CN109165499A - Single-point logging method, mobile terminal and computer readable storage medium - Google Patents

Single-point logging method, mobile terminal and computer readable storage medium Download PDF

Info

Publication number
CN109165499A
CN109165499A CN201810954265.3A CN201810954265A CN109165499A CN 109165499 A CN109165499 A CN 109165499A CN 201810954265 A CN201810954265 A CN 201810954265A CN 109165499 A CN109165499 A CN 109165499A
Authority
CN
China
Prior art keywords
sign
customer center
mobile terminal
request
temporary authorization
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810954265.3A
Other languages
Chinese (zh)
Inventor
刘孟焱
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nubia Technology Co Ltd
Original Assignee
Nubia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nubia Technology Co Ltd filed Critical Nubia Technology Co Ltd
Priority to CN201810954265.3A priority Critical patent/CN109165499A/en
Publication of CN109165499A publication Critical patent/CN109165499A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/41User authentication where a single sign-on provides access to a plurality of computers

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a kind of single-point logging method, mobile terminal and computer readable storage mediums, the single-point logging method is comprising steps of the single-sign-on of browser acquisition third-party application is requested, obtain the access token of the client of the customer center, and the access token is passed to the server-side of the customer center, so that the server-side of the customer center generates the temporary Authorization of the single-sign-on request, and save, the single-sign-on verification request that the browser is sent is obtained afterwards;Whether the temporary Authorization that judgement sends the temporary Authorization of the browser to and the server-side saves is consistent, if so, completing the single-sign-on request of the third-party application;Compared with prior art, the single-sign-on that mobile terminal is more applied can be achieved in the present invention, and having reached user can be logged in without inputting username and password using customer center, remove unnecessary complex operations from, improves user experience.

Description

Single-point logging method, mobile terminal and computer readable storage medium
Technical field
The present invention relates to technical field of mobile terminals more particularly to a kind of single-point logging methods, mobile terminal and computer Readable storage medium storing program for executing.
Background technique
Mobile terminal is commonly configured with multiple and different application systems, including browser, native applications, third-party application etc. Deng being individually to develop between each application system, use respective login function, therefore user is between multiple application systems When switching, need repeatedly to input username and password, this has severely impacted the usage experience of user, while also bringing to user Manage the pressure of numerous account number ciphers.
Single-sign-on (Single Sign On, abbreviation SSO) technology is deposited when being exactly to solve above-mentioned application Integrating The problem of, user is in multiple application systems, it is only necessary to login can once not need to input username and password again Access the application system of all mutual trusts.The work of authentication and rights management is all transferred to single-sign-on to take by the technology Business is completed, silent to user this ensure that the certification work of user is all realized on backstage, is realized between system without seaming and cutting It changes, this greatly improves the usage experience of user.
The single-sign-on scene of existing mobile terminal is all largely the interaction of third-party application, between especially APP Interaction, typical scene such as wechat log in, and existing Android APP mostly supports wechat single-sign-on.There are also partially borrow The customer center for helping mobile terminal manufacturer, with the diversification in role of mobile terminal manufacturer, more and more manufacturers have oneself Customer center, develop diversified application and improve user's viscosity, mobile terminal manufacturer would generally use a customer center Carry out all applications (being belonged to native applications herein) of its exploitation of single-sign-on, such as: cloud service, browser, application The application such as shop, store, community;It, which limits to, is that customer center is only capable of logging in and manages associated application (same manufacturer opens The application of hair), there is also many restrictions, such as different third-party applications may be deployed in difference for the interaction with third-party application Under domain, different third-party applications have used different development languages to develop realization etc..How customer center and third party to be answered It is the pressing issues that we need to solve at present to realize single-sign-on with interacting.
Therefore, it is necessary to provide a kind of single-point logging method, mobile terminal and computer readable storage medium to solve State technical problem.
Summary of the invention
It is a primary object of the present invention to propose a kind of single-point logging method interacted by browser with third-party application, Mobile terminal and computer readable storage medium, to realize single-sign-on that mobile terminal is more applied, so that user is without more Secondary input user information removes unnecessary complex operations from, improves user experience.
Firstly, to achieve the above object, the present invention provides a kind of single-point logging method, applied to the shifting with customer center Dynamic terminal, the single-point logging method the following steps are included:
The single-sign-on request of the browser acquisition third-party application of the mobile terminal;Wherein, the single-sign-on is asked It include the Session ID of the third-party application in asking;
The access token is passed to the customer center by the access token for obtaining the client of the customer center Server-side;
The server-side of the customer center generates the temporary Authorization of the single-sign-on request, and saves;
The temporary Authorization of the third-party application is sent to the browser;
The server-side of the customer center obtains the single-sign-on verification request that the browser is sent;
Whether the temporary Authorization that judgement sends the temporary Authorization of the browser to and the server-side saves is consistent, If so, completing the single-sign-on request of the third-party application.
Optionally, after described " the single-sign-on request of the browser acquisition third-party application of the mobile terminal ", institute It is further comprising the steps of before stating " access token for obtaining the client of the customer center ":
Judge the logging state of the client of the customer center;
If the client of the customer center is logging state, the visit of the client of the customer center is directly acquired Ask token;
If the client of the customer center is to be not logged in state, the client of the customer center is logged in, to obtain The access token of the client of the customer center.
Optionally, the generating algorithm of the temporary Authorization is generated using UUID, to improve the authentication security of single-sign-on.
Optionally, the step of described " temporary Authorization that the server-side of the customer center generates the single-sign-on request " Further include: the effective time of the temporary Authorization is set.
It is optionally, described that " server-side of the customer center generates the temporary Authorization of the single-sign-on request, and protects Deposit " specifically includes the following steps:
The server-side of the customer center generates the temporary Authorization of single-sign-on request, the temporary Authorization with it is described Session ID establishes mapping relations, and is stored in the server-side of the customer center.
Optionally, described the single-sign-on of the third-party application " complete request " specifically includes the following steps:
The identity logs information of the preset third-party application is obtained according to the temporary Authorization;
The respective interface of the third-party application is jumped to using the identity logs information.
Optionally, the third-party application refers to operation on the mobile terminal and can be with the browsing of the mobile terminal Any application of device interaction or software.
Optionally, the browser includes the browser in the native applications of the mobile terminal.
Meanwhile the present invention also provides a kind of mobile terminal, the mobile terminal includes memory, processor and is stored in institute The single-sign-on program that can be run on memory and on the processor is stated, the single-sign-on program is held by the processor The step of single-point logging method as described above is realized when row.
In addition, being stored on the computer readable storage medium the present invention also provides a kind of computer readable storage medium There is single-sign-on program, the single-sign-on program is performed the step of realizing single-point logging method as described above.
Compared to the prior art, single-point logging method proposed by the invention, applied to the mobile end with customer center End is requested by the single-sign-on that browser acquires third-party application, obtains the access token of the client of the customer center, And the access token is passed to the server-side of the customer center, so that the server-side of the customer center generates the list The temporary Authorization of point logging request, and save, then the server-side of the customer center obtains the single-point that the browser is sent Log in verification request;Whether the temporary Authorization that judgement sends the temporary Authorization of the browser to and the server-side saves Unanimously, if so, completing the single-sign-on request of the third-party application;The single-point that achievable mobile terminal is more applied is stepped on Record improves user experience so that user removes unnecessary complex operations from without repeatedly input user information.
Detailed description of the invention
The hardware structural diagram of Fig. 1 optional mobile terminal of each embodiment one to realize the present invention;
Fig. 2 is a kind of communications network system architecture diagram provided in an embodiment of the present invention;
Fig. 3 is the implementation process diagram of single-point logging method first embodiment of the present invention;
Fig. 4 is the implementation process diagram of single-point logging method second embodiment of the present invention;
Fig. 5 is the functional block diagram of single-sign-on program first embodiment of the present invention;
Fig. 6 is the functional block diagram of single-sign-on program second embodiment of the present invention;
Fig. 7 is the interface schematic diagram that third-party application submits single-sign-on request;
Fig. 8 is the effective time set interface schematic diagram of temporary Authorization;
Appended drawing reference:
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
In subsequent description, it is only using the suffix for indicating such as " module ", " component " or " unit " of element Be conducive to explanation of the invention, itself there is no a specific meaning.Therefore, " module ", " component " or " unit " can mix Ground uses.
Terminal can be implemented in a variety of manners.For example, terminal described in the present invention may include such as mobile phone, plate Computer, laptop, palm PC, personal digital assistant (Personal Digital Assistant, PDA), portable Media player (Portable Media Player, PMP), navigation device, wearable device, Intelligent bracelet, pedometer etc. move The fixed terminals such as dynamic terminal, and number TV, desktop computer.
It will be illustrated by taking mobile terminal as an example in subsequent descriptions, it will be appreciated by those skilled in the art that in addition to special Except element for moving purpose, the construction of embodiment according to the present invention can also apply to the terminal of fixed type.
Referring to Fig. 1, a kind of hardware structural diagram of its mobile terminal of each embodiment to realize the present invention, the shifting Dynamic terminal 100 may include: RF (Radio Frequency, radio frequency) unit 101, WiFi module 102, audio output unit 103, A/V (audio/video) input unit 104, sensor 105, display unit 106, user input unit 107, interface unit 108, the components such as memory 109, processor 110 and power supply 111.It will be understood by those skilled in the art that shown in Fig. 1 Mobile terminal structure does not constitute the restriction to mobile terminal, and mobile terminal may include components more more or fewer than diagram, Perhaps certain components or different component layouts are combined.
It is specifically introduced below with reference to all parts of the Fig. 1 to mobile terminal:
Radio frequency unit 101 can be used for receiving and sending messages or communication process in, signal sends and receivees, specifically, by base station Downlink information receive after, to processor 110 handle;In addition, the data of uplink are sent to base station.In general, radio frequency unit 101 Including but not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier, duplexer etc..In addition, penetrating Frequency unit 101 can also be communicated with network and other equipment by wireless communication.Any communication can be used in above-mentioned wireless communication Standard or agreement, including but not limited to GSM (Global System of Mobile communication, global system for mobile telecommunications System), GPRS (General Packet Radio Service, general packet radio service), CDMA2000 (Code Division Multiple Access 2000, CDMA 2000), WCDMA (Wideband Code Division Multiple Access, wideband code division multiple access), TD-SCDMA (Time Division-Synchronous Code Division Multiple Access, TD SDMA), FDD-LTE (Frequency Division Duplexing-Long Term Evolution, frequency division duplex long term evolution) and TDD-LTE (Time Division Duplexing-Long Term Evolution, time division duplex long term evolution) etc..
WiFi belongs to short range wireless transmission technology, and mobile terminal can help user to receive and dispatch electricity by WiFi module 102 Sub- mail, browsing webpage and access streaming video etc., it provides wireless broadband internet access for user.Although Fig. 1 shows Go out WiFi module 102, but it is understood that, and it is not belonging to must be configured into for mobile terminal, it completely can be according to need It to omit within the scope of not changing the essence of the invention.
Audio output unit 103 can be in call signal reception pattern, call mode, record mould in mobile terminal 100 When under the isotypes such as formula, speech recognition mode, broadcast reception mode, by radio frequency unit 101 or WiFi module 102 it is received or The audio data stored in memory 109 is converted into audio signal and exports to be sound.Moreover, audio output unit 103 Audio output relevant to the specific function that mobile terminal 100 executes can also be provided (for example, call signal receives sound, disappears Breath receives sound etc.).Audio output unit 103 may include loudspeaker, buzzer etc..
A/V input unit 104 is for receiving audio or video signal.A/V input unit 104 may include graphics processor (Graphics Processing Unit, GPU) 1041 and microphone 1042, graphics processor 1041 is in video acquisition mode Or the image data of the static images or video obtained in image capture mode by image capture apparatus (such as camera) carries out Reason.Treated, and picture frame may be displayed on display unit 106.Through graphics processor 1041, treated that picture frame can be deposited Storage is sent in memory 109 (or other storage mediums) or via radio frequency unit 101 or WiFi module 102.Mike Wind 1042 can connect in telephone calling model, logging mode, speech recognition mode etc. operational mode via microphone 1042 Quiet down sound (audio data), and can be audio data by such acoustic processing.Audio that treated (voice) data can To be converted to the format output that can be sent to mobile communication base station via radio frequency unit 101 in the case where telephone calling model. Microphone 1042 can be implemented various types of noises elimination (or inhibition) algorithms and send and receive sound to eliminate (or inhibition) The noise generated during frequency signal or interference.
Mobile terminal 100 further includes at least one sensor 105, such as optical sensor, motion sensor and other biographies Sensor.Specifically, optical sensor includes ambient light sensor and proximity sensor, wherein ambient light sensor can be according to environment The light and shade of light adjusts the brightness of display panel 1061, and proximity sensor can close when mobile terminal 100 is moved in one's ear Display panel 1061 and/or backlight.As a kind of motion sensor, accelerometer sensor can detect in all directions (general For three axis) size of acceleration, it can detect that size and the direction of gravity when static, can be used to identify the application of mobile phone posture (such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, percussion) etc.; The fingerprint sensor that can also configure as mobile phone, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer, The other sensors such as hygrometer, thermometer, infrared sensor, details are not described herein.
Display unit 106 is for showing information input by user or being supplied to the information of user.Display unit 106 can wrap Display panel 1061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode can be used Forms such as (Organic Light-Emitting Diode, OLED) configure display panel 1061.
User input unit 107 can be used for receiving the number or character information of input, and generate the use with mobile terminal Family setting and the related key signals input of function control.Specifically, user input unit 107 may include touch panel 1071 with And other input equipments 1072.Touch panel 1071, also referred to as touch screen collect the touch operation of user on it or nearby (for example user uses any suitable objects or attachment such as finger, stylus on touch panel 1071 or in touch panel 1071 Neighbouring operation), and corresponding attachment device is driven according to preset formula.Touch panel 1071 may include touch detection Two parts of device and touch controller.Wherein, the touch orientation of touch detecting apparatus detection user, and detect touch operation band The signal come, transmits a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and by it It is converted into contact coordinate, then gives processor 110, and order that processor 110 is sent can be received and executed.In addition, can To realize touch panel 1071 using multiple types such as resistance-type, condenser type, infrared ray and surface acoustic waves.In addition to touch panel 1071, user input unit 107 can also include other input equipments 1072.Specifically, other input equipments 1072 can wrap It includes but is not limited in physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse, operating stick etc. It is one or more, specifically herein without limitation.
Further, touch panel 1071 can cover display panel 1061, when touch panel 1071 detect on it or After neighbouring touch operation, processor 110 is sent to determine the type of touch event, is followed by subsequent processing device 110 according to touch thing The type of part provides corresponding visual output on display panel 1061.Although in Fig. 1, touch panel 1071 and display panel 1061 be the function that outputs and inputs of realizing mobile terminal as two independent components, but in certain embodiments, it can The function that outputs and inputs of mobile terminal is realized so that touch panel 1071 and display panel 1061 is integrated, is not done herein specifically It limits.
Interface unit 108 be used as at least one external device (ED) connect with mobile terminal 100 can by interface.For example, External device (ED) may include wired or wireless headphone port, external power supply (or battery charger) port, wired or nothing Line data port, memory card port, the port for connecting the device with identification module, audio input/output (I/O) end Mouth, video i/o port, ear port etc..Interface unit 108 can be used for receiving the input from external device (ED) (for example, number It is believed that breath, electric power etc.) and the input received is transferred to one or more elements in mobile terminal 100 or can be with For transmitting data between mobile terminal 100 and external device (ED).
Memory 109 can be used for storing software program and various data.Memory 109 can mainly include storing program area The storage data area and, wherein storing program area can (such as the sound of application program needed for storage program area, at least one function Sound playing function, image player function etc.) etc.;Storage data area can store according to mobile phone use created data (such as Audio data, phone directory etc.) etc..In addition, memory 109 may include high-speed random access memory, it can also include non-easy The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 110 is the control centre of mobile terminal, utilizes each of various interfaces and the entire mobile terminal of connection A part by running or execute the software program and/or module that are stored in memory 109, and calls and is stored in storage Data in device 109 execute the various functions and processing data of mobile terminal, to carry out integral monitoring to mobile terminal.Place Managing device 110 may include one or more processing units;Preferably, processor 110 can integrate application processor and modulatedemodulate is mediated Manage device, wherein application processor mainly handles information system, user interface and application program etc., and modem processor is main Processing wireless communication.It is understood that above-mentioned modem processor can not also be integrated into processor 110.
Mobile terminal 100 can also include the power supply 111 (such as battery) powered to all parts, it is preferred that power supply 111 Can be logically contiguous by power-supply management system and processor 110, to realize management charging by power-supply management system, put The functions such as electricity and power managed.
Although Fig. 1 is not shown, mobile terminal 100 can also be including bluetooth module etc., and details are not described herein.
Embodiment to facilitate the understanding of the present invention, the communications network system that mobile terminal of the invention is based below into Row description.
Referring to Fig. 2, Fig. 2 is a kind of communications network system architecture diagram provided in an embodiment of the present invention, the communication network system System is the LTE system of universal mobile communications technology, which includes UE (User Equipment, the use of successively communication connection Family equipment) (the land Evolved UMTS Terrestrial Radio Access Network, evolved UMTS 201, E-UTRAN Ground wireless access network) 202, EPC (Evolved Packet Core, evolved packet-based core networks) 203 and operator IP operation 204。
Specifically, UE201 can be above-mentioned terminal 100, and details are not described herein again.
E-UTRAN202 includes eNodeB2021 and other eNodeB2022 etc..Wherein, eNodeB2021 can be by returning Journey (backhaul) (such as X2 interface) is connect with other eNodeB2022, and eNodeB2021 is connected to EPC203, ENodeB2021 can provide the access of UE201 to EPC203.
EPC203 may include MME (Mobility Management Entity, mobility management entity) 2031, HSS (Home Subscriber Server, home subscriber location-server) 2032, other MME2033, SGW (Serving Gate Way, gateway) 2034, PGW (PDN Gate Way, grouped data network gateway) 2035 and PCRF (Policy and Charging Rules Function, policy and rate functional entity) 2036 etc..Wherein, MME2031 be processing UE201 and The control node of signaling, provides carrying and connection management between EPC203.HSS2032 is all to manage for providing some registers Such as the function of home location register (not shown) etc, and preserves some related service features, data rates etc. and use The dedicated information in family.All customer data can be sent by SGW2034, and PGW2035 can provide the IP of UE 201 Address distribution and other functions, PCRF2036 are strategy and the charging control strategic decision-making of business data flow and IP bearing resource Point, it selects and provides available strategy and charging control decision with charge execution function unit (not shown) for strategy.
IP operation 204 may include internet, Intranet, IMS (IP Multimedia Subsystem, IP multimedia System) or other IP operations etc..
Although above-mentioned be described by taking LTE system as an example, those skilled in the art should know the present invention is not only Suitable for LTE system, be readily applicable to other wireless communication systems, such as GSM, CDMA2000, WCDMA, TD-SCDMA with And the following new network system etc., herein without limitation.
Based on above-mentioned 100 hardware configuration of mobile terminal and communications network system, each embodiment of the method for the present invention is proposed.
Firstly, the present invention proposes a kind of single-point logging method, which is applied to the tool as described in Fig. 1 to Fig. 2 There is the mobile terminal of customer center.As shown in figure 3, being the implementation flow chart of single-point logging method first embodiment of the present invention.? In the present embodiment, the execution sequence of the step in flow chart shown in Fig. 3 be can change according to different requirements, certain steps It can be omitted.The single-point logging method includes:
Step S301, the single-sign-on request of the browser acquisition third-party application of the mobile terminal;Wherein, the list It include the Session ID of the third-party application in point logging request.
The present invention is used to solve the native applications of mobile terminal and the Single Sign of third-party application;Specifically, exist What needs to be explained here is that the native applications of mobile terminal refer to the application of mobile terminal manufacturer oneself exploitation, can pass through The customer center of mobile terminal realizes single-sign-on, specific native applications include: Cloud Server, browser, using store, The application such as community, store.Herein by taking the mobile phone of Nubia as an example, possess oneself customer center and others native applications, Such as Nubia browser, Nubia Cloud Server, Nubia application shop, community, as long as user obtains in customer center registration After obtaining Nubia account, the other native applications of login can be both synchronized, without independent register account number again.Mobile terminal Third-party application is primarily referred to as running on the mobile terminal herein and can interact with the browser of the mobile terminal Any application or software specifically may include the news applications programs such as similar today's tops, People's Daily, takes journey, way ox etc. Trip application program, video application, the software of music application etc. third party exploitation.Here browser includes peace Retrieve or send mounted in mobile terminal and on the world wide web (www any type of application of information, including IE, 360, Google Chrome, Red fox browser (Firefox) etc., naturally it is also possible to it is the native applications of the mobile terminal, i.e., if it is Nubia mobile phone, Here browser can be Nubia browser, this is optimal selection.
Heretofore described mobile terminal browser acquisition third-party application single-sign-on request, specifically, when with The browser is opened at family, can be jumped to other third parties as needed during browsing webpage into mobile webpage and be answered With, for example when browsing news, need that news original text is commented on or paid close attention to, pass through the similar rank such as click " checking original text " Connect, mobile webpage can jump directly to source --- the third-party application of the news, and comment on or concern be required to log in this Tripartite's application, can just carry out, and at this moment selection comment or concern, webpage will jump directly to key login, such as Fig. 7 institute Show, user clicks key login, and browser is the single-sign-on request for collecting third-party application;Wherein, single-point here It include the Session ID of the third-party application in logging request, Session ID (ID) here is for third-party application Authentication and prepare.It is requested according to the single-sign-on, browser can call the preset SDK interface of customer center to go to obtain Access token (AccessToken), SDK interface here are operable internal interface, acceptable or transmission Session ID, Temporary Authorization, access token or other verifying message, can also provide the client and server-side of browser and customer center Between communication.
Step S302 obtains the access token of the client of the customer center, and the access token is passed to institute State the server-side of customer center.
It should be understood that access token (AccessToken) is user in the client at login user center, user The server-side at center is presented to the client of customer center, the voucher of server-side and client interaction as customer center. After the browser collects the single-sign-on request of the third-party application, it can be called in user by JavaScript script The SDK interface of the heart, SDK interface connect the client of customer center, obtain the access token of the customer center (AccessToken), which is then sent to the server-side of customer center, to request to the server-side of customer center One temporary Authorization (Code) of the third-party application.
Step S303, the server-side of the customer center generate the temporary Authorization of the single-sign-on request, and save.
In the present embodiment, the server-side of customer center receives the access token (AccessToken) from client It is requested with the single-sign-on of third-party application, the server-side of customer center can generate a temporary Authorization (Code), this is temporarily awarded It weighs (Code) to generate using UUID, UUID is the contracting of Universally Unique Identifier (Universally Unique Identifier) It writes, UUID refers to the number generated on a machine, it guarantees it is all uniquely, to lead to aerial all machines when same Chang Pingtai can provide the API of generation.According to the criterion calculation that Open Software Foundation (OSF) is formulated, with having used Ethernet card Location, nsec, chip id code and many possible numbers.UUID by following sections combination: 1. current dates and when Between, first part of UUID is related with the time, if generating a UUID again within several seconds excessively, then after generating a UUID First part is different, remaining is identical;2. clock sequence;3. globally unique IEEE machine recognition number, if there is network interface card, from net Card MAC Address obtains, and otherwise obtains without network interface card.Unique defect of UUID is that the result string generated can be long, About this standard of UUID using it is most common be Microsoft GUID (Globals Uuique Identifiers).UUID be by 16 binary digits of one group of 32 digit are constituted, the UUID format of standard are as follows: xxxxxxxx-xxxx-xxxx-xxxx- Xxxxxxxxxxxx (8-4-4-4-12), wherein each x is a hexadecimal number within the scope of 0-9 or a-f;Theoretically The sum of UUID is 1632=2128, it is approximately equal to 3.4*1038If that is, generate 1,000,000 UUID per nanosecond, to spend 10,000,000,000 years All UUID can be finished.Due to the uniqueness of UUID, the corresponding temporary Authorization (Code) generated also has uniqueness, guarantees life It is only effective to current third-party application at temporary Authorization, to improve the safety of current single sign-on authentication.
Specifically, there is also the need to the effective time of the temporary Authorization is arranged;After a key logs in when the user clicks, the page The effective time setting page for jumping to temporary Authorization, as shown in figure 8, the setting of the effective time can choose what system defined Duration can also select duration under the premise of guaranteeing authorizing secure as needed.In addition, the server-side of the customer center The temporary Authorization of the single-sign-on request is generated, the temporary Authorization and the Session ID (ID) establish mapping relations, And it is stored in the server-side of the customer center, this is primarily to improve safety, the third at each accessing user center Fang Yingyong distributes a Session ID (ID) so that it is convenient to tie up to the corresponding identity logs information of third-party application Shield, third-party application carry the Session ID when requesting single-sign-on, and the temporary Authorization is requested according to single-sign-on The Session ID of middle carrying generates.Assuming that currently there is multiple thirds that can carry out single-sign-on by browser Fang Yingyong distributes ID in order respectively, wherein the ID of a third-party application (specially today's tops) is ID1, another third party ID using (specially taking journey) is ID2, since the temporary Authorization (Code) in request single-sign-on is generated according to ID1, Therefore, in single sign-on authentication request, it is today's tops that temporary Authorization, which authenticates to corresponding log-on message, rather than takes journey , improve the safety that user logs in.
The temporary Authorization of the third-party application is sent to the browser, the customer center by step S304 Server-side obtain the single-sign-on verification request that the browser is sent.
Herein, need to complete the transmitting of temporary Authorization by SDK interface, SDK interface gets temporary Authorization (Code) the login method of the javaScript of a key log-on webpage will be adjusted back after, party's religious name can be defined freely, this method Main realize submits logging request that temporary Authorization is submitted to the server-side of customer center when browser receives temporary Authorization, Single-sign-on verification can be requested to the server-side of customer center.
Step S305, the temporary Authorization that judgement sends the temporary Authorization of the browser to and the server-side saves It is whether consistent.
Step S306, if unanimously, then completing the single-sign-on request of the third-party application.
It in the present embodiment, is here specifically the temporary Authorization for judging to send to the browser and the server-side Whether the temporary Authorization of preservation is consistent, if unanimously, then being stepped on according to the identity that the temporary Authorization obtains the third-party application Information is recorded, the respective interface of the third-party application is jumped to using the identity logs information.It should be noted that receiving After single-sign-on verification request, if not finding the username and password of third-party application, it is necessary to which judgement sends to described Whether the temporary Authorization of browser and the temporary Authorization that the server-side saves are consistent, if the temporary Authorization is consistent , and effectively, then allow active user to access third-party application.In addition, when safeguarding third-party application, in order to improve single-point The safety of login can establish corresponding SDK interface account here for each third-party application, in this way, to single-sign-on When request is verified, it can first judge that whether it transmits the interface account of the information such as temporary Authorization in the interface account pre-established In library, if so, could illustrate that the third-party application of request verification is legal, then temporary Authorization is judged;In this way can It avoids illegal third-party application from stealing relevant data information and identity information in mobile terminal, improves single-sign-on Safety.
S301 to S306 through the above steps, single-point logging method proposed by the invention are applied to have customer center Mobile terminal, by browser acquire third-party application single-sign-on request, obtain the client of the customer center Access token, and the access token is passed to the server-side of the customer center, so that the server-side of the customer center The temporary Authorization of the single-sign-on request is generated, and is saved, obtains the single-sign-on verification request that the browser is sent afterwards; Whether the temporary Authorization that judgement sends the temporary Authorization of the browser to and the server-side saves is consistent, if so, Complete the single-sign-on request of the third-party application;The single-sign-on that achievable mobile terminal is more applied, has reached user It can be logged in using customer center without inputting username and password, remove unnecessary complex operations from, improve user Experience.
Further, it is based on above-mentioned first embodiment, proposes the second embodiment of single-point logging method of the present invention.Such as Fig. 4 It is shown, it is the implementation flow chart of single-point logging method second embodiment of the present invention.In the present embodiment, according to different requirements, The execution sequence of step in flow chart shown in Fig. 4 can change, and certain steps can be omitted.The single-point logging method packet It includes:
Step S401, the single-sign-on request of the browser acquisition third-party application of the mobile terminal.
Step S402 detects the logging state of the client of the customer center.
In the present invention, when third-party application passes through browse request single-sign-on, it is thus necessary to determine that customer center is to have stepped on Record state, if the client of customer center is the state that is not logged in, customer center client is not completed also with server-side and is interacted, and is used The access token at family center does not generate also.
Step S403 logs in the client of the customer center if the client of the customer center is to be not logged in state, The access token of the client of the customer center is obtained, and the access token is passed to the service of the customer center End.
In embodiment, if the client of the customer center is to be not logged in state, need to acquire stepping on for the customer center Information, the client at login user center are recorded, the client of customer center is interacted with the server-side of customer center, described in obtaining The access token of the client of customer center.When user first logs into customer center, by inputting log-on message, including user name And password, login user center pass through when log-on message is verified, i.e. the identity of user, which is verified, to be passed through, the clothes of customer center Business end can be issued with access token authentication data, and save the access token, and such user is needing to access third-party application When, then the access token can be carried in single-sign-on request, to guarantee the legitimacy of active user, it is ensured that user information With the safety of the data information of third-party application.
Step S404 obtains the client of the customer center if the client of the customer center is logging state Access token, and the access token is passed to the server-side of the customer center.
Step S405, the server-side of the customer center generate the temporary Authorization of the single-sign-on request, and save.
The temporary Authorization of the third-party application is sent to the browser, the customer center by step S406 Server-side obtain the single-sign-on verification request that the browser is sent.
Step S407, the temporary Authorization that judgement sends the temporary Authorization of the browser to and the server-side saves Whether consistent
Step S408, if so, completing the single-sign-on request of the third-party application.
In the present embodiment, by the transmitting of legal access token, the corresponding single-sign-on request of active user can guarantee Legitimacy, protect the safety of mobile terminal data.
S401 to S408 through the above steps, single-point logging method proposed by the invention are applied to have customer center Mobile terminal, by browser acquire third-party application single-sign-on request, judge the client of the customer center Logging state, when it is is not logged in state, the access at login user center, the client of customer center described in indirect gain is enabled Board;When it is logging state, the access token of the client of the customer center is directly acquired, and by the access token The server-side of the customer center is passed to, so that the server-side of the customer center generates the interim of the single-sign-on request Authorization, and save, the single-sign-on verification request that the browser is sent is obtained afterwards;Judgement sends the described of the browser to Whether temporary Authorization and the temporary Authorization that the server-side saves are consistent, if so, the single-point for completing the third-party application is stepped on Record request;The single-sign-on that achievable mobile terminal is more applied has reached user without inputting username and password It is logged in using customer center, removes unnecessary complex operations from, improve user experience, and further improve single-sign-on Safety.
Meanwhile the present invention also proposes a kind of mobile terminal, the mobile terminal includes memory, processor and is stored in institute State the single-sign-on program 500 that can be run on memory and on the processor.As shown in figure 5, being single-sign-on of the present invention The functional block diagram of 500 first embodiment of program.In the present embodiment, the single-sign-on program 500 can be divided At one or more modules, for example, in Fig. 5, the single-sign-on program 500 can be divided into request acquisition module 501, Obtain module 502, authorization generation module 503, request correction verification module 504, first judgment module 505 and the first login module 506. The so-called module of the present invention refers to a series of a kind of acquisition machine program instruction sections that can complete specific function, than obtaining machine program More suitable for implementation procedure of the description software in the mobile terminal.Below by the tool of just above-mentioned each functional module 501-506 Body function is described in detail.Wherein:
The request acquisition module 501, the single-sign-on of the browser acquisition third-party application for the mobile terminal Request;It wherein, include the Session ID of the third-party application in the single-sign-on request.
The present invention is used to solve the native applications of mobile terminal and the Single Sign of third-party application;Specifically, exist What needs to be explained here is that the native applications of mobile terminal refer to the application of mobile terminal manufacturer oneself exploitation, can pass through The customer center of mobile terminal realizes single-sign-on, specific native applications include: Cloud Server, browser, using store, The application such as community, store.Herein by taking the mobile phone of Nubia as an example, possess oneself customer center and others native applications, Such as Nubia browser, Nubia Cloud Server, Nubia application shop, community, as long as user obtains in customer center registration After obtaining Nubia account, the other native applications of login can be both synchronized, without independent register account number again.Mobile terminal Third-party application is primarily referred to as running on the mobile terminal herein and can interact with the browser of the mobile terminal Any application or software specifically may include the news applications programs such as similar today's tops, People's Daily, takes journey, way ox etc. Trip application program, video application, the software of music application etc. third party exploitation.Here browser includes peace Retrieve or send mounted in mobile terminal and on the world wide web (www any type of application of information, including IE, 360, Google Chrome, Red fox browser (Firefox) etc., naturally it is also possible to it is the native applications of the mobile terminal, i.e., if it is Nubia mobile phone, Here browser can be Nubia browser, this is optimal selection.
Heretofore described mobile terminal browser acquisition third-party application single-sign-on request, specifically, when with The browser is opened at family, can be jumped to other third parties as needed during browsing webpage into mobile webpage and be answered With, for example when browsing news, need that news original text is commented on or paid close attention to, pass through the similar rank such as click " checking original text " Connect, mobile webpage can jump directly to source --- the third-party application of the news, and comment on or concern be required to log in this Tripartite's application, can just carry out, and at this moment selection comment or concern, webpage will jump directly to key login, such as Fig. 7 institute Show, user clicks key login, and browser is the single-sign-on request for collecting third-party application;Wherein, single-point here It include the Session ID of the third-party application in logging request, Session ID (ID) here is for third-party application Authentication and prepare.It is requested according to the single-sign-on, browser can call the preset SDK interface of customer center to go to obtain Access token (AccessToken), SDK interface here are operable internal interface, acceptable or transmission Session ID, Temporary Authorization, access token or other verifying message, can also provide the client and server-side of browser and customer center Between communication.
The acquisition module 502, the access token of the client for obtaining the customer center, and the access is enabled Board passes to the server-side of the customer center.
It should be understood that access token (AccessToken) is user in the client at login user center, user The server-side at center is presented to the client of customer center, the voucher of server-side and client interaction as customer center. After the browser collects the single-sign-on request of the third-party application, it can be called in user by JavaScript script The SDK interface of the heart, SDK interface connect the client of customer center, obtain the access token of the customer center (AccessToken), which is then sent to the server-side of customer center, to request to the server-side of customer center One temporary Authorization (Code) of the third-party application.
The authorization generation module 503, the server-side for the customer center generate facing for the single-sign-on request Shi Shouquan, and save.
In the present embodiment, the server-side of customer center receives the access token (AccessToken) from client It is requested with the single-sign-on of third-party application, the server-side of customer center can generate a temporary Authorization (Code), this is temporarily awarded It weighs (Code) to generate using UUID, UUID is the contracting of Universally Unique Identifier (Universally Unique Identifier) It writes, UUID refers to the number generated on a machine, it guarantees it is all uniquely, to lead to aerial all machines when same Chang Pingtai can provide the API of generation.According to the criterion calculation that Open Software Foundation (OSF) is formulated, with having used Ethernet card Location, nsec, chip id code and many possible numbers.UUID by following sections combination: 1. current dates and when Between, first part of UUID is related with the time, if generating a UUID again within several seconds excessively, then after generating a UUID First part is different, remaining is identical;2. clock sequence;3. globally unique IEEE machine recognition number, if there is network interface card, from net Card MAC Address obtains, and otherwise obtains without network interface card.Unique defect of UUID is that the result string generated can be long, About this standard of UUID using it is most common be Microsoft GUID (Globals Uuique Identifiers).UUID be by 16 binary digits of one group of 32 digit are constituted, the UUID format of standard are as follows: xxxxxxxx-xxxx-xxxx-xxxx- Xxxxxxxxxxxx (8-4-4-4-12), wherein each x is a hexadecimal number within the scope of 0-9 or a-f;Theoretically The sum of UUID is 1632=2128, it is approximately equal to 3.4*1038If that is, generate 1,000,000 UUID per nanosecond, to spend 10,000,000,000 years All UUID can be finished.Due to the uniqueness of UUID, the corresponding temporary Authorization (Code) generated also has uniqueness, guarantees life It is only effective to current third-party application at temporary Authorization, to improve the safety of current single sign-on authentication.
Specifically, there is also the need to the effective time of the temporary Authorization is arranged;After a key logs in when the user clicks, the page The effective time setting page for jumping to temporary Authorization, as shown in figure 8, the setting of the effective time can choose what system defined Duration can also select duration under the premise of guaranteeing authorizing secure as needed.In addition, the server-side of the customer center The temporary Authorization of the single-sign-on request is generated, the temporary Authorization and the Session ID (ID) establish mapping relations, And it is stored in the server-side of the customer center, this is primarily to improve safety, the third at each accessing user center Fang Yingyong distributes a Session ID (ID) so that it is convenient to tie up to the corresponding identity logs information of third-party application Shield, third-party application carry the Session ID when requesting single-sign-on, and the temporary Authorization is requested according to single-sign-on The Session ID of middle carrying generates.Assuming that currently there is multiple thirds that can carry out single-sign-on by browser Fang Yingyong distributes ID in order respectively, wherein the ID of a third-party application (specially today's tops) is ID1, another third party ID using (specially taking journey) is ID2, since the temporary Authorization (Code) in request single-sign-on is generated according to ID1, Therefore, in single sign-on authentication request, it is today's tops that temporary Authorization, which authenticates to corresponding log-on message, rather than takes journey , improve the safety that user logs in.
The request correction verification module 504, for the temporary Authorization of the third-party application to be sent to the browsing Device, the server-side of the customer center obtain the single-sign-on verification request that the browser is sent.
Herein, need to complete the transmitting of temporary Authorization by SDK interface, SDK interface gets temporary Authorization (Code) the login method of the javaScript of a key log-on webpage will be adjusted back after, party's religious name can be defined freely, this method Main realize submits logging request that temporary Authorization is submitted to the server-side of customer center when browser receives temporary Authorization, Single-sign-on verification can be requested to the server-side of customer center.
The first judgment module 505, for judge to send to the browser the temporary Authorization and the service Hold the temporary Authorization saved whether consistent.
First login module 506, if sending the temporary Authorization and the server-side preservation of the browser to Temporary Authorization be it is consistent, the single-sign-on for completing the third-party application is requested.
It in the present embodiment, is here specifically the temporary Authorization for judging to send to the browser and the server-side Whether the temporary Authorization of preservation is consistent, if so, being believed according to the identity logs that the temporary Authorization obtains the third-party application Breath, the respective interface of the third-party application is jumped to using the identity logs information.It should be noted that receiving single-point After logging in verification request, if not finding the username and password of third-party application, it is necessary to which judgement sends the browsing to Whether the temporary Authorization of device and the temporary Authorization that the server-side saves are consistent, if the temporary Authorization is consistent, and And effectively, then active user is allowed to access third-party application.In addition, when safeguarding third-party application, in order to improve single-sign-on Safety, corresponding SDK interface account can be established here for each third-party application, in this way, requesting to single-sign-on When being verified, it can first judge that whether it transmits the interface account of the information such as temporary Authorization in the interface account library pre-established In, if so, could illustrate that the third-party application of request verification is legal, then temporary Authorization is judged;It can keep away in this way Exempt from illegal third-party application and steal relevant data information and identity information in mobile terminal, improves the peace of single-sign-on Quan Xing.
By above-mentioned module 501 to 506, the present invention has the mobile terminal of customer center, and single-sign-on program passes through Browser acquires the single-sign-on request of third-party application, obtains the access token of the client of the customer center, and by institute The server-side that access token passes to the customer center is stated, so that the server-side of the customer center generates the single-sign-on The temporary Authorization of request, and save, the single-sign-on verification request that the browser is sent is obtained afterwards;Judgement sends to described clear Look at device the temporary Authorization and temporary Authorization that the server-side saves it is whether consistent, answered if so, completing the third party Single-sign-on request;The single-sign-on that achievable mobile terminal is more applied, reached user without input user name and Password can be logged in using customer center, remove unnecessary complex operations from, improve user experience.
Further, the first embodiment based on above-mentioned single-sign-on program 500 proposes single-sign-on program of the present invention 500 second embodiment.Referring to FIG. 6, Fig. 6 is the functional block diagram of 500 second embodiment of single-sign-on program, with the One embodiment is compared, and in the present embodiment, single-sign-on program 500 further includes the second judgment module 506, the second login module 507. In the present embodiment, each functional module is described as follows:
The request acquisition module 501, the single-sign-on request of the browser acquisition third-party application of the mobile terminal.
Second judgment module 507, the logging state of the client for judging the customer center.
In the present invention, when third-party application passes through browse request single-sign-on, it is thus necessary to determine that customer center is to have stepped on Record state, if the client of customer center is the state that is not logged in, customer center client is not completed also with server-side and is interacted, and is used The access token at family center does not generate also.
Second login module 508, it is described for acquiring if the client of the customer center is to be not logged in state The log-on message of customer center completes the client for logging in the customer center, to obtain the client of the customer center Access token.
In embodiment, the log-on message of the customer center is acquired, is interacted with the server-side of customer center, access is generated and enables Board, while the client at login user center.When user first logs into customer center, by inputting log-on message, including user Name and password, login user center pass through when log-on message is verified, i.e. the identity of user, which is verified, to be passed through, customer center Server-side can be issued with access token authentication data, and save the access token, and such user answers needing to access third party Used time can then carry the access token in single-sign-on request, to guarantee the legitimacy of active user, it is ensured that Yong Huxin The safety of the data information of breath and third-party application.
The acquisition module 502 obtains the customer center if the client of the customer center is logging state The access token of client, and the access token is passed to the server-side of the customer center.
The authorization generation module 503, the server-side of the customer center generate temporarily awarding for the single-sign-on request Power, and save.
The temporary Authorization of the third-party application is sent to the browser, institute by the request correction verification module 504 The server-side for stating customer center obtains the single-sign-on verification request that the browser is sent.
The first judgment module 505, judgement sends the temporary Authorization of the browser to and the server-side is protected Whether the temporary Authorization deposited is consistent.
First login module 506 completes the third-party application if first judgment module 505 is judged as YES Single-sign-on request.
In the present embodiment, by the transmitting of legal access token, the corresponding single-sign-on request of active user can guarantee Legitimacy, protect the safety of mobile terminal data.
By above-mentioned module 501 to 508, the single-sign-on program of mobile terminal proposed by the invention is adopted by browser The single-sign-on request for collecting third-party application, judges the logging state of the client of the customer center, when it is to be not logged in shape When state, login user center, the access token of the client of customer center described in indirect gain;When it is logging state, The access token of the client of the customer center is directly acquired, and the access token is passed to the clothes of the customer center It is engaged in end, so that the server-side of the customer center generates the temporary Authorization of the single-sign-on request, and saving, described in rear acquisition The single-sign-on that browser is sent verifies request;Judgement sends the temporary Authorization of the browser to and the server-side is protected Whether the temporary Authorization deposited is consistent, if so, completing the single-sign-on request of the third-party application;Achievable mobile terminal is more The single-sign-on more applied, having reached user can be logged in without inputting username and password using customer center, be exempted from Unnecessary complex operations are gone, improve user experience, and further improve the safety of single-sign-on.
In addition, being stored on the computer readable storage medium the present invention also provides a kind of computer readable storage medium There is single-sign-on program, the single-sign-on program is performed the step of realizing single-point logging method described in Fig. 3 to Fig. 4.
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row His property includes, so that the process, method, article or the device that include a series of elements not only include those elements, and And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do There is also other identical elements in the process, method of element, article or device.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art The part contributed out can be embodied in the form of software products, which is stored in a storage medium In (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal device (can be mobile phone, computer is fixed Position server, air conditioner or the network equipment etc.) execute method described in each embodiment of the present invention.
The above is only a preferred embodiment of the present invention, is not intended to limit the scope of the invention, all to utilize this hair Equivalent structure or equivalent flow shift made by bright specification and accompanying drawing content is applied directly or indirectly in other relevant skills Art field, is included within the scope of the present invention.

Claims (10)

1. a kind of single-point logging method, applied to the mobile terminal with customer center, which is characterized in that the single-sign-on side Method the following steps are included:
The single-sign-on request of the browser acquisition third-party application of the mobile terminal;Wherein, in the single-sign-on request Session ID including the third-party application;
The access token is passed to the service of the customer center by the access token for obtaining the client of the customer center End;
The server-side of the customer center generates the temporary Authorization of the single-sign-on request, and saves;
The temporary Authorization of the third-party application is sent to the browser, the server-side of the customer center obtains institute State the single-sign-on verification request of browser transmission;
Whether the temporary Authorization that judgement sends the temporary Authorization of the browser to and the server-side saves is consistent, if It is the single-sign-on request for then completing the third-party application.
2. single-point logging method as described in claim 1, which is characterized in that described " browser of the mobile terminal acquires The single-sign-on of third-party application is requested " after, before " access token for obtaining the client of the customer center ", also The following steps are included:
Judge the logging state of the client of the customer center;
If the client of the customer center is that logging state, the access for directly acquiring the client of the customer center have enabled Board;
If the client of the customer center is to be not logged in state, the client of the customer center is logged in, described in obtaining The access token of the client of customer center.
3. single-point logging method as described in claim 1, it is characterised in that: the generating algorithm of the temporary Authorization uses UUID It generates.
4. single-point logging method as described in claim 1, which is characterized in that described " server-side of the customer center generates The step of temporary Authorization of the single-sign-on request ", further comprises: the effective time of the temporary Authorization is arranged.
5. single-point logging method as described in claim 1, which is characterized in that described " server-side of the customer center generates The temporary Authorization of the single-sign-on request, and save " specifically includes the following steps:
The server-side of the customer center generates the temporary Authorization of the single-sign-on request, the temporary Authorization and the session Identifier establishes mapping relations, and is stored in the server-side of the customer center.
6. single-point logging method as described in claim 1, which is characterized in that described " to complete the single-point of the third-party application Logging request " specifically includes the following steps:
The identity logs information of the third-party application is obtained according to the temporary Authorization;
The respective interface of the third-party application is jumped to using the identity logs information.
7. single-point logging method as described in claim 1, it is characterised in that: the third-party application refers to described mobile whole Operation and any application that can be interacted with the browser of the mobile terminal or software on end.
8. single-point logging method as described in claim 1, it is characterised in that: the browser includes the original of the mobile terminal Browser in raw application.
9. a kind of mobile terminal, which is characterized in that the mobile terminal includes memory, processor and is stored in the memory Single-sign-on program that is upper and can running on the processor, the single-sign-on program are realized when being executed by the processor Such as the step of single-point logging method described in any item of the claim 1 to 8.
10. a kind of computer readable storage medium, which is characterized in that be stored with single-point on the computer readable storage medium and step on Program is recorded, the single-sign-on program is performed realization such as single-point logging method described in any item of the claim 1 to 8 Step.
CN201810954265.3A 2018-08-21 2018-08-21 Single-point logging method, mobile terminal and computer readable storage medium Pending CN109165499A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810954265.3A CN109165499A (en) 2018-08-21 2018-08-21 Single-point logging method, mobile terminal and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810954265.3A CN109165499A (en) 2018-08-21 2018-08-21 Single-point logging method, mobile terminal and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN109165499A true CN109165499A (en) 2019-01-08

Family

ID=64896287

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810954265.3A Pending CN109165499A (en) 2018-08-21 2018-08-21 Single-point logging method, mobile terminal and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN109165499A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109902476A (en) * 2019-01-25 2019-06-18 上海基分文化传播有限公司 A kind of anti-cheat method and system
CN109995755A (en) * 2019-02-20 2019-07-09 深圳点猫科技有限公司 A kind of control method and device of the logging state based on small routine framework
CN110113358A (en) * 2019-05-24 2019-08-09 全知科技(杭州)有限责任公司 A method of the operation account of application system of the identification based on single-sign-on
CN110493184A (en) * 2019-07-09 2019-11-22 深圳壹账通智能科技有限公司 The processing method of login page, device, electronic device in the client
CN111339521A (en) * 2020-02-17 2020-06-26 北京金和网络股份有限公司 WEB-based single sign-on user integration method and system
CN111753268A (en) * 2020-05-12 2020-10-09 西安震有信通科技有限公司 Single sign-on method, device, storage medium and mobile terminal
CN111935260A (en) * 2020-07-30 2020-11-13 珠海大横琴科技发展有限公司 Account synchronization method and device, electronic equipment and storage medium
CN112347437A (en) * 2020-10-30 2021-02-09 银盛支付服务股份有限公司 Third-party application login-free authorization method and system
CN114257583A (en) * 2021-12-22 2022-03-29 贵州东彩供应链科技有限公司 Safe downloading method for solving JWT authorization
CN115150141A (en) * 2022-06-22 2022-10-04 青岛海信网络科技股份有限公司 Single sign-on method and single management equipment

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104065674A (en) * 2013-03-18 2014-09-24 联想(北京)有限公司 Terminal device and information processing method
CN104618369A (en) * 2015-01-27 2015-05-13 广州市戴为智能科技有限公司 Method, device and system for unique authorization of Internet-of-Things equipment based on OAuth

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104065674A (en) * 2013-03-18 2014-09-24 联想(北京)有限公司 Terminal device and information processing method
CN104618369A (en) * 2015-01-27 2015-05-13 广州市戴为智能科技有限公司 Method, device and system for unique authorization of Internet-of-Things equipment based on OAuth

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109902476A (en) * 2019-01-25 2019-06-18 上海基分文化传播有限公司 A kind of anti-cheat method and system
CN109995755A (en) * 2019-02-20 2019-07-09 深圳点猫科技有限公司 A kind of control method and device of the logging state based on small routine framework
CN109995755B (en) * 2019-02-20 2021-10-26 深圳点猫科技有限公司 Login state control method and device based on applet framework
CN110113358B (en) * 2019-05-24 2021-09-17 全知科技(杭州)有限责任公司 Method for identifying operation account of application system based on single sign-on
CN110113358A (en) * 2019-05-24 2019-08-09 全知科技(杭州)有限责任公司 A method of the operation account of application system of the identification based on single-sign-on
CN110493184A (en) * 2019-07-09 2019-11-22 深圳壹账通智能科技有限公司 The processing method of login page, device, electronic device in the client
CN111339521A (en) * 2020-02-17 2020-06-26 北京金和网络股份有限公司 WEB-based single sign-on user integration method and system
CN111753268A (en) * 2020-05-12 2020-10-09 西安震有信通科技有限公司 Single sign-on method, device, storage medium and mobile terminal
CN111753268B (en) * 2020-05-12 2023-08-11 西安震有信通科技有限公司 Single sign-on method, single sign-on device, storage medium and mobile terminal
CN111935260A (en) * 2020-07-30 2020-11-13 珠海大横琴科技发展有限公司 Account synchronization method and device, electronic equipment and storage medium
CN112347437A (en) * 2020-10-30 2021-02-09 银盛支付服务股份有限公司 Third-party application login-free authorization method and system
CN114257583A (en) * 2021-12-22 2022-03-29 贵州东彩供应链科技有限公司 Safe downloading method for solving JWT authorization
CN115150141A (en) * 2022-06-22 2022-10-04 青岛海信网络科技股份有限公司 Single sign-on method and single management equipment
CN115150141B (en) * 2022-06-22 2024-03-08 青岛海信网络科技股份有限公司 Single sign-on method and single point management equipment

Similar Documents

Publication Publication Date Title
CN109165499A (en) Single-point logging method, mobile terminal and computer readable storage medium
CN109257740A (en) Profile method for down loading, mobile terminal and readable storage medium storing program for executing
CN109558718A (en) Application program login method, computer end, mobile terminal, system and storage medium
CN108881184A (en) Access request processing method, terminal, server and computer readable storage medium
CN108616499A (en) A kind of method for authenticating of application program, terminal and computer readable storage medium
CN107040543A (en) Single-point logging method, terminal and storage medium
CN109033801A (en) Method, mobile terminal and the storage medium of application program verification user identity
CN107451460A (en) Interface processing method, equipment, server and computer-readable recording medium
CN107426717A (en) One kind searches net register method, terminal and computer-readable recording medium
CN107040541A (en) A kind of Ad blocking method, device and computer-readable medium
CN108881103A (en) A kind of method and device accessing network
CN109618316A (en) Network share method, mobile terminal and storage medium
CN107395560A (en) Safety check and its initiation, management method, equipment, server and storage medium
CN109743696A (en) Identifying code encryption method, system and readable storage medium storing program for executing
CN108196762A (en) A kind of terminal control method, terminal and computer readable storage medium
CN107678798A (en) A kind of SIM card fast initializing method, device and computer-readable recording medium
CN107580336A (en) A kind of method for connecting network, terminal and computer-readable recording medium
CN107360139A (en) A kind of mobile terminal, data ciphering method and computer-readable recording medium
CN108052845A (en) file display control method, terminal and computer readable storage medium
CN108920917A (en) Log in end switching method, mobile terminal and computer readable storage medium
CN109803249A (en) A kind of WIFI network sharing method, terminal and computer readable storage medium
CN108601062A (en) WiFi connections sharing method, terminal and computer storage media
CN108012270A (en) A kind of method of information processing, equipment and computer-readable recording medium
CN107302526A (en) System interface call method, equipment and computer-readable recording medium
CN107493396A (en) Button screen method, terminal and computer-readable recording medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190108