CN110351296A - A kind of application login method, device and its relevant device - Google Patents

A kind of application login method, device and its relevant device Download PDF

Info

Publication number
CN110351296A
CN110351296A CN201910662006.8A CN201910662006A CN110351296A CN 110351296 A CN110351296 A CN 110351296A CN 201910662006 A CN201910662006 A CN 201910662006A CN 110351296 A CN110351296 A CN 110351296A
Authority
CN
China
Prior art keywords
account information
state
user
application
checking
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910662006.8A
Other languages
Chinese (zh)
Other versions
CN110351296B (en
Inventor
谢兴安
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Pocket Network Technology Co Ltd
Original Assignee
Shenzhen Pocket Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Pocket Network Technology Co Ltd filed Critical Shenzhen Pocket Network Technology Co Ltd
Priority to CN201910662006.8A priority Critical patent/CN110351296B/en
Publication of CN110351296A publication Critical patent/CN110351296A/en
Application granted granted Critical
Publication of CN110351296B publication Critical patent/CN110351296B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C1/00Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people
    • G07C1/10Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people together with the recording, indicating or registering of other data, e.g. of signs of identity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)
  • Telephonic Communication Services (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

Login method is applied this application discloses a kind of, the logging request of target application is directed to including receiving;Account information is determined according to the logging request;It obtains the account information and corresponds to checking-in state of the user in default attendance checking system;Judge whether the checking-in state is the state of having registered;If so, logging in the target application using the account information;This can effectively verify the legitimacy of application visitor's identity using login method, and then improve the safety of user information, achieve the purpose that effective protection privacy of user.Disclosed herein as well is a kind of application entering device, equipment and computer readable storage mediums, have above-mentioned beneficial effect.

Description

A kind of application login method, device and its relevant device
Technical field
It is this application involves field of information security technology, in particular to a kind of to apply login method, it further relates to a kind of application and steps on Recording device, equipment and computer readable storage medium.
Background technique
With the development of electronic technology, the electronic equipments such as mobile phone, computer are more more and more universal, and function is also stronger and stronger, respectively Kind new application is also come into being, and by installing a plurality of types of applications in the electronic device, can effectively meet the polynary of user Change demand.
To protect privacy of user, many applications are to security performance requirement all with higher, in general, carrying out using visit Before asking, require to carry out authentication to visitor, to guarantee the legitimacy of visitor's identity.Currently, being directed to terminal applies Mainstream login mode, be mainly based upon the plain text authentication of encrypted message, i.e., realized by way of inputting account password to visit The authentication for the person of asking;However, this kind of verification mode still remains biggish security risk, specifically, terminal applies is close Code information is once illegally usurped by other people, and is logged in apply with this and stolen private data therein, it will causes serious information Leakage, so that privacy of user is on the hazard.Further, for the office application software in operative scenario, this kind of defect is especially bright It is aobvious.
Therefore, how the legitimacy of application visitor's identity is effectively verified, and then ensuring information security is ability Field technique personnel's urgent problem to be solved.
Summary of the invention
The purpose of the application is to provide a kind of application access method, which can be to using visitor's identity Legitimacy effectively verified, and then improve the safety of user information, achieved the purpose that effective protection privacy of user; The another object of the application is to provide a kind of application access device, equipment and computer readable storage medium, and all having above-mentioned has Beneficial effect.
In a first aspect, this application provides a kind of application access method, the application access method includes:
Receive the logging request for being directed to target application;
Account information is determined according to the logging request;
It obtains the account information and corresponds to checking-in state of the user in default attendance checking system;
Judge whether the checking-in state is the state of having registered;
If so, logging in the target application using the account information.
It is preferably, described that account information is determined according to the logging request, comprising:
The device identifier of current logging device is read according to the logging request;
Read the account information with device identifier binding.
Preferably, the account information of the reading and device identifier binding, comprising:
The account information with device identifier binding is read in default identifier list;Wherein, described pre- If being stored with the mapping relations of the account information Yu the device identifier in identifier list.
Preferably, the application access method further include:
Corresponding management is executed to the default identifier list according to the management instruction received to operate;Wherein, described Management operation is that sweep equipment identifier operates or increase device identifier operation.
Preferably, the application access method further include:
When the account information can not be read, account information binding prompt is generated.
Preferably, the application access method further include:
If the checking-in state is not the state of having registered, login failure prompt is generated.
Preferably, after the target application using account information login, further includes:
Prompt is logined successfully to the default security terminal transmission.
Second aspect, present invention also provides a kind of application access device, the application access device includes:
Logging request receiving module, for receiving the logging request for being directed to target application;
Account information determining module, for determining account information according to the logging request;
Checking-in state obtains module, corresponds to attendance shape of the user in default attendance checking system for obtaining the account information State;
Checking-in state judgment module, for judging whether the checking-in state is the state of having registered;
Using login module, if being the state of having registered for the checking-in state, stepped on using the account information Record the target application.
The third aspect, present invention also provides a kind of application access equipment, the application access equipment includes:
Memory, for storing computer program;
Processor, the step of any one of the above application access method is realized when for executing the computer program.
Fourth aspect, present invention also provides a kind of computer readable storage medium, the computer readable storage medium On be stored with computer program, the computer program realizes any one of the above application access method when being executed by processor Step.
A kind of application access method provided herein is directed to the logging request of target application including receiving;According to institute It states logging request and determines account information;It obtains the account information and corresponds to checking-in state of the user in default attendance checking system;Sentence Whether the checking-in state of breaking is the state of having registered;If so, logging in the target application using the account information.
As it can be seen that technical solution provided herein, based on the needs of mobile office scene, many office applications all have Movable attendance checking function, i.e., registered by mobile terminal, and is verified by a series of method to avoid staff attendance Cheating, it can be seen that, attendance data safety with higher is based on this characteristic, and technical solution provided herein combines The attendance information of user realizes the authentication to application visitor, when receiving the logging request for a certain application, Register directly wouldn't be executed according to account information, but first determine that account information corresponds to the current checking-in state of user, such as Fruit user has completed to register, then illustrates that user has had come to office, namely the current trial of explanation is carried out using login Visitor be user, thereby ensure that the legitimacy of application access person's identity, efficiently solve in the prior art only base The security risk brought by password authentification, and then realize the purpose for guaranteeing using data safety and protecting privacy of user.
A kind of application entering device, equipment and computer readable storage medium provided herein, all having above-mentioned has Beneficial effect, details are not described herein.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this The embodiment of application for those of ordinary skill in the art without creative efforts, can also basis The attached drawing of offer obtains other attached drawings.
Fig. 1 is a kind of flow diagram using login method provided herein;
Fig. 2 is a kind of flow diagram of hardware binding method provided herein;
Fig. 3 is the flow diagram of another kind application login method provided herein;
Fig. 4 is a kind of structural schematic diagram using entering device provided herein;
Fig. 5 is a kind of structural schematic diagram using logging device provided herein.
Specific embodiment
The core of the application is to provide a kind of using login method, this can be to applying visitor's identity using login method Legitimacy effectively verified, and then improve the safety of user information, achieved the purpose that effective protection privacy of user; Another core of the application is to provide a kind of application entering device, equipment and computer readable storage medium, and all having above-mentioned has Beneficial effect.
To keep the purposes, technical schemes and advantages of the embodiment of the present application clearer, below in conjunction with the embodiment of the present application In attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is Some embodiments of the present application, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art All other embodiment obtained without making creative work, shall fall in the protection scope of this application.
To protect privacy of user, many applications are to security performance requirement all with higher, in general, carrying out using visit Before asking, require to carry out authentication to visitor, to guarantee the legitimacy of visitor's identity.In the prior art, with account Family password, which is realized, applies login mode to visitor's authentication, and being stolen there are encrypted message leads to user information leakage Security risk.Therefore, to solve the above problems, applying login mode this application provides a kind of, this can using login method The legitimacy of application visitor's identity is effectively verified, and then improves the safety of user information, has reached effective guarantor Protect the purpose of privacy of user.
Referring to FIG. 1, Fig. 1 is a kind of flow diagram using login method provided herein, which is logged in Method may include:
S101: the logging request for being directed to target application is received;
This step aims at the acquisition of logging request, which is the logging request for target application, specifically It can be initiated by visitor by terminal where target application, wherein target application is the application that visitor needs to log in, can Think any application at the end web/pc, the end app, concrete type has no effect on the implementation of the technical program.
S102: account information is determined according to logging request;
This step aims at the determination of account information, and account information is that user logs in required number when target application It is believed that breath, can be user and registered when accessing the target application for the first time and obtained, be specifically as follows phone number information, Preset password information etc..
S103: it obtains account information and corresponds to checking-in state of the user in default attendance checking system;
This step aims at the judgement of checking-in state, specifically, can be in advance by the attendance checking system of target application and user It is bound, and sets attendance checking system to target application authorization, target application is allowed to access the attendance data of user, Ke Yili Solution, the user are the legitimate user of target application.Further, it when getting the account information of user, wouldn't directly step on Target application is recorded, but first obtains the checking-in state that account information corresponds to user from the attendance checking system of binding, and then according to this Checking-in state determines whether to continue the register of target application.
S104: judge whether checking-in state is the state of having registered;If so, S105 is executed, if it is not, then executing S106;
S105: target application is logged in using account information;
S106: login failure prompt is generated.
This step aims at the judgement of user's checking-in state, specifically, if the checking-in state obtained is shape of having registered State then illustrates that the legitimate user of target application has had come to office, and then can be determined that current initiation logging request Visitor is user, at this point, being directly based upon account information logs in target application., whereas if the attendance shape of user State is state of not checking card, then illustrates that the legitimate user of target application is not in office, and has received be directed at this time The logging request of target application, it is clear that, the visitor of current goal application is not legitimate user, even if at this point, obtaining The account information of target application, does not allow visitor to log in the target application yet, hereby it is achieved that visitor identity is applied The validity decision of information, and then ensure that user information safety is not leaked.
Further, login failure prompt can also be generated and feed back to terminal display interface, to notify visitor's identity Verify it is wrong, using login failure.
As a kind of preferred embodiment, it is above-mentioned log in the target application using account information after, can also include: to Default security terminal transmission logins successfully prompt.
Specifically, user can in advance bind target application and default security terminal, which is The safety verification terminal logined successfully for informing ownership goal application, is specifically as follows the mobile terminal of user.As a result, when When success logs in target application, it can be sent to default security terminal and login successfully prompt, to inform the currently logged mesh of user Mark application.In the case, if initiating visitor's non-user of logging request, stepping on for target application has but been successfully completed Record, user can be known within first time has unauthorized access person to steal personal information, and carries out information locking, replacement password in time Deng operation, information leakage is avoided.In addition, when being prompted to terminal interface feedback login failure, it can also be to default security terminal Prompt information is sent, has unauthorized access person's logon attempt target application to inform legitimate user in time currently.
Provided herein applies login method, and based on the needs of mobile office scene, many office applications all have Movable attendance checking function, i.e., registered by mobile terminal, and is verified by a series of method to avoid staff attendance Cheating, it can be seen that, attendance data safety with higher is based on this characteristic, and technical solution provided herein combines The attendance information of user realizes the authentication to application visitor, when receiving the logging request for a certain application, Register directly wouldn't be executed according to account information, but first determine that account information corresponds to the current checking-in state of user, such as Fruit user has completed to register, then illustrates that user has had come to office, namely the current trial of explanation is carried out using login Visitor be user, thereby ensure that the legitimacy of application access person's identity, efficiently solve in the prior art only base The security risk brought by password authentification, and then realize the purpose for guaranteeing using data safety and protecting privacy of user. In addition, realizing in conjunction with attendance information to the legitimate verification of visitor's identity, the dependence to attendance business is effectively facilitated, in turn So that preventing the generation of cheating attendance behavior from user from level at heart, be conducive to that user is helped to form good habit.
On the basis of the various embodiments described above, the present embodiment has carried out specific introduction to the acquisition modes of account information.
It is above-mentioned that account information is determined according to logging request as a kind of preferred embodiment, may include:
Step 1, the device identifier that current logging device is read according to logging request;
Step 2 reads the account information bound with device identifier.
The present embodiment realizes the acquisition of account information by hardware binding technology, specifically, due to computer hardware Equipment usually has unique identifier, such as cpu sequence number, hard disk serial number etc., sets thus, it is possible to obtain these hardware in advance Standby unique identifier, then the account information of itself and user are bound, when being again turned on target application, reading can be passed through Hwid is taken to get the account information of corresponding user.
The login for realizing target application using attendance data and hardware binding technology as a result, when user has carried out mobile label After arriving, it is meant that user had come to office prepare start to handle official business, simultaneously as the account of user in advance with use The office computer at family is bound, can the valid certificates computers belong to the user, then, just meet at this time with Lower condition: user has had come to office, and user's operation is the computer of user oneself, and then can determine User needs to log in the account of oneself on that computer to carry out subsequent office behavior at this time.
It should be noted that the acquisition modes of above-mentioned account information are only a kind of specific implementation side provided herein Formula uniquely for example, it is also possible to which terminal inputs where being directly based upon target application by visitor, also not can use mobile whole End is sent in the form of barcode scanning.It is, of course, also possible to be a variety of implementations and deposit, actual demand is based on by user and carries out mode Selection, to improve user experience.
It is understood that the implementation that account information obtains is realized by hardware binding technology, it is more convenient, Specifically, the implementation based on input encrypted message also needs user's hand input-data, based on mobile terminal barcode scanning Implementation also needs user to take out mobile phone to carry out barcode scanning and clicking confirmation, have the defects that it is cumbersome, and based on hardware The implementation of binding technology, it is only necessary to click " quick to log in " button in application interface, carry out other operations i.e. without user The verifying of user identity and the login of target application can be achieved, be truly realized key login, greatly improve user experience.
Further, for above-mentioned hardware binding process, this application provides more concrete implementation modes, referring to FIG. 2, Fig. 2 is a kind of flow diagram of hardware binding method provided herein, and specific implementation flow is as follows:
First, it is determined that whether user has logged on target application, if so, setting for current logging device can be directly acquired Standby identifier, and then execute hardware binding operation;If it is not, then initiating proof of identity to user, which can specifically pass through It is manually entered account password or is realized using the form of mobile terminal barcode scanning, further, when authentication passes through, directly read The device identifier of current logging device, establishes mapping relations for the account information of device identifier and user, and feed back to shifting Dynamic terminal is confirmed by user, after the completion of confirmation, completes hardware binding.
Preferably, the account information of above-mentioned reading and device identifier binding may include: in default identifier list Read the account information with device identifier binding;Wherein, it presets in identifier list and is stored with account information and device identification The mapping relations of symbol.
It, can setting target application and multiple computer equipments specifically, for the not unique situation of user's office terminal Standby identifier establishes mapping relations to realize hardware binding, and is stored in the form of a list, i.e., by user according to practical need It asks and pre-establishes identifier list.It is directly default from this as a result, when obtaining the account information of its binding according to default identifier It is obtained in identifier list.
Preferably, application access method further include: default identifier list is executed according to the management instruction received Corresponding management operation;Wherein, management operation is that sweep equipment identifier operates or increase device identifier operation.
For above-mentioned default identifier list, user can also be managed operation, Jin Ershi to it according to their needs Now to effective management of the computer equipment that can fast log under itself account, wherein above-mentioned management operation specifically can be with For the device identifier etc. for deleting or increasing the computer equipment that target application account information is bound.Specifically, in management field In face, user can check the list for the computer equipment that oneself can fast be logged in, and can delete some under account at any time Can quick log into thr computer, and according to demand increase account under can bind can quick log into thr computer, to prevent from being not belonging to The computer of oneself is maliciously logged in by other people, for example, can delete setting for old computer when needing replacing office computer Standby identifier, and increase the device identifier of new computer.
Preferably, which can also include: and generate account information when that can not read account information and tie up Fixed prompt.
Specifically, illustrating the meter when the account information that the device identifier that can not read current logging device is bound It calculates machine equipment and did not carried out hardware binding, at this point it is possible to generate account information binding prompt, tied up with prompting visitor to execute hardware Fixed operation.Further, the prompt information for executing hardware binding operation can also be provided, as shown in Fig. 2, instructing user to complete in turn Hardware binding.
As it can be seen that utilizing examining in attendance checking system when logging in target application using login method provided by the present embodiment Verifying foundation of the diligent data as visitor's identity, and hardware binding technology is combined to realize that a key of account information obtains, as a result, While guaranteeing has higher-security, input operation or the operation of mobile phone barcode scanning cumbersome before logging in are avoided, is truly realized One key logs in, and greatly improves user experience.
On the basis of above-mentioned each embodiment, applied using pocket assistant as default attendance checking system, the present embodiment It provides a kind of more specifically using login method.Pocket assistant supports movable attendance checking function, when the attendance of breast pocket assistant It supports mobile phone hardware binding, wifi and the triple verifications of positioning, to verify user to hilllock, wants allograph even if user It is not an inexpensive thing, if other people want the cost registered instead of the user in the case where user's non-active allograph Will be higher, therefore attendance data has very high safety.
In the present embodiment, the account information acquisition modes of three types are supported using login method, i.e. user can be Unrestricted choice in input login, barcode scanning login and quick login.
Wherein, quick login mode only needs to add hardware binding logic at the end pc, and login page add fast by Button, as a result, when user needs using quick log in, it is only necessary to which clicking quick botton can be completed key login.It is understood that , quick log in needs while meeting two conditions, i.e. hardware binding and attendance data, specifically, if user does not sign It arrives, then proves that user does not come office, if quick register occurs at this time, deducibility is other people logon attempts The account of the user, the behavior will be refused by system;If user account information without and computer equipment bind, system without Method learn it is current whose account need to log in be, be unable to complete key login.
Further, referring to FIG. 3, Fig. 3 is the flow diagram of another kind application login method provided herein.Tool For body, when the user clicks when quick login button, it will the logging request for target application is received, further, judgement Whether bound targets apply corresponding account information to current logging device, if it is not, user is then prompted currently not yet to bind account Family information, while bootable user binds current logging device with account information, and restarts to log in;Conversely, if Current logging device has been bundled with account information, then subsequent login operation can be executed according to the account information of binding, at this point, It can determine whether current account supports attendance data to obtain function and prompt user to add attendance checking system, and terminate if not supporting Current register can obtain the attendance information of user, from attendance checking system if supporting to judge whether user is in label To state, if being not at the state of registering, prompt user that can not log in target application due to not registering, if in shape of registering State can then be directly based upon account information and log in target application and carry out application access, at the same time it can also to the mobile end of user End feedback logins successfully information.
It can be seen that in the case where user enterprise supports attendance, when user is in register state, and its computer equipment When with account information binding, quick login button is only clicked in the operation of user, and others operate all program judgements, as long as It is eligible directly to login successfully, it is very convenient quick.
Login method is applied provided by the embodiment of the present application, based under mobile office scene, passes through attendance data conduct The foundation that user logs in verification with higher-security, eliminates user using hardware binding as supplementary means High-frequency input operation or barcode scanning operation required when office application are logged in operative scenario, effectively increase user experience, The dependence to attendance is also added simultaneously and reduces the probability of cheating attendance.
Application entering device provided by the embodiments of the present application is introduced below, application entering device described below with Above-described application login method can correspond to each other reference.
Referring to FIG. 4, Fig. 4 is a kind of structural schematic diagram using entering device provided herein, which is logged in Device may include:
Logging request receiving module 10, for receiving the logging request for being directed to target application;
Account information determining module 20, for determining account information according to logging request;
Checking-in state obtains module 30, corresponds to attendance shape of the user in default attendance checking system for obtaining account information State;
Checking-in state judgment module 40, for judging whether checking-in state is the state of having registered;
Using login module 50, if being state of having registered for checking-in state, target application is logged in using account information.
Provided herein applies entering device, and based on the needs of mobile office scene, many office applications all have Movable attendance checking function, i.e., registered by mobile terminal, and is verified by a series of method to avoid staff attendance Cheating, it can be seen that, attendance data safety with higher is based on this characteristic, and technical solution provided herein combines The attendance information of user realizes the authentication to application visitor, when receiving the logging request for a certain application, Register directly wouldn't be executed according to account information, but first determine that account information corresponds to the current checking-in state of user, such as Fruit user has completed to register, then illustrates that user has had come to office, namely the current trial of explanation is carried out using login Visitor be user, thereby ensure that the legitimacy of application access person's identity, efficiently solve in the prior art only base The security risk brought by password authentification, and then realize the purpose for guaranteeing using data safety and protecting privacy of user.
On the basis of the above embodiments, as a kind of preferred embodiment, provided herein is applied in entering device, Above-mentioned account information determining module 20 can include:
Device identifier reading unit, for reading the device identifier of current logging device according to logging request;
Account information reading unit, for reading the account information with device identifier binding.
On the basis of the above embodiments, as a kind of preferred embodiment, provided herein is applied in entering device, Above-mentioned account information reading unit can be specifically used for reading in default identifier list to be believed with the account of device identifier binding Breath;Wherein, the mapping relations that account information and device identifier are stored in identifier list are preset.
On the basis of the above embodiments, as a kind of preferred embodiment, provided herein is applied in entering device, Above-mentioned account information determining module 20 may also include default identifier list administrative unit, for according to the management instruction received Corresponding management operation is executed to default identifier list;Wherein, management operation is that sweep equipment identifier operates or increase is set Standby identifier operates.
On the basis of the above embodiments, as a kind of preferred embodiment, provided herein is applied in entering device, Above-mentioned account information determining module 20 may also include account information binding prompt generation unit, can not read account letter for working as When breath, account information binding prompt is generated.
On the basis of the above embodiments, as a kind of preferred embodiment, provided herein is applied in entering device, It may also include login failure prompt generation module, if not being the state of having registered for checking-in state, generate login failure prompt.
On the basis of the above embodiments, as a kind of preferred embodiment, virtual machine heat provided herein upgrades dress In setting, it may also include and login successfully prompt generation module, for logining successfully prompt to the transmission of default security terminal.
Above method embodiment is please referred to for the introduction of device provided by the present application, this will not be repeated here by the application.
Application logging device provided by the embodiments of the present application is introduced below, application logging device described below with Above-described application login method can correspond to each other reference.
Referring to FIG. 5, Fig. 5 is a kind of structural schematic diagram using logging device provided herein, which is logged in Equipment may include:
Memory 1, for storing computer program;
Processor 2 can realize that any one of the above application is stepped on when for executing the computer program of the above-mentioned storage of memory 1 The step of recording method.
Above method embodiment is please referred to for the introduction of equipment provided by the present application, this will not be repeated here by the application.
Further, the embodiment of the present application also discloses a kind of computer readable storage medium, for storing computer journey Sequence, wherein the step of any one of the above application login method can be realized when computer program is executed by processor.
Wherein, which may include: USB flash disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic or disk etc. is various to deposit Store up the medium of program code.
Above method embodiment is please referred to for the specific introduction of computer readable storage medium provided by the present application, this Shen It please this will not be repeated here.
Each embodiment is described in a progressive manner in specification, the highlights of each of the examples are with other realities The difference of example is applied, the same or similar parts in each embodiment may refer to each other.For device disclosed in embodiment Speech, since it is corresponded to the methods disclosed in the examples, so being described relatively simple, related place is referring to method part illustration ?.
Professional further appreciates that, unit described in conjunction with the examples disclosed in the embodiments of the present disclosure And algorithm steps, can be realized with electronic hardware, computer software, or a combination of the two, in order to clearly demonstrate hardware and The interchangeability of software generally describes each exemplary composition and step according to function in the above description.These Function is implemented in hardware or software actually, the specific application and design constraint depending on technical solution.Profession Technical staff can use different methods to achieve the described function each specific application, but this realization is not answered Think beyond scope of the present application.
The step of method described in conjunction with the examples disclosed in this document or algorithm, can directly be held with hardware, processor The combination of capable software module or the two is implemented.Software module can be placed in random access memory (RAM), memory, read-only deposit Reservoir (ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technology In any other form of storage medium well known in field.
Finally, it is to be noted that, herein, relational terms such as first and second and the like be used merely to by One entity or operation are distinguished with another entity or operation, without necessarily requiring or implying these entities or operation Between there are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant meaning Covering non-exclusive inclusion, so that the process, method, article or equipment for including a series of elements not only includes that A little elements, but also including other elements that are not explicitly listed, or further include for this process, method, article or The intrinsic element of equipment.In the absence of more restrictions, the element limited by sentence "including a ...", is not arranged Except there is also other identical elements in the process, method, article or apparatus that includes the element.
Application login method, device, equipment and computer readable storage medium provided herein are carried out above It is discussed in detail.Specific examples are used herein to illustrate the principle and implementation manner of the present application, above embodiments Illustrate to be merely used to help understand the present processes and its core concept.It should be pointed out that for the common skill of the art For art personnel, under the premise of not departing from the application principle, can also to the application, some improvement and modification can also be carried out, these change Into the protection scope element for also falling into the claim of this application with modification.

Claims (10)

1. a kind of apply login method characterized by comprising
Receive the logging request for being directed to target application;
Account information is determined according to the logging request;
It obtains the account information and corresponds to checking-in state of the user in default attendance checking system;
Judge whether the checking-in state is the state of having registered;
If so, logging in the target application using the account information.
2. applying login method as described in claim 1, which is characterized in that described to determine that account is believed according to the logging request Breath, comprising:
The device identifier of current logging device is read according to the logging request;
Read the account information with device identifier binding.
3. applying login method as claimed in claim 2, which is characterized in that the reading and device identifier binding The account information, comprising:
The account information with device identifier binding is read in default identifier list;Wherein, the pre- bidding Know the mapping relations that the account information Yu the device identifier are stored in symbol list.
4. applying login method as claimed in claim 3, which is characterized in that further include:
Corresponding management is executed to the default identifier list according to the management instruction received to operate;Wherein, the management Operation is that sweep equipment identifier operates or increase device identifier operation.
5. applying login method as claimed in claim 2, which is characterized in that further include:
When the account information can not be read, account information binding prompt is generated.
6. applying login method as described in claim 1, which is characterized in that further include:
If the checking-in state is not the state of having registered, login failure prompt is generated.
7. applying login method as described in claim 1 to 6 any one, which is characterized in that described to be believed using the account Breath logs in after the target application, further includes:
Prompt is logined successfully to the default security terminal transmission.
8. a kind of apply entering device characterized by comprising
Logging request receiving module, for receiving the logging request for being directed to target application;
Account information determining module, for determining account information according to the logging request;
Checking-in state obtains module, corresponds to checking-in state of the user in default attendance checking system for obtaining the account information;
Checking-in state judgment module, for judging whether the checking-in state is the state of having registered;
Using login module, if being the state of having registered for the checking-in state, institute is logged in using the account information State target application.
9. a kind of apply logging device characterized by comprising
Memory, for storing computer program;
Processor realizes application login side as claimed in any one of claims 1 to 7 when for executing the computer program The step of method.
10. a kind of computer readable storage medium, which is characterized in that be stored with computer on the computer readable storage medium Program, the computer program realize that application as claimed in any one of claims 1 to 7 logs in when being executed by the processor The step of method.
CN201910662006.8A 2019-07-22 2019-07-22 Application login method and device and related equipment thereof Active CN110351296B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910662006.8A CN110351296B (en) 2019-07-22 2019-07-22 Application login method and device and related equipment thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910662006.8A CN110351296B (en) 2019-07-22 2019-07-22 Application login method and device and related equipment thereof

Publications (2)

Publication Number Publication Date
CN110351296A true CN110351296A (en) 2019-10-18
CN110351296B CN110351296B (en) 2022-09-30

Family

ID=68179654

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910662006.8A Active CN110351296B (en) 2019-07-22 2019-07-22 Application login method and device and related equipment thereof

Country Status (1)

Country Link
CN (1) CN110351296B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112104663A (en) * 2020-10-30 2020-12-18 上海连尚网络科技有限公司 Method and equipment for managing login user and user equipment
CN112987589A (en) * 2021-03-25 2021-06-18 深圳康佳电子科技有限公司 Station electricity utilization control method, server, system and computer readable storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107292984A (en) * 2017-05-23 2017-10-24 烽火通信科技股份有限公司 A kind of enterprise based on running fix optimized algorithm registers system and method
CN206833742U (en) * 2017-03-09 2018-01-02 江苏海事职业技术学院 A kind of Prelecting system with teaching management
US20180103035A1 (en) * 2015-05-08 2018-04-12 International Business Machines Corporation Network authentication of a geo-fenced volume
CN107911340A (en) * 2017-10-25 2018-04-13 平安普惠企业管理有限公司 Login validation method, device, equipment and the storage medium of application program
CN207706215U (en) * 2017-12-19 2018-08-07 南京华讯方舟通信设备有限公司 A kind of fingerprint logs in cloud host equipment and system
CN108449320A (en) * 2018-02-09 2018-08-24 北京百悟科技有限公司 The safe office system of intelligent automation and method
CN109982244A (en) * 2019-04-03 2019-07-05 山东浪潮云信息技术有限公司 Method and system of registering based on wechat position location functionality

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180103035A1 (en) * 2015-05-08 2018-04-12 International Business Machines Corporation Network authentication of a geo-fenced volume
CN206833742U (en) * 2017-03-09 2018-01-02 江苏海事职业技术学院 A kind of Prelecting system with teaching management
CN107292984A (en) * 2017-05-23 2017-10-24 烽火通信科技股份有限公司 A kind of enterprise based on running fix optimized algorithm registers system and method
CN107911340A (en) * 2017-10-25 2018-04-13 平安普惠企业管理有限公司 Login validation method, device, equipment and the storage medium of application program
CN207706215U (en) * 2017-12-19 2018-08-07 南京华讯方舟通信设备有限公司 A kind of fingerprint logs in cloud host equipment and system
CN108449320A (en) * 2018-02-09 2018-08-24 北京百悟科技有限公司 The safe office system of intelligent automation and method
CN109982244A (en) * 2019-04-03 2019-07-05 山东浪潮云信息技术有限公司 Method and system of registering based on wechat position location functionality

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112104663A (en) * 2020-10-30 2020-12-18 上海连尚网络科技有限公司 Method and equipment for managing login user and user equipment
CN112104663B (en) * 2020-10-30 2023-06-23 上海连尚网络科技有限公司 Method and equipment for managing login user and user equipment
CN112987589A (en) * 2021-03-25 2021-06-18 深圳康佳电子科技有限公司 Station electricity utilization control method, server, system and computer readable storage medium

Also Published As

Publication number Publication date
CN110351296B (en) 2022-09-30

Similar Documents

Publication Publication Date Title
CN110324276B (en) Method, system, terminal and electronic device for logging in application
CN109992949B (en) Equipment authentication method, over-the-air card writing method and equipment authentication device
CN102804200B (en) Two-factor user authentication system, and method therefor
CN103377332B (en) The method of access application and device
EP1571525B1 (en) A method, a hardware token, and a computer program for authentication
US9843930B2 (en) Trusted execution environment initialization method and mobile terminal
CN105246073B (en) The access authentication method and server of wireless network
JP2018532301A (en) User authentication method and apparatus
CN104065621A (en) Identify verification method for third-party service, client and system
CN1937498A (en) Dynamic cipher authentication method, system and device
CN109101795A (en) A kind of account number safe login method, apparatus and system
CN101316167A (en) Registration and login method of safety authentication, system and mobile terminal
CN102821112A (en) Mobile equipment, server and mobile equipment data verification method
CN105337997A (en) Log-in method of application client and relevant device
US11809540B2 (en) System and method for facilitating authentication via a short-range wireless token
CN107707356B (en) A kind of mobile device secure binding method and application system based on two dimensional code identification
KR20120019021A (en) Image forming apparatus for executing user authentication and method for executing user authentication of image forming apparatus
CN109919601A (en) Payment verification method, apparatus and electronic equipment
CN111242248A (en) Personnel information monitoring method and device and computer storage medium
CN104104671B (en) Establish the unified dynamic authorization code system of business entity's account
CN105939194A (en) Backup method and backup system for private key of electronic key device
CN106686585A (en) Binding method and system
CN111901304B (en) Registration method and device of mobile security equipment, storage medium and electronic device
CN110324344A (en) The method and device of account information certification
CN110351296A (en) A kind of application login method, device and its relevant device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant