CN111258602A - Information updating method and device - Google Patents

Information updating method and device Download PDF

Info

Publication number
CN111258602A
CN111258602A CN202010026856.1A CN202010026856A CN111258602A CN 111258602 A CN111258602 A CN 111258602A CN 202010026856 A CN202010026856 A CN 202010026856A CN 111258602 A CN111258602 A CN 111258602A
Authority
CN
China
Prior art keywords
time
host
updating
information
login
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010026856.1A
Other languages
Chinese (zh)
Other versions
CN111258602B (en
Inventor
华杰
刘青
刘少耿
李雨彤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Baidu Netcom Science and Technology Co Ltd
Original Assignee
Beijing Baidu Netcom Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Baidu Netcom Science and Technology Co Ltd filed Critical Beijing Baidu Netcom Science and Technology Co Ltd
Priority to CN202010026856.1A priority Critical patent/CN111258602B/en
Publication of CN111258602A publication Critical patent/CN111258602A/en
Application granted granted Critical
Publication of CN111258602B publication Critical patent/CN111258602B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

The embodiment of the disclosure discloses an information updating method and device. One embodiment of the method comprises: acquiring the creation time of an initial login credential based on the initial login credential, wherein the initial login credential is a group of character strings used for representing the login state of a user; and judging whether the time difference between the creation time and the current time meets the updating condition, and updating the creation time in response to the fact that the time difference between the creation time and the current time meets the updating condition. The implementation method can ensure that the login information of the user is not overdue, realizes that the user keeps a login state during login, reduces frequent and repeated login operations of the user, and improves user experience.

Description

Information updating method and device
Technical Field
The embodiment of the disclosure relates to the technical field of computers, in particular to the technical field of information processing, and particularly relates to an information updating method and device.
Background
The applet is an application which can be used without downloading and installing, can run in different application environments (namely hosts), and needs to solve the problem of how to keep and synchronize the user login states when the applet is applied to different hosts.
In the existing solution, after logging in by using a web browser application program (i.e. a first App), a small program records login state information of a user at a corresponding website server, i.e. session, which records corresponding failure time of user login, and since no login refreshing mechanism is provided, once the failure time of login is exceeded, the first App prompts the user to log in again, so that the user needs to log in again at intervals; after the applet logs in some instant messaging application programs (namely, the second App), the session of the user can be recorded at a server of a second App manufacturer, the session also records the expiration time corresponding to the user login, and the session can only ensure the login state of the user corresponding to the second App, and cannot ensure the synchronization and refreshing of the user login state among cross hosts.
Disclosure of Invention
The embodiment of the disclosure provides an information updating method and device.
In a first aspect, an embodiment of the present disclosure provides an information updating method, which is applied to a server, and the method includes: acquiring the creation time of an initial login credential based on the initial login credential, wherein the initial login credential is a group of character strings used for representing the login state of a user; and judging whether the time difference between the creation time and the current time meets the updating condition, and updating the creation time in response to the fact that the time difference between the creation time and the current time meets the updating condition.
In some embodiments, determining whether the time difference between the creation time and the current time satisfies the update condition, and in response to the time difference between the creation time and the current time satisfying the update condition, updating the creation time includes: judging whether the time difference between the creation time and the current time is greater than the updating time of the initial login credential or not, and whether the time difference between the creation time and the current time is less than the effective time of the initial login credential or not, wherein the updating time is used for representing the time interval for updating the initial login credential, and the effective time is used for representing the time for allowing the user to keep the login state; and updating the creating time in response to the fact that the time difference between the creating time and the current time is larger than the updating time and the time difference between the creating time and the current time is smaller than the effective time.
In some embodiments, after determining whether the time difference between the creation time and the current time satisfies the update condition and updating the creation time in response to the time difference between the creation time and the current time satisfying the update condition, the method further comprises: and updating the failure time of the initial login credential, wherein the failure time is used for representing the starting time point of the user changing from the login state to the non-login state.
In some embodiments, obtaining the time of creation of the initial logon credential based on the initial logon credential comprises: analyzing an update request data packet which is sent by a client and used for updating the initial login credentials to obtain the initial login credentials and a host name; and decrypting the initial login certificate to obtain the creation time of the initial login certificate, user login information and a host ID, wherein the host ID is used for representing the identity of a host of the program running environment.
In some embodiments, after determining whether the time difference between the creation time and the current time satisfies the update condition and updating the creation time in response to the time difference between the creation time and the current time satisfying the update condition, the method further comprises: encrypting the creation time, the user login information and the host ID by using an encryption algorithm according to the updated creation time to generate an updated login certificate; and sending the updated login credentials to the client.
In some embodiments, after obtaining the creation time of the initial login credential based on the initial login credential, the method further comprises: matching host information corresponding to the host name in a database according to the host name; analyzing the content of the host information, and extracting a host number in the host information; judging whether the host number in the host information is the same as the host ID or not according to the host ID obtained by decryption; and responding to the host number in the host information being the same as the host ID, and continuing to execute subsequent work.
In some embodiments, after determining whether the host number in the host information is the same as the host ID according to the decrypted host ID, the method further includes: and responding to the host number in the host information being different from the host ID, and sending a message that the initial login credentials are illegal to the client.
In some embodiments, the method further comprises: and sending the initial login credential to the client in response to the time difference between the creation time and the current time not meeting the update condition.
In a second aspect, an embodiment of the present disclosure provides an information updating method, applied to a client, where the method includes: receiving user login operation, responding to the operation that the user login operation accords with a preset updating request triggering operation, and sending an updating request to a server side, wherein the updating request is a request for updating the current user login credentials; and in response to receiving the login credential returned by the server and corresponding to the updating request, storing the login credential returned by the server locally.
In some embodiments, the method further comprises: and responding to the received message which is returned by the server and indicates that the current user login credentials are illegal, and displaying the message to the user.
In a third aspect, an embodiment of the present disclosure provides an information updating apparatus, including: the system comprises an acquisition unit, a storage unit and a control unit, wherein the acquisition unit is configured to acquire the creation time of an initial login credential based on the initial login credential, and the initial login credential is a group of character strings used for representing the login state of a user; and an updating unit configured to determine whether a time difference between the creation time and the current time satisfies an updating condition, and update the creation time in response to the time difference between the creation time and the current time satisfying the updating condition.
In some embodiments, the update unit comprises: the judging module is configured to judge whether the time difference between the creating time and the current time is greater than the updating time of the initial login credential or not and whether the time difference between the creating time and the current time is less than the effective time of the initial login credential or not, wherein the updating time is used for representing the time interval for updating the initial login credential, and the effective time is used for representing the time for allowing the user to keep the login state; an update module configured to update the creation time in response to a time difference between the creation time and the current time being greater than the update duration and the time difference between the creation time and the current time being less than the valid duration.
In some embodiments, the apparatus further comprises: and the second updating unit is configured to update the failure time of the initial login credential, wherein the failure time is used for representing the starting time point of the user changing from the login state to the non-login state.
In some embodiments, the obtaining unit comprises: the analysis module is configured to analyze an update request data packet which is sent by the client and used for updating the initial login credentials to obtain the initial login credentials and a host name; and the decryption module is configured to decrypt the initial login credential to obtain the creation time of the initial login credential, the user login information and the host ID, wherein the host ID is used for representing the identity of the host of the program running environment.
In some embodiments, the apparatus further comprises: an encryption unit configured to encrypt the creation time, the user login information, and the host ID by using an encryption algorithm according to the updated creation time, and generate an updated login credential; a sending unit configured to send the updated login credential to the client.
In some embodiments, the apparatus further comprises: the host matching unit is configured to match host information corresponding to the host name in the database according to the host name; the information analysis unit is configured to analyze the content of the host information and extract a host number in the host information; the host verification unit is configured to judge whether the host number in the host information is the same as the host ID or not according to the host ID obtained by decryption; and the result execution unit is configured to continue executing subsequent work in response to the host number in the host information being the same as the host ID.
In some embodiments, the apparatus further comprises: and the message sending unit is configured to respond to that the host number in the host information is not identical to the host ID, and send a message that the initial login credentials are illegal to the client.
In some embodiments, the apparatus further comprises: a feedback unit configured to send the initial login credential to the client in response to a time difference between the creation time and the current time not being greater than the update duration.
In a fourth aspect, an embodiment of the present disclosure provides an electronic device, including: one or more processors; a storage device having one or more programs stored thereon, which when executed by one or more processors, cause the one or more processors to implement the method as described in any of the implementations of the first aspect.
In a fifth aspect, embodiments of the present disclosure provide a computer-readable medium on which a computer program is stored, wherein the computer program, when executed by a processor, implements the method as described in any implementation manner of the first aspect.
According to the information updating method and device provided by the embodiment of the disclosure, whether the time difference between the creation time and the current time meets the updating condition is judged, and the creation time is updated in response to the fact that the time difference between the creation time and the current time meets the updating condition, so that the login information of the user is not overdue, the user keeps a login state during login, frequent and repeated login operations of the user are reduced, and the user experience is improved.
Drawings
Other features, objects and advantages of the disclosure will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
FIG. 1 is an exemplary system architecture diagram in which some embodiments of the present disclosure may be applied;
FIG. 2 is a flow diagram of one embodiment of an information update method applied to a server in accordance with the present disclosure;
FIG. 3 is a schematic diagram of an application scenario of an information update method applied to a server according to the present disclosure;
FIG. 4 is a flow chart diagram of another embodiment of an information update method applied to a server in accordance with the present disclosure;
FIG. 5 is a flow chart of yet another embodiment of an information update method applied to a server according to the present disclosure;
FIG. 6 is a flow chart of yet another embodiment of an information update method applied to a server according to the present disclosure;
FIG. 7 is a flow chart diagram for one embodiment of an information update method applied to a client, according to the present disclosure;
FIG. 8 is a schematic block diagram of one embodiment of an information updating apparatus according to the present disclosure;
FIG. 9 is a schematic structural diagram of an electronic device suitable for use in implementing embodiments of the present disclosure.
Detailed Description
The present disclosure is described in further detail below with reference to the accompanying drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the relevant invention and not restrictive of the invention. It should be noted that, for convenience of description, only the portions related to the related invention are shown in the drawings.
It should be noted that, in the present disclosure, the embodiments and features of the embodiments may be combined with each other without conflict. The present disclosure will be described in detail below with reference to the accompanying drawings in conjunction with embodiments.
Fig. 1 illustrates an exemplary system architecture 100 to which an information updating method or an information updating apparatus of an embodiment of the present disclosure may be applied.
As shown in fig. 1, the system architecture 100 may include terminal devices 101, 102, 103, a network 104, and a server 105. The network 104 serves as a medium for providing communication links between the terminal devices 101, 102, 103 and the server 105. Network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few.
The user may use the terminal devices 101, 102, 103 to interact with the server 105 via the network 104 to receive or send messages or the like. The terminal devices 101, 102, 103 may have various communication client applications installed thereon, such as a shopping application, a pick-up application, a web browser application, a search application, an instant messaging tool, a mailbox client, social platform software, and the like.
The terminal apparatuses 101, 102, and 103 may be hardware or software. When the terminal devices 101, 102, 103 are hardware, they may be various electronic devices having a display screen and sending an update request, including but not limited to smart phones, tablet computers, e-book readers, laptop portable computers, desktop computers, and the like. When the terminal apparatuses 101, 102, 103 are software, they can be installed in the electronic apparatuses listed above. It may be implemented, for example, as multiple software or software modules to provide distributed services, or as a single software or software module. And is not particularly limited herein.
The server 105 may be a server that provides various services, such as a server that provides support for update requests of the terminal devices 101, 102, 103. The server may perform processing such as determination on data such as the received update request, and feed back a processing result (e.g., an update result) to the terminal device.
It should be noted that the information updating method provided by the embodiment of the present disclosure is generally executed by the server 105, and a corresponding information updating apparatus is generally disposed in the server 105.
The server may be hardware or software. When the server is hardware, it may be implemented as a distributed server cluster formed by multiple servers, or may be implemented as a single server. When the server is software, it may be implemented as multiple pieces of software or software modules, for example, to provide distributed services, or as a single piece of software or software module. And is not particularly limited herein.
It should be understood that the number of terminal devices, networks, and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
With continued reference to fig. 2, a flow 200 of one embodiment of an information update method applied to a server according to the present disclosure is shown. The information updating method comprises the following steps:
step 201, obtaining the creation time of the initial login credential based on the initial login credential.
In this embodiment, after receiving a request sent by a client to update an initial login credential, an executing entity (e.g., a server shown in fig. 1) of an information updating method obtains time information, i.e., a creation time, when the initial login credential is created, based on the initial login credential, where the initial login credential may be a set of character strings used for representing a login state of a user, and the initial login credential may be user login information generated after the user has successfully logged in last time. It should be noted that the wireless connection means may include, but is not limited to, a 3G/4G/5G connection, a WiFi connection, a bluetooth connection, a WiMAX connection, a Zigbee connection, a uwb (ultra wideband) connection, and other wireless connection means now known or developed in the future.
Step 202, judging whether the time difference between the creation time and the current time meets the updating condition, and updating the creation time in response to the time difference between the creation time and the current time meeting the updating condition.
In this embodiment, the execution agent determines a time difference between the creation time of the initial login credential and the current time, determines whether the time difference satisfies an update condition, and updates the creation time if the time difference satisfies the update condition.
For example, when the execution agent determines whether the time difference between the creation time of the initial login credential and the current time exceeds the update time, if the time difference exceeds the update time, the creation time of the initial login credential is delayed backward by a preset time.
It should be noted that the above updating method is a well-known technique widely studied and applied at present, and is not described herein again.
With continued reference to fig. 3, fig. 3 is a schematic diagram 300 of an application scenario of the information updating method applied to the server according to the embodiment. The user enters login information via the applet client 301, such as: the small program client 301 sends a login request data packet to the small program server 302 through the host application according to login information input by a user, generates an initial login credential 303 after the small program server 302 receives the login request data packet, obtains a creation time of the initial login credential based on the initial login credential, judges whether a time difference between the creation time and the current time meets an update condition, and updates the creation time of the initial login credential if the time difference between the creation time and the current time meets the update condition.
According to the information updating method applied to the server side, provided by the embodiment of the disclosure, the creation time is updated by judging whether the time difference between the creation time and the current time meets the updating condition or not in response to the time difference between the creation time and the current time meeting the updating condition, so that the login information of the user is not outdated, the user keeps a login state during login, frequent and repeated login operations of the user are reduced, and the user experience is improved.
With continued reference to fig. 4, a flow 400 of another embodiment of an information update method applied to a server according to the present disclosure is shown. The information updating method comprises the following steps:
step 401, obtaining the creation time of the initial login credential based on the initial login credential.
Step 402, determining whether the time difference between the creation time and the current time is greater than the update time of the initial login credential, and whether the time difference between the creation time and the current time is less than the effective time of the initial login credential.
In this embodiment, the execution subject determines a time difference between the creation time of the initial login credential and the current time, and determines whether the time difference is between an update time of the initial login credential and an effective time of the initial login credential, that is, the time difference is greater than the update time of the initial login credential and less than the effective time of the initial login credential, where the update time is used to represent a time interval for updating the initial login credential, and the effective time is used to represent a time for allowing the user to maintain the login state.
And step 403, updating the creation time in response to that the time difference between the creation time and the current time is greater than the updating time and the time difference between the creation time and the current time is less than the effective time.
In this embodiment, when the execution subject determines that the time difference between the creation time of the initial login credential and the current time is between the update time of the initial login credential and the valid time of the initial login credential, the creation time is updated.
For example, when the execution subject determines that the time difference between the creation time of the initial login credential and the current time is between the update time of the initial login credential and the valid time of the initial login credential, the creation time of the initial login credential is delayed by a fixed time according to a preset fixed time.
In this embodiment, the specific operation of step 401 is substantially the same as the operation of step 201 in the embodiment shown in fig. 2, and is not described herein again.
As can be seen from fig. 4, compared with the embodiment corresponding to fig. 2, in the process 400 of updating information in this embodiment, by determining whether the time difference between the creation time and the current time is greater than the update time of the initial login credential, and whether the time difference between the creation time and the current time is less than the valid time of the initial login credential, in response to that the time difference between the creation time and the current time is greater than the update time and the time difference between the creation time and the current time is less than the valid time, the creation time is updated, because the update of the creation time is performed under a certain condition, instead of performing the update at each login, frequent data changes on the server and the client due to the information update are reduced, and the system performance is improved while the login state of the user is ensured.
With further reference to fig. 5, a flow diagram of yet another embodiment of an information update method applied to a server is shown. The process 500 of the information updating method includes the following steps:
step 501, an update request data packet sent by a client for updating an initial login credential is analyzed to obtain the initial login credential and a host name.
In this embodiment, an execution subject of the method parses a received update request packet sent by a client and used for updating an initial login credential to obtain the initial login credential and a host name, where the initial login credential is a mabdus generated by a user in a login process.
Step 502, the initial login credentials are decrypted to obtain the creation time of the initial login credentials, user login information and host ID.
In this embodiment, the execution subject decrypts a mabpass generated by the user in the login process to obtain the creation time of the initial login credential, user login information, and a host ID, where the host ID is used to characterize the identity of a host of the program running environment, and the user login information may be a user login account.
Step 503, determining whether the time difference between the creation time and the current time meets the update condition, and updating the creation time in response to the time difference between the creation time and the current time meeting the update condition.
And step 504, encrypting the creation time, the user login information and the host ID by using an encryption algorithm according to the updated creation time to generate an updated login certificate.
In this embodiment, the execution agent encrypts the updated creation time, the user login information, and the host ID by using a preset encryption algorithm to generate a new login credential, that is, an updated login credential.
And step 505, sending the updated login credentials to the client.
In this embodiment, the executing entity sends the new login credential generated in step 504 to the client that issued the login request, so that the client stores the encrypted information locally, and takes the login credential to prove the legal identity of the user each time the user requests to log in.
In some optional implementation manners of this embodiment, after determining whether a time difference between the creation time and the current time satisfies an update condition, and in response to that the time difference between the creation time and the current time satisfies the update condition, updating the creation time, the method further includes: and updating the failure time of the initial login credential, wherein the failure time is used for representing the starting time point of the user changing from the login state to the non-login state.
In some optional implementations of this embodiment, the updating the creation time and the invalidation time of the initial login credential includes: updating the creation time to the current time; and updating the failure time to a time point after the effective time length is prolonged backwards from the updated creation time according to the updated creation time and the preset effective time length.
In this embodiment, the specific operation of step 503 is substantially the same as the operation of step 202 in the embodiment shown in fig. 2, and is not described herein again.
It should be noted that the above encryption and decryption methods are well-known technologies that are widely studied and applied at present, and are not described herein again.
As can be seen from fig. 5, compared with the embodiment corresponding to fig. 2, in the process 500 of information update in this embodiment, the initial login credential is decrypted to obtain the creation time of the initial login credential, the user login information, and the host ID, the creation time, the user login information, and the host ID are encrypted by using an encryption algorithm according to the updated creation time to generate the updated login credential, and the updated login credential is sent to the client.
With further reference to fig. 6, a flow diagram of yet another embodiment of an information update method applied to a server is shown. The process 600 of the information updating method includes the following steps:
step 601, analyzing an update request data packet for updating the initial login credential sent by the client to obtain the initial login credential and the host name.
Step 602, the initial login credentials are decrypted to obtain the creation time of the initial login credentials, the user login information and the host ID.
Step 603, matching host information corresponding to the host name in the database according to the host name.
In this embodiment, the execution subject of the method queries the database for host information corresponding to the host name.
And step 604, analyzing the content of the host information, and extracting the host number in the host information.
In this embodiment, after the execution subject parses the queried host content, the host number in the host information is extracted.
Step 605, according to the decrypted host ID, determine whether the host number in the host information is the same as the host ID.
In this embodiment, the execution agent compares the host number in the extracted host information with the host ID decrypted from the initial login credential, and determines whether the host number is the same as the host ID.
And step 606, responding to the host number in the host information being the same as the host ID, and continuing to execute subsequent work.
In this embodiment, if the execution subject determines that the host number in the host information is the same as the host ID, the subsequent work is continuously executed, otherwise, an error message is returned. The legality of the host ID is determined by comparing the host number in the extracted host information with the host ID after the initial login certificate is decrypted, and a service end is prevented from being deceived by a professional maliciously forging request parameters and forging the initial login certificate in the cookie.
In some optional implementation manners of this embodiment, after determining whether the host number in the host information is the same as the host ID according to the host ID obtained by decryption, the method further includes: and responding to the host number in the host information being different from the host ID, and sending a message that the initial login credentials are illegal to the client.
Step 607, determining whether the time difference between the creation time and the current time satisfies the update condition, and updating the creation time in response to the time difference between the creation time and the current time satisfying the update condition.
In some optional implementations of this embodiment, the method further includes: and sending the initial login credential to the client in response to the time difference between the creation time and the current time not meeting the update condition.
In this embodiment, when the execution agent determines that the time difference between the creation time of the initial login credential and the current time does not satisfy the update condition, the execution agent indicates that the login has not yet reached the update time limit, and returns the initial login credential to the client.
In this embodiment, the specific operations of steps 601, 602, and 607 are substantially the same as the operations of steps 501, 502, and 503 in the embodiment shown in fig. 5, and are not repeated here.
As can be seen from fig. 6, compared with the embodiment corresponding to fig. 2, in the process 600 of information update in this embodiment, host information corresponding to a host name is matched in a database according to the host name, content analysis is performed on the host information, a host number in the host information is extracted, whether the host number in the host information is the same as the host ID is determined according to the host ID obtained by decryption, and in response to that the host number in the host information is the same as the host ID, subsequent work is continuously performed, the validity of the host ID is determined, a forged login request is excluded, and authenticity and reliability of login data are ensured.
With further reference to FIG. 7, a flow diagram of one embodiment of an information update method applied to a client is shown. The process 700 of the information updating method includes the following steps:
step 701, receiving a user login operation, responding to an operation that the user login operation conforms to a preset update request triggering operation, and sending an update request to a server.
In this embodiment, a user sends an update request for a current user login credential to an execution subject (e.g., the terminal device shown in fig. 1) of the information updating method during each login operation, and when the execution subject determines that the user login operation matches a preset operation that triggers the update request, the update request is sent to a server, where the current user login credential is the initial login credential.
And step 702, in response to receiving the login credential corresponding to the update request returned by the server, storing the login credential returned by the server locally.
In this embodiment, when the execution principal receives the updated login credential returned by the server, the updated login credential is stored locally, so that the login credential is taken each time the user requests to log in to prove the legal identity of the user.
In some optional implementations of this embodiment, the method further includes: and responding to the received message which is returned by the server and indicates that the current user login credentials are illegal, and displaying the message to the user.
According to the information updating method applied to the client, the login operation of the user is received, the operation of responding to the login operation of the user and meeting the preset updating triggering request is responded, the updating request is sent to the server, the login credential returned by the server is stored locally in response to the received login credential returned by the server and corresponding to the updating request, the login credential of the user at the client is updated once every certain time, the login information of the user is always kept unexpired, the user is kept in a login state during login, frequent and repeated login operations of the user are reduced, and the user experience is improved.
With further reference to fig. 8, as an implementation of the method shown in fig. 2 to fig. 6, the present disclosure provides an embodiment of an information updating apparatus, which corresponds to the method embodiment shown in fig. 2, and which can be applied in various electronic devices.
As shown in fig. 8, the information updating apparatus 800 of the present embodiment includes: the acquisition unit 801 updates the unit 802. The acquiring unit 801 is configured to acquire a creation time of an initial login credential based on the initial login credential, where the initial login credential is a set of character strings used for representing a user login state; an updating unit 802 configured to determine whether a time difference between the creation time and the current time satisfies an updating condition, and update the creation time in response to the time difference between the creation time and the current time satisfying the updating condition.
In this embodiment, specific processes of the obtaining unit 801 and the updating unit 802 of the login apparatus 800 and technical effects thereof may refer to the related descriptions from step 201 to step 202 in the embodiment corresponding to fig. 2, which are not described herein again.
In some optional implementations of this embodiment, the updating unit includes: the judging module is configured to judge whether the time difference between the creating time and the current time is greater than the updating time of the initial login credential or not and whether the time difference between the creating time and the current time is less than the effective time of the initial login credential or not, wherein the updating time is used for representing the time interval for updating the initial login credential, and the effective time is used for representing the time for allowing the user to keep the login state; an update module configured to update the creation time in response to a time difference between the creation time and the current time being greater than the update duration and the time difference between the creation time and the current time being less than the valid duration.
In some optional implementations of this embodiment, the apparatus further includes: and the second updating unit is configured to update the failure time of the initial login credential, wherein the failure time is used for representing the starting time point of the user changing from the login state to the non-login state.
In some optional implementation manners of this embodiment, the obtaining unit includes: the analysis module is configured to analyze an update request data packet which is sent by the client and used for updating the initial login credentials to obtain the initial login credentials and a host name; and the decryption module is configured to decrypt the initial login credential to obtain the creation time of the initial login credential, the user login information and the host ID, wherein the host ID is used for representing the identity of the host of the program running environment.
In some optional implementations of this embodiment, the apparatus further includes: an encryption unit configured to encrypt the creation time, the user login information, and the host ID by using an encryption algorithm according to the updated creation time, and generate an updated login credential; a sending unit configured to send the updated login credential to the client.
In some optional implementations of this embodiment, the apparatus further includes: the host matching unit is configured to match host information corresponding to the host name in the database according to the host name; the information analysis unit is configured to analyze the content of the host information and extract a host number in the host information; the host verification unit is configured to judge whether the host number in the host information is the same as the host ID or not according to the host ID obtained by decryption; and the result execution unit is configured to continue executing subsequent work in response to the host number in the host information being the same as the host ID.
In some optional implementations of this embodiment, the apparatus further includes: and the message sending unit is configured to respond to that the host number in the host information is not identical to the host ID, and send a message that the initial login credentials are illegal to the client.
In some optional implementations of this embodiment, the apparatus further includes: a feedback unit configured to send the initial login credential to the client in response to a time difference between the creation time and the current time not being greater than the update duration.
Referring now to FIG. 9, shown is a schematic diagram of an electronic device (e.g., the server of FIG. 1) 900 suitable for use in implementing embodiments of the present disclosure. The terminal device in the embodiments of the present disclosure may include, but is not limited to, a mobile terminal such as a mobile phone, a notebook computer, a digital broadcast receiver, a PDA (personal digital assistant), a PAD (tablet computer), a PMP (portable multimedia player), a vehicle terminal (e.g., a car navigation terminal), and the like, and a fixed terminal such as a digital TV, a desktop computer, and the like. The server shown in fig. 9 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present disclosure.
As shown in fig. 9, the electronic device 900 may include a processing means (e.g., a central processing unit, a graphics processor, etc.) 901 that may perform various appropriate actions and processes in accordance with a program stored in a Read Only Memory (ROM)902 or a program loaded from a storage means 908 into a Random Access Memory (RAM) 903. In the RAM903, various programs and data necessary for the operation of the electronic apparatus 900 are also stored. The processing apparatus 901, the ROM 902, and the RAM903 are connected to each other through a bus 904. An input/output (I/O) interface 905 is also connected to bus 904.
Generally, the following devices may be connected to the I/O interface 905: input devices 906 including, for example, a touch screen, touch pad, keyboard, mouse, camera, microphone, accelerometer, gyroscope, etc.; an output device 907 including, for example, a Liquid Crystal Display (LCD), a speaker, a vibrator, and the like; storage 908 including, for example, magnetic tape, hard disk, etc.; and a communication device 909. The communication device 909 may allow the electronic apparatus 900 to perform wireless or wired communication with other apparatuses to exchange data. While fig. 9 illustrates an electronic device 900 having various means, it is to be understood that not all illustrated means are required to be implemented or provided. More or fewer devices may alternatively be implemented or provided. Each block shown in fig. 9 may represent one device or may represent multiple devices as desired.
In particular, according to an embodiment of the present disclosure, the processes described above with reference to the flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method illustrated in the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network through the communication device 909, or installed from the storage device 908, or installed from the ROM 902. The computer program, when executed by the processing apparatus 901, performs the above-described functions defined in the methods of the embodiments of the present disclosure.
It should be noted that the computer readable medium described in the embodiments of the present disclosure may be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In embodiments of the disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In embodiments of the present disclosure, however, a computer readable signal medium may comprise a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, optical cables, RF (radio frequency), etc., or any suitable combination of the foregoing.
The computer readable medium may be embodied in the electronic device; or may exist separately without being assembled into the electronic device. The computer readable medium carries one or more programs which, when executed by the electronic device, cause the electronic device to: acquiring the creation time of an initial login credential based on the initial login credential, wherein the initial login credential is a group of character strings used for representing the login state of a user; and judging whether the time difference between the creation time and the current time meets the updating condition, and updating the creation time in response to the fact that the time difference between the creation time and the current time meets the updating condition.
Computer program code for carrying out operations for embodiments of the present disclosure may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C + +, and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in the embodiments of the present disclosure may be implemented by software or hardware. The described units may also be provided in a processor, and may be described as: a processor includes an acquisition unit and an update unit. The names of these units do not in some cases constitute a limitation on the unit itself, and for example, the acquisition unit may also be described as a "unit that acquires the creation time of the initial login credential based on the initial login credential".
The foregoing description is only exemplary of the preferred embodiments of the disclosure and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the invention in the embodiments of the present disclosure is not limited to the specific combination of the above-mentioned features, but also encompasses other embodiments in which any combination of the above-mentioned features or their equivalents is made without departing from the inventive concept as defined above. For example, the above features and (but not limited to) technical features with similar functions disclosed in the embodiments of the present disclosure are mutually replaced to form the technical solution.

Claims (20)

1. An information updating method, the method comprising:
acquiring the creation time of an initial login credential based on the initial login credential, wherein the initial login credential is a group of character strings used for representing the login state of a user;
and judging whether the time difference between the creation time and the current time meets an updating condition, and updating the creation time in response to the time difference between the creation time and the current time meeting the updating condition.
2. The information updating method according to claim 1, wherein the determining whether the time difference between the creation time and the current time satisfies an update condition, and updating the creation time in response to the time difference between the creation time and the current time satisfying the update condition, includes:
judging whether the time difference between the creation time and the current time is greater than the updating time of the initial login credential or not, and whether the time difference between the creation time and the current time is less than the effective time of the initial login credential or not, wherein the updating time is used for representing the time interval for updating the initial login credential, and the effective time is used for representing the time for allowing the user to keep the login state;
and updating the creating time in response to the fact that the time difference between the creating time and the current time is larger than the updating time length and the time difference between the creating time and the current time is smaller than the effective time length.
3. The information updating method according to claim 1, wherein after determining whether or not the time difference between the creation time and the current time satisfies an update condition and updating the creation time in response to the time difference between the creation time and the current time satisfying the update condition, the method further comprises:
and updating the failure time of the initial login credential, wherein the failure time is used for representing the starting time point of the user changing from the login state to the non-login state.
4. The information updating method according to claim 1, wherein the acquiring a creation time of the initial login credential based on the initial login credential comprises:
analyzing an update request data packet which is sent by a client and used for updating an initial login credential to obtain the initial login credential and a host name;
and decrypting the initial login credentials to obtain the creation time of the initial login credentials, user login information and a host ID, wherein the host ID is used for representing the identity of a host of the program running environment.
5. The information updating method according to claim 4, wherein after the determining whether the time difference between the creation time and the current time satisfies the update condition and updating the creation time in response to the time difference between the creation time and the current time satisfying the update condition, the method further comprises:
encrypting the creation time, the user login information and the host ID by using an encryption algorithm according to the updated creation time to generate an updated login credential;
and sending the updated login credentials to a client.
6. The information updating method according to claim 4, wherein after the creation time of acquiring the initial login credential based on the initial login credential, the method further comprises:
according to the host name, matching host information corresponding to the host name in a database;
analyzing the content of the host information, and extracting a host number in the host information;
judging whether the host number in the host information is the same as the host ID or not according to the host ID obtained by decryption;
and responding to the host number in the host information being the same as the host ID, and continuing to execute subsequent work.
7. The information updating method according to claim 6, after said judging, according to the decrypted host ID, whether a host number in the host information is the same as the host ID, the method further comprising:
and responding to the host number in the host information being different from the host ID, and sending the message that the initial login credentials are illegal to the client.
8. The information updating method according to claim 1, wherein the method further comprises:
and sending the initial login credential to a client in response to the time difference between the creation time and the current time not meeting an update condition.
9. An information updating method, the method comprising:
receiving a user login operation, responding to the operation that the user login operation accords with a preset updating request triggering operation, and sending an updating request to a server, wherein the updating request is a request for updating a current user login credential;
and responding to the received login credential returned by the server and corresponding to the updating request, and storing the login credential returned by the server locally.
10. The information updating method of claim 9, the method further comprising:
and responding to the received message which is returned by the server and indicates that the current user login credentials are illegal, and displaying the message to the user.
11. An information updating apparatus comprising:
the system comprises an acquisition unit, a storage unit and a control unit, wherein the acquisition unit is configured to acquire the creation time of an initial login credential based on the initial login credential, and the initial login credential is a group of character strings used for representing the login state of a user;
an updating unit configured to determine whether a time difference between the creation time and the current time satisfies an updating condition, and update the creation time in response to the time difference between the creation time and the current time satisfying the updating condition.
12. The information updating apparatus according to claim 11, wherein the updating unit includes:
a judging module configured to judge whether a time difference between the creation time and the current time is greater than an update time of the initial login credential and whether the time difference between the creation time and the current time is less than an effective time of the initial login credential, wherein the update time is used for representing a time interval for updating the initial login credential, and the effective time is used for representing a time for allowing a user to keep a login state;
an update module configured to update the creation time in response to a time difference between the creation time and a current time being greater than the update duration and the time difference between the creation time and the current time being less than the valid duration.
13. The information updating apparatus according to claim 11, wherein the apparatus further comprises:
and the second updating unit is configured to update the failure time of the initial login credential, wherein the failure time is used for representing the starting time point of the user changing from the login state to the non-login state.
14. The information updating apparatus according to claim 11, wherein the acquisition unit includes:
the analysis module is configured to analyze an update request data packet which is sent by a client and used for updating an initial login certificate to obtain the initial login certificate and a host name;
and the decryption module is configured to decrypt the initial login credential to obtain the creation time of the initial login credential, user login information and a host ID, wherein the host ID is used for representing the identity of a host of the program running environment.
15. The information updating apparatus according to claim 14, wherein the apparatus further comprises:
an encryption unit configured to encrypt the creation time, the user login information, and the host ID by using an encryption algorithm according to the updated creation time, and generate an updated login credential;
a sending unit configured to send the updated login credential to a client.
16. The information updating apparatus according to claim 14, wherein the apparatus further comprises:
the host matching unit is configured to match host information corresponding to the host name in a database according to the host name;
the information analysis unit is configured to analyze the content of the host information and extract a host number in the host information;
the host verification unit is configured to judge whether the host number in the host information is the same as the host ID or not according to the host ID obtained by decryption;
a result execution unit configured to continue to execute subsequent work in response to a host number in the host information being the same as the host ID.
17. The information updating apparatus according to claim 16, wherein the apparatus further comprises:
and the message sending unit is configured to respond to the host number in the host information being different from the host ID, and send the message that the initial login credentials are illegal to the client.
18. The information updating apparatus according to claim 11, wherein the apparatus further comprises:
a feedback unit configured to send the initial login credential to a client in response to a time difference between the creation time and a current time not being greater than the update duration.
19. An electronic device, comprising:
one or more processors;
a storage device having one or more programs stored thereon;
when executed by the one or more processors, cause the one or more processors to implement the method of any one of claims 1-8.
20. A computer-readable medium, on which a computer program is stored, wherein the program, when executed by a processor, implements the method of any one of claims 1-8.
CN202010026856.1A 2020-01-10 2020-01-10 Information updating method and device Active CN111258602B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010026856.1A CN111258602B (en) 2020-01-10 2020-01-10 Information updating method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010026856.1A CN111258602B (en) 2020-01-10 2020-01-10 Information updating method and device

Publications (2)

Publication Number Publication Date
CN111258602A true CN111258602A (en) 2020-06-09
CN111258602B CN111258602B (en) 2023-06-30

Family

ID=70946856

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010026856.1A Active CN111258602B (en) 2020-01-10 2020-01-10 Information updating method and device

Country Status (1)

Country Link
CN (1) CN111258602B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113391858A (en) * 2021-07-12 2021-09-14 苏州达家迎信息技术有限公司 Page loading method and device in client, computer equipment and medium
CN113422784A (en) * 2021-07-12 2021-09-21 苏州达家迎信息技术有限公司 Login certificate updating method and device, computer equipment and storage medium
CN113542256A (en) * 2021-07-12 2021-10-22 苏州达家迎信息技术有限公司 Method, device, equipment and storage medium for updating login credentials in client
CN114124382A (en) * 2021-12-01 2022-03-01 深圳市大头兄弟科技有限公司 Voucher updating method, system, equipment and storage medium
CN114531471A (en) * 2020-11-09 2022-05-24 航天信息股份有限公司 Login state maintenance method, device, equipment and medium
CN114679302A (en) * 2022-03-01 2022-06-28 中信百信银行股份有限公司 Method, device, equipment and storage medium for docking single sign-on system

Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1906604A (en) * 2003-12-19 2007-01-31 微软公司 Routing of resource information in a network
CN104519050A (en) * 2014-11-14 2015-04-15 百度在线网络技术(北京)有限公司 Login method and login system
CN105323222A (en) * 2014-07-11 2016-02-10 博雅网络游戏开发(深圳)有限公司 Login verification method and login verification system
WO2016049870A1 (en) * 2014-09-30 2016-04-07 宇龙计算机通信科技(深圳)有限公司 Method and system for generating dynamic login credential
CN106790183A (en) * 2016-12-30 2017-05-31 广州华多网络科技有限公司 Logging on authentication method of calibration, device
US20170195346A1 (en) * 2016-01-04 2017-07-06 Microsoft Technology Licensing, Llc Systems and methods for the detection of advanced attackers using client side honeytokens
CN106982239A (en) * 2016-01-18 2017-07-25 中国移动通信集团公司 A kind of polyelectron channel report activating method and device
CN107786528A (en) * 2016-08-31 2018-03-09 阿里巴巴集团控股有限公司 The login method and device of application, communication system
CN108062221A (en) * 2017-12-11 2018-05-22 网易(杭州)网络有限公司 Processing method, device, storage medium and the processor of Software Development Kit
CN108322461A (en) * 2018-01-31 2018-07-24 百度在线网络技术(北京)有限公司 Method, system, device, equipment and the medium of application program automated log on
CN108900559A (en) * 2018-09-26 2018-11-27 平安普惠企业管理有限公司 Management method, device, computer equipment and the storage medium of logging on authentication
CN109118160A (en) * 2018-06-26 2019-01-01 腾讯科技(深圳)有限公司 A kind of information sharing method, device, terminal device and medium
CN109270850A (en) * 2018-12-13 2019-01-25 桂林电子科技大学 A kind of intelligent household management system and method based on Internet of Things
CN109284603A (en) * 2017-07-20 2019-01-29 腾讯科技(深圳)有限公司 A kind of configuration data processing method, device and storage medium
CN109831456A (en) * 2019-03-14 2019-05-31 腾讯科技(深圳)有限公司 Information push method, device, equipment and storage medium
CN109995755A (en) * 2019-02-20 2019-07-09 深圳点猫科技有限公司 A kind of control method and device of the logging state based on small routine framework
CN110362986A (en) * 2019-07-17 2019-10-22 福州福昕网络技术有限责任公司 A kind of wechat small routine automatic logging method and storage equipment

Patent Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1906604A (en) * 2003-12-19 2007-01-31 微软公司 Routing of resource information in a network
CN105323222A (en) * 2014-07-11 2016-02-10 博雅网络游戏开发(深圳)有限公司 Login verification method and login verification system
WO2016049870A1 (en) * 2014-09-30 2016-04-07 宇龙计算机通信科技(深圳)有限公司 Method and system for generating dynamic login credential
CN104519050A (en) * 2014-11-14 2015-04-15 百度在线网络技术(北京)有限公司 Login method and login system
US20170195346A1 (en) * 2016-01-04 2017-07-06 Microsoft Technology Licensing, Llc Systems and methods for the detection of advanced attackers using client side honeytokens
CN106982239A (en) * 2016-01-18 2017-07-25 中国移动通信集团公司 A kind of polyelectron channel report activating method and device
CN107786528A (en) * 2016-08-31 2018-03-09 阿里巴巴集团控股有限公司 The login method and device of application, communication system
CN106790183A (en) * 2016-12-30 2017-05-31 广州华多网络科技有限公司 Logging on authentication method of calibration, device
CN109284603A (en) * 2017-07-20 2019-01-29 腾讯科技(深圳)有限公司 A kind of configuration data processing method, device and storage medium
CN108062221A (en) * 2017-12-11 2018-05-22 网易(杭州)网络有限公司 Processing method, device, storage medium and the processor of Software Development Kit
CN108322461A (en) * 2018-01-31 2018-07-24 百度在线网络技术(北京)有限公司 Method, system, device, equipment and the medium of application program automated log on
CN109118160A (en) * 2018-06-26 2019-01-01 腾讯科技(深圳)有限公司 A kind of information sharing method, device, terminal device and medium
CN108900559A (en) * 2018-09-26 2018-11-27 平安普惠企业管理有限公司 Management method, device, computer equipment and the storage medium of logging on authentication
CN109270850A (en) * 2018-12-13 2019-01-25 桂林电子科技大学 A kind of intelligent household management system and method based on Internet of Things
CN109995755A (en) * 2019-02-20 2019-07-09 深圳点猫科技有限公司 A kind of control method and device of the logging state based on small routine framework
CN109831456A (en) * 2019-03-14 2019-05-31 腾讯科技(深圳)有限公司 Information push method, device, equipment and storage medium
CN110362986A (en) * 2019-07-17 2019-10-22 福州福昕网络技术有限责任公司 A kind of wechat small routine automatic logging method and storage equipment

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
MORGEN E. PECK等: "Blockchains: How they work and why they\'ll change the world", 《IEEE SPECTRUM》, pages 26 *
此行欲上天: "微信小程序保持登录状态", Retrieved from the Internet <URL:《https://www.jianshu.com/p/0334def6ca89?utm_campaign=maleskine》> *
章春梅 等: "基于ThinkPHP+微信小程序的校园社团云平台的设计与实现", 《电脑知识与技术》, pages 78 - 81 *
董陈晨: "微信公众号图文系统的设计与实现", 《中国优秀硕士学位论文全文数据库 信息科技辑》, pages 138 - 657 *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114531471A (en) * 2020-11-09 2022-05-24 航天信息股份有限公司 Login state maintenance method, device, equipment and medium
CN113391858A (en) * 2021-07-12 2021-09-14 苏州达家迎信息技术有限公司 Page loading method and device in client, computer equipment and medium
CN113422784A (en) * 2021-07-12 2021-09-21 苏州达家迎信息技术有限公司 Login certificate updating method and device, computer equipment and storage medium
CN113542256A (en) * 2021-07-12 2021-10-22 苏州达家迎信息技术有限公司 Method, device, equipment and storage medium for updating login credentials in client
CN113542256B (en) * 2021-07-12 2023-08-22 苏州达家迎信息技术有限公司 Method, device, equipment and storage medium for updating login credentials in client
CN114124382A (en) * 2021-12-01 2022-03-01 深圳市大头兄弟科技有限公司 Voucher updating method, system, equipment and storage medium
CN114124382B (en) * 2021-12-01 2024-04-09 深圳市闪剪智能科技有限公司 Credential updating method, system, device and storage medium
CN114679302A (en) * 2022-03-01 2022-06-28 中信百信银行股份有限公司 Method, device, equipment and storage medium for docking single sign-on system

Also Published As

Publication number Publication date
CN111258602B (en) 2023-06-30

Similar Documents

Publication Publication Date Title
CN111258602B (en) Information updating method and device
CN111199037B (en) Login method, system and device
US20210056541A1 (en) Method and system for mobile cryptocurrency wallet connectivity
CN107248984B (en) Data exchange system, method and device
US20180124023A1 (en) Method, system and apparatus for storing website private key plaintext
CN109743161B (en) Information encryption method, electronic device and computer readable medium
CN113271296B (en) Login authority management method and device
CN110377440B (en) Information processing method and device
CN107844488B (en) Data query method and device
CN110705985B (en) Method and apparatus for storing information
CN114584381A (en) Security authentication method and device based on gateway, electronic equipment and storage medium
CN112329044A (en) Information acquisition method and device, electronic equipment and computer readable medium
CN111767550A (en) Data storage method and device
CN112560003A (en) User authority management method and device
CN113079085B (en) Business service interaction method, business service interaction device, business service interaction equipment and storage medium
CN113824675B (en) Method and device for managing login state
CN114202332A (en) Digital currency wallet management method, device and system
CN111897620A (en) Interaction method and device and electronic equipment
CN111786936A (en) Method and device for authentication
CN110659476A (en) Method and apparatus for resetting password
CN110855655A (en) Information verification method, device, equipment and storage medium
CN113626873B (en) Authentication method, device, electronic equipment and computer readable medium
CN111835846B (en) Information updating method and device and electronic equipment
CN116112172B (en) Android client gRPC interface security verification method and device
CN114598549B (en) Customer SSL certificate verification method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant