CN110830479B - Multi-card-based one-key login method, device, equipment and storage medium - Google Patents

Multi-card-based one-key login method, device, equipment and storage medium Download PDF

Info

Publication number
CN110830479B
CN110830479B CN201911105549.6A CN201911105549A CN110830479B CN 110830479 B CN110830479 B CN 110830479B CN 201911105549 A CN201911105549 A CN 201911105549A CN 110830479 B CN110830479 B CN 110830479B
Authority
CN
China
Prior art keywords
sim card
login
terminal
target
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911105549.6A
Other languages
Chinese (zh)
Other versions
CN110830479A (en
Inventor
王梦华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Dajiaying Information Technology Co Ltd
Original Assignee
Suzhou Dajiaying Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Dajiaying Information Technology Co Ltd filed Critical Suzhou Dajiaying Information Technology Co Ltd
Priority to CN201911105549.6A priority Critical patent/CN110830479B/en
Publication of CN110830479A publication Critical patent/CN110830479A/en
Application granted granted Critical
Publication of CN110830479B publication Critical patent/CN110830479B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices
    • H04W88/06Terminal devices adapted for operation in multiple networks or having at least two operational modes, e.g. multi-mode terminals

Abstract

The embodiment of the invention discloses a one-key login method, a one-key login device, one-key login equipment and a storage medium based on multiple cards. The method comprises the following steps: responding to a one-key login request sent by a user, and providing SIM card selection information corresponding to a plurality of SIM cards configured by a terminal for the user; acquiring a target SIM card identifier corresponding to the target SIM card selected by the user; sending the target SIM card identifier to a server for login verification; and receiving login confirmation response information returned by the server after the login verification is successful. According to the technical scheme of the embodiment of the invention, one-key login can be realized without acquiring the mobile phone number of the current traffic card, so that the selection flexibility of the mobile phone card for login is improved.

Description

Multi-card-based one-key login method, device, equipment and storage medium
Technical Field
The embodiment of the invention relates to the technical field of communication, in particular to a one-key login method, a one-key login device, one-key login equipment and a storage medium based on multiple cards.
Background
With the development of internet technology, the issue of security authentication of users in various applications has become a focus of attention. At present, a user logs in an application mainly through an account and password authentication mode; however, this authentication method is complicated and the user has a complicated operation when logging in, and the one-touch login authentication method is widely used because of its simple operation.
In the prior art, the one-key login of the phone number can only acquire and verify the phone number through an operator based on a mobile phone card flow channel of a user, but the method enables the user to log in only by using the current flow card and cannot acquire the mobile phone number of a non-current flow card, so that the user cannot flexibly select the mobile phone card for logging in.
Disclosure of Invention
The embodiment of the invention provides a one-key login method, a one-key login device, one-key login equipment and a storage medium based on multiple cards, so that one-key login can be realized without acquiring the mobile phone number of the current traffic card, and the selection flexibility of a mobile phone card for login is improved.
In a first aspect, an embodiment of the present invention provides a multi-card-based one-key login method, including:
responding to a one-key login request sent by a user, and providing SIM card selection information corresponding to a plurality of Subscriber Identity Module (SIM) cards configured by a terminal for the user;
acquiring a target SIM card identifier corresponding to a target SIM card selected by a user;
sending the target SIM card identifier to a server for login verification;
and receiving login confirmation response information returned by the server after the login verification is successful.
Optionally, before providing, to the user, SIM card selection information corresponding to a plurality of SIM cards configured by the terminal in response to a one-key login request sent by the user, the method further includes:
when a software to be logged in starting notice sent by a server is received, acquiring the chip type of a terminal;
acquiring an Application Programming Interface (API) matched with the chip type;
acquiring an instance of the API according to the reflection mechanism, calling a target method in the API, and determining the number of SIM cards included in the terminal;
if the number of the SIM cards is larger than 1, calling a preset SIM card identification acquisition code to acquire all SIM card identifications included by the terminal;
and storing all the SIM card identifications locally, and sending the SIM card identifications to a server so that the server can perform login verification on the terminal according to all the SIM card identifications.
Optionally, before obtaining the target SIM card identifier corresponding to the target SIM card selected by the user, the method further includes:
encrypting the target SIM card identification by using a Hash algorithm;
sending the target SIM card identifier to a server for login verification, wherein the login verification comprises the following steps:
and sending the encrypted target SIM card identifier to a server for login verification.
In a second aspect, an embodiment of the present invention further provides a one-key login method based on multiple cards, including:
when detecting that the software to be logged in is started, sending a software to be logged in starting notice to the terminal;
receiving and storing all SIM card identifications included by the terminal returned by the terminal aiming at the software starting notice to be logged in;
receiving a login verification request which is sent by a terminal and carries a target SIM card identifier; the target SIM card identification corresponds to a target SIM card selected by a user;
and when the target SIM card identification belongs to all the SIM card identifications included by the terminal, sending login confirmation response information to the terminal.
Optionally, after receiving the login authentication request carrying the target SIM card identifier sent by the terminal, the method further includes:
decrypting the target SIM card identification in the login authentication request by using a Hash algorithm;
when the target SIM card identification belongs to all SIM card identifications included by the terminal, sending login confirmation response information to the terminal, wherein the login confirmation response information comprises the following steps:
and when the decrypted target SIM card identification belongs to all the SIM card identifications included by the terminal, sending login confirmation response information to the terminal.
In a third aspect, an embodiment of the present invention further provides a multi-card-based one-key login apparatus, applied to a terminal, including:
the selection information providing module is used for responding to a one-key login request sent by a user and providing SIM card selection information corresponding to a plurality of SIM cards configured by the terminal for the user;
the card identification acquisition module is used for acquiring a target SIM card identification corresponding to a target SIM card selected by a user;
the login verification module is used for sending the target SIM card identifier to the server for login verification;
and the response information receiving module is used for receiving the login confirmation response information returned by the server after the login verification is successful.
Optionally, the method further includes:
the information acquisition module is used for acquiring the chip type of the terminal when receiving a software start notification to be logged, which is sent by a server, before responding to a one-key login request sent by a user and providing SIM card selection information corresponding to a plurality of SIM cards configured by the terminal for the user;
acquiring an API matched with the type of the chip;
acquiring an instance of the API according to the reflection mechanism, calling a target method in the API, and determining the number of SIM cards included in the terminal;
if the number of the SIM cards is more than 1, calling a preset SIM card identification acquisition code to acquire all SIM card identifications included by the terminal;
and storing all SIM card identifications locally, and sending the SIM card identifications to a server so that the server can perform login verification on the terminal according to all SIM card identifications.
In a fourth aspect, an embodiment of the present invention further provides a multi-card-based one-key login apparatus, applied to a server, including:
the starting notification sending module is used for sending a software starting notification to be logged to the terminal when detecting that the software to be logged is started;
the card identifier receiving module is used for receiving and storing all SIM card identifiers included by the terminal returned by the terminal aiming at the software starting notice to be logged;
the verification request receiving module is used for receiving a login verification request which is sent by the terminal and carries a target SIM card identifier; the target SIM card identification corresponds to a target SIM card selected by a user;
