CN110830479A - Multi-card-based one-key login method, device, equipment and storage medium - Google Patents
Multi-card-based one-key login method, device, equipment and storage medium Download PDFInfo
- Publication number
- CN110830479A CN110830479A CN201911105549.6A CN201911105549A CN110830479A CN 110830479 A CN110830479 A CN 110830479A CN 201911105549 A CN201911105549 A CN 201911105549A CN 110830479 A CN110830479 A CN 110830479A
- Authority
- CN
- China
- Prior art keywords
- sim card
- login
- terminal
- target
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
- H04W88/06—Terminal devices adapted for operation in multiple networks or having at least two operational modes, e.g. multi-mode terminals
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Telephone Function (AREA)
- Telephonic Communication Services (AREA)
Abstract
The embodiment of the invention discloses a one-key login method, a one-key login device, one-key login equipment and a storage medium based on multiple cards. The method comprises the following steps: responding to a one-key login request sent by a user, and providing SIM card selection information corresponding to a plurality of SIM cards configured by a terminal for the user; acquiring a target SIM card identifier corresponding to the target SIM card selected by the user; sending the target SIM card identifier to a server for login verification; and receiving login confirmation response information returned by the server after the login verification is successful. According to the technical scheme of the embodiment of the invention, one-key login can be realized without acquiring the mobile phone number of the current traffic card, so that the selection flexibility of the mobile phone card for login is improved.
Description
Technical Field
The embodiment of the invention relates to the technical field of communication, in particular to a one-key login method, a one-key login device, one-key login equipment and a storage medium based on multiple cards.
Background
With the development of internet technology, the issue of security authentication of users in various applications has become a focus of attention. At present, a user mainly logs in an application in an authentication mode of an account and a password; however, this authentication method is complicated and the user has a complicated operation when logging in, and the one-touch login authentication method is widely used because of its simple operation.
In the prior art, the one-key login of the local number can only acquire and verify the local number through an operator based on a mobile phone card flow channel of a user, but the method enables the user to log in only by using the current flow card and cannot acquire the mobile phone number of a non-current flow card, so that the user cannot flexibly select the mobile phone card for logging in.
Disclosure of Invention
Embodiments of the present invention provide a one-key login method, apparatus, device and storage medium based on multiple cards, so as to implement one-key login without acquiring a mobile phone number of a current traffic card, and improve flexibility of selecting a mobile phone card for login.
In a first aspect, an embodiment of the present invention provides a one-key login method based on multiple cards, including:
responding to a one-key login request sent by a user, and providing SIM card selection information corresponding to a plurality of Subscriber Identity Module (SIM) cards configured by a terminal for the user;
acquiring a target SIM card identifier corresponding to a target SIM card selected by a user;
sending the target SIM card identifier to a server for login verification;
and receiving login confirmation response information returned by the server after the login verification is successful.
Optionally, before providing, to the user, SIM card selection information corresponding to a plurality of SIM cards configured by the terminal in response to a one-key login request sent by the user, the method further includes:
when a software to be logged in starting notice sent by a server is received, acquiring the chip type of a terminal;
acquiring an Application Programming Interface (API) matched with the chip type;
acquiring an instance of the API according to the reflection mechanism, calling a target method in the API, and determining the number of SIM cards included in the terminal;
if the number of the SIM cards is more than 1, calling a preset SIM card identification acquisition code to acquire all SIM card identifications included by the terminal;
and storing all the SIM card identifications locally, and sending the SIM card identifications to a server so that the server can perform login verification on the terminal according to all the SIM card identifications.
Optionally, before obtaining the target SIM card identifier corresponding to the target SIM card selected by the user, the method further includes:
encrypting the target SIM card identification by using a Hash algorithm;
sending the target SIM card identifier to a server for login verification, wherein the login verification comprises the following steps:
and sending the encrypted target SIM card identifier to a server for login verification.
In a second aspect, an embodiment of the present invention further provides a one-key login method based on multiple cards, including:
when detecting that the software to be logged in is started, sending a software to be logged in starting notice to the terminal;
receiving and storing all SIM card identifications included by the terminal returned by the terminal aiming at the software starting notice to be logged in;
receiving a login verification request which is sent by a terminal and carries a target SIM card identifier; the target SIM card identification corresponds to a target SIM card selected by a user;
and when the target SIM card identification belongs to all the SIM card identifications included by the terminal, sending the login confirmation response information to the terminal.
Optionally, after receiving the login authentication request carrying the target SIM card identifier sent by the terminal, the method further includes:
decrypting the target SIM card identification in the login authentication request by using a Hash algorithm;
when the target SIM card identification belongs to all SIM card identifications included by the terminal, sending login confirmation response information to the terminal, wherein the login confirmation response information comprises:
and when the decrypted target SIM card identification belongs to all the SIM card identifications included by the terminal, sending login confirmation response information to the terminal.
In a third aspect, an embodiment of the present invention further provides a multi-card-based one-key login apparatus, applied to a terminal, including:
the selection information providing module is used for responding to a one-key login request sent by a user and providing SIM card selection information corresponding to a plurality of SIM cards configured by the terminal for the user;
the card identification acquisition module is used for acquiring a target SIM card identification corresponding to a target SIM card selected by a user;
the login verification module is used for sending the target SIM card identifier to the server for login verification;
and the response information receiving module is used for receiving the login confirmation response information returned by the server after the login verification is successful.
Optionally, the method further includes:
the information acquisition module is used for acquiring the chip type of the terminal when receiving a software start notification to be logged sent by a server before responding to a one-key login request sent by a user and providing SIM card selection information corresponding to a plurality of SIM cards configured by the terminal for the user;
acquiring an API matched with the type of the chip;
acquiring an instance of the API according to the reflection mechanism, calling a target method in the API, and determining the number of SIM cards included in the terminal;
if the number of the SIM cards is more than 1, calling a preset SIM card identification acquisition code to acquire all SIM card identifications included by the terminal;
and storing all SIM card identifications locally, and sending the SIM card identifications to a server so that the server can perform login verification on the terminal according to all SIM card identifications.
In a fourth aspect, an embodiment of the present invention further provides a multi-card-based one-key login apparatus, applied to a server, including:
the starting notification sending module is used for sending a software starting notification to be logged to the terminal when detecting that the software to be logged is started;
the card identifier receiving module is used for receiving and storing all SIM card identifiers included by the terminal returned by the terminal aiming at the software starting notice to be logged;
the verification request receiving module is used for receiving a login verification request which is sent by the terminal and carries a target SIM card identifier; the target SIM card identification corresponds to a target SIM card selected by a user;
and the response module is used for sending the login confirmation response information to the terminal when the target SIM card identification belongs to all the SIM card identifications included by the terminal.
In a fifth aspect, an embodiment of the present invention further provides an apparatus, where the apparatus includes:
one or more processors;
a storage device for storing one or more programs,
when the one or more programs are executed by the one or more processors, the one or more processors are caused to implement a multi-card based one-touch login method as provided by any embodiment of the invention.
In a sixth aspect, the embodiments of the present invention further provide a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the multi-card-based one-key login method provided in any embodiment of the present invention.
According to the technical scheme of the embodiment of the invention, SIM card selection information corresponding to a plurality of SIM cards of the customer identification modules configured by the terminal is provided for the user by responding to a one-key login request sent by the user; acquiring a target SIM card identifier corresponding to a target SIM card selected by a user; sending the target SIM card identifier to a server for login verification; the method and the device for confirming the login response information solve the problems that in the prior art, the current flow card can only be used for login and the mobile phone card for login cannot be flexibly selected, realize one-key login without acquiring the mobile phone number of the current flow card, and improve the selection flexibility of the mobile phone card for login.
Drawings
FIG. 1 is a flowchart of a method for multi-card-based one-key login according to a first embodiment of the present invention;
FIG. 2 is a flowchart of a multi-card-based one-key login method according to a second embodiment of the present invention;
fig. 3 is a schematic structural diagram of a multi-card-based one-key login device according to a third embodiment of the present invention;
fig. 4 is a schematic structural diagram of a multi-card-based one-key login device according to a fourth embodiment of the present invention;
fig. 5 is a schematic structural diagram of an apparatus in the fifth embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the invention and are not limiting of the invention. It should be further noted that, for the convenience of description, only some of the structures related to the present invention are shown in the drawings, not all of the structures.
Example one
Fig. 1 is a flowchart of a one-key login method based on multiple cards according to a first embodiment of the present invention, which is applicable to a case where a user can login by one key without obtaining a mobile phone number, and the method can be executed by a one-key login device based on multiple cards, which can be implemented by hardware and/or software, and can be generally integrated into a device providing a one-key login service, such as a terminal. As shown in fig. 1, the method includes:
In this embodiment, the one-key login request may be generated in response to a click operation of a one-key login button by a user, and when the one-key login request of the user is received, SIM card selection information corresponding to a plurality of SIM cards configured by the terminal is provided to the user to prompt the user to select one SIM card for login, for example, a SIM card selection list is displayed on a current page, and the user may select to use the locally activated SIM card 1, SIM card 2, or other SIM cards for login on the list. The SIM card is also called a subscriber identity card, stores contents such as information of a digital mobile phone subscriber, an encrypted key, and a phone book of the subscriber on a corresponding computer chip, and is used by a Global System for mobile communications (GSM) network to authenticate the subscriber identity and encrypt voice information of the subscriber during a call.
In this embodiment, in order to enable a user to arbitrarily select an SIM card for login according to his own will, instead of being limited to login only using a fixed SIM card, the user decides to use an identifier of the SIM card for login verification, thereby avoiding login by using a mobile phone number with one key.
Optionally, before providing, to the user, SIM card selection information corresponding to a plurality of SIM cards configured by the terminal in response to a one-key login request sent by the user, the method may further include: when a software to be logged in starting notice sent by a server is received, acquiring the chip type of a terminal; acquiring an API matched with the type of the chip; acquiring an instance of the API according to the reflection mechanism, calling a target method in the API, and determining the number of SIM cards included in the terminal; if the number of the SIM cards is more than 1, calling a preset SIM card identification acquisition code to acquire all SIM card identifications included by the terminal; and storing all the SIM card identifications locally, and sending the SIM card identifications to a server so that the server can perform login verification on the terminal according to all the SIM card identifications.
In this embodiment, before the user performs one-key login, the SIM card identifiers of the SIM cards configured by the terminal are obtained in advance and stored, so that after the user selects a target SIM for login, the target SIM card identifier can be directly obtained.
Optionally, when the reflection mechanism is used to obtain the SIM card identifier, it is considered that the dual-card or multi-card function is ordered by a manufacturer in conjunction with a chip developer, so that if the chip developers are different and the manufacturers are different, the reflected class and function names are different when obtaining the SIM card identifier. Therefore, when the software to be logged in is known to be started, the chip type of the terminal is obtained so as to further obtain the matched system level API according to the chip type, then the instance of the API is obtained according to the reflection mechanism, and the target method in the API is called to determine the number of SIM cards included in the terminal.
For example, if a millet terminal uses a high-traffic chip, the target method for determining the number of SIM cards included in the terminal is telephonymanager.getsubscriberid (), and if the terminal uses a Huachen chip, the target method for determining the number of SIM cards included in the terminal is msimtterphonymanager.getsubscriberid (long id), and if the terminal uses a Unicode chip, the target method for determining the number of SIM cards included in the terminal is getSubscriberIdGemini ().
For example, for a co-distribution chip, if at least two SIM cards are configured in a terminal, the following codes may be called to obtain all SIM card identifiers currently configured by the terminal:
Method addMethod=tm.getClass().getDeclaredMethod("getSubscriberIdGemini",resources);
addMethod.setAccessible(true);
imsi=(String)addMethod.invoke(tm,resourcesId)。
and step 120, acquiring a target SIM card identifier corresponding to the target SIM card selected by the user.
In this embodiment, in response to a click operation of a user on SIM card selection information corresponding to a target SIM card, a target SIM card identifier corresponding to the target SIM card is obtained from all locally stored SIM card identifiers currently configured by the terminal, so as to perform login verification according to the target SIM card identifier.
Optionally, before acquiring the target SIM card identifier corresponding to the target SIM card selected by the user, the method may further include: and encrypting the target SIM card identification by using a hash algorithm.
In this embodiment, in order to ensure the integrity of the data and prevent the data from being leaked, before the target SIM card identifier is obtained from all the locally stored SIM card identifiers, the target SIM card identifier is encrypted by using a hash Algorithm, for example, the fifth version of the message digest Algorithm (MD 5). Alternatively, after acquiring all SIM card identifiers currently configured by the terminal, MD5 may be used to encrypt each SIM card identifier.
Illustratively, each SIM card identification may be encrypted according to the code messagedigest.getinstance ("MD5"). digest (content.getbytes ("UTF-8")).
And step 130, sending the target SIM card identification to a server for login verification.
Optionally, sending the target SIM card identifier to the server for login verification may include: and sending the encrypted target SIM card identifier to a server for login verification.
And step 140, receiving login confirmation response information returned by the server after the login verification is successful.
In this embodiment, when the target SIM card identifier received by the server matches the SIM card identifiers of all the SIM cards configured by the terminal and stored in advance by the server, a login confirmation response message returned by the server is received, which indicates that the login is successful by using the target SIM card identifier; and when the target SIM card identification received by the server is not matched with the SIM card identifications of all the SIM cards configured by the terminal and stored in advance by the server, the server receives login failure response information returned by the server, which indicates that the login fails by using the target SIM card identification and needs to log in again.
According to the technical scheme of the embodiment of the invention, SIM card selection information corresponding to a plurality of SIM cards of the customer identification modules configured by the terminal is provided for the user by responding to a one-key login request sent by the user; acquiring a target SIM card identifier corresponding to a target SIM card selected by a user; sending the target SIM card identifier to a server for login verification; the method and the device for confirming the login response information solve the problems that in the prior art, the current flow card can only be used for login and the mobile phone card for login cannot be flexibly selected, realize one-key login without acquiring the mobile phone number of the current flow card, and improve the selection flexibility of the mobile phone card for login.
