CN110351296B - Application login method and device and related equipment thereof - Google Patents

Application login method and device and related equipment thereof Download PDF

Info

Publication number
CN110351296B
CN110351296B CN201910662006.8A CN201910662006A CN110351296B CN 110351296 B CN110351296 B CN 110351296B CN 201910662006 A CN201910662006 A CN 201910662006A CN 110351296 B CN110351296 B CN 110351296B
Authority
CN
China
Prior art keywords
login
application
account information
user
attendance checking
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910662006.8A
Other languages
Chinese (zh)
Other versions
CN110351296A (en
Inventor
谢兴安
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Koudai Network Technology Co ltd
Original Assignee
Shenzhen Koudai Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Koudai Network Technology Co ltd filed Critical Shenzhen Koudai Network Technology Co ltd
Priority to CN201910662006.8A priority Critical patent/CN110351296B/en
Publication of CN110351296A publication Critical patent/CN110351296A/en
Application granted granted Critical
Publication of CN110351296B publication Critical patent/CN110351296B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C1/00Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people
    • G07C1/10Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people together with the recording, indicating or registering of other data, e.g. of signs of identity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)
  • Information Transfer Between Computers (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The application discloses an application login method, which comprises the steps of receiving a login request aiming at a target application; determining account information according to the login request; acquiring an attendance checking state of a user in a preset attendance checking system corresponding to the account information; judging whether the attendance checking state is a signed state or not; if yes, logging in the target application by using the account information; the application login method can effectively verify the validity of the identity of the application visitor, so that the safety of user information is improved, and the purpose of effectively protecting the privacy of the user is achieved. The application also discloses an application login device, equipment and a computer readable storage medium, which have the beneficial effects.

Description

Application login method and device and related equipment thereof
Technical Field
The present application relates to the field of information security technologies, and in particular, to an application login method, and further, to an application login apparatus, device, and computer-readable storage medium.
Background
With the development of electronic technology, electronic devices such as mobile phones and computers are more and more popularized and have more and more powerful functions, various novel applications are generated, and diversified requirements of users can be effectively met by installing various types of applications in the electronic devices.
In order to protect user privacy, many applications have high requirements on security performance, and generally, before application access is performed, identity authentication needs to be performed on an accessor so as to ensure the validity of the identity of the accessor. At present, a mainstream login mode for terminal application is mainly based on plaintext verification of password information, that is, identity verification of an visitor is realized by inputting an account password; however, the authentication method still has a great potential safety hazard, and specifically, once the password information of the terminal application is illegally stolen by others, and the login application steals the private data therein, serious information leakage will be caused, so that the privacy of the user is threatened. Further, such a drawback is particularly apparent for office application software in a work scene.
Therefore, how to effectively verify the validity of the identity of the application visitor and further ensure the information security is an urgent problem to be solved by those skilled in the art.
Disclosure of Invention
The application access method can effectively verify the validity of the identity of an application visitor, so that the safety of user information is improved, and the aim of effectively protecting the privacy of a user is fulfilled; another object of the present application is to provide an application access device, an apparatus and a computer readable storage medium, all having the above advantages.
In a first aspect, the present application provides an application access method, including:
receiving a login request for a target application;
determining account information according to the login request;
acquiring an attendance checking state of a user in a preset attendance checking system corresponding to the account information;
judging whether the attendance checking state is a signed state or not;
and if so, logging in the target application by using the account information.
Preferably, the determining account information according to the login request includes:
reading the equipment identifier of the current login equipment according to the login request;
reading the account information bound to the device identifier.
Preferably, the reading the account information bound to the device identifier includes:
reading the account information bound with the device identifier in a preset identifier list; the preset identifier list stores the mapping relationship between the account information and the device identifier.
Preferably, the application access method further includes:
executing corresponding management operation on the preset identifier list according to the received management instruction; wherein the management operation is a delete device identifier operation or an add device identifier operation.
Preferably, the application access method further includes:
and generating an account information binding prompt when the account information cannot be read.
Preferably, the application access method further includes:
and if the attendance checking state is not the checked-in state, generating a login failure prompt.
Preferably, after logging in the target application by using the account information, the method further includes:
and sending a login success prompt to the preset safety terminal.
In a second aspect, the present application further provides an application access apparatus, including:
the login request receiving module is used for receiving a login request aiming at the target application;
the account information determining module is used for determining account information according to the login request;
the attendance checking state acquisition module is used for acquiring the attendance checking state of the user corresponding to the account information in a preset attendance checking system;
the attendance checking state judging module is used for judging whether the attendance checking state is a signed state or not;
and the application login module is used for logging in the target application by using the account information if the attendance checking state is the checked-in state.
In a third aspect, the present application further provides an application access device, where the application access device includes:
a memory for storing a computer program;
a processor for implementing the steps of any of the above application access methods when executing the computer program.
In a fourth aspect, the present application further provides a computer-readable storage medium having a computer program stored thereon, which when executed by a processor, implements the steps of any of the above-mentioned application access methods.
The application access method comprises the steps of receiving a login request aiming at a target application; determining account information according to the login request; acquiring an attendance checking state of a user in a preset attendance checking system corresponding to the account information; judging whether the attendance checking state is a signed state or not; and if so, logging in the target application by using the account information.
Therefore, based on the requirement of a mobile office scene, the technical scheme provided by the application has a mobile attendance function, namely, the mobile terminal is used for checking in and a series of methods are used for verifying so as to avoid employee attendance cheating, therefore, the attendance data has higher safety, based on the characteristic, the technical scheme provided by the application realizes the identity verification of the application visitor by combining the attendance information of the user, when a login request aiming at a certain application is received, the login operation is not directly executed according to the account information, but the current attendance state of the user corresponding to the account information is firstly judged, if the user finishes checking in, the user comes to the office place, namely, the visitor who attempts to perform application login at present is the user himself, thereby ensuring the validity of the identity of the application visitor, the method effectively solves the potential safety hazard caused by password verification in the prior art, and further achieves the purposes of ensuring the safety of application data and protecting the privacy of users.
The application login device, the device and the computer readable storage medium provided by the application login method have the beneficial effects, and are not described herein again.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, it is obvious that the drawings in the following description are only embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
Fig. 1 is a schematic flowchart of an application login method provided in the present application;
FIG. 2 is a flowchart illustrating a hardware binding method according to the present application;
FIG. 3 is a schematic flow chart of another application login method provided in the present application;
fig. 4 is a schematic structural diagram of an application login apparatus provided in the present application;
fig. 5 is a schematic structural diagram of an application login device provided in the present application.
Detailed Description
The core of the application is to provide the application login method, the validity of the identity of the application visitor can be effectively verified, the safety of user information is further improved, and the purpose of effectively protecting the privacy of the user is achieved; another core of the present application is to provide an application login apparatus, a device and a computer readable storage medium, all having the above beneficial effects.
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
In order to protect user privacy, many applications have high requirements on security performance, and generally, before application access is performed, identity authentication needs to be performed on an accessor to ensure the validity of the identity of the accessor. In the prior art, an application login mode of verifying the identity of an visitor is realized by an account password, and the potential safety hazard of user information leakage caused by the fact that password information is stolen exists. Therefore, in order to solve the above problems, the application login method is provided, and the application login method can effectively verify the validity of the identity of the application visitor, so that the security of user information is improved, and the purpose of effectively protecting the privacy of the user is achieved.
Referring to fig. 1, fig. 1 is a schematic flowchart of an application login method provided in the present application, where the application login method may include:
s101: receiving a login request aiming at a target application;
the step aims to realize the acquisition of the login request, the login request is the login request aiming at the target application, and can be specifically initiated by the visitor through the terminal where the target application is located, wherein the target application is the application which the visitor needs to log in, and can be any application of a web/pc end and an app end, and the specific type of the application does not influence the implementation of the technical scheme.
S102: determining account information according to the login request;
the step aims to realize the determination of account information, the account information is data information required by a user when the user logs in a target application, can be obtained by registering when the user accesses the target application for the first time, and specifically can be mobile phone number information, preset password information and the like.
S103: acquiring an attendance checking state of a user in a preset attendance checking system corresponding to account information;
the target application and the attendance system of the user can be bound in advance, the attendance system is set to authorize the target application, the target application is allowed to access attendance data of the user, and the user is a legal user of the target application. Further, when the account information of the user is acquired, the target application is not directly logged in, but the attendance state of the user corresponding to the account information is acquired from the bound attendance system, and whether the login operation of the target application is continued or not is determined according to the attendance state.
S104: judging whether the attendance checking state is a checked-in state or not; if yes, executing S105, otherwise executing S106;
s105: logging in the target application by using the account information;
s106: and generating a login failure prompt.
The step aims to realize the judgment of the attendance checking state of the user, and particularly, if the obtained attendance checking state is the checked-in state, the fact that a legal user of the target application has arrived at an office place is indicated, and then the fact that the visitor initiating the login request at present is the user can be judged, and at the moment, the user can directly log in the target application based on account information. On the contrary, if the attendance checking state of the user is a non-card-punching state, it is indicated that the legal user of the target application is not located in the office place, and the login request for the target application is received at the moment, obviously, the visitor of the current target application is not the legal user, and at the moment, even if the account information of the target application is obtained, the visitor is not allowed to log in the target application, so that the validity judgment on the identity information of the visitor of the application is realized, and the safety of the user information is further ensured not to be leaked.
Furthermore, a login failure prompt can be generated and fed back to a terminal display interface so as to inform the visitor of the error in identity verification and the application login failure.
As a preferred embodiment, after logging in the target application by using the account information, the method may further include: and sending a login success prompt to a preset safety terminal.
Specifically, the user may bind the target application with a preset security terminal in advance, where the preset security terminal is a security verification terminal for informing the user that the target application has successfully logged in, and specifically may be a mobile terminal of the user. Therefore, when the target application is successfully logged in, a login success prompt can be sent to the preset security terminal to inform the user that the target application is logged in currently. Under the condition, if the visitor who initiates the login request is not the user, the login of the target application is successfully completed, the user can know that the illegal visitor steals the private information in the first time, and the operations of locking the information, changing the password and the like are carried out in time, so that the information leakage is avoided. In addition, when a login failure prompt is fed back to the terminal interface, prompt information can be sent to the preset safety terminal, and a legal user is informed that an illegal visitor attempts to login the target application at present.
Based on the characteristics that a plurality of office applications have a mobile attendance function, namely, the office applications are signed in through a mobile terminal and are verified through a series of methods to avoid employee attendance cheating, therefore, attendance data has higher safety, the technical scheme provided by the application realizes identity verification on an application visitor by combining attendance information of a user, when a login request for a certain application is received, the login operation is not directly executed according to account information, but the current attendance state of the user corresponding to the account information is firstly judged, if the user finishes signing in, the user comes to an office place, namely, the visitor who attempts to perform application login at present is the user himself, thereby ensuring the validity of the identity of the application visitor, the method effectively solves the potential safety hazard caused by password verification in the prior art, and further achieves the purposes of ensuring the safety of application data and protecting the privacy of users. In addition, the validity verification of the identity of the visitor is realized by combining the attendance information, the dependence on attendance services is effectively promoted, the attendance behavior of the user is prevented from happening from the psychological aspect, and the good habit formation of the user is facilitated.
On the basis of the foregoing embodiments, the present embodiment specifically describes an acquisition manner of account information.
As a preferred embodiment, the determining the account information according to the login request may include:
step 1, reading a device identifier of current login equipment according to a login request;
and 2, reading account information bound with the equipment identifier.
In this embodiment, the account information is obtained through a hardware binding technology, and specifically, because computer hardware devices usually have unique identifiers, such as cpu serial numbers, hard disk serial numbers, and the like, the unique identifiers of the hardware devices can be obtained in advance, and then are bound with the account information of the user, and when the target application is opened again, the account information of the corresponding user can be obtained by reading the hardware identifiers.
Therefore, the target application is logged in by using the attendance data and the hardware binding technology, when the user is in mobile sign-in, the user is meant to arrive at an office place and is ready to start working, meanwhile, because the account of the user is bound with the office computer of the user in advance, the computer can be effectively proved to belong to the user, and then the following conditions are met: the user himself has come to the office place, and the user operates the computer of the user himself, so that it can be determined that the user needs to log in his account on the computer for subsequent office activities.
It should be noted that the above-mentioned manner of acquiring the account information is only one specific implementation manner provided by the present application, and is not unique, for example, the account information may also be directly input by the visitor based on the terminal where the target application is located, or may also be sent in a code scanning manner by using the mobile terminal. Of course, multiple implementation modes can coexist, and the user selects the mode based on actual requirements to improve the user experience.
It can be understood that the implementation manner of obtaining account information is realized through a hardware binding technology, which is more convenient and faster, particularly, the implementation manner based on inputting password information still needs manual data input by a user, the implementation manner based on scanning codes by a mobile terminal still needs the user to take out a mobile phone to scan codes and click confirmation, and the defects of complex operation exist.
Further, for the above hardware binding process, the present application provides a more specific implementation manner, please refer to fig. 2, where fig. 2 is a schematic flow chart of a hardware binding method provided by the present application, and a specific implementation flow thereof is as follows:
firstly, judging whether a user logs in a target application, if so, directly acquiring a device identifier of current login equipment, and further executing hardware binding operation; if not, initiating identity verification to the user, wherein the verification process can be realized by manually inputting an account password or using a code scanning mode of the mobile terminal, further, directly reading the equipment identifier of the current login equipment when the identity verification is passed, establishing a mapping relation between the equipment identifier and the account information of the user, feeding the mapping relation back to the mobile terminal for confirmation by the user, and finishing hardware binding after the confirmation is completed.
Preferably, the reading of the account information bound to the device identifier may include: reading account information bound with the device identifier from a preset identifier list; the preset identifier list stores the mapping relation between the account information and the device identifier.
Specifically, for the case that the office terminal of the user is not unique, the mapping relationship between the target application and the device identifiers of the multiple computer devices may be established to implement hardware binding, and the hardware binding may be stored in a list form, that is, the identifier list may be established in advance by the user according to actual requirements. Therefore, when the account information bound by the preset identifier is acquired according to the preset identifier, the account information can be directly acquired from the preset identifier list.
Preferably, the application access method further includes: executing corresponding management operation on the preset identifier list according to the received management instruction; wherein the management operation is a delete device identifier operation or an add device identifier operation.
For the preset identifier list, the user may further perform a management operation on the preset identifier list according to the need of the user, so as to achieve effective management on the computer device capable of logging in quickly under the account of the user, where the management operation may specifically be deleting or adding a device identifier of the computer device bound to the target application account information, and the like. Specifically, in the management interface, a user can check a list of computer devices which can be quickly logged in by the user, delete a certain quickly-logged computer under an account at any time, and increase the quickly-logged computers which can be bound under the account according to requirements, so as to prevent the computers which do not belong to the user from being maliciously logged in by other people, for example, when an office computer needs to be replaced, the device identifier of an old computer can be deleted, and the device identifier of a new computer can be increased.
Preferably, the application access method may further include: and when the account information cannot be read, generating an account information binding prompt.
Specifically, when the account information bound to the device identifier of the currently logged-in device cannot be read, it is indicated that the computer device has not performed hardware binding, and at this time, an account information binding prompt may be generated to prompt a visitor to perform a hardware binding operation. Further, a prompt message for executing the hardware binding operation may also be given, as shown in fig. 2, so as to guide the user to complete the hardware binding.
Therefore, according to the application login method provided by the embodiment, when a target application is logged in, the attendance data in the attendance system is used as the verification basis of the identity of an accessor, and the one-key acquisition of account information is realized by combining the hardware binding technology, so that the higher security is ensured, the complicated input operation or mobile phone code scanning operation before login is avoided, the one-key login is really performed, and the user experience is greatly improved.
Based on the above embodiments, taking the pocket assistant application as the preset attendance system as an example, the embodiment provides a more specific application login method. The pocket assistant supports a mobile attendance function, the attendance of the current pocket assistant supports mobile phone hardware binding, wifi and positioning triple verification are used for verifying that a user arrives at work, even if the user wants to sign instead, the low-cost matter is not, and if the user does not actively sign instead, the cost for others to sign instead of the user is higher, so that the attendance data has high safety.
In this embodiment, the application login method supports three types of account information acquisition modes, that is, a user can freely select among input login, code scanning login and quick login.
The quick login method only needs to add hardware binding logic at the pc end, and add a quick button on a login page, so that when a user needs to use quick login, one-key login can be completed only by clicking the quick button. It can be understood that the fast login needs to satisfy two conditions, namely hardware binding and attendance data, specifically, if the user does not sign in, it is proved that the user does not come to the office location, and if the fast login operation occurs at this time, it can be inferred that other people try to log in the account of the user, and the behavior will be rejected by the system; if the account information of the user is not bound with the computer equipment, the system cannot know who account needs to be logged in currently, and cannot complete one-key login.
Further, please refer to fig. 3, fig. 3 is a flowchart illustrating another application login method provided in the present application. Specifically, when a user clicks a shortcut login button, a login request aiming at a target application is received, further, whether the current login equipment is bound with account information corresponding to the target application or not is judged, if not, the user is prompted that the account information is not bound currently, meanwhile, the user can be guided to bind the current login equipment and the account information, and login is started again; otherwise, if the current login equipment is bound with the account information, subsequent login operation can be executed according to the bound account information, at the moment, whether the current account supports the attendance data acquisition function or not can be judged, if not, the user is prompted to add an attendance system, the current login operation is finished, if so, the attendance information of the user can be acquired from the attendance system so as to judge whether the user is in a check-in state or not, if not, the user is prompted to be incapable of logging in the target application due to no check-in, if so, the target application can be directly logged in and application access can be carried out based on the account information, and meanwhile, login success information can be fed back to the mobile terminal of the user.
Therefore, when a user is in a sign-in state and computer equipment and account information of the user are bound under the condition that a user enterprise supports attendance checking, the user only clicks a quick login button to operate, other operations are all program judgment, and the user can directly login successfully as long as conditions are met, so that the system is very convenient and quick.
According to the application login method, on the basis of a mobile office scene, the attendance data is used as the basis of user login verification, the hardware binding is used as an auxiliary means, and under the condition of high safety, high-frequency input operation or code scanning operation required by a user when the user logs in an office application in a working scene is avoided, so that the user experience is effectively improved, meanwhile, the dependence on attendance is increased, and the probability of attendance replacement is reduced.
In the following, the application login device provided in the embodiment of the present application is introduced, and the application login device described below and the application login method described above may be referred to correspondingly.
Referring to fig. 4, fig. 4 is a schematic structural diagram of an application login device provided in the present application, where the application login device may include:
a login request receiving module 10, configured to receive a login request for a target application;
an account information determining module 20, configured to determine account information according to the login request;
the attendance checking state acquisition module 30 is used for acquiring an attendance checking state of the user corresponding to the account information in a preset attendance checking system;
the attendance checking state judging module 40 is used for judging whether the attendance checking state is a signed state or not;
and the application login module 50 is used for logging in the target application by using the account information if the attendance checking state is the checked-in state.
Based on the requirement of a mobile office scene, a plurality of office applications have a mobile attendance function, namely, sign-in is carried out through a mobile terminal, and verification is carried out through a series of methods to avoid employee attendance cheating, so that the attendance data has higher safety, based on the characteristics, the technical scheme provided by the application realizes identity verification on an application visitor by combining attendance information of a user, when a login request aiming at a certain application is received, login operation is not directly executed according to account information, the current attendance state of the user corresponding to the account information is firstly judged, if the user finishes sign-in, the user is shown to have come to an office place, namely, the visitor who attempts to carry out application login at present is the user, and therefore, the validity of the identity of the application visitor is ensured, the method effectively solves the potential safety hazard caused by password verification in the prior art, and further achieves the purposes of ensuring the safety of application data and protecting the privacy of users.
On the basis of the foregoing embodiment, as a preferred embodiment, in the application login apparatus provided by the present application, the account information determining module 20 may include:
the device identifier reading unit is used for reading the device identifier of the current login device according to the login request;
and the account information reading unit is used for reading the account information bound with the equipment identifier.
On the basis of the foregoing embodiment, as a preferred embodiment, in the application login apparatus provided by the present application, the account information reading unit may be specifically configured to read account information bound to the device identifier in a preset identifier list; the preset identifier list stores the mapping relation between the account information and the device identifier.
On the basis of the foregoing embodiment, as a preferred embodiment, in the application login apparatus provided in the present application, the account information determining module 20 may further include a preset identifier list managing unit, configured to perform a corresponding management operation on a preset identifier list according to a received management instruction; wherein the management operation is a delete device identifier operation or an add device identifier operation.
On the basis of the foregoing embodiment, as a preferred embodiment, in the application login device provided by the application, the account information determining module 20 may further include an account information binding prompt generating unit, configured to generate an account information binding prompt when the account information cannot be read.
On the basis of the foregoing embodiment, as a preferred embodiment, the application login apparatus provided in the present application may further include a login failure prompt generation module, configured to generate a login failure prompt if the attendance status is not the checked-in status.
On the basis of the foregoing embodiment, as a preferred embodiment, the virtual machine hot upgrade apparatus provided by the present application may further include a login success prompt generating module, configured to send a login success prompt to a preset security terminal.
For the introduction of the apparatus provided in the present application, please refer to the above method embodiments, which are not described herein again.
In the following, the application login device provided in the embodiment of the present application is introduced, and the application login device described below and the application login method described above may be referred to correspondingly.
Referring to fig. 5, fig. 5 is a schematic structural diagram of an application login device provided in the present application, where the application login device may include:
a memory 1 for storing a computer program;
the processor 2 is configured to implement the steps of any one of the above-described application login methods when executing the computer program stored in the memory 1.
For the introduction of the device provided in the present application, please refer to the above method embodiment, which is not described herein again.
Further, an embodiment of the present application also discloses a computer-readable storage medium for storing a computer program, where the computer program, when executed by a processor, can implement any of the steps of the application login method described above.
Wherein the computer-readable storage medium may include: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
For a detailed description of the computer-readable storage medium provided in the present application, please refer to the above method embodiments, which are not described herein again.
The embodiments are described in a progressive manner in the specification, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other. The device disclosed by the embodiment corresponds to the method disclosed by the embodiment, so that the description is simple, and the relevant points can be referred to the method part for description.
Those of skill would further appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the various illustrative components and steps have been described above generally in terms of their functionality in order to clearly illustrate this interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in Random Access Memory (RAM), memory, Read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
Finally, it should also be noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The application login method, device, equipment and computer readable storage medium provided by the application are described in detail above. The principles and embodiments of the present application are explained herein using specific examples, which are provided only to help understand the method and the core idea of the present application. It should be noted that, for those skilled in the art, without departing from the principle of the present application, the present application can also make several improvements and modifications, which also fall into the elements of the protection scope of the claims of the present application.

Claims (9)

1. An application login method, comprising:
receiving a login request for a target application; the login request responds to a click instruction of a shortcut button in a login page of the current login equipment;
determining account information according to the login request;
acquiring an attendance checking state of a user in a preset attendance checking system corresponding to the account information;
judging whether the attendance checking state is a signed state or not;
if yes, logging in the target application by using the account information;
wherein the determining account information according to the login request includes:
reading the equipment identifier of the current login equipment according to the login request;
reading the account information bound to the device identifier.
2. The application login method of claim 1, wherein the reading the account information bound with the device identifier comprises:
reading the account information bound with the device identifier in a preset identifier list; the preset identifier list stores a mapping relation between the account information and the device identifier.
3. The application login method of claim 2, further comprising:
executing corresponding management operation on the preset identifier list according to the received management instruction; wherein the management operation is a delete device identifier operation or an add device identifier operation.
4. The application login method of claim 1, further comprising:
and generating an account information binding prompt when the account information cannot be read.
5. The application login method of claim 1, further comprising:
and if the attendance checking state is not the checked-in state, generating a login failure prompt.
6. The application login method according to any one of claims 1 to 5, wherein after the login of the target application using the account information, further comprising:
and sending a login success prompt to a preset safety terminal.
7. An application login apparatus, comprising:
the login request receiving module is used for receiving a login request aiming at the target application; the login request responds to a click instruction of a shortcut button in a login page of the current login equipment;
the account information determining module is used for determining account information according to the login request;
the attendance checking state acquisition module is used for acquiring the attendance checking state of the user corresponding to the account information in a preset attendance checking system;
the attendance checking state judging module is used for judging whether the attendance checking state is a signed state or not;
the application login module is used for logging in the target application by using the account information if the attendance checking state is the checked-in state;
the account information determining module is used for reading the equipment identifier of the current login equipment according to the login request; reading the account information bound to the device identifier.
8. An application login device, comprising:
a memory for storing a computer program;
a processor for implementing the steps of the application login method as claimed in any one of claims 1 to 6 when executing said computer program.
9. A computer-readable storage medium, characterized in that a computer program is stored on the computer-readable storage medium, which computer program, when being executed by a processor, carries out the steps of the application login method as claimed in any one of claims 1 to 6.
CN201910662006.8A 2019-07-22 2019-07-22 Application login method and device and related equipment thereof Active CN110351296B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910662006.8A CN110351296B (en) 2019-07-22 2019-07-22 Application login method and device and related equipment thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910662006.8A CN110351296B (en) 2019-07-22 2019-07-22 Application login method and device and related equipment thereof

Publications (2)

Publication Number Publication Date
CN110351296A CN110351296A (en) 2019-10-18
CN110351296B true CN110351296B (en) 2022-09-30

Family

ID=68179654

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910662006.8A Active CN110351296B (en) 2019-07-22 2019-07-22 Application login method and device and related equipment thereof

Country Status (1)

Country Link
CN (1) CN110351296B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112104663B (en) * 2020-10-30 2023-06-23 上海连尚网络科技有限公司 Method and equipment for managing login user and user equipment
CN112987589A (en) * 2021-03-25 2021-06-18 深圳康佳电子科技有限公司 Station electricity utilization control method, server, system and computer readable storage medium

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9866552B2 (en) * 2015-05-08 2018-01-09 International Business Machines Corporation Network authentication of a geo-fenced volume
CN206833742U (en) * 2017-03-09 2018-01-02 江苏海事职业技术学院 A kind of Prelecting system with teaching management
CN107292984A (en) * 2017-05-23 2017-10-24 烽火通信科技股份有限公司 A kind of enterprise based on running fix optimized algorithm registers system and method
CN107911340B (en) * 2017-10-25 2020-08-28 平安普惠企业管理有限公司 Login verification method, device and equipment of application program and storage medium
CN207706215U (en) * 2017-12-19 2018-08-07 南京华讯方舟通信设备有限公司 A kind of fingerprint logs in cloud host equipment and system
CN108449320B (en) * 2018-02-09 2020-08-14 北京百悟科技有限公司 Intelligent automatic safe office system and method
CN109982244A (en) * 2019-04-03 2019-07-05 山东浪潮云信息技术有限公司 Method and system of registering based on wechat position location functionality

Also Published As

Publication number Publication date
CN110351296A (en) 2019-10-18

Similar Documents

Publication Publication Date Title
CN104917749B (en) account registration method and device
CN105227321B (en) Information processing method, server and client
CN104092542B (en) A kind of account login method, Apparatus and system
CN109784031B (en) Account identity verification processing method and device
CN105337997B (en) Login method of application client and related equipment
CN109039987A (en) A kind of user account login method, device, electronic equipment and storage medium
CN106790267A (en) A kind of method and apparatus of access server operating system
CN110336870B (en) Method, device and system for establishing remote office operation and maintenance channel and storage medium
CN111092899A (en) Information acquisition method, device, equipment and medium
CN110351296B (en) Application login method and device and related equipment thereof
CN104702760A (en) Communication number updating method and device
CN109379388B (en) Identity recognition method, terminal and wearable device
CN105577619B (en) Client login method, client and system
CN110730446A (en) Login method, terminal and computer storage medium
CN109672695A (en) A kind of double factor identity identifying method and device
CN107786486B (en) Method and device for activating operating system
CN109992940B (en) Identity verification method, device and system and identity verification server
CN103036852A (en) Method and device for achieving network login
CN104009850B (en) A kind of method for authenticating user identity and system
KR20210011577A (en) Apparatus and Method for Personal authentication using Sim Toolkit and Applet
CN105471920A (en) Identifying code processing method and device
CN107305608A (en) The management method and device of terminal device
KR101879843B1 (en) Authentication mehtod and system using ip address and short message service
CN110351719B (en) Wireless network management method, system, electronic equipment and storage medium
CN108600280B (en) Network connection method, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant