CN108959904A - Terminal device applies login method and terminal device - Google Patents

Terminal device applies login method and terminal device Download PDF

Info

Publication number
CN108959904A
CN108959904A CN201810614373.6A CN201810614373A CN108959904A CN 108959904 A CN108959904 A CN 108959904A CN 201810614373 A CN201810614373 A CN 201810614373A CN 108959904 A CN108959904 A CN 108959904A
Authority
CN
China
Prior art keywords
server
unique identification
user information
application
terminal device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810614373.6A
Other languages
Chinese (zh)
Inventor
朱坤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN201810614373.6A priority Critical patent/CN108959904A/en
Priority to PCT/CN2018/105553 priority patent/WO2019237542A1/en
Publication of CN108959904A publication Critical patent/CN108959904A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The present invention is suitable for field of communication technology, provide a kind of application login method and terminal device, described using login method includes: when listening to the application of terminal device to start, to obtain the application unique identification of the application, the first inquiry instruction of generation is simultaneously sent to server;If receiving server returns to user information corresponding with the application unique identification, the login of the application is completed according to the user information;If receiving the message being not present using unique identification of server return, the equipment unique identification of the terminal device is obtained, generate the second inquiry instruction and is sent to server;If receiving the user information corresponding with equipment unique identification of server return, the login of the application is completed according to the corresponding user information of the equipment unique identification, The present invention reduces repeatedly inputting for user information, facilitate the register of user.

Description

Terminal device applies login method and terminal device
Technical field
The invention belongs to field of communication technology more particularly to application login method and the terminal devices of a kind of terminal device.
Background technique
With the continuous development of the communication technology, terminal device also constantly upgrades, the application that user installs in terminal device Also more and more.
But each application at present requires user's registration account, could log in after completing registration, it is different logging in In application, need ceaselessly to input the user information of oneself, it is cumbersome, and Many times these information are identical, shadows Ring user experience.
Summary of the invention
In view of this, login method and terminal device are applied the embodiment of the invention provides a kind of terminal device, with solution Certainly the prior art needs on-line production access customer information to cause login process is cumbersome to ask when terminal device is carried out using logging in Topic.
The first aspect of the embodiment of the present invention provides a kind of application login method of terminal device, comprising:
When listening to the application starting of terminal device, the application unique identification of the application is obtained, the first inquiry is generated and refers to It enables and is sent to server;First inquiry instruction is used to indicate the server according to the application unique identification and user The corresponding relationship of information searches corresponding user information, carries in first inquiry instruction described using unique identification;
If receiving server returns to user information corresponding with the application unique identification, according to the user information Complete the login of the application;
If receiving the message being not present using unique identification of server return, the terminal device is obtained Equipment unique identification generates the second inquiry instruction and is sent to server;The equipment is carried in second inquiry instruction Unique identification, second inquiry instruction are used to indicate server and are uniquely marked according to the equipment unique identification lookup equipment Know corresponding user information;
If receiving the user information corresponding with equipment unique identification of server return, uniquely marked according to the equipment Know the login that corresponding user information completes the application.
The second aspect of the embodiment of the present invention provides a kind of terminal device, including memory and processor, described to deposit The computer program that can be run on the processor is stored in reservoir, when the processor executes the computer program, Realize following steps:
When listening to the application starting of terminal device, the application unique identification of the application is obtained, the first inquiry is generated and refers to It enables and is sent to server;First inquiry instruction is used to indicate the server according to the application unique identification and user The corresponding relationship of information searches corresponding user information, carries in first inquiry instruction described using unique identification;
If receiving server returns to user information corresponding with the application unique identification, according to the user information Complete the login of the application;
If receiving the message being not present using unique identification of server return, the terminal device is obtained Equipment unique identification generates the second inquiry instruction and is sent to server;The equipment is carried in second inquiry instruction Unique identification, second inquiry instruction are used to indicate server and are uniquely marked according to the equipment unique identification lookup equipment Know corresponding user information;
If receiving the user information corresponding with equipment unique identification of server return, uniquely marked according to the equipment Know the login that corresponding user information completes the application.
The third aspect of the embodiment of the present invention provides a kind of computer readable storage medium, the computer-readable storage Media storage has computer program, and the computer program realizes following steps when being executed by processor:
When listening to the application starting of terminal device, the application unique identification of the application is obtained, the first inquiry is generated and refers to It enables and is sent to server;First inquiry instruction is used to indicate the server according to the application unique identification and user The corresponding relationship of information searches corresponding user information, carries in first inquiry instruction described using unique identification;
If receiving server returns to user information corresponding with the application unique identification, according to the user information Complete the login of the application;
If receiving the message being not present using unique identification of server return, the terminal device is obtained Equipment unique identification generates the second inquiry instruction and is sent to server;The equipment is carried in second inquiry instruction Unique identification, second inquiry instruction are used to indicate server and are uniquely marked according to the equipment unique identification lookup equipment Know corresponding user information;
If receiving the user information corresponding with equipment unique identification of server return, uniquely marked according to the equipment Know the login that corresponding user information completes the application.
In embodiments of the present invention, started by listening to the application of terminal device, obtain the application unique identification of application, To pass through the login for completing application using the corresponding user information of unique identification with this;In addition, if not obtaining with the application only When the one corresponding user information of mark, then illustrate the also unregistered application of user, at this point, the equipment for obtaining terminal device is uniquely marked Know, see whether the other application of the terminal device has registration, if so, then uniquely being marked with the equipment of terminal device according to getting Know corresponding user information, carry out the registering and logging of the application, by obtaining and applying unique identification or terminal unique identification Corresponding user information completes the login of the different application on terminal device, reduces repeatedly inputting for user information, greatly Facilitate the register of user.
Detailed description of the invention
It to describe the technical solutions in the embodiments of the present invention more clearly, below will be to embodiment or description of the prior art Needed in attached drawing be briefly described, it should be apparent that, the accompanying drawings in the following description is only of the invention some Embodiment for those of ordinary skill in the art without any creative labor, can also be according to these Attached drawing obtains other attached drawings.
Fig. 1 is a kind of implementation flow chart using login method of terminal device provided in an embodiment of the present invention;
Fig. 2 is the implementation flow chart using login method of another terminal device provided in an embodiment of the present invention;
Fig. 3 is the implementation flow chart using login method of another terminal device provided in an embodiment of the present invention;
Fig. 4 is the implementation flow chart using login method of another terminal device provided in an embodiment of the present invention;
Fig. 5 is the implementation flow chart using login method of another terminal device provided in an embodiment of the present invention;
Fig. 6 is a kind of structural block diagram using entering device of terminal device provided in an embodiment of the present invention;
Fig. 7 is the structural block diagram using entering device of another terminal device provided in an embodiment of the present invention;
Fig. 8 is the structural block diagram using entering device of another terminal device provided in an embodiment of the present invention;
Fig. 9 is the structural block diagram using entering device of another terminal device provided in an embodiment of the present invention;
Figure 10 is the schematic diagram of terminal device provided in an embodiment of the present invention.
Specific embodiment
In being described below, for illustration and not for limitation, the tool of such as particular system structure, technology etc is proposed Body details, to understand thoroughly the embodiment of the present invention.However, it will be clear to one skilled in the art that there is no these specific The present invention also may be implemented in the other embodiments of details.In other situations, it omits to well-known system, device, electricity The detailed description of road and method, in case unnecessary details interferes description of the invention.
In order to illustrate technical solutions according to the invention, the following is a description of specific embodiments.
Fig. 1 shows the implementation process using login method of terminal device provided in an embodiment of the present invention, this method stream Journey includes step S101 to S104.The specific implementation principle of each step is as follows.
S101 obtains the application unique identification of the application when listening to the application starting of terminal device, generates first and looks into It askes and instructs and be sent to server;First inquiry instruction be used to indicate the server according to the application unique identification and The corresponding relationship of user information searches corresponding user information, and the unique mark of the application is carried in first inquiry instruction Know.
Wherein, the terminal device includes desktop computer, laptop, tablet computer (Portable Android Device, PAD) and the portable or non-portable terminal device such as smart phone.
It can be Universally Unique Identifier (Universally Unique Identifier, UUID) using unique identification. Generation when UUID is run for the first time after application installation, corresponding different application generate different UUID.The present invention does not limit specifically Mark, which being capable of the unique identification application.
In the embodiment of the present invention, server is connect with terminal equipment in communication, and server is stored with using unique identification and uses The storing process of the corresponding relationship of family information, the corresponding relationship is carried out in the user's registration application, and user information includes user Account, user password and subscriber identity information.
Terminal device obtains the application unique identification of application, and the first inquiry instruction of generation is simultaneously sent to server, and described the One inquiry instruction carries described using unique identification.Server is according to first inquiry instruction, only further according to the application The corresponding relationship of one mark and user information, searches user information corresponding with the application unique identification.If server is searched The corresponding relationship of unique identification and user information is applied to this, then return with this using the corresponding user information of unique identification to whole End equipment, terminal device execute step S102;If server does not find this and closes using unique identification and the corresponding of user information System, then return to the message for applying unique identification to be not present, and terminal device executes step S103.
Illustratively, installing terminal equipment has several applications, such as using A, using B and using C, if user starts application A, then terminal device is listened to starts using A, obtains the UUID using A, generates the first inquiry instruction, and by described first Inquiry instruction is sent to server.Server searches the corresponding relationship of the UUID and user information according to the UUID using A, If finding the corresponding relationship of the UUID and user information, user information corresponding with the UUID is returned to terminal device;If The corresponding relationship of the UUID and user information is not found, then returns to message that the UUID is not present to terminal device.
S102, if receiving server returns to user information corresponding with the application unique identification, according to the use Family information completes the login of the application.
According to the corresponding relationship using unique identification and user information that server stores, it is unique to obtain the application Corresponding user information is identified, and according to the application of the user information registration terminal equipment, so that user be made to log in It does not need to repeatedly input user information when registered application.
S103 obtains the terminal if receiving the message being not present using unique identification of server return The equipment unique identification of equipment generates the second inquiry instruction and is sent to server, carries in second inquiry instruction Equipment unique identification is stated, second inquiry instruction is used to indicate server and searches the equipment according to the equipment unique identification The corresponding user information of unique identification.
Wherein, equipment unique identification includes international mobile subscriber identity (International Mobile Subscriber Identification Number, IMSI), international mobile equipment identification number (International Mobile Equipment Identity, IMEI), mobile device identification code (Mobile Equipment Identifier, MEID, CDMA E-serial code (Electronic Serial Number, ESN) and product ID (Serial Number) Deng.The present invention does not limit specific mark, which being capable of the unique identification terminal device.
In the embodiment of the present invention, server is stored with the corresponding relationship of equipment unique identification and user information, which closes The storing process of system is carried out when the user of terminal device is in any application on registering terminal equipment, and user information includes user Account, user password and subscriber identity information.
Terminal device obtains the equipment unique identification of terminal device, generates the second inquiry instruction and is sent to server, institute It states and carries the equipment unique identification in the second inquiry instruction.Server is according to second inquiry instruction, further according to described The corresponding relationship of equipment unique identification and user information searches user information corresponding with the equipment sole criterion.If service Device finds user information corresponding with the equipment unique identification, then returns to user information corresponding with the equipment unique identification and give Terminal device, terminal device execute step S104;If server does not find the correspondence of the equipment unique identification and user information Relationship then returns to message that the equipment unique identification is not present to terminal device.At this point, terminal device can load prompt user The page for carrying out account registration sends the user's registration application after user determines that registering and input user information succeeds in registration When application unique identification, equipment sole indicator and user information to server, server stores the application unique identification, sets The corresponding relationship of standby sole indicator and user information.
Illustratively, installing terminal equipment has several applications, such as using A, using B and using C, if user starts application A, then terminal device is listened to starts using A, obtains the UUID using A, generates the first inquiry instruction, and by described first Inquiry instruction is sent to server.Server searches the corresponding relationship of the UUID and user information according to the UUID using A, If not finding the corresponding relationship of the UUID and user information, the message that the UUID is not present is returned.Terminal device obtains IMSI generates the second inquiry instruction, and second inquiry instruction is sent to server.Server is according to second inquiry Instruction, searches the corresponding relationship of the IMSI and user information.If server finds the corresponding relationship of the IMSI and user information, User information corresponding with the IMSI is then returned to terminal device, terminal device completes institute according to the corresponding user information of the IMSI State the registering and logging of application.In this way, when user can not a certain unregistered application in registration terminal equipment can be with when such as applying A Using other application is registered on terminal device, such as user information when B is applied to carry out the login using A.
S104, if the user information corresponding with the equipment unique identification of server return is received, according to User information completes the login of the application.
According to the corresponding relationship of the equipment unique identification and user information of server storage, it is unique to obtain the equipment Corresponding user information is identified, and completes the registration of unregistered application according to the user information, and log in.To terminal device User can not need to register when logging in unregistered application, repetition fill in user information and reduce operation, improve use Family stickiness.
In the embodiment of the present invention, the application by listening to terminal device starts, and obtains the application unique identification of application, from And the login by completing application using the corresponding user information of unique identification with this;In addition, if not obtaining unique with the application When identifying corresponding user information, then illustrate the also unregistered application of user, at this point, the equipment for obtaining terminal device is uniquely marked Know, see whether the other application of the terminal device has registration, if so, then according to the equipment unique identification of the terminal device got With the corresponding relationship of user information, the registering and logging of the application is carried out, reduces repeatedly inputting for user information, greatly just The benefit register of user.
On the basis of the above embodiments, as shown in Fig. 2, the present invention also provides the sides that a kind of application of terminal device logs in Method, the present embodiment on the basis of the above embodiments, using the step registered for the first time on more terminal devices before step S101 Suddenly.Embodiment place same as the previously described embodiments repeats no more, as shown in Fig. 2, the application login method further includes step S201 to S202.The specific implementation principle of each step is as follows.
S201 listens to the application starting of terminal device, receives the user information of user's input, to be believed according to the user Breath completes user's registration;The user information includes user account, user password and subscriber identity information;
Wherein, the application starting of terminal device is listened to, if user applies in unregistered cross of terminal device before this, that The also not stored corresponding relationship having using unique identification, equipment unique identification and user information in the server.
Therefore, registration application is selected in user, the user information that mobile terminal receives user's input completes user's registration simultaneously It logs in.And user's registration is completed in user, it monitors after successfully logging in the application, the user's letter used when sending user's registration Breath, using unique identification and equipment unique identification to server uniquely marked so that server is established using unique identification, equipment Know the corresponding relationship with user information.
S202 monitors after logging in the application that the user used when sending user's registration believes after completing user's registration Breath, using unique identification and equipment unique identification to server uniquely marked so that server is established using unique identification, equipment Know the corresponding relationship with user information.
Optionally, on the basis of the embodiment described in Fig. 2, after step S202, further includes: load is used for authorization terminal Equipment logs in the selection interface of other application by user information, if receiving determining authorization message in the selection interface, The identity recognition function for starting terminal device, obtains the identity information of user, the identity information is sent to server, establishes The corresponding relationship of the identity information and user information.
Correspondingly, listening to after the application starting of terminal device, before the application unique identification for obtaining the application, also Include:
The identity recognition function for starting terminal device obtains the identity information of user, generates third inquiry instruction and sends To server;The third inquiry instruction is used to indicate server according to the corresponding relationship of the identity information and user information, Corresponding user information is searched, the third inquiry instruction carries the identity information;
If receiving server returns to user information corresponding with the identity information, completed according to the user information The login of the application;
If the message that the identity information for receiving server return is not present, closes the application.
Wherein, identity information includes finger print information or gesture information of user etc..User registers one in terminal device and answers With rear, load, by the selection interface of user information login other application, allows user in institute for authorization terminal equipment It states selection interface to determine whether to log in other application using with user information identical when registering a certain application, to improve application The safety of login.It is determined once user and logs in other application using with user information identical when registering a certain application, It then determines that the method for recognizing each other login using information logs in other application, can thus reduce repeatedly inputting for user information, mention The convenience that height application logs in.
It should be noted that on the one hand, in other embodiments of the present invention, the selection interface further includes that terminal device is each It is a that corresponding selection is applied to confirm control, determine whether that selection answers this by the way that whether user triggers these selection confirmation controls The mode of login is recognized each other with implementation information, so as to allow user can personal settings, further promote user experience.It is another Aspect, in other embodiments of the present invention, load recognize each other the selection of login for authorization terminal equipment other application using information Interface, if not executing acquisition subscriber identity information later in the determination authorization message that the selection interface receives user's input , the step of establishing the corresponding relationship of identity information and user information, and be only complete it is real to other application on terminal device Apply the authorization that information recognizes each other login.
In addition, the embodiment of the present invention by establishing the corresponding relationship of the identity information and user information, logs in for user Using another way is provided, the diversification that user logs in application is furthermore achieved.
On the basis of above-mentioned embodiment illustrated in fig. 2, as shown in figure 3, the present invention also provides a kind of terminal device applications The method of login, the present embodiment increase terminal device authentication clothes on the basis of above-mentioned Fig. 2 embodiment after step S202 The step of business device, improve safety.Embodiment place same as the previously described embodiments repeats no more, as shown in figure 3, described answer It further include step S301 to S302 with login method.The specific implementation principle of each step is as follows.
S301 receives the server and is receiving the user information Userinfo, using unique identification AppID and setting The authorization code Authcode generated at random and server cryptographic Hash H returned after standby unique identification DevIDser
Wherein, Hser=h (Userinfo ⊙ h (AppID ⊙ h (DevID ⊙ Authcode))), ⊙ indicate same or operation, h () is hash function.
Server receives the user information Userinfo, using unique identification AppID and equipment unique identification DevID Later, authorization code Authcode, and calculation server cryptographic Hash H are generated at randomser.The authorization code that server will generate at random Authcode and server cryptographic Hash HserReturn to terminal device.
S302 passes through hash function computing terminal equipment cryptographic Hash Hdev, Hdev=h (Userinfo ⊙ h (AppID ⊙ h (DevID ⊙ Authcode))), and judge HdevAnd HserIt is whether equal, if equal, authorize the terminal device and server Between access authority;If unequal, the access between the terminal device and server is limited.
Wherein, pass through the hash function computing terminal equipment cryptographic Hash H of terminal device localdev
In other embodiments of the present invention, as shown in figure 4, the step of terminal device authentication server, including step S401 To S403.
S401 receives the server and is receiving the user information Userinfo, using unique identification AppID and setting The authorization code Authcode generated at random, the server cryptographic Hash H returned after standby unique identification DevIDserWith working as server Preceding time Tser
Wherein, Hser=h (Userinfo ⊙ h (AppID ⊙ h (DevID ⊙ Authcode))), ⊙ indicate same or operation, h () is hash function.
S402 determines the current time T of the serverserWith the current time T of terminal devicedevIn having for authen session It imitates within the scope of the time difference.
Illustratively, the current time T of server is determinedserWith the current time T of terminal devicedevMeet Tdev-TserMΔ T。
If the current time T of the server receivedserWith the current time T of terminal devicedevIn the effective of authen session Within the scope of time difference, then S403 is continued to execute;If the current time T of the server receivedserWith the current time of terminal device TdevNot within the scope of the effective time difference of authen session, then the access between the terminal device and server is limited.
S403 passes through hash function computing terminal equipment cryptographic Hash Hdev, Hdev=h (Userinfo ⊙ h (AppID ⊙ h (DevID ⊙ Authcode))), and judge HdevAnd HserIt is whether equal, if HdevAnd HserIt is equal, then authorize the terminal device Access authority between server;If HdevAnd HserIt is unequal, then limit the access between the terminal device and server.
On the basis of above-mentioned Fig. 3 or embodiment illustrated in fig. 4, logged in the present invention also provides a kind of application of terminal device Method, the present embodiment increase on the basis of terminal device authentication server on the basis of above-mentioned Fig. 3 or Fig. 4 embodiment The step of server authentication terminal device, further improve safety.The embodiment of the present invention is based on embodiment described in Fig. 3 It is illustrated for improving, as shown in figure 5, the application login method further includes step S501 to S505.Each step It is as follows to implement principle.
S501 receives the server and is receiving the user information Userinfo, using unique identification AppID and setting The authorization code Authcode generated at random and server cryptographic Hash H returned after standby unique identification DevIDser, Hser=h (Userinfo ⊙ h (AppID ⊙ h (DevID ⊙ Authcode))), wherein ⊙ indicates same or operation, and h () is hash function;
S502 passes through hash function computing terminal equipment cryptographic Hash Hdev, Hdev=h (Userinfo ⊙ h (AppID ⊙ h (DevID ⊙ Authcode))), and judge HdevAnd HserIt is whether equal.
S503, if HdevAnd HserIt is equal, then obtain the current time T of terminal devicedev, and calculate Hdev2=h (Userinfo∪h(AppID∪h(DevID∪Tdev))), wherein union is sought in ∪ expression.
S504 is executed after S503.
S504, by the current time T of terminal devicedevAnd Hdev2It is sent to the server, so that the server obtains Take the current time T of serverser, judge the current time T of serverserWith the current time T of terminal devicedevDifference be It is no in effective time difference range, if so, calculating Hser2=h (Userinfo ∪ h (AppID ∪ h (DevID ∪ Tdev))), if Hdev2With Hser2It is equal, then authorize the access authority between the terminal device and server.
Illustratively, judge the current time T of serverserWith the current time T of terminal devicedevDifference whether having Time difference range is imitated, including judges Tdev-TserWhether M Δ T is true.
If the current time T of serverserWith the current time T of terminal devicedevDifference in effective time difference range, then Calculate Hser2=h (Userinfo ∪ h (AppID ∪ h (DevID ∪ Tdev))), if Hdev2With Hser2It is equal, then trust the terminal Access between equipment and server;If Hdev2With Hser2It is unequal, then limit the visit between the terminal device and server It asks.
If the current time T of serverserWith the current time T of terminal devicedevDifference not in effective time difference range, Then limit the access between the terminal device and server.Subsequent step is not executed at this time.
S505, if HdevAnd HserIt is unequal, then limit the access between the terminal device and server.
It should be understood that the size of the serial number of each step is not meant that the order of the execution order in above-described embodiment, each process Execution sequence should be determined by its function and internal logic, the implementation process without coping with the embodiment of the present invention constitutes any limit It is fixed.
Corresponding to login method is applied described in foregoing embodiments, Fig. 6 shows interface provided in an embodiment of the present invention Using the structural block diagram of entering device, for ease of description, only parts related to embodiments of the present invention are shown.
Referring to Fig. 6, this includes: using entering device
First enquiry module 601, when for listening to the application starting of terminal device, the application for obtaining the application is unique Mark generates the first inquiry instruction and is sent to server;First inquiry instruction is used to indicate the server according to institute The corresponding relationship using unique identification and user information is stated, corresponding user information is searched, is carried in first inquiry instruction Have described using unique identification;
First login module 602, if returning to user's letter corresponding with the application unique identification for receiving server Breath, then complete the login of the application according to the user information;
Second enquiry module 603, if the message being not present using unique identification for receiving server return, The equipment unique identification of the terminal device is then obtained, the second inquiry instruction is generated and is sent to server;Second inquiry The equipment unique identification is carried in instruction, second inquiry instruction is used to indicate server and uniquely marks according to the equipment Know and searches the corresponding user information of the equipment unique identification;
Second login module 604, if the user information corresponding with equipment unique identification for receiving server return, The login of the application is then completed according to the corresponding user information of the equipment unique identification.
Optionally, as shown in fig. 7, described apply entering device further include:
Receiving module 605 receives the user information of user's input, for listening to the application starting of terminal device with root User's registration is completed according to the user information;The user information includes user account, user password and subscriber identity information;
Sending module 606 is used for after completing user's registration, when monitoring to log in the application, and logining successfully, by institute It states user information, be sent to server using unique identification and equipment unique identification, so that server establishes the unique mark of application Know, the corresponding relationship of equipment unique identification and user information.
Optionally, as shown in figure 8, described apply entering device further include:
Loading module 607, for loading selection circle for logging in other application by user information for authorization terminal equipment Face starts the identity recognition function of terminal device, obtains user's if receiving determining authorization message in the selection interface The identity information is sent to server, establishes the corresponding relationship of identity information and user information by identity information;The identity Information includes the finger print information or gesture information of user;
Third enquiry module 608, is used for:
The identity recognition function for starting terminal device obtains the identity information of user, generates third inquiry instruction and sends To server;The third inquiry instruction is used to indicate server according to the corresponding relationship of the identity information and user information, Corresponding user information is searched, the third inquiry instruction carries the identity information;
It is complete according to the user information if receiving the user information corresponding with the identity information of server return At the login of the application;
If the message that the identity information for receiving server return is not present, closes the application.
Further, as shown in figure 9, described apply entering device further include: authentication module 609.
Optionally, authentication module 609 are used for:
Receive the server receive the user information Userinfo, using unique identification AppID and equipment only The authorization code Authcode generated at random and server cryptographic Hash H returned after one mark DevIDser, Hser=h (Userinfo ⊙ h (AppID ⊙ h (DevID ⊙ Authcode))), wherein ⊙ indicates same or operation, and h () is hash function;
Pass through the hash function computing terminal equipment cryptographic Hash H of terminal device localdev, Hdev=h (Userinfo ⊙ h (AppID ⊙ h (DevID ⊙ Authcode))), and judge HdevAnd HserIt is whether equal, if equal, trust the terminal device Access between server;If unequal, the access between the terminal device and server is limited.
Optionally, the authentication module 609, is used for:
Receive the server receive the user information Userinfo, using unique identification AppID and equipment only The authorization code Authcode generated at random, the server cryptographic Hash H returned after one mark DevIDserWith server it is current when Between Tser, wherein Hser=h (Userinfo ⊙ h (AppID ⊙ h (DevID ⊙ Authcode))), ⊙ indicate same or operation, h () For hash function;
Determine the current time T of the server receivedserWith the current time T of terminal devicedevIn having for authen session It imitates within the scope of the time difference;
Pass through hash function computing terminal equipment cryptographic Hash Hdev, Hdev=h (Userinfo ⊙ h (AppID ⊙ h (DevID ⊙ Authcode))), and judge HdevAnd HserIt is whether equal, if equal, authorize the visit between the terminal device and server Ask permission;If unequal, the access between the terminal device and server is limited.
Optionally, the authentication module 609, is used for:
Receive the server receive the user information Userinfo, using unique identification AppID and equipment only The authorization code Authcode generated at random and server cryptographic Hash H returned after one mark DevIDser, Hser=h (Userinfo ⊙ h (AppID ⊙ h (DevID ⊙ Authcode))), wherein ⊙ indicates same or operation, and h () is hash function;
Pass through hash function computing terminal equipment cryptographic Hash Hdev, Hdev=h (Userinfo ⊙ h (AppID ⊙ h (DevID ⊙ Authcode))), and judge HdevAnd HserIt is whether equal;
If HdevAnd HserIt is equal, then obtain the current time T of terminal devicedev, and calculate Hdev2=h (Userinfo ∪ h (AppID∪h(DevID∪Tdev))), wherein union is sought in ∪ expression;By the current time T of terminal devicedevAnd Hdev2It is sent to The server, so that the server obtains the current time T of serverser, judge the current time T of serverserWith The current time T of terminal devicedevDifference whether in effective time difference range, if satisfied, then calculating Hser2=h (Userinfo ∪h(AppID∪h(DevID∪Tdev))), if Hdev2With Hser2It is equal, then authorize the visit between the terminal device and server Ask permission;
If HdevAnd HserIt is unequal, then limit the access between the terminal device and server.
Figure 10 is the schematic diagram for the terminal device that one embodiment of the invention provides.As shown in Figure 10, the terminal of the embodiment Equipment 10 includes: processor 100, memory 101 and is stored in the memory 101 and can be on the processor 100 The computer program 102 of operation, such as using logging program.The realization when processor 100 executes the computer program 102 Above-mentioned each step using in login method embodiment, such as step S101 to S104 shown in FIG. 1.Alternatively, the processing Device 100 realizes the function of each module/unit in above-mentioned each Installation practice, such as Fig. 6 institute when executing the computer program 102 Show the function of module 601 to 604.
Illustratively, the computer program 102 can be divided into one or more module/units, it is one or Multiple module/the units of person are stored in the memory 101, and are executed by the processor 100, to complete the present invention.Institute Stating one or more module/units can be the series of computation machine program instruction section that can complete specific function, the instruction segment For describing implementation procedure of the computer program 102 in the terminal device 10.
The terminal device 10 can be desktop PC, notebook, palm PC and mobile phone etc..The terminal Equipment 10 may include, but be not limited only to, processor 100, memory 101.It will be understood by those skilled in the art that Figure 10 is only The example of terminal device 10 does not constitute the restriction to terminal device 10, may include components more more or fewer than diagram, or Person combines certain components or different components, such as the terminal device can also include input-output equipment, network insertion Equipment, bus etc..
Alleged processor 100 can be central processing unit (Central Processing Unit, CPU), can also be Other general processors, digital signal processor (Digital Signal Processor, DSP), specific integrated circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field- Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic, Discrete hardware components etc..General processor can be microprocessor or the processor is also possible to any conventional processor Deng.
The memory 101 can be the internal storage unit of the terminal device 10, such as the hard disk of terminal device 10 Or memory.The memory 101 is also possible to the External memory equipment of the terminal device 10, such as on the terminal device 10 The plug-in type hard disk of outfit, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) Card, flash card (Flash Card) etc..Further, the memory 101 can also be both interior including the terminal device 10 Portion's storage unit also includes External memory equipment.The memory 101 is for storing the computer program and the terminal Other programs and data needed for equipment.The memory 101, which can be also used for temporarily storing, have been exported or will be defeated Data out.
It is apparent to those skilled in the art that for convenience of description and succinctly, only with above-mentioned each function Can unit, module division progress for example, in practical application, can according to need and by above-mentioned function distribution by different Functional unit, module are completed, i.e., the internal structure of described device is divided into different functional unit or module, more than completing The all or part of function of description.Each functional unit in embodiment, module can integrate in one processing unit, can also To be that each unit physically exists alone, can also be integrated in one unit with two or more units, it is above-mentioned integrated Unit both can take the form of hardware realization, can also realize in the form of software functional units.In addition, each function list Member, the specific name of module are also only for convenience of distinguishing each other, the protection scope being not intended to limit this application.Above system The specific work process of middle unit, module, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, is not described in detail or remembers in some embodiment The part of load may refer to the associated description of other embodiments.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated module/unit be realized in the form of SFU software functional unit and as independent product sale or In use, can store in a computer readable storage medium.Based on this understanding, the present invention realizes above-mentioned implementation All or part of the process in example method, can also instruct relevant hardware to complete, the meter by computer program Calculation machine program can be stored in a computer readable storage medium, the computer program when being executed by processor, it can be achieved that on The step of stating each embodiment of the method.
Embodiment described above is merely illustrative of the technical solution of the present invention, rather than its limitations;Although referring to aforementioned reality Applying example, invention is explained in detail, those skilled in the art should understand that: it still can be to aforementioned each Technical solution documented by embodiment is modified or equivalent replacement of some of the technical features;And these are modified Or replacement, the spirit and scope for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution should all It is included within protection scope of the present invention.

Claims (10)

1. a kind of terminal device applies login method characterized by comprising
When listening to the application starting of terminal device, the application unique identification of the application is obtained, generates the first inquiry instruction simultaneously It is sent to server;First inquiry instruction is used to indicate the server according to the application unique identification and user information Corresponding relationship, search corresponding user information, carried in first inquiry instruction described using unique identification;
If receiving server returns to user information corresponding with the application unique identification, completed according to the user information The login of the application;
If receiving the message being not present using unique identification of server return, the equipment for obtaining the terminal device Unique identification generates the second inquiry instruction and is sent to server;It is unique that the equipment is carried in second inquiry instruction Mark, second inquiry instruction are used to indicate server and search the equipment unique identification pair according to the equipment unique identification The user information answered;
If the user information corresponding with equipment unique identification of server return is received, according to the equipment unique identification pair The user information answered completes the login of the application.
2. applying login method as described in claim 1, which is characterized in that described to apply login method further include:
The application starting for listening to terminal device, receives the user information of user's input, to complete to use according to the user information Family registration;The user information includes user account, user password and subscriber identity information;
After completing user's registration, when monitoring to log in the application, and logining successfully, by the user information, using unique Mark and equipment unique identification are sent to server, so that server, which is established, applies unique identification, equipment unique identification and use The corresponding relationship of family information.
3. applying login method as claimed in claim 2, which is characterized in that described to be marked by the user information, using unique Know and equipment unique identification is sent to server, so that server, which is established, applies unique identification, equipment unique identification and user After the corresponding relationship of information, comprising:
Load logs in the selection interface of other application by user information for authorization terminal equipment, if connecing in the selection interface Determining authorization message is received, then starts the identity recognition function of terminal device, obtains the identity information of user, the identity is believed Breath is sent to server, establishes the corresponding relationship of the identity information and user information;The identity information includes the finger of user Line information or gesture information;
Correspondingly, listening to after the application starting of terminal device, before the application unique identification for obtaining the application, also wrap It includes:
The identity recognition function for starting terminal device obtains the identity information of user, generates third inquiry instruction and is sent to clothes Business device;The third inquiry instruction is used to indicate server according to the corresponding relationship of the identity information and user information, searches Corresponding user information, the third inquiry instruction carry the identity information;
If receiving the user information corresponding with the identity information of server return, institute is completed according to the user information State the login of application;
If the message that the identity information for receiving server return is not present, closes the application.
4. applying login method as claimed in claim 2 or claim 3, which is characterized in that the use used when the transmission user's registration Family information, using unique identification and equipment unique identification to server after, comprising:
The server is received to receive the user information Userinfo, the application unique identification AppID and described setting The authorization code Authcode generated at random and server cryptographic Hash H returned after standby unique identification DevIDser, Hser=h (Userinfo ⊙ h (AppID ⊙ h (DevID ⊙ Authcode))), wherein ⊙ indicates same or operation, and h () is hash function;
Pass through hash function computing terminal equipment cryptographic Hash Hdev, Hdev=h (Userinfo ⊙ h (AppID ⊙ h (DevID ⊙ Authcode))), and judge HdevAnd HserIt is whether equal, if HdevAnd HserIt is equal, then authorize the terminal device and server Between access authority;If HdevAnd HserIt is unequal, then limit the access between the terminal device and server.
5. applying login method as claimed in claim 4, which is characterized in that it is described receive the server receive it is described User information Userinfo, the authorization generated at random returned later using unique identification AppID and equipment unique identification DevID Code Authcode and server cryptographic Hash HserWhile, comprising:
The server is received to receive the user information Userinfo, uniquely marking using unique identification AppID and equipment Know the current time T of the server returned after DevIDser,
Correspondingly, the hash function computing terminal equipment cryptographic Hash H by terminal device localdevBefore, comprising:
Determine the current time T of the serverserWith the current time T of terminal devicedevIt is poor in the effective time of authen session In range.
6. applying login method as claimed in claim 4, which is characterized in that the judgement HdevAnd HserIt is whether equal, if Hdev And HserIt is equal, further includes:
Obtain the current time T of terminal devicedev, and calculate Hdev2=h (Userinfo ∪ h (AppID ∪ h (DevID ∪ Tdev))), wherein union is sought in ∪ expression;
By the current time T of terminal devicedevAnd Hdev2It is sent to the server, so that the server obtains server Current time Tser, judge the current time T of serverserWith the current time T of terminal devicedevDifference whether when effective Between poor range, if so, calculating Hser2=h (Userinfo ∪ h (AppID ∪ h (DevID ∪ Tdev))), if Hdev2With Hser2Phase Deng then authorizing the access authority between the terminal device and server.
7. a kind of terminal device, including memory and processor, it is stored with and can transports on the processor in the memory Capable computer program, which is characterized in that when the processor executes the computer program, realize following steps:
When listening to the application starting of terminal device, the application unique identification of the application is obtained, generates the first inquiry instruction simultaneously It is sent to server;First inquiry instruction is used to indicate the server according to the application unique identification and user information Corresponding relationship, search corresponding user information, carried in first inquiry instruction described using unique identification;
If receiving server returns to user information corresponding with the application unique identification, completed according to the user information The login of the application;
If receiving the message being not present using unique identification of server return, the equipment for obtaining the terminal device Unique identification generates the second inquiry instruction and is sent to server;It is unique that the equipment is carried in second inquiry instruction Mark, second inquiry instruction are used to indicate server and search the equipment unique identification pair according to the equipment unique identification The user information answered;
If the user information corresponding with equipment unique identification of server return is received, according to the equipment unique identification pair The user information answered completes the login of the application.
8. terminal device as claimed in claim 7, which is characterized in that when the processor executes the computer program, also Realize following steps:
The application starting for listening to terminal device, receives the user information of user's input, to complete to use according to the user information Family registration;The user information includes user account, user password and subscriber identity information;
After completing user's registration, when monitoring to log in the application, and logining successfully, by the user information, using unique Mark and equipment unique identification are sent to server, so that server, which is established, applies unique identification, equipment unique identification and use The corresponding relationship of family information.
9. terminal device as claimed in claim 8, which is characterized in that it is described by the user information, using unique identification and Equipment unique identification is sent to server, so that server, which is established, applies unique identification, equipment unique identification and user information Corresponding relationship after, comprising:
Load logs in the selection interface of other application by user information for authorization terminal equipment, if connecing in the selection interface Determining authorization message is received, then starts the identity recognition function of terminal device, obtains the identity information of user, the identity is believed Breath is sent to server, establishes the corresponding relationship of identity information and user information;The identity information includes the fingerprint letter of user Breath or gesture information;
Correspondingly, listening to after the application starting of terminal device, before the application unique identification for obtaining the application, also wrap It includes:
The identity recognition function for starting terminal device obtains the identity information of user, generates third inquiry instruction and is sent to clothes Business device;The third inquiry instruction is used to indicate server according to the corresponding relationship of the identity information and user information, searches Corresponding user information, the third inquiry instruction carry the identity information;
If receiving the user information corresponding with the identity information of server return, institute is completed according to the user information State the login of application;
If the message that the identity information for receiving server return is not present, closes the application.
10. a kind of computer readable storage medium, the computer-readable recording medium storage has computer program, and feature exists In when the computer program is executed by processor the step of any one of such as claim 1 to 6 of realization the method.
CN201810614373.6A 2018-06-14 2018-06-14 Terminal device applies login method and terminal device Pending CN108959904A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201810614373.6A CN108959904A (en) 2018-06-14 2018-06-14 Terminal device applies login method and terminal device
PCT/CN2018/105553 WO2019237542A1 (en) 2018-06-14 2018-09-13 Application login method and apparatus for electronic device, and electronic device and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810614373.6A CN108959904A (en) 2018-06-14 2018-06-14 Terminal device applies login method and terminal device

Publications (1)

Publication Number Publication Date
CN108959904A true CN108959904A (en) 2018-12-07

Family

ID=64488954

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810614373.6A Pending CN108959904A (en) 2018-06-14 2018-06-14 Terminal device applies login method and terminal device

Country Status (2)

Country Link
CN (1) CN108959904A (en)
WO (1) WO2019237542A1 (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111625809A (en) * 2020-05-31 2020-09-04 数字浙江技术运营有限公司 Data authorization method and device, electronic equipment and storage medium
CN111783169A (en) * 2020-07-09 2020-10-16 深圳市欢太科技有限公司 Method and device for determining unique identification code of equipment, terminal equipment and storage medium
CN111935710A (en) * 2020-09-24 2020-11-13 广州市玄武无线科技股份有限公司 Application program login method and device of mobile terminal and electronic equipment
CN112364312A (en) * 2020-10-27 2021-02-12 连尚(新昌)网络科技有限公司 Application login method, electronic device and computer readable storage medium
WO2021169469A1 (en) * 2020-02-24 2021-09-02 平安科技(深圳)有限公司 Voiceprint data processing method and apparatus, computer device, and storage medium
CN114579193A (en) * 2022-03-08 2022-06-03 国泰新点软件股份有限公司 Multi-system loading method, device, equipment and storage medium
CN115412347A (en) * 2022-08-31 2022-11-29 建信金融科技有限责任公司 Device login method, device and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103152331A (en) * 2013-02-07 2013-06-12 百度在线网络技术(北京)有限公司 Method and system for logging in/registering through mobile terminal and cloud server
CN103609090A (en) * 2013-06-19 2014-02-26 华为技术有限公司 Method and device for identity login
US20140289508A1 (en) * 2013-03-21 2014-09-25 Tencent Technology (Shenzhen) Company Limited Method, client and system of identity authentication
CN104468103A (en) * 2013-09-13 2015-03-25 联想(北京)有限公司 Information processing method, electronic equipment and server

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103001934B (en) * 2011-09-16 2016-09-07 腾讯科技(深圳)有限公司 The method and system that terminal applies logs in
CN104301316A (en) * 2014-10-13 2015-01-21 中国电子科技集团公司第二十八研究所 Single sign-on system and implementation method thereof
CN106650351B (en) * 2016-10-31 2018-12-04 维沃移动通信有限公司 A kind of operation method and mobile terminal of application program
CN107295085B (en) * 2017-06-28 2019-07-12 Oppo广东移动通信有限公司 Application message processing and method for down loading, server, client and terminal device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103152331A (en) * 2013-02-07 2013-06-12 百度在线网络技术(北京)有限公司 Method and system for logging in/registering through mobile terminal and cloud server
US20140289508A1 (en) * 2013-03-21 2014-09-25 Tencent Technology (Shenzhen) Company Limited Method, client and system of identity authentication
CN103609090A (en) * 2013-06-19 2014-02-26 华为技术有限公司 Method and device for identity login
CN104468103A (en) * 2013-09-13 2015-03-25 联想(北京)有限公司 Information processing method, electronic equipment and server

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021169469A1 (en) * 2020-02-24 2021-09-02 平安科技(深圳)有限公司 Voiceprint data processing method and apparatus, computer device, and storage medium
CN111625809A (en) * 2020-05-31 2020-09-04 数字浙江技术运营有限公司 Data authorization method and device, electronic equipment and storage medium
CN111625809B (en) * 2020-05-31 2024-03-26 数字浙江技术运营有限公司 Data authorization method and device, electronic equipment and storage medium
CN111783169A (en) * 2020-07-09 2020-10-16 深圳市欢太科技有限公司 Method and device for determining unique identification code of equipment, terminal equipment and storage medium
CN111783169B (en) * 2020-07-09 2024-05-24 深圳市欢太科技有限公司 Method and device for determining device unique identification code, terminal device and storage medium
CN111935710A (en) * 2020-09-24 2020-11-13 广州市玄武无线科技股份有限公司 Application program login method and device of mobile terminal and electronic equipment
CN112364312A (en) * 2020-10-27 2021-02-12 连尚(新昌)网络科技有限公司 Application login method, electronic device and computer readable storage medium
CN114579193A (en) * 2022-03-08 2022-06-03 国泰新点软件股份有限公司 Multi-system loading method, device, equipment and storage medium
CN114579193B (en) * 2022-03-08 2024-01-12 国泰新点软件股份有限公司 Multi-system loading method, device, equipment and storage medium
CN115412347A (en) * 2022-08-31 2022-11-29 建信金融科技有限责任公司 Device login method, device and storage medium

Also Published As

Publication number Publication date
WO2019237542A1 (en) 2019-12-19

Similar Documents

Publication Publication Date Title
CN108959904A (en) Terminal device applies login method and terminal device
CN111478967B (en) Request processing method and device
US8639926B2 (en) Techniques for mobile device authentication
CN109683936B (en) Gray scale distribution method and device, storage medium and electronic equipment
CN105282126B (en) Login authentication method, terminal and server
CN111212075B (en) Service request processing method and device, electronic equipment and computer storage medium
CN108701309A (en) A kind of distributed user profile authentication system for security of e-commerce transactions
EP3389295A1 (en) Multi-terminal mapping system and method for virtual sim card
CN112738805A (en) Device control method and apparatus, storage medium, and electronic device
US9680841B2 (en) Network authentication method for secure user identity verification using user positioning information
CN111262866B (en) Cloud service access method, device, equipment and medium
CN105992204A (en) Access authentication method of applications of mobile intelligent terminal and device
WO2019140790A1 (en) Service tracking method and apparatus, terminal device, and storage medium
CA2998119C (en) Information registration and authentication method and device
CN108241797A (en) Mirror image warehouse user right management method, device, system and readable storage medium storing program for executing
CN105337739B (en) Safe login method, device, server and terminal
CN111176794A (en) Container management method and device and readable storage medium
EP3607440A1 (en) Credential-based proactive discovery of remote micro-services by spreadsheet applications
CN111355723A (en) Single sign-on method, device, equipment and readable storage medium
WO2014139097A1 (en) Systems and methods for account recovery using a platform attestation credential
CN106656985A (en) Backup account login method, device and system
CN113569263A (en) Secure processing method and device for cross-private-domain data and electronic equipment
CN108769059B (en) Verification method, device, medium and computing equipment
CN108574658B (en) Application login method and device
CN110602679B (en) Display and transmission method, identity authentication and data transmission device and terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20181207