on predetermined encryption
Then, the logging on authentication is encrypted according to the host identification;Encrypted logging on authentication is stored in the terminal
In local memory.
Request detection unit 503, for detect in the timeliness duration whether to the server send network request.
Condition judgment unit 504, if for not sending network request, judgement to the server in the timeliness duration
Whether the operating parameter of the application program meets preset operating conditions.
Wherein, condition judgment unit 504 includes:State-detection subelement 5041, motion detection subelement 5042 and condition
Determine subelement 5043.Specifically, state-detection subelement 5041, for detecting before whether the application program be in terminal
Platform operating status;Motion detection subelement 5042, if being in the front stage operation state of the terminal for the application program, inspection
It surveys on the program interface of the application program and whether operational motion occurs;Condition criterion subelement 5043, if being used for the application
Operational motion occurs on the program interface of program, determines that the operating parameter of the application program meets the preset operating conditions.
Request transmitting unit 505 is sent if the operating parameter for the application program meets the preset operating conditions
Request is renewed to the server to complete to renew the logging on authentication.
Wherein, request transmitting unit 505 includes:Period determines subelement 5051 and request transmission sub-unit 5052.Specifically
Ground, period determine subelement 5051, for determining preset sending cycle according to the timeliness duration;Request transmission sub-unit
5052, for renewing request to the server to complete to renew the logging on authentication according to sending cycle transmission.
Wherein, request transmitting unit 505 are also used to:It is raw according to the encrypted logging on authentication and default decryption rule
At request is renewed, the default decryption rule is corresponding with the predetermined encryption rule;Request is renewed described in transmission to the clothes
Business device is so that the server renews request according to and completes to renew the logging on authentication.
It is apparent to those skilled in the art that for convenience of description and succinctly, foregoing description is stepped on
The managing device of voucher and the specific work process of unit are recorded, can refer to corresponding processes in the foregoing method embodiment, herein
It repeats no more.
Above-mentioned apparatus can be implemented as a kind of form of computer program, and computer program can be in meter as shown in Figure 7
It calculates and is run on machine equipment.
Referring to Fig. 7, Fig. 7 is a kind of schematic block diagram of computer equipment provided by the embodiments of the present application.The computer
Equipment 700 can be terminal.
Referring to Fig. 7, which includes processor 720, memory and the net connected by system bus 710
Network interface 750, wherein memory may include non-volatile memory medium 730 and built-in storage 740.
The non-volatile memory medium 730 can storage program area 731 and computer program 732.The computer program 732
It is performed, processor 720 may make to execute the management method of any one logging on authentication.
The processor 720 supports the operation of entire computer equipment 700 for providing calculating and control ability.
The built-in storage 740 provides environment for the operation of the computer program 732 in non-volatile memory medium 730, should
When computer program 732 is executed by processor 720, processor 720 may make to execute the management method of any one logging on authentication.
The network interface 750 such as sends the task dispatching of distribution for carrying out network communication.Those skilled in the art can manage
It solves, structure shown in Fig. 7, only the block diagram of part-structure relevant to application scheme, is not constituted to the application side
The restriction for the computer equipment 700 that case is applied thereon, specific computer equipment 700 may include more than as shown in the figure
Or less component, perhaps combine certain components or with different component layouts.Wherein, the processor 720 is for transporting
Row program code stored in memory, to realize following steps:
The corresponding log-on message of login application program is obtained, the log-on message is sent to server so that the service
Device verifies the log-on message and generates logging on authentication after being verified;Receive the logging on authentication that the server is sent, institute
Stating logging on authentication includes timeliness duration;Detection in the timeliness duration whether to the server send network request;If
Network request is not sent to the server in the timeliness duration, it is pre- to judge whether the operating parameter of the application program meets
If service condition;If the operating parameter of the application program meets the preset operating conditions, transmission renews request to the clothes
Device be engaged in complete to renew the logging on authentication.
In one embodiment, the processor 720 is sentenced described in program code realization stored in memory for running
When whether the operating parameter for the application program of breaking meets preset operating conditions, it is implemented as follows step:
Detect the front stage operation the state whether application program is in terminal;If the application program is in the terminal
Front stage operation state, detect whether operational motion occurs on the program interface of the application program;If the application program
Operational motion occurs on program interface, determines that the operating parameter of the application program meets the preset operating conditions.
In one embodiment, the processor 720 realizes the inspection for running program code stored in memory
Survey whether the application program is in after the front stage operation state of terminal, also realization following steps:
If the application program is in the background operation state of the terminal, the current task for detecting the application program is
No completion;If the current task of the application program does not complete, it is described default to determine that the operating parameter of the application program meets
Service condition.
In one embodiment, the processor 720 realizes the hair for running program code stored in memory
It send and renews request to the server to complete when renewing, to be implemented as follows step to the logging on authentication:
Preset sending cycle is determined according to the timeliness duration;It renews and is requested to described according to sending cycle transmission
Server is to complete to renew the logging on authentication
In one embodiment, the processor 720 realizes the hair for running program code stored in memory
It send and renews request to the server to complete when renewing, to be implemented as follows step to the logging on authentication:
Request is renewed according to logging on authentication generation;It calls and renews request described in preset interface transmission to the server
So that the server renews the timeliness duration that request extends the logging on authentication according to.
In one embodiment, the processor 720 realizes the inspection for running program code stored in memory
It surveys in the timeliness duration after whether sending network request to the server, also realization following steps:
If detecting and sending the network request in the timeliness duration, continue to repeat the detection when described
Imitate the step of whether sending network request to the server in duration.
In one embodiment, the processor 720 connects described in program code realization stored in memory for running
After receiving the logging on authentication that the server is sent, following steps are also realized:
Obtain the host identification of the server;Based on predetermined encryption rule, according to the host identification to the login
Voucher is encrypted;Encrypted logging on authentication is stored in the local memory of the terminal.
It should be appreciated that in the embodiment of the present application, processor 720 can be central processing unit (Central
Processing Unit, CPU), which can also be other general processors, digital signal processor (Digital
Signal Processor, DSP), specific integrated circuit (Application Specific Integrated Circuit,
ASIC), ready-made programmable gate array (Field-Programmable Gate Array, FPGA) or other programmable logic
Device, discrete gate or transistor logic, discrete hardware components etc..Wherein, general processor can be microprocessor or
Person's processor is also possible to any conventional processor etc..
It will be understood by those skilled in the art that 700 structure of computer equipment shown in Fig. 7 is not constituted and is set to computer
Standby 700 restriction may include perhaps combining certain components or different component cloth than illustrating more or fewer components
It sets.
Those of ordinary skill in the art will appreciate that be realize above-described embodiment method in all or part of the process, be
Relevant hardware can be instructed to complete by computer program, computer program can be stored in a storage medium, this is deposited
Storage media is computer readable storage medium.In the embodiment of the present invention, which can be stored in computer system
It in storage medium, and is executed by least one processor in the computer system, includes the reality such as above-mentioned each method with realization
Apply the process step of example.
The computer readable storage medium can be magnetic disk, CD, USB flash disk, mobile hard disk, read-only memory (ROM, Read-
Only Memory), the various media that can store program code such as magnetic or disk.
Those of ordinary skill in the art may be aware that list described in conjunction with the examples disclosed in the embodiments of the present disclosure
Member and algorithm steps, can be realized with electronic hardware, computer software, or a combination of the two, in order to clearly demonstrate hardware
With the interchangeability of software, each exemplary composition and step are generally described according to function in the above description.This
A little functions are implemented in hardware or software actually, the specific application and design constraint depending on technical solution.Specially
Industry technical staff can use different methods to achieve the described function each specific application, but this realization is not
It is considered as beyond scope of the present application.
In several embodiments provided herein, it should be understood that the managing device of disclosed logging on authentication and
Method may be implemented in other ways.For example, the managing device embodiment of logging on authentication described above is only to show
Meaning property.For example, the division of each unit, only a kind of logical function partition, can there is other division in actual implementation
Mode.Such as multiple units or components can be combined or can be integrated into another system, or some features can be ignored, or
It does not execute.
Step in the embodiment of the present application method can be sequentially adjusted, merged and deleted according to actual needs.
Unit in the embodiment of the present application device can be combined, divided and deleted according to actual needs.
It, can also be in addition, each functional unit in each embodiment of the application can integrate in one processing unit
It is that each unit physically exists alone, is also possible to two or more units and is integrated in one unit.It is above-mentioned integrated
Unit both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated unit is realized in the form of SFU software functional unit and when sold or used as an independent product,
It can store in a computer readable storage medium.Based on this understanding, the technical solution of the application substantially or
Person says that all or part of the part that contributes to existing technology or the technical solution can body in the form of software products
Reveal and, which is stored in a storage medium, including some instructions are with so that a computer is set
Standby (can be personal computer, terminal or the network equipment etc.) execute each embodiment the method for the application whole or
Part steps.
The above, the only specific embodiment of the application, but the protection scope of the application is not limited thereto, it is any
Those familiar with the art within the technical scope of the present application, can readily occur in various equivalent modifications or replace
It changes, these modifications or substitutions should all cover within the scope of protection of this application.Therefore, the protection scope of the application should be with right
It is required that protection scope subject to.
Claims (10)
1. a kind of management method of logging on authentication, which is characterized in that including:
The corresponding log-on message of login application program is obtained, the log-on message is sent to server so that the server is tested
It demonstrate,proves the log-on message and generates logging on authentication after being verified;
The logging on authentication that the server is sent is received, the logging on authentication includes timeliness duration;
Detection in the timeliness duration whether to the server send network request;
If not sending network request to the server in the timeliness duration, judge that the operating parameter of the application program is
It is no to meet preset operating conditions;
If the operating parameter of the application program meets the preset operating conditions, transmission renews request to the server with complete
The pairs of logging on authentication renews.
2. the management method of logging on authentication according to claim 1, which is characterized in that the judgement application program
Whether operating parameter meets preset operating conditions, including:
Detect the front stage operation the state whether application program is in terminal;
If the application program is in the front stage operation state of the terminal, detect on the program interface of the application program whether
Operational motion occurs;
If operational motion occurs on the program interface of the application program, determine described in the operating parameter satisfaction of the application program
Preset operating conditions.
3. the management method of logging on authentication according to claim 2, which is characterized in that the detection application program is
After the no front stage operation state in terminal, further include:
If the application program is in the background operation state of the terminal, whether the current task for detecting the application program is complete
At;
If the current task of the application program does not complete, determine that the operating parameter of the application program meets the default operation
Condition.
4. the management method of logging on authentication according to claim 1, which is characterized in that the transmission, which renews, requests to described
Server to complete to renew the logging on authentication, including:
Preset sending cycle is determined according to the timeliness duration;
Request is renewed to the server according to sending cycle transmission to complete to renew the logging on authentication.
5. the management method of logging on authentication according to claim 1, which is characterized in that the transmission, which renews, requests to described
Server to complete to renew the logging on authentication, including:
Request is renewed according to logging on authentication generation;
It calls and renews request described in preset interface transmission to the server so that the server renews request according to and prolongs
The timeliness duration of the long logging on authentication.
6. the management method of logging on authentication according to claim 1, which is characterized in that described to receive the server transmission
Logging on authentication after, further include:
Obtain the host identification of the server;
Based on predetermined encryption rule, the logging on authentication is encrypted according to the host identification;
Encrypted logging on authentication is stored in the local memory of the terminal.
7. the management method of logging on authentication according to claim 1, which is characterized in that the detection is in the timeliness duration
After inside whether sending network request to the server, further include:
If detecting and sending the network request in the timeliness duration, continue to repeat the detection in the timeliness
The step of whether sending network request to the server in long.
8. a kind of managing device of logging on authentication, which is characterized in that including:
It obtains transmission unit and the log-on message is sent to service for obtaining login application program corresponding log-on message
Device after being verified so as to log-on message described in the server authentication and generate logging on authentication;
Voucher receiving unit, the logging on authentication sent for receiving the server, the logging on authentication includes timeliness duration;
Request detection unit, for detect in the timeliness duration whether to the server send network request;
Condition judgment unit, if being answered described in judgement for not sending network request to the server in the timeliness duration
Whether meet preset operating conditions with the operating parameter of program;
Request transmitting unit, if the operating parameter for the application program meets the preset operating conditions, transmission, which renews, is asked
It asks to the server to complete to renew the logging on authentication.
9. a kind of computer equipment, which is characterized in that including memory, processor and be stored on the memory and can be in institute
The computer program run on processor is stated, the processor is realized when executing the computer program as in claim 1 to 7
The step of any one the method.
10. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage has computer journey
Sequence, the computer program make the processor execute such as claim 1 to 7 any one the method when being executed by processor
The step of.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811124257.2A CN108900559B (en) | 2018-09-26 | 2018-09-26 | Login certificate management method and device, computer equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811124257.2A CN108900559B (en) | 2018-09-26 | 2018-09-26 | Login certificate management method and device, computer equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108900559A true CN108900559A (en) | 2018-11-27 |
CN108900559B CN108900559B (en) | 2022-08-05 |
Family
ID=64360345
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811124257.2A Active CN108900559B (en) | 2018-09-26 | 2018-09-26 | Login certificate management method and device, computer equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108900559B (en) |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110166529A (en) * | 2019-04-16 | 2019-08-23 | 平安普惠企业管理有限公司 | It keeps logging in state method, apparatus, equipment and storage medium |
CN110166563A (en) * | 2019-05-27 | 2019-08-23 | 杭州迪普科技股份有限公司 | A kind of page login-timeout method for updating time and device |
CN110298162A (en) * | 2019-05-22 | 2019-10-01 | 深圳壹账通智能科技有限公司 | Application client login method, device, computer equipment and storage medium |
CN110381078A (en) * | 2019-07-29 | 2019-10-25 | 迈普通信技术股份有限公司 | Determination method, apparatus, electronic equipment and the storage medium that token renews |
CN110445615A (en) * | 2019-07-12 | 2019-11-12 | 平安普惠企业管理有限公司 | Network request security verification method, device, medium and electronic equipment |
CN111258602A (en) * | 2020-01-10 | 2020-06-09 | 百度在线网络技术(北京)有限公司 | Information updating method and device |
CN111460411A (en) * | 2020-04-17 | 2020-07-28 | 支付宝(杭州)信息技术有限公司 | Method and system for keeping login state |
CN111756738A (en) * | 2020-06-24 | 2020-10-09 | 昆明东电科技有限公司 | System framework for quickly constructing Web application, data processing method and system |
CN112910876A (en) * | 2021-01-27 | 2021-06-04 | 北京健康之家科技有限公司 | Login method and device and electronic equipment |
CN113391858A (en) * | 2021-07-12 | 2021-09-14 | 苏州达家迎信息技术有限公司 | Page loading method and device in client, computer equipment and medium |
CN113422784A (en) * | 2021-07-12 | 2021-09-21 | 苏州达家迎信息技术有限公司 | Login certificate updating method and device, computer equipment and storage medium |
CN113542256A (en) * | 2021-07-12 | 2021-10-22 | 苏州达家迎信息技术有限公司 | Method, device, equipment and storage medium for updating login credentials in client |
CN113568543A (en) * | 2021-06-30 | 2021-10-29 | 北京达佳互联信息技术有限公司 | Information processing method, information processing device, electronic equipment and storage medium |
CN114124382A (en) * | 2021-12-01 | 2022-03-01 | 深圳市大头兄弟科技有限公司 | Voucher updating method, system, equipment and storage medium |
CN115396277A (en) * | 2022-08-24 | 2022-11-25 | 数字广东网络建设有限公司 | Login state management method, device, equipment and storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150106905A1 (en) * | 2013-10-14 | 2015-04-16 | Alibaba Group Holding Limited | Login method for client application and corresponding server |
CN106372922A (en) * | 2015-07-21 | 2017-02-01 | 深圳市银信网银科技有限公司 | Method and system for segmented modification of validity periods of all stages of electronic certificate |
CN107135218A (en) * | 2017-05-04 | 2017-09-05 | 腾讯科技(深圳)有限公司 | Log in state acquisition, sending method, voucher collocation method, client and server |
CN108322461A (en) * | 2018-01-31 | 2018-07-24 | 百度在线网络技术(北京)有限公司 | Method, system, device, equipment and the medium of application program automated log on |
-
2018
- 2018-09-26 CN CN201811124257.2A patent/CN108900559B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150106905A1 (en) * | 2013-10-14 | 2015-04-16 | Alibaba Group Holding Limited | Login method for client application and corresponding server |
CN106372922A (en) * | 2015-07-21 | 2017-02-01 | 深圳市银信网银科技有限公司 | Method and system for segmented modification of validity periods of all stages of electronic certificate |
CN107135218A (en) * | 2017-05-04 | 2017-09-05 | 腾讯科技(深圳)有限公司 | Log in state acquisition, sending method, voucher collocation method, client and server |
CN108322461A (en) * | 2018-01-31 | 2018-07-24 | 百度在线网络技术(北京)有限公司 | Method, system, device, equipment and the medium of application program automated log on |
Non-Patent Citations (1)
Title |
---|
齐辰雄: "基于Kerberos的Web应用系统的认证系统设计与实现", 《中国优秀硕士学位论文全文数据库 信息科技辑》 * |
Cited By (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110166529A (en) * | 2019-04-16 | 2019-08-23 | 平安普惠企业管理有限公司 | It keeps logging in state method, apparatus, equipment and storage medium |
CN110298162A (en) * | 2019-05-22 | 2019-10-01 | 深圳壹账通智能科技有限公司 | Application client login method, device, computer equipment and storage medium |
CN110166563A (en) * | 2019-05-27 | 2019-08-23 | 杭州迪普科技股份有限公司 | A kind of page login-timeout method for updating time and device |
CN110445615B (en) * | 2019-07-12 | 2021-08-31 | 平安普惠企业管理有限公司 | Network request security verification method, device, medium and electronic equipment |
CN110445615A (en) * | 2019-07-12 | 2019-11-12 | 平安普惠企业管理有限公司 | Network request security verification method, device, medium and electronic equipment |
CN110381078A (en) * | 2019-07-29 | 2019-10-25 | 迈普通信技术股份有限公司 | Determination method, apparatus, electronic equipment and the storage medium that token renews |
CN111258602A (en) * | 2020-01-10 | 2020-06-09 | 百度在线网络技术(北京)有限公司 | Information updating method and device |
CN111258602B (en) * | 2020-01-10 | 2023-06-30 | 百度在线网络技术(北京)有限公司 | Information updating method and device |
CN111460411A (en) * | 2020-04-17 | 2020-07-28 | 支付宝(杭州)信息技术有限公司 | Method and system for keeping login state |
CN111460411B (en) * | 2020-04-17 | 2023-08-04 | 支付宝(杭州)信息技术有限公司 | Method and system for keeping login state |
CN111756738A (en) * | 2020-06-24 | 2020-10-09 | 昆明东电科技有限公司 | System framework for quickly constructing Web application, data processing method and system |
CN112910876A (en) * | 2021-01-27 | 2021-06-04 | 北京健康之家科技有限公司 | Login method and device and electronic equipment |