Example two
Fig. 2 is a flowchart of a one-key-login method based on multiple cards according to a second embodiment of the present invention, which is applicable to a case where a user can login by one key without obtaining a mobile phone number. As shown in fig. 2, the method includes:
In this embodiment, in order to enable the terminal to obtain the SIM card identifier corresponding to the SIM card configured in advance, when detecting that the software to be logged in starts to be started, the server immediately generates a corresponding software to be logged in start notification, and sends the software to be logged in start notification to each terminal that may log in, so that each terminal starts to obtain its own SIM card identifier.
And step 220, receiving and storing all SIM card identifications included by the terminal for the terminal to return the software starting notice to be logged in.
In this embodiment, in order to subsequently determine whether the target SIM card identifier sent by the terminal can pass the login verification, the server needs to receive all the SIM card identifiers sent by the terminal and included by the server, wherein in order to ensure the integrity and uniqueness of the data, the SIM card identifier received by the server is encrypted by the terminal, and therefore, the server needs to correspondingly decrypt the received SIM card identifier and then store the decrypted SIM card identifier in a designated area corresponding to the terminal, so that the SIM card identifier corresponding to the terminal can be quickly found during the verification.
Optionally, after receiving the login authentication request carrying the target SIM card identifier sent by the terminal, the method may further include: and decrypting the target SIM card identification in the login authentication request by using a Hash algorithm.
In this embodiment, after the server receives the login authentication request of the terminal, the server needs to extract the target SIM card identifier for login from the login request, and then perform corresponding decryption operation on the target SIM card identifier in the login authentication request by using a hash algorithm.
And 240, when the target SIM card identification belongs to all the SIM card identifications included by the terminal, sending a login confirmation response message to the terminal.
Optionally, when the target SIM card identifier belongs to all SIM card identifiers included in the terminal, sending a login confirmation response message to the terminal may include: and when the decrypted target SIM card identification belongs to all the SIM card identifications included by the terminal, sending login confirmation response information to the terminal.
In this embodiment, if the decrypted target SIM card identifier matches the SIM card identifiers of all the SIM cards configured by the terminal and stored in advance by the server, that is, the decrypted target SIM card identifier belongs to all the SIM card identifiers included in the terminal, the server returns a login confirmation response message to the terminal, indicating that the login is successful by using the target SIM card identifier; if the decrypted target SIM card identification is not matched with the SIM card identifications of all the SIM cards configured by the terminal and stored in advance by the server, namely the decrypted target SIM card identification does not belong to all the SIM card identifications included by the terminal, the server returns login failure response information to the terminal, which indicates that the login fails by using the target SIM card identification and needs the terminal to resend the login verification request.
According to the technical scheme of the embodiment of the invention, when the software to be logged is detected to be started, the software to be logged is sent to the terminal to start the notification, all SIM card identifications included by the terminal returned by the terminal aiming at the software to be logged to start the notification are received and stored, and the login verification request which is sent by the terminal and carries the target SIM card identification is received; when the target SIM card identification belongs to all SIM card identifications included by the terminal, the login confirmation response information is sent to the terminal, the problems that in the prior art, the current flow card can only be used for login, and the mobile phone card for login cannot be flexibly selected are solved, one-key login can be realized without acquiring the mobile phone number of the current flow card, and the selection flexibility of the mobile phone card for login is improved.
EXAMPLE III
Fig. 3 is a schematic structural diagram of a multi-card-based one-key login apparatus according to a third embodiment of the present invention, which may be implemented by hardware and/or software and may be generally integrated in a device providing one-key login services, such as a terminal. As shown in fig. 3, the multi-card-based one-key entry apparatus includes: a selection information providing module 310, a card identification obtaining module 320, a login verifying module 330, and a response information receiving module 340;
a selection information providing module 310, configured to provide, to a user, SIM card selection information corresponding to a plurality of SIM cards configured by the terminal in response to a one-key login request sent by the user;
a card identifier obtaining module 320, configured to obtain a target SIM card identifier corresponding to a target SIM card selected by a user;
the login verification module 330 is configured to send the target SIM card identifier to the server for login verification;
the response information receiving module 340 is configured to receive login response confirmation information returned by the server after the login authentication is successful.
According to the technical scheme of the embodiment of the invention, SIM card selection information corresponding to a plurality of SIM cards of the customer identification modules configured by the terminal is provided for the user by responding to a one-key login request sent by the user; acquiring a target SIM card identifier corresponding to a target SIM card selected by a user; sending the target SIM card identifier to a server for login verification; the method and the device for confirming the login response information solve the problems that in the prior art, the current flow card can only be used for login and the mobile phone card for login cannot be flexibly selected, realize one-key login without acquiring the mobile phone number of the current flow card, and improve the selection flexibility of the mobile phone card for login.
Optionally, the apparatus further comprises:
the information pre-acquisition module is used for acquiring the chip type of the terminal when receiving a software start notification to be logged sent by a server before responding to a one-key login request sent by a user and providing SIM card selection information corresponding to a plurality of SIM cards configured by the terminal for the user;
acquiring an Application Programming Interface (API) matched with the type of the chip;
acquiring an instance of the API according to the reflection mechanism, calling a target method in the API, and determining the number of SIM cards included in the terminal;
if the number of the SIM cards is more than 1, calling a preset SIM card identification acquisition code to acquire all SIM card identifications included by the terminal;
and storing all the SIM card identifications locally, and sending the SIM card identifications to a server so that the server can perform login verification on the terminal according to all the SIM card identifications.
Optionally, the apparatus further comprises: the encryption module is used for encrypting the target SIM card identification by using a Hash algorithm before acquiring the target SIM card identification corresponding to the target SIM card selected by the user;
the login verification module 330 is specifically configured to: and sending the encrypted target SIM card identifier to a server for login verification.
The one-key login device based on multiple cards can execute the one-key login method based on multiple cards and applicable to the terminal provided by any embodiment of the invention, and has the corresponding functional modules and beneficial effects of executing the one-key login method based on multiple cards.
Example four
Fig. 4 is a schematic structural diagram of a multi-card-based one-key login apparatus in a fourth embodiment of the present invention, which may be implemented by hardware and/or software and may be generally integrated in a device providing one-key login services, such as a server. As shown in fig. 4, the multi-card-based one-key entry apparatus includes: a start notification sending module 410, a card identification receiving module 420, an authentication request receiving module 430, and a response module 440;
a start notification sending module 410, configured to send a start notification of the software to be logged to the terminal when detecting that the software to be logged is started;
the card identifier receiving module 420 is configured to receive and store all SIM card identifiers included in the terminal returned by the terminal for the to-be-logged software start notification;
an authentication request receiving module 430, configured to receive a login authentication request sent by a terminal and carrying a target SIM card identifier; the target SIM card identification corresponds to a target SIM card selected by a user;
and a response module 440, configured to send a login confirmation response message to the terminal when the target SIM card identifier belongs to all SIM card identifiers included in the terminal.
According to the technical scheme of the embodiment of the invention, when the software to be logged is detected to be started, the software to be logged is sent to the terminal to start the notification, all SIM card identifications included by the terminal returned by the terminal aiming at the software to be logged to start the notification are received and stored, and the login verification request which is sent by the terminal and carries the target SIM card identification is received; when the target SIM card identification belongs to all SIM card identifications included by the terminal, the login confirmation response information is sent to the terminal, the problems that in the prior art, the current flow card can only be used for login, and the mobile phone card for login cannot be flexibly selected are solved, one-key login can be realized without acquiring the mobile phone number of the current flow card, and the selection flexibility of the mobile phone card for login is improved.
Optionally, the method further includes: the decryption module is used for decrypting the target SIM card identifier in the login authentication request by using a Hash algorithm after receiving the login authentication request which is sent by the terminal and carries the target SIM card identifier;
the response module 440 is specifically configured to: and when the decrypted target SIM card identification belongs to all the SIM card identifications included by the terminal, sending login confirmation response information to the terminal.
The one-key login device based on multiple cards can execute the one-key login method based on multiple cards and applicable to the server provided by any embodiment of the invention, and has the corresponding functional modules and beneficial effects of executing the one-key login method based on multiple cards.
EXAMPLE five
Fig. 5 is a schematic structural diagram of an apparatus in the fifth embodiment of the present invention. Fig. 5 illustrates a block diagram of an exemplary device 12 suitable for use in implementing embodiments of the present invention. The device 12 shown in fig. 5 is only an example and should not bring any limitations to the functionality and scope of use of the embodiments of the present invention.
As shown in FIG. 5, device 12 is in the form of a general purpose computing device. The components of device 12 may include, but are not limited to: one or more processors or processing units 16, a system memory 28, and a bus 18 that couples various system components including the system memory 28 and the processing unit 16.
The system memory 28 may include computer system readable media in the form of volatile memory, such as Random Access Memory (RAM)30 and/or cache memory 32. Device 12 may further include other removable/non-removable, volatile/nonvolatile computer system storage media. By way of example only, storage system 34 may be used to read from and write to non-removable, nonvolatile magnetic media (not shown in FIG. 5, and commonly referred to as a "hard drive"). Although not shown in FIG. 5, a magnetic disk drive for reading from and writing to a removable, nonvolatile magnetic disk (e.g., a "floppy disk") and an optical disk drive for reading from or writing to a removable, nonvolatile optical disk (e.g., a CD-ROM, DVD-ROM, or other optical media) may be provided. In these cases, each drive may be connected to bus 18 by one or more data media interfaces. Memory 28 may include at least one program product having a set (e.g., at least one) of program modules that are configured to carry out the functions of embodiments of the invention.
A program/utility 40 having a set (at least one) of program modules 42 may be stored, for example, in memory 28, such program modules 42 including, but not limited to, an operating system, one or more application programs, other program modules, and program data, each of which examples or some combination thereof may comprise an implementation of a network environment. Program modules 42 generally carry out the functions and/or methodologies of the described embodiments of the invention.
The processing unit 16 executes various functional applications and data processing by executing programs stored in the system memory 28, for example, implementing one multi-card-based one-key login method or another multi-card-based one-key login method provided by the embodiments of the present invention.
Namely: the one-key login method based on the multi-card is realized, and comprises the following steps:
responding to a one-key login request sent by a user, and providing SIM card selection information corresponding to a plurality of SIM cards of a subscriber identity module configured by a terminal for the user;
acquiring a target SIM card identifier corresponding to a target SIM card selected by a user;
sending the target SIM card identifier to a server for login verification;
and receiving login confirmation response information returned by the server after the login verification is successful.
Or, another one-key login method based on multiple cards is realized, which comprises the following steps:
when detecting that the software to be logged in is started, sending a software to be logged in starting notice to the terminal;
receiving and storing all SIM card identifications included by the terminal returned by the terminal aiming at the software starting notice to be logged in;
receiving a login verification request which is sent by a terminal and carries a target SIM card identifier; the target SIM card identification corresponds to a target SIM card selected by a user;
and when the target SIM card identification belongs to all the SIM card identifications included by the terminal, sending the login confirmation response information to the terminal.
EXAMPLE six
The sixth embodiment of the invention also discloses a computer storage medium, wherein a computer program is stored on the computer storage medium, and when the program is executed by a processor, the one-key login method based on multiple cards is realized, or another one-key login method based on multiple cards is realized.
A one-key login method based on multiple cards comprises the following steps:
responding to a one-key login request sent by a user, and providing SIM card selection information corresponding to a plurality of SIM cards of a subscriber identity module configured by a terminal for the user;
acquiring a target SIM card identifier corresponding to a target SIM card selected by a user;
sending the target SIM card identifier to a server for login verification;
and receiving login confirmation response information returned by the server after the login verification is successful.
Another one-key login method based on multiple cards comprises the following steps:
when detecting that the software to be logged in is started, sending a software to be logged in starting notice to the terminal;
receiving and storing all SIM card identifications included by the terminal returned by the terminal aiming at the software starting notice to be logged in;
receiving a login verification request which is sent by a terminal and carries a target SIM card identifier; the target SIM card identification corresponds to a target SIM card selected by a user;
and when the target SIM card identification belongs to all the SIM card identifications included by the terminal, sending the login confirmation response information to the terminal.
Computer storage media for embodiments of the invention may employ any combination of one or more computer-readable media. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
It is to be noted that the foregoing is only illustrative of the preferred embodiments of the present invention and the technical principles employed. It will be understood by those skilled in the art that the present invention is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the invention. Therefore, although the present invention has been described in greater detail by the above embodiments, the present invention is not limited to the above embodiments, and may include other equivalent embodiments without departing from the spirit of the present invention, and the scope of the present invention is determined by the scope of the appended claims.
Claims (10)
1. A one-key login method based on multiple cards is characterized by comprising the following steps:
responding to a one-key login request sent by a user, and providing SIM card selection information corresponding to a plurality of SIM cards configured by a terminal for the user;
acquiring a target SIM card identifier corresponding to the target SIM card selected by the user;
sending the target SIM card identifier to a server for login verification;
and receiving login confirmation response information returned by the server after the login verification is successful.
2. The method according to claim 1, before providing SIM card selection information corresponding to a plurality of SIM cards configured by a terminal to a user in response to a one-touch login request sent by the user, further comprising:
when a software to be logged in starting notice sent by the server is received, acquiring the chip type of the terminal;
acquiring an Application Programming Interface (API) matched with the chip type;
acquiring an instance of the API according to a reflection mechanism, calling a target method in the API, and determining the number of SIM cards included in the terminal;
if the number of the SIM cards is larger than 1, calling a preset SIM card identification acquisition code to acquire all SIM card identifications included by the terminal;
and storing all SIM card identifications locally, and sending the SIM card identifications to the server so that the server performs login verification on the terminal according to all SIM card identifications.
3. The method of claim 1, further comprising, before obtaining a target SIM card identity corresponding to the target SIM card selected by the user:
encrypting the target SIM card identification by using a Hash algorithm;
the step of sending the target SIM card identifier to a server for login verification comprises the following steps:
and sending the encrypted target SIM card identifier to the server for login verification.
4. A one-key login method based on multiple cards is characterized by comprising the following steps:
when detecting that the software to be logged in is started, sending a software to be logged in starting notice to the terminal;
receiving and storing all SIM card identifications included by the terminal returned by the terminal aiming at the software starting notice to be logged in;
receiving a login verification request which is sent by the terminal and carries a target SIM card identifier; the target SIM card identification corresponds to a target SIM card selected by a user;
and when the target SIM card identification belongs to all the SIM card identifications included by the terminal, sending login confirmation response information to the terminal.
5. The method according to claim 4, after receiving a login authentication request carrying a target SIM card identifier sent by the terminal, further comprising:
decrypting the target SIM card identification in the login authentication request by using a Hash algorithm;
when the target SIM card identification belongs to all the SIM card identifications included in the terminal, sending login confirmation response information to the terminal, wherein the login confirmation response information comprises:
and when the decrypted target SIM card identification belongs to all the SIM card identifications included by the terminal, sending login confirmation response information to the terminal.
6. A one-key login device based on multiple cards is characterized by being applied to a terminal and comprising:
the selection information providing module is used for responding to a one-key login request sent by a user and providing SIM card selection information corresponding to a plurality of SIM cards configured by the terminal for the user;
a card identifier obtaining module, configured to obtain a target SIM card identifier corresponding to the target SIM card selected by the user;
the login verification module is used for sending the target SIM card identifier to a server for login verification;
and the response information receiving module is used for receiving the login confirmation response information returned by the server after the login verification is successful.
7. The apparatus of claim 6, further comprising:
the information acquisition module is used for acquiring the chip type of the terminal when receiving a software start notification to be logged sent by a server before responding to a one-key login request sent by a user and providing SIM card selection information corresponding to a plurality of SIM cards configured by the terminal for the user;
acquiring an API matched with the chip type;
acquiring an instance of the API according to a reflection mechanism, calling a target method in the API, and determining the number of SIM cards included in the terminal;
if the number of the SIM cards is larger than 1, calling a preset SIM card identification acquisition code to acquire all SIM card identifications included by the terminal;
and storing all SIM card identifications locally, and sending the SIM card identifications to the server so that the server performs login verification on the terminal according to all SIM card identifications.
8. A one-key login device based on multiple cards is applied to a server and comprises the following components:
the starting notification sending module is used for sending a software starting notification to be logged to the terminal when detecting that the software to be logged is started;
the card identifier receiving module is used for receiving and storing all SIM card identifiers included by the terminal, which are returned by the terminal aiming at the software starting notice to be logged;
the verification request receiving module is used for receiving a login verification request which is sent by the terminal and carries a target SIM card identifier; the target SIM card identification corresponds to a target SIM card selected by a user;
and the response module is used for sending login confirmation response information to the terminal when the target SIM card identification belongs to all the SIM card identifications included by the terminal.
9. An apparatus, characterized in that the apparatus comprises:
one or more processors;
a storage device for storing one or more programs,
when executed by the one or more processors, cause the one or more processors to implement the multi-card based one-touch login method of any one of claims 1-3, or the multi-card based one-touch login method of any one of claims 4-5.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, implements the multi-card based one-touch login method according to any one of claims 1 to 3, or implements the multi-card based one-touch login method according to any one of claims 4 to 5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911105549.6A CN110830479B (en) | 2019-11-13 | 2019-11-13 | Multi-card-based one-key login method, device, equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911105549.6A CN110830479B (en) | 2019-11-13 | 2019-11-13 | Multi-card-based one-key login method, device, equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110830479A true CN110830479A (en) | 2020-02-21 |
CN110830479B CN110830479B (en) | 2022-11-18 |
Family
ID=69554700
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911105549.6A Active CN110830479B (en) | 2019-11-13 | 2019-11-13 | Multi-card-based one-key login method, device, equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110830479B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114710339A (en) * | 2022-03-25 | 2022-07-05 | 云南腾云信息产业有限公司 | Login method and device of application program, mobile terminal and readable storage medium |
WO2022199673A1 (en) * | 2021-03-25 | 2022-09-29 | 华为技术有限公司 | Login authentication method and electronic device |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103595867A (en) * | 2013-11-14 | 2014-02-19 | 北京奇虎科技有限公司 | Application program implementation method and device based on multi-card recognition |
US20140310793A1 (en) * | 2011-12-28 | 2014-10-16 | Tencent Technology (Shenzhen) Company Limited | Application login method and apparatus, and mobile terminal therefor |
CN106658463A (en) * | 2016-09-30 | 2017-05-10 | 宇龙计算机通信科技(深圳)有限公司 | Operating system login method, device and terminal |
CN107508784A (en) * | 2016-06-14 | 2017-12-22 | 中国移动通信有限公司研究院 | One kind applies login method and terminal device |
CN107623690A (en) * | 2017-09-27 | 2018-01-23 | 上海掌门科技有限公司 | Login method, equipment and storage medium |
CN107809437A (en) * | 2017-11-15 | 2018-03-16 | 广东欧珀移动通信有限公司 | A kind of converged communication login method, device and computer-readable recording medium |
CN107948204A (en) * | 2017-12-29 | 2018-04-20 | 咪咕文化科技有限公司 | One key login method and system, relevant device and computer-readable recording medium |
CN108616869A (en) * | 2018-03-22 | 2018-10-02 | 深圳市优克联新技术有限公司 | Multi-card multi-standby system, method, apparatus, computer installation and computer readable storage medium |
CN109587162A (en) * | 2018-12-26 | 2019-04-05 | 闻泰通讯股份有限公司 | Login validation method, device, terminal, cipher server and storage medium |
-
2019
- 2019-11-13 CN CN201911105549.6A patent/CN110830479B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140310793A1 (en) * | 2011-12-28 | 2014-10-16 | Tencent Technology (Shenzhen) Company Limited | Application login method and apparatus, and mobile terminal therefor |
CN103595867A (en) * | 2013-11-14 | 2014-02-19 | 北京奇虎科技有限公司 | Application program implementation method and device based on multi-card recognition |
CN107508784A (en) * | 2016-06-14 | 2017-12-22 | 中国移动通信有限公司研究院 | One kind applies login method and terminal device |
CN106658463A (en) * | 2016-09-30 | 2017-05-10 | 宇龙计算机通信科技(深圳)有限公司 | Operating system login method, device and terminal |
CN107623690A (en) * | 2017-09-27 | 2018-01-23 | 上海掌门科技有限公司 | Login method, equipment and storage medium |
CN107809437A (en) * | 2017-11-15 | 2018-03-16 | 广东欧珀移动通信有限公司 | A kind of converged communication login method, device and computer-readable recording medium |
CN107948204A (en) * | 2017-12-29 | 2018-04-20 | 咪咕文化科技有限公司 | One key login method and system, relevant device and computer-readable recording medium |
CN108616869A (en) * | 2018-03-22 | 2018-10-02 | 深圳市优克联新技术有限公司 | Multi-card multi-standby system, method, apparatus, computer installation and computer readable storage medium |
CN109587162A (en) * | 2018-12-26 | 2019-04-05 | 闻泰通讯股份有限公司 | Login validation method, device, terminal, cipher server and storage medium |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2022199673A1 (en) * | 2021-03-25 | 2022-09-29 | 华为技术有限公司 | Login authentication method and electronic device |
CN114710339A (en) * | 2022-03-25 | 2022-07-05 | 云南腾云信息产业有限公司 | Login method and device of application program, mobile terminal and readable storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN110830479B (en) | 2022-11-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR102307665B1 (en) | identity authentication | |
US20210399895A1 (en) | Systems and Methods for Single-Step Out-of-Band Authentication | |
US20090298468A1 (en) | System and method for deleting data in a communication device | |
US9544747B2 (en) | Transmitting management commands to a client device | |
CN112039826B (en) | Login method and device applied to applet end, electronic equipment and readable medium | |
US11824854B2 (en) | Communication system and computer readable storage medium | |
EP2893681A1 (en) | Securely handling server certificate errors in synchronization communication | |
CN111698312B (en) | Service processing method, device, equipment and storage medium based on open platform | |
CN111918274B (en) | Code number configuration and management method and device, electronic equipment and readable storage medium | |
CN110719590B (en) | One-key login method, device, equipment and storage medium based on mobile phone number | |
CN113225351B (en) | Request processing method and device, storage medium and electronic equipment | |
JP2024079694A (en) | System and method for pre-authentication of customer support calls - Patents.com | |
CN113553572A (en) | Resource information acquisition method and device, computer equipment and storage medium | |
CN110830479B (en) | Multi-card-based one-key login method, device, equipment and storage medium | |
US20110154436A1 (en) | Provider Management Methods and Systems for a Portable Device Running Android Platform | |
US20170230834A1 (en) | Information Sending Method and Apparatus, Terminal Device, and System | |
CN103036852A (en) | Method and device for achieving network login | |
KR20190111006A (en) | Authentication server, authentication system and method | |
CN114125027A (en) | Communication establishing method and device, electronic equipment and storage medium | |
CN110545542A (en) | Main control key downloading method and device based on asymmetric encryption algorithm and computer equipment | |
US20230284015A1 (en) | Method and system for generating a secure one-time passcode using strong authentication | |
US9854444B2 (en) | Apparatus and methods for preventing information disclosure | |
US11805090B1 (en) | Method, apparatus, and system for securing electronic messages | |
US9143510B2 (en) | Secure identification of intranet network | |
WO2011030352A2 (en) | System and method for mobile phone resident digital signing and encryption/decryption of sms |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |