CN109347797A - A kind of third-party application login method and electronic equipment based on educational system - Google Patents
A kind of third-party application login method and electronic equipment based on educational system Download PDFInfo
- Publication number
- CN109347797A CN109347797A CN201811061790.9A CN201811061790A CN109347797A CN 109347797 A CN109347797 A CN 109347797A CN 201811061790 A CN201811061790 A CN 201811061790A CN 109347797 A CN109347797 A CN 109347797A
- Authority
- CN
- China
- Prior art keywords
- login
- party application
- inner frame
- user information
- row inner
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 238000000034 method Methods 0.000 title claims abstract description 39
- 238000012544 monitoring process Methods 0.000 claims abstract description 10
- 238000004590 computer program Methods 0.000 claims description 12
- 238000004519 manufacturing process Methods 0.000 claims description 7
- 238000012360 testing method Methods 0.000 claims description 6
- 238000012423 maintenance Methods 0.000 description 5
- 230000006870 function Effects 0.000 description 4
- 230000008569 process Effects 0.000 description 4
- 238000013475 authorization Methods 0.000 description 2
- 235000014510 cooky Nutrition 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000002159 abnormal effect Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000010367 cloning Methods 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000007613 environmental effect Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000009527 percussion Methods 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/20—Education
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Business, Economics & Management (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- Tourism & Hospitality (AREA)
- Health & Medical Sciences (AREA)
- Economics (AREA)
- General Health & Medical Sciences (AREA)
- Human Resources & Organizations (AREA)
- Marketing (AREA)
- Primary Health Care (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Educational Technology (AREA)
- Educational Administration (AREA)
- Software Systems (AREA)
- Power Engineering (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The present invention discloses a kind of third-party application login method and electronic equipment based on educational system, wherein method comprising steps of A, when detecting user by third-party application login system, obtain the login url of third-party application;B, the mark of current device is filled according to the login url, and a row inner frame is set;C, the row inner frame is opened, is opened for the monitoring event for whether logging in completion to be monitored;D, after the completion of listening to login, the row inner frame is closed, and obtain the storing data in browser, sends back-end server for the storing data, requests user information;E, when getting the user information of back-end server return, prompt is logined successfully.The present invention directly uses row inner frame to open new third party login window, substantially increases login efficiency, and due to using same set of third party login system, so then only needing iteration primary if any new function iteration.
Description
Technical field
The present invention relates to field of computer technology more particularly to a kind of third-party application login methods based on educational system
And electronic equipment.
Background technique
In the APP of mainstream, third party fast logs in the standard configuration for having become login system, and user is also increasingly accustomed to
It does not remove memory cipher, but clicks and jump to the application such as wechat, then click authorization and enter in APP and logged in.
The essence of third party login is exactly to obtain account number using external mark on the basis of OAuth2.0 agreement
Internal indicator then complete log in process.It concretely, is exactly by the account number of third-party account number binding to product itself
On, when inquiring the third-party account number of user and being bundled with some user_id of platform, directly log in corresponding account number.
Since third party login can make login more quick, password is not needed, registration conversion ratio can be improved, registration is more accelerated
Speed, more convenient gain user information, so increasingly by the welcome of users.
But in the prior art, third party login needs to configure key (key), and disparity items does not have extra key, and
More set third party login systems need separated maintenance, whole changes are needed after error, maintenance efficiency is low.
Therefore, the existing technology needs to be improved and developed.
Summary of the invention
In view of above-mentioned deficiencies of the prior art, the purpose of the present invention is to provide a kind of third parties based on educational system to answer
With login method and electronic equipment, it is intended to solve the problems, such as operation and maintenance inconvenience existing for third party login in the prior art.
Technical scheme is as follows:
A kind of third-party application login method based on educational system, wherein comprising steps of
A, when detecting user by third-party application login system, the login url of third-party application is obtained;
B, the mark of current device is filled according to the login url, and a row inner frame is set;
C, the row inner frame is opened, is opened for the monitoring event for whether logging in completion to be monitored;
D, after the completion of listening to login, the row inner frame is closed, and obtain the storing data in browser, it will be described
Storing data is sent to back-end server, requests user information;
E, when getting the user information of back-end server return, prompt is logined successfully.
The third-party application login method based on educational system, wherein the step A is specifically included:
A1, when detecting user by third-party application login system, obtain current login environment;
A2, configured url group is read, obtains the login url of third-party application.
The third-party application login method based on educational system, wherein in the step E, when have not been obtained to after
When the user information for holding server to return, login failure is prompted.
The third-party application login method based on educational system, wherein in the step E, the user information
The pet name and head portrait including third-party application.
The third-party application login method based on educational system, wherein in the step A1, when detecting user
When by third-party application login system, stop page scroll event.
The third-party application login method based on educational system, wherein the step E takes when getting rear end
When the user information that business device returns, login window is hidden, and restore page scroll event.
The third-party application login method based on educational system, wherein the login environment include test environment,
Develop environment and production environment.
A kind of electronic equipment, wherein include:
Processor is adapted for carrying out each instruction, and
Equipment is stored, is suitable for storing a plurality of instruction, described instruction is suitable for being loaded and being executed by processor:
When detecting user by third-party application login system, the login url of third-party application is obtained;
The mark of current device is filled according to the login url, and a row inner frame is set;
The row inner frame is opened, is opened for the monitoring event for whether logging in completion to be monitored;
After the completion of listening to login, the row inner frame is closed, and obtain the storing data in browser, deposited described
Storage data are sent to back-end server, request user information;
When getting the user information of back-end server return, prompt is logined successfully.
A kind of non-volatile computer readable storage medium storing program for executing, wherein the non-volatile computer readable storage medium storing program for executing is deposited
Computer executable instructions are contained, when which is executed by one or more processors, may make described one
A or multiple processors execute the third-party application login method based on educational system as described above.
A kind of computer program product, wherein non-volatile computer is readable to be deposited computer program product including being stored in
Computer program on storage media, computer program include program instruction, when program instruction is executed by processor, make the place
It manages device and executes the third-party application login method based on educational system as described above.
The utility model has the advantages that the present invention directly uses row inner frame to open new third party login window, login is substantially increased
Efficiency, and due to using same set of third party login system, so then only needing iteration primary if any new function iteration
?.
Detailed description of the invention
Fig. 1 is a kind of flow chart of the third-party application login method preferred embodiment based on educational system of the present invention.
Fig. 2 is the structural block diagram of a kind of electronic equipment preferred embodiment of the present invention.
Specific embodiment
The present invention provides a kind of third-party application login method and electronic equipment based on educational system, of the invention to make
Purpose, technical solution and effect are clearer, clear, and the present invention is described in more detail below.It should be appreciated that this place is retouched
The specific embodiment stated is only used to explain the present invention, is not intended to limit the present invention.
Referring to Fig. 1, Fig. 1 is a kind of third-party application login method preferred embodiment based on educational system of the present invention
Flow chart, as shown, itself comprising steps of
S1, when detecting user by third-party application login system, obtain the login url of third-party application;
S2, the mark that current device is filled according to the login url, and a row inner frame is set;
S3, the row inner frame is opened, opened for the monitoring event for whether logging in completion to be monitored;
S4, after the completion of listening to login, the row inner frame is closed, and obtain the storing data in browser, by institute
It states storing data and is sent to back-end server, request user information;
S5, when get back-end server return user information when, prompt logins successfully.
The present invention directly uses row inner frame to open new third party login window, substantially increases login efficiency, and
Due to using same set of third party login system, so then only needing iteration primary if any new function iteration.
Specifically, in the step S1, when user passes through third-party application login system, third-party application is first obtained
Login url.
Further, the step S1 is specifically included:
S11, when detecting user by third-party application login system, obtain current login environment;
S12, configured url group is read, obtains the login url of third-party application.
In the step S11, original login window is first popped up.It is logged in by the original login window.
Then in original login window, login mode is may be selected in user, if it is third-party application login system is passed through, then
Current login environment is obtained, if it is common login mode, is then logged according to existing login mode.
When detecting user by third-party application login system, stop page scroll event.Certainly, it is stepped in common
Under record mode, it can equally stop page scroll event.That is, preventing page scroll event, i.e., in original login window
Stop page scroll event, so that user carries out register.
In the step S12, if it is pass through third-party application login system, it can be determined that be which kind of application, such as
QQ or wechat etc..
Then current login environment is obtained, specifically, the login environment includes test environment, exploitation environment and production
Environment.
Exploitation environment is used exclusively for the server of exploitation, and configuration is freer, convenient in order to develop debugging, general to open entirely
Portion's error reporting.
Testing environment is usually the configuration for cloning a production environment, and a program is abnormal in test environmental work, then
It can not publish in manufacturing machine.
Production environment refers to what formal offer externally serviced, can generally turn off error reporting, open error log.
In simple terms, exploitation environment is exactly project even in coding stage;And environment then project completion test is tested, modification
The bug stage;Production environment is exactly that logical, commencement of commercial operation has been run on project data front end backstage.
Configured url group is read according to current login environment, obtains the login url of third-party application.It in this way can be with
It is jumped by the login url, jumps to third party login window.
In the step S2, the mark of current device is filled according to the login url, and a row inner frame is set.
Described identify refers to the pid of current device, pid (Process Identification) fingering journey identifier,
It is exactly Process identifier.One program of every opening can all create a process ID, i.e. pid in operating system.
One row inner frame (iframe) is set simultaneously, and iframe element will create the inline frame comprising another document
Frame (inner frame at once).The present invention is exactly directly to open new third party login window using iframe, applies other project
Third party login, so that disparity items be avoided not have the case where extra key configuration third party login.
The common attribute of iframe is as follows:
Name: the title of regulation<iframe>.
Width: the width of regulation<iframe>.
Height: the height of regulation<iframe>.
Src: the URL of the document shown in<iframe>is provided.
Frameborder: the frame around display<iframe>is defined whether.(0 is Rimless, and 1 has frame).
Align: it defines how usually to be aligned<iframe>according to the member of surrounding.
Scrolling: the show scroll bars in<iframe>is defined whether.
In the step S3, the row inner frame is opened, is opened for the monitoring event for whether logging in completion to be monitored;Prison
It listens event to refer to the generation for allowing equipment to wait an event, then makes corresponding response, such as wait mouse-click button, it is single
A new page is opened when percussion is raw.
The row inner frame is the third party login window for being used for third-party application login, which can
It is used with being supplied to multiple projects, i.e., the present invention does not need multiple key to configure third party login, it is only necessary to use the row inside casing
Frame can be applied, and login step is simplified.
The row inner frame newly opened can be jumped to by login url above-mentioned, i.e., the described third party login window, in institute
Authorization login can quickly be carried out by stating third party login window.
Whether the monitoring event in the present invention is completed for monitoring to log in.
In the step S4, after the completion of listening to login, the row inner frame is closed.If it is not complete to listen to login
At, then continue waiting for, until log in complete, be then shut off the row inner frame.
After closing rows inner frame, the storing data in browser is obtained.The storing data, which refers to, to be stored in browser
Cookie.Cookie refers to the data being stored on user local terminal.Back-end services are sent by the storing data again
Device requests user information.
In the step S5, when getting the user information of back-end server return, then it represents that login successfully.If
When the user information of back-end server return has not been obtained, login failure is prompted, can specifically pop up login failure prompt, and prompt
Again it logs in.
When logining successfully, login window is also hidden, and restore page scroll event.The specific of user information is obtained simultaneously
Content.User information specifically includes the pet name and head portrait of third-party application, such as the pet name and head portrait of QQ or wechat.
The present invention uses same set of third party login system, and new function iteration only needs iteration primary.Also
It is to say not needing using more set third party login systems, the problem of so as to avoid separated maintenance, whole is not needed after error yet
Change, improves maintenance efficiency.
The present invention also provides a kind of electronic equipment 10, as shown in Fig. 2, comprising:
Processor 1110 is adapted for carrying out each instruction, and
Equipment 120 is stored, is suitable for storing a plurality of instruction, described instruction is suitable for being loaded and being executed by processor 110:
When detecting user by third-party application login system, the login url of third-party application is obtained;
The mark of current device is filled according to the login url, and a row inner frame is set;
The row inner frame is opened, is opened for the monitoring event for whether logging in completion to be monitored;
After the completion of listening to login, the row inner frame is closed, and obtain the storing data in browser, deposited described
Storage data are sent to back-end server, request user information;
When getting the user information of back-end server return, prompt is logined successfully.
The processor 110 can for general processor, digital signal processor (DSP), specific integrated circuit (ASIC),
Field programmable gate array (FPGA), single-chip microcontroller, ARM (Acorn RISC Machine) or other programmable logic device are divided
Any combination of vertical door or transistor logic, discrete hardware component or these components.In addition, processor can also be any
Conventional processors, microprocessor or state machine.Processor also may be implemented as calculating the combination of equipment, for example, DSP and Wei Chu
Manage combination, multi-microprocessor, one or more microprocessors combination DSP core, any other this configuration of device.
It stores equipment 120 and is used as a kind of non-volatile computer readable storage medium storing program for executing, can be used for storing non-volatile software
Program, non-volatile computer executable program and module, such as the third party based on educational system in the embodiment of the present invention
Using the corresponding program instruction of login method.Processor by operation be stored in storage equipment in non-volatile software program,
Instruction and unit, at the various function application and data thereby executing the third-party application login method based on educational system
Reason, i.e. realization above method embodiment.
It has been described in detail in the method for particular technique details in front about above-mentioned electronic equipment 10, so it will not be repeated.
The present invention also provides a kind of non-volatile computer readable storage medium storing program for executing, the non-volatile computer readable storage
Media storage has computer executable instructions, when which is executed by one or more processors, may make
One or more of processors execute the third-party application login method based on educational system.
The present invention also provides a kind of computer program product, computer program product includes being stored in non-volatile computer
Computer program on readable storage medium storing program for executing, computer program include program instruction, when program instruction is executed by processor, are made
The processor executes the third-party application login method based on educational system.
It should be understood that the application of the present invention is not limited to the above for those of ordinary skills can
With improvement or transformation based on the above description, all these modifications and variations all should belong to the guarantor of appended claims of the present invention
Protect range.
Claims (10)
1. a kind of third-party application login method based on educational system, which is characterized in that comprising steps of
A, when detecting user by third-party application login system, the login url of third-party application is obtained;
B, the mark of current device is filled according to the login url, and a row inner frame is set;
C, the row inner frame is opened, is opened for the monitoring event for whether logging in completion to be monitored;
D, after the completion of listening to login, the row inner frame is closed, and obtain the storing data in browser, by the storage
Data are sent to back-end server, request user information;
E, when getting the user information of back-end server return, prompt is logined successfully.
2. the third-party application login method according to claim 1 based on educational system, which is characterized in that the step
A is specifically included:
A1, when detecting user by third-party application login system, obtain current login environment;
A2, configured url group is read, obtains the login url of third-party application.
3. the third-party application login method according to claim 1 based on educational system, which is characterized in that the step
In E, when the user information of back-end server return has not been obtained, login failure is prompted.
4. the third-party application login method according to claim 1 based on educational system, which is characterized in that the step
In E, the user information includes the pet name and head portrait of third-party application.
5. the third-party application login method according to claim 2 based on educational system, which is characterized in that the step
In A1, when detecting user by third-party application login system, stop page scroll event.
6. the third-party application login method according to claim 5 based on educational system, which is characterized in that the step
E hides login window, and restore page scroll event when getting the user information of back-end server return.
7. the third-party application login method according to claim 2 based on educational system, which is characterized in that the login
Environment includes test environment, exploitation environment and production environment.
8. a kind of electronic equipment characterized by comprising
Processor is adapted for carrying out each instruction, and
Equipment is stored, is suitable for storing a plurality of instruction, described instruction is suitable for being loaded and being executed by processor:
When detecting user by third-party application login system, the login url of third-party application is obtained;
The mark of current device is filled according to the login url, and a row inner frame is set;
The row inner frame is opened, is opened for the monitoring event for whether logging in completion to be monitored;
After the completion of listening to login, the row inner frame is closed, and obtain the storing data in browser, by the storage number
According to back-end server is sent to, user information is requested;
When getting the user information of back-end server return, prompt is logined successfully.
9. a kind of non-volatile computer readable storage medium storing program for executing, which is characterized in that the non-volatile computer readable storage medium
Matter is stored with computer executable instructions, when which is executed by one or more processors, may make institute
It states one or more processors perform claim and requires the described in any item third-party application login sides based on educational system 1-7
Method.
10. a kind of computer program product, which is characterized in that computer program product can including being stored in non-volatile computer
The computer program on storage medium is read, computer program includes program instruction, when program instruction is executed by processor, makes institute
It states processor perform claim and requires the described in any item third-party application login methods based on educational system of 1-7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811061790.9A CN109347797A (en) | 2018-09-12 | 2018-09-12 | A kind of third-party application login method and electronic equipment based on educational system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811061790.9A CN109347797A (en) | 2018-09-12 | 2018-09-12 | A kind of third-party application login method and electronic equipment based on educational system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109347797A true CN109347797A (en) | 2019-02-15 |
Family
ID=65305228
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811061790.9A Withdrawn CN109347797A (en) | 2018-09-12 | 2018-09-12 | A kind of third-party application login method and electronic equipment based on educational system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109347797A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110166469A (en) * | 2019-05-28 | 2019-08-23 | 深圳市六度人和科技有限公司 | A kind of method for authenticating, device and storage device |
CN112069488A (en) * | 2020-07-27 | 2020-12-11 | 合肥美的智能科技有限公司 | Application login method in communication program and related device thereof |
-
2018
- 2018-09-12 CN CN201811061790.9A patent/CN109347797A/en not_active Withdrawn
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110166469A (en) * | 2019-05-28 | 2019-08-23 | 深圳市六度人和科技有限公司 | A kind of method for authenticating, device and storage device |
CN110166469B (en) * | 2019-05-28 | 2022-03-15 | 深圳市六度人和科技有限公司 | Authentication method, device and storage device |
CN112069488A (en) * | 2020-07-27 | 2020-12-11 | 合肥美的智能科技有限公司 | Application login method in communication program and related device thereof |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
USRE49486E1 (en) | System and method for tracking web interactions with real time analytics | |
US20210352099A1 (en) | System for automatically discovering, enriching and remediating entities interacting in a computer network | |
US11500762B2 (en) | System and method for automated intelligent mobile application testing | |
US9977904B2 (en) | Systems and methods for automated detection of application vulnerabilities | |
US11265272B2 (en) | System and method for automated end-to-end web interaction testing | |
US10430324B2 (en) | System and method for automated intelligent mobile application testing | |
CA2725274C (en) | Monitoring and tracking application usage | |
US20200034281A1 (en) | System and method for automated intelligent mobile application testing | |
US7124328B2 (en) | Capturing system error messages | |
US20100281467A1 (en) | Method and apparatus for automatic software testing | |
US20210385251A1 (en) | System and methods for integrating datasets and automating transformation workflows using a distributed computational graph | |
US8661431B2 (en) | Accurately estimating install time | |
US20110161395A1 (en) | Synthetic transaction monitoring and management of scripts | |
CN111552633A (en) | Interface abnormal call testing method and device, computer equipment and storage medium | |
US9971563B2 (en) | Systems and methods for low interference logging and diagnostics | |
CN112799940B (en) | Regression testing method, regression testing device, computer system and computer readable storage medium | |
US10572371B2 (en) | Generating valid use cases from a parsed configuration file describing use case options | |
CN109976973A (en) | Abnormality monitoring method and electronic equipment on a kind of small routine line | |
CN109347797A (en) | A kind of third-party application login method and electronic equipment based on educational system | |
US10951540B1 (en) | Capture and execution of provider network tasks | |
US10609164B2 (en) | System and method for diagnosing an unfavorable mobile application user experience | |
US20220100636A1 (en) | Assisted detection of application performance issues using serverless compute templates | |
EP3226515A1 (en) | System and method for automated end-to-end web interaction testing | |
US11221938B2 (en) | Real-time collaboration dynamic logging level control | |
US20200334094A1 (en) | Self-verification of operating system memory management |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20190215 |