CN112910876B (en) * | 2021-01-27 | 2023-04-28 | 北京水滴科技集团有限公司 | Login method and device and electronic equipment |
CN113568543A (en) * | 2021-06-30 | 2021-10-29 | 北京达佳互联信息技术有限公司 | Information processing method, information processing device, electronic equipment and storage medium |
CN113391858A (en) * | 2021-07-12 | 2021-09-14 | 苏州达家迎信息技术有限公司 | Page loading method and device in client, computer equipment and medium |
CN113542256A (en) * | 2021-07-12 | 2021-10-22 | 苏州达家迎信息技术有限公司 | Method, device, equipment and storage medium for updating login credentials in client |
CN113422784A (en) * | 2021-07-12 | 2021-09-21 | 苏州达家迎信息技术有限公司 | Login certificate updating method and device, computer equipment and storage medium |
CN113542256B (en) * | 2021-07-12 | 2023-08-22 | 苏州达家迎信息技术有限公司 | Method, device, equipment and storage medium for updating login credentials in client |
CN114124382A (en) * | 2021-12-01 | 2022-03-01 | 深圳市大头兄弟科技有限公司 | Voucher updating method, system, equipment and storage medium |
CN114124382B (en) * | 2021-12-01 | 2024-04-09 | 深圳市闪剪智能科技有限公司 | Credential updating method, system, device and storage medium |
CN115396277A (en) * | 2022-08-24 | 2022-11-25 | 数字广东网络建设有限公司 | Login state management method, device, equipment and storage medium |
CN115396277B (en) * | 2022-08-24 | 2024-01-02 | 数字广东网络建设有限公司 | Login state management method, device, equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN108900559B (en) | 2022-08-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108900559A (en) | Management method, device, computer equipment and the storage medium of logging on authentication | |
US20200036692A1 (en) | System and method for providing controlled application programming interface security | |
US20180293557A1 (en) | Method of charging electronic currency automatically based on blockchain and system thereof | |
CN106911687B (en) | Page construction control method and device | |
US20130144755A1 (en) | Application licensing authentication | |
CN109240838A (en) | Interface call method, device, computer equipment and storage medium | |
CN107026860B (en) | Login authentication method, device and system | |
CN107124431A (en) | Method for authenticating, device, computer-readable recording medium and right discriminating system | |
CN104734849A (en) | Method and system for conducting authentication on third-party application | |
CN104580112B (en) | A kind of service authentication method, system and server | |
CN110619208B (en) | User authentication method, server, user equipment and system | |
CN105378703A (en) | Methods and systems for validating multiple methods of input using unified rule set | |
CN108846263B (en) | Software authorization processing and running method and device and electronic equipment | |
CN111669351B (en) | Authentication method, service server, client and computer readable storage medium | |
CN110069909A (en) | It is a kind of to exempt from the close method and device for logging in third party system | |
CN109842616B (en) | Account binding method and device and server | |
CN104484620A (en) | Method for avoiding false declaration of sales volume and inventory in fast-selling sales management cloud system | |
CN109948330B (en) | Method, device, equipment and storage medium for implementing application management service | |
CN109325363A (en) | Management method, device, computer equipment and the storage medium of authority information | |
CN111984936B (en) | Authorization distribution method, device, server and storage medium | |
CN111585954A (en) | Authentication method, authentication device, computer equipment and storage medium | |
CN103020827B (en) | Payment processing method and system | |
US20200053093A1 (en) | Detecting fraudulent user access to online web services via user flow | |
CN108390878B (en) | Method and device for verifying network request security | |
CN109657170A (en) | Webpage loading method, device, computer equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |