CN109710437A - A kind of application logs in optimization method, terminal and computer readable storage medium - Google Patents

A kind of application logs in optimization method, terminal and computer readable storage medium Download PDF

Info

Publication number
CN109710437A
CN109710437A CN201811271499.4A CN201811271499A CN109710437A CN 109710437 A CN109710437 A CN 109710437A CN 201811271499 A CN201811271499 A CN 201811271499A CN 109710437 A CN109710437 A CN 109710437A
Authority
CN
China
Prior art keywords
log
events
application
login
subsequent
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811271499.4A
Other languages
Chinese (zh)
Inventor
廖松茂
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nubia Technology Co Ltd
Original Assignee
Nubia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nubia Technology Co Ltd filed Critical Nubia Technology Co Ltd
Priority to CN201811271499.4A priority Critical patent/CN109710437A/en
Publication of CN109710437A publication Critical patent/CN109710437A/en
Pending legal-status Critical Current

Links

Abstract

The embodiment of the present invention provides a kind of application and logs in optimization method, terminal and computer readable storage medium, and it includes: to detect to triggering using the log-in events logged in when determining that application is currently at login interface which, which logs in optimization method,;When detecting log-in events for the first time after send logging request to server, judge whether do not receive the login response that server returns in preset duration;If so, it is subsequent receive log-in events again when, intercept process is carried out to subsequent received log-in events, to prevent to transmit subsequent received log-in events before receiving login response.The embodiment of the present invention can effectively avoid user's account caused by continuous trigger login under wrong account information and be closed, and enhances using reliability is logged in, improves user experience.

Description

A kind of application logs in optimization method, terminal and computer readable storage medium
Technical field
The present invention relates to intelligent terminal technical field, more specifically to a kind of application log in optimization method, terminal and Computer readable storage medium.
Background technique
With the continuous development of terminal technology, the popularity rate of intelligent terminal in social life is higher and higher, and user is in day Often also higher and higher using the frequency of intelligent terminal in life, the intelligent terminal for applying various new technologies also comes into being, and makes Obtaining intelligent terminal becomes the indispensable important tool of people.
User often will be installed various applications, and to meet work or life requirement, and user usually has when logging in application It is memoryless to log in and there is memory to log in two ways, wherein user can be defeated manually by memoryless login mode namely user Enter corresponding account information (including username and password), then clicks login button and normally logged in, alternatively, it is also possible to By thering is memory login mode namely login interface directly to remember an account information, user can click directly on login button come into Row logs in, but in practical applications, can there is that user is input to the account information of login interface or login interface is remembered The case where account information is wrong account information, after user trigger login for the first time, if application because certain reasons it is no and When receive the response results of server return, then so that user is continued triggering and log in, and user connects under wrong account information When continuous triggering logs in multiple, it will usually cause the account of user by server locks, in some instances it may even be possible to permanently be closed, so that user The normal access that can not be applied by the account, makes troubles to user.
Summary of the invention
The technical problem to be solved in the present invention is that in the prior art mistake account information under triggering log in application, The response results returned using server is not timely received for some purposes, and user can accidentally be made to continue in the mistake account It triggers and logs under information, the account of caused user is easy by server locks, in some instances it may even be possible to permanently be closed, for the skill Art problem provides a kind of application and logs in optimization method, terminal and computer readable storage medium.
In order to solve the above technical problems, the present invention provides a kind of application login optimization method, which logs in optimization method Include:
When determining that application is currently at login interface, the log-in events logged in triggering application are detected;
When detecting log-in events for the first time after send logging request to server, whether not to judge in preset duration Receive the login response of server return;
If so, it is subsequent receive log-in events again when, subsequent received log-in events are carried out at interception Reason, to prevent to transmit subsequent received log-in events before receiving login response.
Optionally, log-in events include: login button on login interface by external trigger.
Optionally, determine that application is currently at login interface and includes:
The screenshot for the page that application is currently started is obtained in real time;
Extract the image feature information of screenshot;
When extracted image feature information is matched with preset login interface characteristic information, what determination was currently started The page is login interface.
Optionally, before carrying out intercept process to subsequent received log-in events, further includes:
Determine whether the current running state information of terminal meets preset intercept process trigger condition;
If so, carrying out intercept process to subsequent received log-in events.
Optionally, when running state information is network speed, intercept process condition includes: network speed lower than preset Network speed threshold value.
Optionally, it is subsequent receive log-in events again when, subsequent received log-in events are carried out at interception Reason includes:
It is subsequent receive log-in events again when, subsequent received each log-in events are carried out at interception respectively Reason;
Or, it is subsequent receive log-in events again when, subsequent received all log-in events are uniformly blocked Cut processing.
Optionally, before uniformly carrying out intercept process to subsequent received all log-in events, further includes:
Whether the number for determining subsequent received log-in events is more than preset quantity threshold value;
If so, uniformly carrying out intercept process to subsequent received all log-in events.
Optionally, carrying out intercept process to subsequent received log-in events includes:
Subsequent received log-in events are intercepted, and permanently prevent the transmitting of log-in events;
Or, being intercepted to subsequent received log-in events, and the transmitting of log-in events is delayed, and is delayed To receive server return login response when transmitted.
Further, the present invention also provides a kind of terminal, which includes processor, memory, communication bus;
Communication bus is for realizing the connection communication between processor, memory;
Processor logs in optimization for executing one or more program stored in memory, with the application for realizing above-mentioned The step of method.
Further, the present invention also provides a kind of computer readable storage medium, which is deposited One or more program is contained, one or more program can be executed by one or more processor, above-mentioned to realize Using the step of logging in optimization method.
Beneficial effect
The present invention provides a kind of application and logs in optimization method, terminal and computer readable storage medium, for the prior art In mistake account information under triggering log in application, using be not timely received for some purposes server return sound It answers as a result, and user can accidentally be made to continue the triggering login under the mistake account information, the easy bedding and clothing of the account of caused user Business device locking, in some instances it may even be possible to which the defect permanently closed, it includes: to be currently to step in determining application which, which logs in optimization method, When recording interface, the log-in events logged in triggering application are detected;When detect log-in events for the first time and to server After sending logging request, the login response for whether not receiving server return in preset duration is judged;If so, rear It is continuous that intercept process is carried out to subsequent received log-in events when receiving log-in events again, to prevent to step on receiving Subsequent received log-in events are transmitted before record response.Thing is logged in by monitoring triggered application in system layer Part, if when triggering login for the first time fails to timely receive the login response of server, triggered login thing subsequent to user Part is intercepted, and be can effectively avoid user's account caused by continuous trigger login under wrong account information and is closed, is enhanced Application logs in reliability, improves user experience.
Detailed description of the invention
Present invention will be further explained below with reference to the attached drawings and examples, in attached drawing:
The hardware structural diagram of Fig. 1 each embodiment one optional mobile terminal to realize the present invention;
Fig. 2 is the wireless communication system schematic diagram of mobile terminal as shown in Figure 1;
Fig. 3 is the basic flow chart that the application that first embodiment of the invention provides logs in optimization method;
Fig. 4 is the interface schematic diagram for the login interface that first embodiment of the invention provides;
Fig. 5 is the refined flow chart that the application that second embodiment of the invention provides logs in optimization method;
Fig. 6 is the refined flow chart that the application that third embodiment of the invention provides logs in optimization method;
Fig. 7 is the structural schematic diagram for the terminal that fourth embodiment of the invention provides.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
In subsequent description, it is only using the suffix for indicating such as " module ", " component " or " unit " of element Be conducive to explanation of the invention, itself there is no a specific meaning.Therefore, " module ", " component " or " unit " can mix Ground uses.
Terminal can be implemented in a variety of manners.For example, terminal described in the present invention may include such as mobile phone, plate Computer, laptop, palm PC, personal digital assistant (Personal Digital Assistant, PDA), portable Media player (Portable Media Player, PMP), navigation device, wearable device, Intelligent bracelet, pedometer etc. move The fixed terminals such as dynamic terminal, and number TV, desktop computer.
It will be illustrated by taking mobile terminal as an example in subsequent descriptions, it will be appreciated by those skilled in the art that in addition to special Except element for moving purpose, the construction of embodiment according to the present invention can also apply to the terminal of fixed type.
Referring to Fig. 1, a kind of hardware structural diagram of its mobile terminal of each embodiment to realize the present invention, the shifting Dynamic terminal 100 may include: RF (Radio Frequency, radio frequency) unit 101, WiFi module 102, audio output unit 103, A/V (audio/video) input unit 104, sensor 105, display unit 106, user input unit 107, interface unit 108, the components such as memory 109, processor 110 and power supply 111.It will be understood by those skilled in the art that shown in Fig. 1 Mobile terminal structure does not constitute the restriction to mobile terminal, and mobile terminal may include components more more or fewer than diagram, Perhaps certain components or different component layouts are combined.
It is specifically introduced below with reference to all parts of the Fig. 1 to mobile terminal:
Radio frequency unit 101 can be used for receiving and sending messages or communication process in, signal sends and receivees, specifically, by base station Downlink information receive after, to processor 110 handle;In addition, the data of uplink are sent to base station.In general, radio frequency unit 101 Including but not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier, duplexer etc..In addition, penetrating Frequency unit 101 can also be communicated with network and other equipment by wireless communication.Any communication can be used in above-mentioned wireless communication Standard or agreement, including but not limited to GSM (Global System of Mobile communication, global system for mobile telecommunications System), GPRS (General Packet Radio Service, general packet radio service), CDMA2000 (Code Division Multiple Access 2000, CDMA 2000), WCDMA (Wideband Code Division Multiple Access, wideband code division multiple access), TD-SCDMA (Time Division-Synchronous Code Division Multiple Access, TD SDMA), FDD-LTE (Frequency Division Duplexing-Long Term Evolution, frequency division duplex long term evolution) and TDD-LTE (Time Division Duplexing-Long Term Evolution, time division duplex long term evolution) etc..
WiFi belongs to short range wireless transmission technology, and mobile terminal can help user to receive and dispatch electricity by WiFi module 102 Sub- mail, browsing webpage and access streaming video etc., it provides wireless broadband internet access for user.Although Fig. 1 shows Go out WiFi module 102, but it is understood that, and it is not belonging to must be configured into for mobile terminal, it completely can be according to need It to omit within the scope of not changing the essence of the invention.
Audio output unit 103 can be in call signal reception pattern, call mode, record mould in mobile terminal 100 When under the isotypes such as formula, speech recognition mode, broadcast reception mode, by radio frequency unit 101 or WiFi module 102 it is received or The audio data stored in memory 109 is converted into audio signal and exports to be sound.Moreover, audio output unit 103 Audio output relevant to the specific function that mobile terminal 100 executes can also be provided (for example, call signal receives sound, disappears Breath receives sound etc.).Audio output unit 103 may include loudspeaker, buzzer etc..
A/V input unit 104 is for receiving audio or video signal.A/V input unit 104 may include graphics processor (Graphics Processing Unit, GPU) 1041 and microphone 1042, graphics processor 1041 is in video acquisition mode Or the image data of the static images or video obtained in image capture mode by image capture apparatus (such as camera) carries out Reason.Treated, and picture frame may be displayed on display unit 106.Through graphics processor 1041, treated that picture frame can be deposited Storage is sent in memory 109 (or other storage mediums) or via radio frequency unit 101 or WiFi module 102.Mike Wind 1042 can connect in telephone calling model, logging mode, speech recognition mode etc. operational mode via microphone 1042 Quiet down sound (audio data), and can be audio data by such acoustic processing.Audio that treated (voice) data can To be converted to the format output that can be sent to mobile communication base station via radio frequency unit 101 in the case where telephone calling model. Microphone 1042 can be implemented various types of noises elimination (or inhibition) algorithms and send and receive sound to eliminate (or inhibition) The noise generated during frequency signal or interference.
Mobile terminal 100 further includes at least one sensor 105, such as optical sensor, motion sensor and other biographies Sensor.Specifically, optical sensor includes ambient light sensor and proximity sensor, wherein ambient light sensor can be according to environment The light and shade of light adjusts the brightness of display panel 1061, and proximity sensor can close when mobile terminal 100 is moved in one's ear Display panel 1061 and/or backlight.As a kind of motion sensor, accelerometer sensor can detect in all directions (general For three axis) size of acceleration, it can detect that size and the direction of gravity when static, can be used to identify the application of mobile phone posture (such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, percussion) etc.; The fingerprint sensor that can also configure as mobile phone, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer, The other sensors such as hygrometer, thermometer, infrared sensor, details are not described herein.
Display unit 106 is for showing information input by user or being supplied to the information of user.Display unit 106 can wrap Display panel 1061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode can be used Forms such as (Organic Light-Emitting Diode, OLED) configure display panel 1061.
User input unit 107 can be used for receiving the number or character information of input, and generate the use with mobile terminal Family setting and the related key signals input of function control.Specifically, user input unit 107 may include touch panel 1071 with And other input equipments 1072.Touch panel 1071, also referred to as touch screen collect the touch operation of user on it or nearby (for example user uses any suitable objects or attachment such as finger, stylus on touch panel 1071 or in touch panel 1071 Neighbouring operation), and corresponding attachment device is driven according to preset formula.Touch panel 1071 may include touch detection Two parts of device and touch controller.Wherein, the touch orientation of touch detecting apparatus detection user, and detect touch operation band The signal come, transmits a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and by it It is converted into contact coordinate, then gives processor 110, and order that processor 110 is sent can be received and executed.In addition, can To realize touch panel 1071 using multiple types such as resistance-type, condenser type, infrared ray and surface acoustic waves.In addition to touch panel 1071, user input unit 107 can also include other input equipments 1072.Specifically, other input equipments 1072 can wrap It includes but is not limited in physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse, operating stick etc. It is one or more, specifically herein without limitation.
Further, touch panel 1071 can cover display panel 1061, when touch panel 1071 detect on it or After neighbouring touch operation, processor 110 is sent to determine the type of touch event, is followed by subsequent processing device 110 according to touch thing The type of part provides corresponding visual output on display panel 1061.Although in Fig. 1, touch panel 1071 and display panel 1061 be the function that outputs and inputs of realizing mobile terminal as two independent components, but in certain embodiments, it can The function that outputs and inputs of mobile terminal is realized so that touch panel 1071 and display panel 1061 is integrated, is not done herein specifically It limits.
Interface unit 108 be used as at least one external device (ED) connect with mobile terminal 100 can by interface.For example, External device (ED) may include wired or wireless headphone port, external power supply (or battery charger) port, wired or nothing Line data port, memory card port, the port for connecting the device with identification module, audio input/output (I/O) end Mouth, video i/o port, ear port etc..Interface unit 108 can be used for receiving the input from external device (ED) (for example, number It is believed that breath, electric power etc.) and the input received is transferred to one or more elements in mobile terminal 100 or can be with For transmitting data between mobile terminal 100 and external device (ED).
Memory 109 can be used for storing software program and various data.Memory 109 can mainly include storing program area The storage data area and, wherein storing program area can (such as the sound of application program needed for storage program area, at least one function Sound playing function, image player function etc.) etc.;Storage data area can store according to mobile phone use created data (such as Audio data, phone directory etc.) etc..In addition, memory 109 may include high-speed random access memory, it can also include non-easy The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 110 is the control centre of mobile terminal, utilizes each of various interfaces and the entire mobile terminal of connection A part by running or execute the software program and/or module that are stored in memory 109, and calls and is stored in storage Data in device 109 execute the various functions and processing data of mobile terminal, to carry out integral monitoring to mobile terminal.Place Managing device 110 may include one or more processing units;Preferably, processor 110 can integrate application processor and modulatedemodulate is mediated Manage device, wherein the main processing operation system of application processor, user interface and application program etc., modem processor is main Processing wireless communication.It is understood that above-mentioned modem processor can not also be integrated into processor 110.
Mobile terminal 100 can also include the power supply 111 (such as battery) powered to all parts, it is preferred that power supply 111 Can be logically contiguous by power-supply management system and processor 110, to realize management charging by power-supply management system, put The functions such as electricity and power managed.
Although Fig. 1 is not shown, mobile terminal 100 can also be including bluetooth module etc., and details are not described herein.
Embodiment to facilitate the understanding of the present invention, the communications network system that mobile terminal of the invention is based below into Row description.
Referring to Fig. 2, Fig. 2 is a kind of communications network system architecture diagram provided in an embodiment of the present invention, the communication network system System is the LTE system of universal mobile communications technology, which includes UE (User Equipment, the use of successively communication connection Family equipment) (the land Evolved UMTS Terrestrial Radio Access Network, evolved UMTS 201, E-UTRAN Ground wireless access network) 202, EPC (Evolved Packet Core, evolved packet-based core networks) 203 and operator IP operation 204。
Specifically, UE201 can be above-mentioned terminal 100, and details are not described herein again.
E-UTRAN202 includes eNodeB2021 and other eNodeB2022 etc..Wherein, eNodeB2021 can be by returning Journey (backhaul) (such as X2 interface) is connect with other eNodeB2022, and eNodeB2021 is connected to EPC203, ENodeB2021 can provide the access of UE201 to EPC203.
EPC203 may include MME (Mobility Management Entity, mobility management entity) 2031, HSS (Home Subscriber Server, home subscriber server) 2032, other MME2033, SGW (Serving Gate Way, Gateway) 2034, PGW (PDN Gate Way, grouped data network gateway) 2035 and PCRF (Policy and Charging Rules Function, policy and rate functional entity) 2036 etc..Wherein, MME2031 be processing UE201 and The control node of signaling, provides carrying and connection management between EPC203.HSS2032 is all to manage for providing some registers Such as the function of home location register (not shown) etc, and preserves some related service features, data rates etc. and use The dedicated information in family.All customer data can be sent by SGW2034, and PGW2035 can provide the IP of UE 201 Address distribution and other functions, PCRF2036 are strategy and the charging control strategic decision-making of business data flow and IP bearing resource Point, it selects and provides available strategy and charging control decision with charge execution function unit (not shown) for strategy.
IP operation 204 may include internet, Intranet, IMS (IP Multimedia Subsystem, IP multimedia System) or other IP operations etc..
Although above-mentioned be described by taking LTE system as an example, those skilled in the art should know the present invention is not only Suitable for LTE system, be readily applicable to other wireless communication systems, such as GSM, CDMA2000, WCDMA, TD-SCDMA with And the following new network system etc., herein without limitation.
Based on above-mentioned mobile terminal hardware configuration and communications network system, each embodiment of the method for the present invention is proposed.
First embodiment
To solve in the prior art, triggering is logged in application, using not having for some purposes under the account information in mistake There are the response results for receiving server return in time, and user can accidentally be made to continue to trigger under the mistake account information to log in, institute The account of caused user is easy by server locks, in some instances it may even be possible to which the defect permanently closed present embodiments provides one kind Using optimization method is logged in, it is illustrated in figure 3 the basic flow chart that application provided in this embodiment logs in optimization method, the application Log in optimization method specifically includes the following steps:
S301, when determining that application is currently at login interface, the log-in events that are logged in of triggering application are examined It surveys.
It needs the page started to the application of terminal front stage operation to be monitored in the present embodiment, is currently opened with determination Whether dynamic application page is login interface, and login interface is only to be carried out into the entrance for applying main interface in login interface After login, the function that main interface uses application to provide just can enter.In addition, the log-in events of the present embodiment refer to that triggering uses User account is carried out using the event logged in, and in a kind of preferred embodiment, log-in events can be stepping on login interface Button is recorded by external trigger, in further embodiments, log-in events can also be to be logged in by the triggerings such as voice, gesture application Event, will not enumerate herein.
Optionally, determining that application is currently at login interface includes: cutting for the page that real-time acquisition application is currently started Figure;Extract the image feature information of screenshot;Preset login interface characteristic information is matched in extracted image feature information When, determine that the page currently started is login interface.
Specifically, carrying out the identification of login interface in the present embodiment based on image recognition algorithm, in practical applications, step on Recording interface has its specific characteristics of image, usually includes two text input windows (account input window and Password Inputs Window) an and login button can also include certainly identifying code input window etc. in further embodiments, such as Fig. 4 is this The interface schematic diagram for the login interface that embodiment provides, successively shown from top to bottom is account input window, Password Input Window and login button.Based on this, screenshot is carried out to application interface in real time in the present embodiment, then the image being truncated to is carried out The extraction of image feature information, then extracted image feature information is matched with the standard picture feature of login interface, It can determine that current interface is login interface if fitting through.
S302, when detecting log-in events for the first time after send logging request to server, judge in preset duration Whether the login response of server return is not received.
Specifically, in practical applications, when application receives log-in events, triggering to send to log in server immediately and ask It asks and triggers login, i.e. triggering logs in optimization monitoring, prison when login interface detects log-in events for the first time in the present embodiment The login response whether application receive server return within a certain period of time is surveyed, is logged in for determining to apply in triggering Afterwards, if the login response of server return can be timely received.
It should be noted that application front end, which will do it, to be jumped when receiving the login response of server return based on application Success or Password Input mistake prompt, and if using do not receive server return login response when, current interface can It keeps interface before this and does not change.Based on this, optionally, can be identified by image recognition algorithm in the present embodiment Trigger application log in after prefixed time interval in, using whether receive server return login response, Ye Ji It obtains the image for applying current interface in real time in preset duration, and extracts the characteristic information of acquired image, then by institute Whether the characteristic information of the image of acquisition is compared with the characteristics of image of login interface, consistent both to identify, the two not When consistent, then show the login response for having received server return.
S303, if so, it is subsequent receive log-in events again when, subsequent received log-in events are blocked Processing is cut, to prevent subsequent received log-in events to be transmitted before receiving login response.
Specifically, user can take for this in the present embodiment when receiving the login response of server return not in time Preceding log-in events do not input success, such as when user takes for oneself not clicking login button or clicking login button It is not recognized effectively by terminal, to can accidentally make user continue the input of log-in events in this case, and causes Logging request continuously is sent to server, in practical applications, if the inputted log-in events of user are the accounts based on a mistake Encrypted message is certified not then the input of continuous several times log-in events will lead to the multiple logging request that server is sent Pass through, it is obstructed out-of-date that current account is repeatedly authenticated in accumulation, and server, which would generally be assert, currently to be logged on as illegally logging in, thus right The account is locked, it would not allow for continue to log in a certain period of time, or in severe cases can be directly right Account is permanently closed.Based on this, this erroneous logons behavior is intercepted in the present embodiment, namely is received for the first time After log-in events, if subsequent receive log-in events again, the transmitting of subsequent generated log-in events is intercepted, And before receiving server and being responded to application based on the log-in events logging request generated received for the first time, resistance The only transmitting of subsequent log-in events, and avoid continuing to send logging request to server and carry out legitimacy certification.
Optionally, before carrying out intercept process to subsequent received log-in events, further includes: determine that terminal is current Running state information whether meet preset intercept process trigger condition;If so, to subsequent received log-in events Carry out intercept process.
Specifically, in practical applications, application front end is caused to fail to timely receive the login response of server return There are many situations, and is not required in all cases in triggering the present embodiment at the subsequent interception carried out to log-in events Reason, such as the logging request of user obtain present terminal operating status in the present embodiment based on this by illegally intercepting and capturing etc. Take, and determine meet preset trigger condition when ability triggering following intercept process process.
Optionally, when running state information is network speed, intercept process condition includes: network speed lower than preset net Fast threshold value.
In practical applications, usually logging request can be caused to delay to reach server when terminal network speed is poor, or The login response that server is returned, which is delayed by, to be received, therefore, current in terminal in an embodiment of the present embodiment When network speed is lower than preset value, the intercept process of triggering following.It should be noted that can also be terminal in further embodiments Memory occupancy, the case where will lead to terminal Caton when terminal EMS memory occupation is excessively high, also will affect application front end to clothes The prompt for the login response that business device returns.
Optionally, it is subsequent receive log-in events again when, subsequent received log-in events are carried out at interception Reason include: it is subsequent receive log-in events again when, subsequent received each log-in events are carried out at interception respectively Reason;Or, it is subsequent receive log-in events again when, subsequent received all log-in events are uniformly carried out at interception Reason.
Specifically, in practical applications, the subsequent login and then inputted of user usually more than once, then to this When a little log-in events carry out intercept process, it can be in a kind of situation and often receive a log-in events subsequent, trigger immediately To the intercept process of the log-in events, namely every time, the intercept process of log-in events is processing, independent process immediately, and another In the case of, it can also be and all log-in events accumulations are uniformly processed together.
Optionally, before uniformly carrying out intercept process to subsequent received all log-in events, further includes: determine Whether the number of subsequent received log-in events is more than preset quantity threshold value;If so, owning to subsequent received Log-in events uniformly carry out intercept process.
Specifically, in practical applications, the safety of account, the usual permitted account of server are applied generally for protection Number logging in the number that continuous mistake is attempted has certain limitations, and is more than the number limited in the number for continually attempting to log in, then Regarding as logging request is illegal request, can just carry out closing processing etc. to account, such as high safety application may only allow to connect Continuous 3 requests log in, and lower security application then can permit continuous 5 times to 10 times requests and log in, and the amount threshold is visually real Depending on the usage scenario of border.Based on this, uniformly carried out at interception in the present embodiment to subsequent received all log-in events In the case where reason, if the number of all log-in events is less than the number that permitted continuous mistake is attempted, even if not to stepping on Copyist's part intercepts, and the log-in events be mistake attempt log-in events, also can't trigger the server to account into Row closes processing etc., thus the only ability triggering following when the number of subsequent received all log-in events is more than preset value Unified intercept process.
Optionally, carrying out intercept process to subsequent received log-in events includes: to subsequent received login Event is intercepted, and permanently prevents the transmitting of log-in events;Or, subsequent received log-in events are intercepted, and The transmitting of log-in events is delayed, and is transmitted when delay to the login response for receiving server return.
Specifically, in the present embodiment, the intercept process to subsequent login event includes but is not limited to following two situation, First, cancel after intercepting log-in events to the log-in events, so as to prevent the log-in events after It resumes and passs, and log in triggering for the first time and then logging request will not be sent to server;Second, being blocked by log-in events It cuts down after coming, delay transmitting processing is carried out to each log-in events intercepted, is only receiving server for first logging into When requesting returned login response, just the login time intercepted is transmitted.
The present invention provides a kind of application login optimization method, steps on for triggering under the account information of mistake in the prior art Record in application, using be not timely received for some purposes server return response results, and can accidentally make user continue exist It triggers and logs under the mistake account information, the account of caused user is easy by server locks, in some instances it may even be possible to by permanent envelope The defect of taboo, it includes: to step on when determining that application is currently at login interface to triggering application which, which logs in optimization method, The log-in events of record are detected;When detecting log-in events for the first time after send logging request to server, judge pre- If the login response of server return whether is not received in duration;If so, it is subsequent receive log-in events again when, it is right Subsequent received log-in events carry out intercept process, to prevent before receiving login response to subsequent received Log-in events are transmitted.By monitoring triggered application log-in events in system layer, if ought trigger for the first time login fail and When receiving the login response of server, triggered log-in events subsequent to user intercept, and can effectively avoid user Continuous trigger logs in caused account and is closed under wrong account information, enhances using reliability is logged in, improves use Family usage experience.
Second embodiment
In order to better understand the present invention, the present embodiment logs in optimization method to application with a specific example and says Bright, Fig. 5 is the refined flow chart that the application that second embodiment of the invention provides logs in optimization method, which logs in optimization method Include:
S501, it obtains in real time currently in the screenshot of the application interface of the application of front stage operation, and the image for extracting screenshot is special Reference breath.
S502, judge whether extracted image feature information is matched with preset login interface characteristic information;If so, S503 is executed, if it is not, then executing S501.
The identification of login interface, in practical applications, login interface are carried out in the present embodiment based on image recognition algorithm With its specific characteristics of image, usually include two text input windows (account input window and Password Input window) and One login button, by the standard picture of extracted from the screenshot at current application interface image feature information and login interface Feature is matched, and can determine that current interface is login interface if fitting through.
S503, the log-in events logged in triggering application detect.
In a kind of preferred embodiment, log-in events can be the login button on login interface by external trigger, In other embodiments, log-in events can also be the event logged in by the triggerings such as voice, gesture application.
S504, when detecting log-in events for the first time after send logging request to server, judge in preset duration Whether the login response of server return is not received;If so, S505 is executed, if it is not, then executing S501.
If needing the log-in events of triggering following to intercept using response of the server to logging request is not normally received Process flow causes possible account to be closed, it should be noted that server log response to avoid the trial of user's mistake Detection can also be realized based on image recognition algorithm, the application interface that will also obtain in real time be compared with login interface and It determines, if acquired application interface remains consistent with login interface, illustrates to be not received by login response, it is on the contrary then be to connect Receive login response.
S505, log-in events are received again subsequent, and when terminal network speed is lower than preset network speed threshold value, to rear Continue received each log-in events to be intercepted respectively, and permanently prevents the transmitting of each log-in events.
In the present embodiment after intercepting log-in events, which is cancelled, so as to prevent The log-in events continue to transmit, and log in triggering for the first time and then will not send logging request to server, also just not It will lead to and carry out account caused by multiple logging request under based on wrong account number cipher and close.
The present invention provides a kind of application login optimization method, by monitoring triggered application log-in events in system layer, If the login response for logging in and failing to timely receive server ought be triggered for the first time, and when current network speed is lower than default network speed threshold value, Triggered log-in events subsequent to user intercept, and permanently prevent the transmitting of log-in events, can effectively avoid user and exist Continuous trigger logs in caused account and is closed under mistake account information, enhances using reliability is logged in, improves user Usage experience.
3rd embodiment
In order to better understand the present invention, the present embodiment logs in optimization method to application with another specific example and carries out Illustrate, Fig. 6 is the refined flow chart that the application that third embodiment of the invention provides logs in optimization method, which logs in optimization side Method includes:
Whether S601, judgement are currently login interface in the application interface of the application of front stage operation;If so, executing S602, if it is not, then executing S601.
Application in the present embodiment logs in optimization method and is applied to carry out under the scene using login, therefore current in judgement The login Optimizing Flow of triggering following when application interface is login interface.
S602, the log-in events logged in triggering application detect.
S603, when detecting log-in events for the first time after send logging request to server, judge in preset duration Whether the login response of server return is not received;If so, S604 is executed, if it is not, then executing S601.
S604, log-in events are received again subsequent, and when terminal network speed is lower than preset network speed threshold value, determine Whether the number of subsequent continuously received log-in events reaches preset quantity threshold value;If so, S605 is executed, if it is not, then Execute S601.
If the number of the log-in events continuously received is less than the number that the permitted continuous mistake of server is attempted, Even if not intercepted to log-in events, and the log-in events are the log-in events that mistake is attempted, and can't also trigger service Device carries out account to close processing, thus only in the number of subsequent received all log-in events more than pre- in the present embodiment If the unified intercept process of ability triggering following when value.
S605, subsequent received all log-in events are uniformly intercepted, and by the transmitting of all log-in events It is delayed, and is transmitted when delay to the login response for receiving server return.
Different from often receiving a log-in events in a upper embodiment, triggered at the interception to the log-in events immediately It manages, is that all log-in events accumulations are uniformly processed together in the present embodiment;In addition, being different from a upper embodiment After log-in events are intercepted, log-in events are cancelled and permanently prevent to transmit, is to being intercepted in the present embodiment Each log-in events carry out delay transmitting processing, then request returned login to ring receiving server and be directed to first log into At once, just the login time intercepted is transmitted.
The present invention provides a kind of application login optimization method, by monitoring triggered application log-in events in system layer, If the login response for logging in and failing to timely receive server ought be triggered for the first time, and when current network speed is lower than default network speed threshold value, Triggered log-in events subsequent to user intercept, and the transmitting of log-in events is delayed, and are delayed to receiving It is transmitted when the login response that server returns, can effectively avoid user's continuous trigger login under wrong account information and led The account of cause is closed, and is enhanced using reliability is logged in, is improved user experience.
Fourth embodiment
A kind of terminal is present embodiments provided, it is shown in Figure 7, including processor 701, memory 702, communication bus 703;
Communication bus 703 is for realizing the connection communication between processor 701, memory 702;
Memory 702 is for storing one or more programs, and processor 701 is for executing one stored in memory 702 A or multiple programs, it is no longer superfluous herein to realize the step of application shown in the various embodiments described above logs in optimization method It states.
5th embodiment
The present invention also provides a kind of computer readable storage medium, one is stored in the computer readable storage medium Or multiple programs, which can be executed by one or more processor, to realize the various embodiments described above Shown in application log in optimization method the step of, details are not described herein.
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row His property includes, so that the process, method, article or the device that include a series of elements not only include those elements, and And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do There is also other identical elements in the process, method of element, article or device.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art The part contributed out can be embodied in the form of software products, which is stored in a storage medium In (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal (can be mobile phone, computer, service Device, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited to above-mentioned specific Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much Form, all of these belong to the protection of the present invention.

Claims (10)

1. a kind of application logs in optimization method, which is characterized in that the application logs in optimization method and includes:
When determining that application is currently at login interface, detected to the log-in events that the application is logged in are triggered;
When detecting the log-in events for the first time after send logging request to server, whether not to judge in preset duration Receive the login response that the server returns;
If so, it is subsequent receive the log-in events again when, the subsequent received log-in events are blocked Processing is cut, to prevent the subsequent received log-in events to be transmitted before receiving the login response.
2. application as described in claim 1 logs in optimization method, which is characterized in that the log-in events include: the login Login button on interface is by external trigger.
3. application as described in claim 1 logs in optimization method, which is characterized in that the determining application, which is currently at, logs in boundary Face includes:
The screenshot of the page applied and currently started is obtained in real time;
Extract the image feature information of the screenshot;
When extracted described image characteristic information is matched with preset login interface characteristic information, determines and described currently opened The dynamic page is login interface.
4. application as described in claim 1 logs in optimization method, which is characterized in that the subsequent received login Event carries out before intercept process, further includes:
Determine whether the current running state information of terminal meets preset intercept process trigger condition;
If so, carrying out intercept process to the subsequent received log-in events.
5. application as claimed in claim 4 logs in optimization method, which is characterized in that fast for network in the running state information When spending, the intercept process condition includes: network speed lower than preset network speed threshold value.
6. as described in any one of claims 1 to 5 application log in optimization method, which is characterized in that it is described it is subsequent again When receiving the log-in events, carrying out intercept process to the subsequent received log-in events includes:
It is subsequent receive the log-in events again when, subsequent each of the received log-in events are blocked respectively Cut processing;
Or, it is subsequent receive the log-in events again when, it is unified to subsequent received all log-in events into Row intercept process.
7. application as claimed in claim 6 logs in optimization method, which is characterized in that subsequent received all described Log-in events uniformly carry out before intercept process, further includes:
Whether the number for determining the subsequent received log-in events is more than preset quantity threshold value;
If so, uniformly carrying out intercept process to subsequent received all log-in events.
8. the application as described in any one of claims 1 to 5 logs in optimization method, which is characterized in that described to be connect to subsequent The log-in events received carry out intercept process
The subsequent received log-in events are intercepted, and permanently prevent the transmitting of the log-in events;
Or, being intercepted to the subsequent received log-in events, and the transmitting of the log-in events is delayed, and It is transmitted when delay to the login response for receiving the server return.
9. a kind of terminal, which is characterized in that the terminal includes processor, memory, communication bus;
The communication bus is for realizing the connection communication between processor, memory;
The processor is for executing one or more program stored in memory, to realize as appointed in claim 1 to 8 Application described in one logs in the step of optimization method.
10. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage have one or Multiple programs, one or more of programs can be executed by one or more processor, to realize such as claim 1 to 8 Any one of described in application log in optimization method the step of.
CN201811271499.4A 2018-10-29 2018-10-29 A kind of application logs in optimization method, terminal and computer readable storage medium Pending CN109710437A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811271499.4A CN109710437A (en) 2018-10-29 2018-10-29 A kind of application logs in optimization method, terminal and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811271499.4A CN109710437A (en) 2018-10-29 2018-10-29 A kind of application logs in optimization method, terminal and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN109710437A true CN109710437A (en) 2019-05-03

Family

ID=66254755

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811271499.4A Pending CN109710437A (en) 2018-10-29 2018-10-29 A kind of application logs in optimization method, terminal and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN109710437A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110636080A (en) * 2019-10-18 2019-12-31 深圳小辣椒科技有限责任公司 Application program network connection control method and system in mobile intelligent terminal system
CN113812125A (en) * 2019-08-15 2021-12-17 奇安信安全技术(珠海)有限公司 Login behavior verification method, device and system, storage medium and electronic device

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130160113A1 (en) * 2011-12-15 2013-06-20 Samsung Electronics Co., Ltd. Computing apparatus and method for operating application
CN106681922A (en) * 2016-12-27 2017-05-17 广州唯品会信息科技有限公司 Simulation server response method and system
CN107528851A (en) * 2017-09-05 2017-12-29 努比亚技术有限公司 A kind of method, terminal and the computer-readable recording medium of log-on message management
CN107548547A (en) * 2015-04-30 2018-01-05 帕马索有限公司 The method for identifying the unauthorized access of the account of online service
WO2018023600A1 (en) * 2016-08-04 2018-02-08 薄冰 Method for adjusting fingerprint login technique according to usage condition, and login system
CN108551521A (en) * 2018-03-16 2018-09-18 维沃移动通信有限公司 A kind of log-on message reminding method and mobile terminal

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130160113A1 (en) * 2011-12-15 2013-06-20 Samsung Electronics Co., Ltd. Computing apparatus and method for operating application
CN107548547A (en) * 2015-04-30 2018-01-05 帕马索有限公司 The method for identifying the unauthorized access of the account of online service
WO2018023600A1 (en) * 2016-08-04 2018-02-08 薄冰 Method for adjusting fingerprint login technique according to usage condition, and login system
CN106681922A (en) * 2016-12-27 2017-05-17 广州唯品会信息科技有限公司 Simulation server response method and system
CN107528851A (en) * 2017-09-05 2017-12-29 努比亚技术有限公司 A kind of method, terminal and the computer-readable recording medium of log-on message management
CN108551521A (en) * 2018-03-16 2018-09-18 维沃移动通信有限公司 A kind of log-on message reminding method and mobile terminal

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113812125A (en) * 2019-08-15 2021-12-17 奇安信安全技术(珠海)有限公司 Login behavior verification method, device and system, storage medium and electronic device
CN113812125B (en) * 2019-08-15 2023-10-20 奇安信安全技术(珠海)有限公司 Verification method and device for login behavior, system, storage medium and electronic device
CN110636080A (en) * 2019-10-18 2019-12-31 深圳小辣椒科技有限责任公司 Application program network connection control method and system in mobile intelligent terminal system

Similar Documents

Publication Publication Date Title
CN109558718A (en) Application program login method, computer end, mobile terminal, system and storage medium
CN109151169A (en) Camera right management method, mobile terminal and computer readable storage medium
CN109068167A (en) Record screen exchange method, mobile terminal, wearable device and storage medium
CN109800602A (en) Method for secret protection, mobile terminal and computer readable storage medium
CN108038827A (en) Image processing method, mobile terminal and computer-readable recording medium
CN108021802A (en) A kind of system resource access control method, terminal and computer-readable recording medium
CN108833690A (en) authority control method, terminal and computer readable storage medium
CN107704766A (en) Multimedia file access control method, terminal and computer-readable recording medium
CN109324730A (en) Shortcut generation method, terminal and computer readable storage medium
CN107330313A (en) Application control method, mobile terminal and readable storage medium storing program for executing
CN110213444A (en) Display methods, device, mobile terminal and the storage medium of mobile terminal message
CN110191465A (en) Authority control method, mobile terminal and computer readable storage medium
CN110401806A (en) A kind of video call method of mobile terminal, mobile terminal and storage medium
CN109710437A (en) A kind of application logs in optimization method, terminal and computer readable storage medium
CN110020551A (en) One kind preventing the method for divulging a secret, terminal and computer readable storage medium
CN109167882A (en) A kind of association starting control method, terminal and computer readable storage medium
CN110086925A (en) A kind of application processing method and mobile terminal
CN108650415A (en) End message display methods, mobile terminal and computer readable storage medium
CN109309762A (en) Message treatment method, device, mobile terminal and storage medium
CN109101301A (en) A kind of display control method, mobile terminal and computer readable storage medium
CN108197506A (en) A kind of terminal display control method, terminal and computer readable storage medium
CN107729236A (en) Management method, device, mobile terminal and the storage medium of application program
CN109766211A (en) Method, terminal and the storage medium of shuangping san false-touch prevention
CN109683741A (en) Function triggering method, device and computer readable storage medium
CN109660666A (en) Data card switching method, mobile terminal and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190503