and the response module is used for sending login confirmation response information to the terminal when the target SIM card identifier belongs to all the SIM card identifiers included by the terminal.
In a fifth aspect, an embodiment of the present invention further provides an apparatus, where the apparatus includes:
one or more processors;
a storage device for storing one or more programs,
when executed by one or more processors, cause the one or more processors to implement a multi-card based one-touch login method as provided by any embodiment of the invention.
In a sixth aspect, an embodiment of the present invention further provides a computer-readable storage medium, on which a computer program is stored, where the program, when executed by a processor, implements the multi-card-based one-key login method provided in any embodiment of the present invention.
According to the technical scheme of the embodiment of the invention, SIM card selection information corresponding to a plurality of SIM cards of the customer identification modules configured by the terminal is provided for the user by responding to a one-key login request sent by the user; acquiring a target SIM card identifier corresponding to a target SIM card selected by a user; sending the target SIM card identifier to a server for login verification; the method and the device for confirming the login response information solve the problems that in the prior art, the current flow card can only be used for login and the mobile phone card for login cannot be flexibly selected, realize one-key login without acquiring the mobile phone number of the current flow card, and improve the selection flexibility of the mobile phone card for login.
Drawings
FIG. 1 is a flowchart of a method for multi-card-based one-key login according to a first embodiment of the present invention;
FIG. 2 is a flowchart of a multi-card-based one-key login method according to a second embodiment of the present invention;
fig. 3 is a schematic structural diagram of a multi-card-based one-key login device according to a third embodiment of the present invention;
fig. 4 is a schematic structural diagram of a multi-card-based one-key login device in a fourth embodiment of the present invention;
fig. 5 is a schematic structural diagram of an apparatus in a fifth embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the invention and are not to be construed as limiting the invention. It should be further noted that, for the convenience of description, only some structures related to the present invention are shown in the drawings, not all of them.
Example one
Fig. 1 is a flowchart of a one-key login method based on multiple cards according to a first embodiment of the present invention, which is applicable to a case where a user can login by one key without obtaining a mobile phone number, and the method can be executed by a one-key login device based on multiple cards, which can be implemented by hardware and/or software, and can be generally integrated into a device providing a one-key login service, such as a terminal. As shown in fig. 1, the method includes:
step 110, responding to a one-key login request sent by a user, and providing SIM card selection information corresponding to a plurality of SIM cards configured by the terminal for the user.
In this embodiment, the one-key login request may be generated in response to a click operation of a one-key login button by a user, and when the one-key login request of the user is received, SIM card selection information corresponding to a plurality of SIM cards configured by the terminal is provided to the user to prompt the user to select one SIM card for login, for example, a SIM card selection list is displayed on a current page, and the user may select to use a locally activated SIM card 1, a SIM card 2, or another SIM card for login on the list. The SIM card is also called a subscriber identity card, stores contents such as information of a digital Mobile phone subscriber, an encrypted key, and a phone book of the subscriber on a corresponding computer chip, and is used by a Global System for Mobile Communications (GSM) network to identify the subscriber identity and encrypt voice information during a call.
In this embodiment, in order to enable a user to arbitrarily select an SIM card for login according to his own will, instead of being limited to login only using a fixed SIM card, the user decides to use an identifier of the SIM card for login verification, thereby avoiding login by using a mobile phone number with one key.
Optionally, before providing, to the user, SIM card selection information corresponding to multiple SIM cards configured by the terminal in response to the one-key login request sent by the user, the method may further include: when a software starting notice to be logged in sent by a server is received, acquiring the chip type of a terminal; acquiring an API matched with the type of the chip; acquiring an instance of the API according to the reflection mechanism, calling a target method in the API, and determining the number of SIM cards included in the terminal; if the number of the SIM cards is more than 1, calling a preset SIM card identification acquisition code to acquire all SIM card identifications included by the terminal; and storing all the SIM card identifications locally, and sending the SIM card identifications to a server so that the server can perform login verification on the terminal according to all the SIM card identifications.
In this embodiment, before the user performs one-key login, the SIM card identifiers of the SIM cards configured by the terminal are obtained in advance, and stored, so that after the user selects a target SIM for login, the target SIM card identifier can be directly obtained.
Optionally, when the reflection mechanism is used to obtain the SIM card identifier, it is considered that the dual-card or multi-card function is ordered by a manufacturer in conjunction with a chip developer, so that if the chip developers are different and the manufacturers are different, the reflected class and function names are different when obtaining the SIM card identifier. Therefore, when the software to be logged in is known to be started, the chip type of the terminal is obtained so as to further obtain the matched system level API according to the chip type, then the instance of the API is obtained according to the reflection mechanism, and the target method in the API is called to determine the number of SIM cards included in the terminal.
For example, if a millet terminal uses a high-traffic chip, the target method for determining the number of SIM cards included in the terminal is telephonymanager.getsubscriberid (), and if the terminal uses a Huachen chip, the target method for determining the number of SIM cards included in the terminal is msimtterphonymanager.getsubscriberid (long id), and if the terminal uses a Unicode chip, the target method for determining the number of SIM cards included in the terminal is getSubscriberIdGemini ().
For example, for a co-distribution chip, if at least two SIM cards are configured in a terminal, the following codes may be called to obtain all SIM card identifiers currently configured by the terminal:
Method addMethod=tm.getClass().getDeclaredMethod("getSubscriberIdGemini",resources);
addMethod.setAccessible(true);
imsi=(String)addMethod.invoke(tm,resourcesId)。
and step 120, acquiring a target SIM card identifier corresponding to the target SIM card selected by the user.
In this embodiment, in response to a click operation of a user on SIM card selection information corresponding to a target SIM card, a target SIM card identifier corresponding to the target SIM card is obtained from all locally stored SIM card identifiers currently configured by the terminal, so as to perform login verification according to the target SIM card identifier.
Optionally, before acquiring the target SIM card identifier corresponding to the target SIM card selected by the user, the method may further include: and encrypting the target SIM card identification by using a hash algorithm.
In this embodiment, in order to ensure the integrity of the data and prevent the data from being leaked, before the target SIM card identifier is obtained from all the locally stored SIM card identifiers, the target SIM card identifier is encrypted by using a hash Algorithm, for example, the fifth version of the Message Digest Algorithm (md5). Or, after acquiring all the SIM card identifiers currently configured by the terminal, the MD5 may be used to encrypt each SIM card identifier.
Illustratively, each SIM card identification may be encrypted according to the code messagedigest.getinstance ("MD 5"). Digest (content.getbytes ("UTF-8")).
And step 130, sending the target SIM card identification to a server for login verification.
Optionally, sending the target SIM card identifier to the server for login verification may include: and sending the encrypted target SIM card identifier to a server for login verification.
And step 140, receiving login confirmation response information returned by the server after the login verification is successful.
In this embodiment, when the target SIM card identifier received by the server matches the SIM card identifiers of all the SIM cards configured by the terminal and stored in advance by the server, a login confirmation response message returned by the server is received, which indicates that the login is successful by using the target SIM card identifier; when the target SIM card identifier received by the server is not matched with the SIM card identifiers of all the SIM cards configured by the terminal and pre-stored by the server, login failure response information returned by the server is received, which indicates that the login fails by using the target SIM card identifier and the login needs to be performed again.
According to the technical scheme of the embodiment of the invention, SIM card selection information corresponding to a plurality of SIM cards of the customer identification modules configured by the terminal is provided for the user by responding to a one-key login request sent by the user; acquiring a target SIM card identifier corresponding to a target SIM card selected by a user; sending the target SIM card identification to a server for login verification; the method and the device for confirming the login response information solve the problems that in the prior art, the current flow card can only be used for login and the mobile phone card for login cannot be flexibly selected, realize one-key login without acquiring the mobile phone number of the current flow card, and improve the selection flexibility of the mobile phone card for login.
Example two
Fig. 2 is a flowchart of a one-key-login method based on multiple cards according to a second embodiment of the present invention, which is applicable to a case where a user can login by one key without obtaining a mobile phone number. As shown in fig. 2, the method includes:
step 210, when detecting that the software to be logged in is started, sending a software to be logged in starting notice to the terminal.
In this embodiment, in order to enable the terminal to obtain the SIM card identifier corresponding to the SIM card configured in advance, when detecting that the software to be logged starts to be started, the server immediately generates a corresponding software to be logged start notification, and sends the software to be logged start notification to each terminal that may log in, so that each terminal starts to obtain its own SIM card identifier.
And step 220, receiving and storing all SIM card identifications included by the terminal for the terminal to return the software starting notice to be logged in.
In this embodiment, in order to subsequently determine whether the target SIM card identifier sent by the terminal can pass the login verification, the server needs to receive all the SIM card identifiers sent by the terminal and included by the server, wherein in order to ensure the integrity and uniqueness of the data, the SIM card identifier received by the server is encrypted by the terminal, and therefore, the server needs to correspondingly decrypt the received SIM card identifier and then store the decrypted SIM card identifier in a designated area corresponding to the terminal, so that the SIM card identifier corresponding to the terminal can be quickly found during the verification.
Step 230, receiving a login verification request carrying a target SIM card identifier sent by a terminal; the target SIM card identification corresponds to the target SIM card selected by the user.
Optionally, after receiving the login authentication request with the target SIM card identifier sent by the terminal, the method may further include: and decrypting the target SIM card identification in the login authentication request by using a Hash algorithm.
In this embodiment, after the server receives the login authentication request of the terminal, the server needs to extract the target SIM card identifier for login from the login request, and then perform corresponding decryption operation on the target SIM card identifier in the login authentication request by using a hash algorithm.
And 240, when the target SIM card identification belongs to all the SIM card identifications included by the terminal, sending login confirmation response information to the terminal.
Optionally, when the target SIM card identifier belongs to all SIM card identifiers included in the terminal, sending the login confirmation response information to the terminal may include: and when the decrypted target SIM card identification belongs to all the SIM card identifications included by the terminal, sending login confirmation response information to the terminal.
In this embodiment, if the decrypted target SIM card identifier matches the SIM card identifiers of all the SIM cards configured by the terminal and stored in advance by the server, that is, the decrypted target SIM card identifier belongs to all the SIM card identifiers included in the terminal, the server returns a login confirmation response message to the terminal, indicating that the login is successful by using the target SIM card identifier; if the decrypted target SIM card identification is not matched with the SIM card identifications of all the SIM cards configured by the terminal and stored in advance by the server, namely the decrypted target SIM card identification does not belong to all the SIM card identifications included by the terminal, the server returns login failure response information to the terminal, which indicates that the login fails by using the target SIM card identification and needs the terminal to resend the login verification request.
According to the technical scheme of the embodiment of the invention, when the software to be logged in is detected to be started, the software to be logged in starting notice is sent to the terminal, all SIM card identifications included by the terminal returned by the terminal aiming at the software to be logged in starting notice are received and stored, and the login verification request which is sent by the terminal and carries the target SIM card identification is received; when the target SIM card identification belongs to all SIM card identifications included by the terminal, the login confirmation response information is sent to the terminal, the problems that in the prior art, the current flow card can only be used for login, and the mobile phone card for login cannot be flexibly selected are solved, one-key login can be realized without acquiring the mobile phone number of the current flow card, and the selection flexibility of the mobile phone card for login is improved.
EXAMPLE III
Fig. 3 is a schematic structural diagram of a multi-card-based one-key login apparatus according to a third embodiment of the present invention, which may be implemented by hardware and/or software and may be generally integrated in a device providing one-key login services, such as a terminal. As shown in fig. 3, the multi-card-based one-key entry apparatus includes: a selection information providing module 310, a card identification obtaining module 320, a login verification module 330, and a response information receiving module 340;
a selection information providing module 310, configured to provide, to a user, SIM card selection information corresponding to a plurality of SIM cards configured by the terminal in response to a one-key login request sent by the user;
a card identifier obtaining module 320, configured to obtain a target SIM card identifier corresponding to a target SIM card selected by a user;
the login verification module 330 is configured to send the target SIM card identifier to the server for login verification;
the response information receiving module 340 is configured to receive login response confirmation information returned by the server after the login authentication is successful.
According to the technical scheme of the embodiment of the invention, SIM card selection information corresponding to a plurality of SIM cards of the customer identification modules configured by the terminal is provided for the user by responding to a one-key login request sent by the user; acquiring a target SIM card identifier corresponding to a target SIM card selected by a user; sending the target SIM card identifier to a server for login verification; the method and the device for the mobile phone card login comprise the steps that login confirmation response information returned by the server after login verification is successful is received, the problems that in the prior art, login can be carried out only through the current flow card, and the mobile phone card used for login cannot be flexibly selected are solved, one-key login can be achieved without obtaining the mobile phone number of the current flow card, and the flexibility of selection of the mobile phone card used for login is improved.
Optionally, the apparatus further comprises:
the information pre-acquisition module is used for acquiring the chip type of the terminal when receiving a software start notification to be logged sent by a server before responding to a one-key login request sent by a user and providing SIM card selection information corresponding to a plurality of SIM cards configured by the terminal for the user;
acquiring an Application Programming Interface (API) matched with the type of the chip;
acquiring an instance of the API according to the reflection mechanism, calling a target method in the API, and determining the number of SIM cards included in the terminal;
if the number of the SIM cards is more than 1, calling a preset SIM card identification acquisition code to acquire all SIM card identifications included by the terminal;
and storing all the SIM card identifications locally, and sending the SIM card identifications to the server so as to enable the server to carry out login verification on the terminal according to all the SIM card identifications.
Optionally, the apparatus further comprises: the encryption module is used for encrypting the target SIM card identification by using a Hash algorithm before acquiring the target SIM card identification corresponding to the target SIM card selected by the user;
the login verification module 330 is specifically configured to: and sending the encrypted target SIM card identifier to a server for login verification.
The one-key login device based on multiple cards can execute the one-key login method based on multiple cards and applicable to the terminal provided by any embodiment of the invention, and has the corresponding functional modules and beneficial effects of executing the one-key login method based on multiple cards.
Example four
Fig. 4 is a schematic structural diagram of a multi-card-based one-touch login apparatus according to a fourth embodiment of the present invention, which may be implemented by hardware and/or software, and may be generally integrated in a device providing one-touch login services, such as a server. As shown in fig. 4, the multi-card-based one-key entry apparatus includes: a start notification transmission module 410, a card identification reception module 420, an authentication request reception module 430, and a response module 440;
a start notification sending module 410, configured to send a start notification of the software to be logged to the terminal when detecting that the software to be logged is started;
the card identifier receiving module 420 is configured to receive and store all SIM card identifiers included in the terminal returned by the terminal for the to-be-logged-in software start notification;
an authentication request receiving module 430, configured to receive a login authentication request sent by a terminal and carrying a target SIM card identifier; the target SIM card identification corresponds to a target SIM card selected by a user;
and a response module 440, configured to send a login confirmation response message to the terminal when the target SIM card identifier belongs to all SIM card identifiers included in the terminal.
According to the technical scheme of the embodiment of the invention, when the software to be logged is detected to be started, the software to be logged is sent to the terminal to start the notification, all SIM card identifications included by the terminal returned by the terminal aiming at the software to be logged to start the notification are received and stored, and the login verification request which is sent by the terminal and carries the target SIM card identification is received; when the target SIM card identification belongs to all SIM card identifications included by the terminal, the login confirmation response information is sent to the terminal, the problems that in the prior art, the current flow card can only be used for login, and the mobile phone card for login cannot be flexibly selected are solved, one-key login can be realized without acquiring the mobile phone number of the current flow card, and the selection flexibility of the mobile phone card for login is improved.
Optionally, the method further includes: the decryption module is used for decrypting the target SIM card identifier in the login authentication request by using a Hash algorithm after receiving the login authentication request which is sent by the terminal and carries the target SIM card identifier;
the response module 440 is specifically configured to: and when the decrypted target SIM card identification belongs to all the SIM card identifications included by the terminal, sending login confirmation response information to the terminal.
The one-key login device based on multiple cards can execute the one-key login method based on multiple cards and applicable to the server provided by any embodiment of the invention, and has the corresponding functional modules and beneficial effects of executing the one-key login method based on multiple cards.
EXAMPLE five
Fig. 5 is a schematic structural diagram of an apparatus in a fifth embodiment of the present invention. Fig. 5 illustrates a block diagram of an exemplary device 12 suitable for use in implementing embodiments of the present invention. The device 12 shown in fig. 5 is only an example and should not bring any limitations to the functionality and scope of use of the embodiments of the present invention.
As shown in FIG. 5, device 12 is in the form of a general purpose computing device. The components of device 12 may include, but are not limited to: one or more processors or processing units 16, a system memory 28, and a bus 18 that couples various system components including the system memory 28 and the processing unit 16.
Bus 18 represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, a processor, or a local bus using any of a variety of bus architectures. By way of example, such architectures include, but are not limited to, industry Standard Architecture (ISA) bus, micro-channel architecture (MAC) bus, enhanced ISA bus, video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnect (PCI) bus.
Device 12 typically includes a variety of computer system readable media. Such media may be any available media that is accessible by device 12 and includes both volatile and nonvolatile media, removable and non-removable media.
The system memory 28 may include computer system readable media in the form of volatile memory, such as Random Access Memory (RAM) 30 and/or cache memory 32. Device 12 may further include other removable/non-removable, volatile/nonvolatile computer system storage media. By way of example only, storage system 34 may be used to read from and write to non-removable, nonvolatile magnetic media (not shown in FIG. 5, and commonly referred to as a "hard drive"). Although not shown in FIG. 5, a magnetic disk drive for reading from and writing to a removable, nonvolatile magnetic disk (e.g., a "floppy disk") and an optical disk drive for reading from or writing to a removable, nonvolatile optical disk (e.g., a CD-ROM, DVD-ROM, or other optical media) may be provided. In these cases, each drive may be connected to bus 18 by one or more data media interfaces. Memory 28 may include at least one program product having a set (e.g., at least one) of program modules that are configured to carry out the functions of embodiments of the invention.
A program/utility 40 having a set (at least one) of program modules 42 may be stored, for example, in memory 28, such program modules 42 including, but not limited to, an operating system, one or more application programs, other program modules, and program data, each of which examples or some combination thereof may comprise an implementation of a network environment. Program modules 42 generally carry out the functions and/or methodologies of the described embodiments of the invention.
Device 12 may also communicate with one or more external devices 14 (e.g., keyboard, pointing device, display 24, etc.), with one or more devices that enable a user to interact with device 12, and/or with any devices (e.g., network card, modem, etc.) that enable device 12 to communicate with one or more other computing devices. Such communication may be through an input/output (I/O) interface 22. Also, the device 12 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network, such as the Internet) via the network adapter 20. As shown, the network adapter 20 communicates with the other modules of the device 12 via the bus 18. It should be understood that although not shown in the figures, other hardware and/or software modules may be used in conjunction with device 12, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data backup storage systems, among others.
The processing unit 16 executes various functional applications and data processing by executing programs stored in the system memory 28, for example, implementing one multi-card-based one-key login method or another multi-card-based one-key login method provided by the embodiments of the present invention.
Namely: the one-key login method based on the multi-card is realized, and comprises the following steps:
responding to a one-key login request sent by a user, and providing SIM card selection information corresponding to a plurality of SIM cards of a subscriber identity module configured by a terminal for the user;
acquiring a target SIM card identifier corresponding to a target SIM card selected by a user;
sending the target SIM card identification to a server for login verification;
and receiving login confirmation response information returned by the server after the login verification is successful.
Or, another one-key login method based on multiple cards is realized, which comprises the following steps:
when detecting that the software to be logged in is started, sending a software to be logged in starting notice to the terminal;
receiving and storing all SIM card identifications included by the terminal returned by the terminal aiming at the software starting notice to be logged in;
receiving a login verification request which is sent by a terminal and carries a target SIM card identifier; the target SIM card identification corresponds to a target SIM card selected by a user;
and when the target SIM card identification belongs to all the SIM card identifications included by the terminal, sending login confirmation response information to the terminal.
EXAMPLE six
The sixth embodiment of the invention also discloses a computer storage medium, wherein a computer program is stored on the computer storage medium, and when the program is executed by a processor, the one-key login method based on multiple cards is realized, or another one-key login method based on multiple cards is realized.
A one-key login method based on multiple cards comprises the following steps:
responding to a one-key login request sent by a user, and providing SIM card selection information corresponding to a plurality of SIM cards of a subscriber identity module configured by a terminal for the user;
acquiring a target SIM card identifier corresponding to a target SIM card selected by a user;
sending the target SIM card identifier to a server for login verification;
and receiving login confirmation response information returned by the server after the login verification is successful.
Another one-key login method based on multiple cards comprises the following steps:
when detecting that the software to be logged in is started, sending a software to be logged in starting notice to the terminal;
receiving and storing all SIM card identifications included by the terminal for starting a notice and returning by the software to be logged in;
receiving a login verification request which is sent by a terminal and carries a target SIM card identifier; the target SIM card identification corresponds to a target SIM card selected by a user;
and when the target SIM card identification belongs to all the SIM card identifications included by the terminal, sending the login confirmation response information to the terminal.
Computer storage media for embodiments of the invention may employ any combination of one or more computer-readable media. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, smalltalk, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
It is to be noted that the foregoing is only illustrative of the preferred embodiments of the present invention and the technical principles employed. It will be understood by those skilled in the art that the present invention is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the invention. Therefore, although the present invention has been described in some detail by the above embodiments, the invention is not limited to the above embodiments, and may include other equivalent embodiments without departing from the spirit of the invention, and the scope of the invention is determined by the scope of the appended claims.

Claims (10)

1. A one-key login method based on multiple cards is characterized by comprising the following steps:
responding to a one-key login request sent by a user, providing SIM card selection information corresponding to a plurality of SIM cards configured by a terminal for the user, and prompting the user to select one SIM card from the plurality of SIM cards for login;
acquiring a target SIM card identifier corresponding to the target SIM card selected by the user;
sending the target SIM card identifier to a server for login verification;
and when the target SIM card identification received by the server is matched with the SIM card identifications of all the SIM cards configured by the terminal and stored in advance by the server, receiving login confirmation response information returned by the server, wherein the login confirmation response information indicates that the login verification by using the target SIM card identification is successful.
2. The method according to claim 1, before providing SIM card selection information corresponding to a plurality of SIM cards configured by a terminal to a user in response to a one-touch login request sent by the user, further comprising:
when a software to be logged in starting notice sent by the server is received, acquiring the chip type of the terminal;
acquiring an Application Programming Interface (API) matched with the chip type;
acquiring an instance of the API according to a reflection mechanism, calling a target method in the API, and determining the number of SIM cards included in the terminal;
if the number of the SIM cards is larger than 1, calling a preset SIM card identification acquisition code to acquire all SIM card identifications included by the terminal;
and locally storing all SIM card identifications, and sending the SIM card identifications to the server so as to enable the server to carry out login verification on the terminal according to all SIM card identifications.
3. The method according to claim 1, further comprising, before obtaining a target SIM card identity corresponding to the target SIM card selected by the user:
encrypting the target SIM card identification by using a Hash algorithm;
the step of sending the target SIM card identifier to a server for login verification comprises the following steps:
and sending the encrypted target SIM card identifier to the server for login verification.
4. A one-key login method based on multiple cards is characterized by comprising the following steps:
when detecting that the software to be logged in is started, sending a software to be logged in starting notice to the terminal;
receiving and storing all SIM card identifications included by the terminal returned by the terminal aiming at the software starting notice to be logged in;
receiving a login verification request which is sent by the terminal and carries a target SIM card identifier; the target SIM card identification corresponds to a target SIM card selected by a user, and when the terminal receives a one-key login request of the user, SIM card selection information corresponding to a plurality of SIM cards configured by the terminal is provided for the user so as to prompt the user to select one SIM card from the plurality of SIM cards for login;
when the target SIM card identification belongs to all SIM card identifications included by the terminal, sending login confirmation response information to the terminal; and the login confirmation response message indicates that the login is successful by using the target SIM card identifier.
5. The method according to claim 4, after receiving a login authentication request carrying a target SIM card identifier sent by the terminal, further comprising:
decrypting the target SIM card identification in the login authentication request by using a Hash algorithm;
when the target SIM card identification belongs to all the SIM card identifications included in the terminal, sending login confirmation response information to the terminal, wherein the login confirmation response information comprises:
and when the decrypted target SIM card identification belongs to all the SIM card identifications included by the terminal, sending login confirmation response information to the terminal.
6. A one-key login device based on multiple cards is characterized by being applied to a terminal and comprising:
the selection information providing module is used for responding to a one-key login request sent by a user, providing SIM card selection information corresponding to a plurality of SIM cards configured by the terminal for the user, and prompting the user to select one SIM card from the plurality of SIM cards for login;
a card identifier obtaining module, configured to obtain a target SIM card identifier corresponding to the target SIM card selected by the user;
the login verification module is used for sending the target SIM card identifier to a server for login verification;
and the response information receiving module is used for receiving the login confirmation response information returned by the server when the target SIM card identifier received by the server is matched with the SIM card identifiers of all the SIM cards configured by the terminal and pre-stored by the server, wherein the login confirmation response information indicates that the login verification using the target SIM card identifier is successful.
7. The apparatus of claim 6, further comprising:
the information acquisition module is used for acquiring the chip type of the terminal when receiving a software start notification to be logged, which is sent by a server, before responding to a one-key login request sent by a user and providing SIM card selection information corresponding to a plurality of SIM cards configured by the terminal for the user;
acquiring an API matched with the chip type;
acquiring an instance of the API according to a reflection mechanism, calling a target method in the API, and determining the number of SIM cards included in the terminal;
if the number of the SIM cards is larger than 1, calling a preset SIM card identification acquisition code to acquire all SIM card identifications included by the terminal;
and storing all SIM card identifications locally, and sending the SIM card identifications to the server so that the server performs login verification on the terminal according to all SIM card identifications.
8. A one-key login device based on multiple cards is applied to a server and comprises the following components:
the starting notification sending module is used for sending a software starting notification to be logged to the terminal when detecting that the software to be logged is started;
the card identifier receiving module is used for receiving and storing all SIM card identifiers included by the terminal, which are returned by the terminal aiming at the software starting notice to be logged;
the verification request receiving module is used for receiving a login verification request which is sent by the terminal and carries a target SIM card identifier; the target SIM card identification corresponds to a target SIM card selected by a user, and when the terminal receives a one-key login request of the user, SIM card selection information corresponding to a plurality of SIM cards configured by the terminal is provided for the user so as to prompt the user to select one SIM card from the plurality of SIM cards for login;
the response module is used for sending login confirmation response information to the terminal when the target SIM card identification belongs to all SIM card identifications included by the terminal; and the login confirmation response message indicates that the login is successful by using the target SIM card identifier.
9. An electronic device, characterized in that the device comprises:
one or more processors;
a storage device for storing one or more programs,
when executed by the one or more processors, cause the one or more processors to implement the multi-card based one-key login method of any one of claims 1-3, or implement the multi-card based one-key login method of any one of claims 4-5.
10. A computer-readable storage medium, on which a computer program is stored, which program, when being executed by a processor, implements the multi-card based one-touch login method of any one of claims 1 to 3, or implements the multi-card based one-touch login method of any one of claims 4 to 5.
CN201911105549.6A 2019-11-13 2019-11-13 Multi-card-based one-key login method, device, equipment and storage medium Active CN110830479B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911105549.6A CN110830479B (en) 2019-11-13 2019-11-13 Multi-card-based one-key login method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911105549.6A CN110830479B (en) 2019-11-13 2019-11-13 Multi-card-based one-key login method, device, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN110830479A CN110830479A (en) 2020-02-21
CN110830479B true CN110830479B (en) 2022-11-18

Family

ID=69554700

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911105549.6A Active CN110830479B (en) 2019-11-13 2019-11-13 Multi-card-based one-key login method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN110830479B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115130085A (en) * 2021-03-25 2022-09-30 华为技术有限公司 Login authentication method and electronic equipment
CN114710339A (en) * 2022-03-25 2022-07-05 云南腾云信息产业有限公司 Login method and device of application program, mobile terminal and readable storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103595867A (en) * 2013-11-14 2014-02-19 北京奇虎科技有限公司 Application program implementation method and device based on multi-card recognition
CN106658463A (en) * 2016-09-30 2017-05-10 宇龙计算机通信科技(深圳)有限公司 Operating system login method, device and terminal
CN107508784A (en) * 2016-06-14 2017-12-22 中国移动通信有限公司研究院 One kind applies login method and terminal device
CN107623690A (en) * 2017-09-27 2018-01-23 上海掌门科技有限公司 Login method, equipment and storage medium

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103188221B (en) * 2011-12-28 2018-01-30 腾讯科技(深圳)有限公司 application program login method, device and mobile terminal
CN107809437B (en) * 2017-11-15 2021-04-13 Oppo广东移动通信有限公司 Converged communication login method and device and computer readable storage medium
CN107948204B (en) * 2017-12-29 2020-10-30 咪咕文化科技有限公司 One-key login method and system, related equipment and computer readable storage medium
CN108616869B (en) * 2018-03-22 2020-06-09 深圳市优克联新技术有限公司 Multi-card multi-standby system, method, device, communication device and computer readable storage medium
CN109587162B (en) * 2018-12-26 2021-11-12 闻泰通讯股份有限公司 Login verification method, device, terminal, password server and storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103595867A (en) * 2013-11-14 2014-02-19 北京奇虎科技有限公司 Application program implementation method and device based on multi-card recognition
CN107508784A (en) * 2016-06-14 2017-12-22 中国移动通信有限公司研究院 One kind applies login method and terminal device
CN106658463A (en) * 2016-09-30 2017-05-10 宇龙计算机通信科技(深圳)有限公司 Operating system login method, device and terminal
CN107623690A (en) * 2017-09-27 2018-01-23 上海掌门科技有限公司 Login method, equipment and storage medium

Also Published As

Publication number Publication date
CN110830479A (en) 2020-02-21

Similar Documents

Publication Publication Date Title
KR102307665B1 (en) identity authentication
EP3013086B1 (en) Method, apparatus and electronic device for connection management
US20210399895A1 (en) Systems and Methods for Single-Step Out-of-Band Authentication
US20090298468A1 (en) System and method for deleting data in a communication device
US11824854B2 (en) Communication system and computer readable storage medium
CN111918274B (en) Code number configuration and management method and device, electronic equipment and readable storage medium
CN111698312B (en) Service processing method, device, equipment and storage medium based on open platform
CN112039826B (en) Login method and device applied to applet end, electronic equipment and readable medium
CN110830479B (en) Multi-card-based one-key login method, device, equipment and storage medium
US10080139B2 (en) Information sending method and apparatus, terminal device, and system
WO2019134494A1 (en) Verification information processing method, communication device, service platform, and storage medium
CN113225351A (en) Request processing method and device, storage medium and electronic equipment
US20110154436A1 (en) Provider Management Methods and Systems for a Portable Device Running Android Platform
CN103036852A (en) Method and device for achieving network login
CN110545542B (en) Main control key downloading method and device based on asymmetric encryption algorithm and computer equipment
KR20190111006A (en) Authentication server, authentication system and method
KR101379711B1 (en) Method for file encryption and decryption using telephone number
CN110719590B (en) One-key login method, device, equipment and storage medium based on mobile phone number
CN114125027A (en) Communication establishing method and device, electronic equipment and storage medium
CN109379378B (en) Method, device, server, system and storage medium for sending internet short messages
US9143510B2 (en) Secure identification of intranet network
WO2011030352A2 (en) System and method for mobile phone resident digital signing and encryption/decryption of sms
CN110781481A (en) Single sign-on method, client, server, and storage medium
CN113746779A (en) Digital certificate installation method and equipment
US11805090B1 (en) Method, apparatus, and system for securing electronic messages

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant