CN111259358A - Login method, login device, computer equipment and storage medium - Google Patents

Login method, login device, computer equipment and storage medium Download PDF

Info

Publication number
CN111259358A
CN111259358A CN202010014556.1A CN202010014556A CN111259358A CN 111259358 A CN111259358 A CN 111259358A CN 202010014556 A CN202010014556 A CN 202010014556A CN 111259358 A CN111259358 A CN 111259358A
Authority
CN
China
Prior art keywords
application
user
authentication
login
applet
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010014556.1A
Other languages
Chinese (zh)
Other versions
CN111259358B (en
Inventor
冯先其
农思梅
杨东道
周伟峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Digital Guangdong Network Construction Co Ltd
Original Assignee
Digital Guangdong Network Construction Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Digital Guangdong Network Construction Co Ltd filed Critical Digital Guangdong Network Construction Co Ltd
Priority to CN202010014556.1A priority Critical patent/CN111259358B/en
Publication of CN111259358A publication Critical patent/CN111259358A/en
Application granted granted Critical
Publication of CN111259358B publication Critical patent/CN111259358B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Collating Specific Patterns (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The application relates to a login method, a login device, a computer device and a storage medium. The method comprises the following steps: when a login operation aiming at the third-party application is detected, calling a general authentication applet; the universal authentication applet is used for acquiring a user face image through the local camera and sending the user face image to the universal authentication server; the universal authentication server is used for identifying the face image of the user and feeding back an identification result; and after receiving the identification result, sending the identification result to an application login server corresponding to the third-party application so as to allow the application login server to log in the account of the user according to the identification result. The method integrates the account information of each application through the universal authentication applet, solves the information island problem of each application, and simplifies the login process. In addition, on the basis of simplifying the user login operation, login verification is performed through face recognition, and the safety of a user account is improved.

Description

Login method, login device, computer equipment and storage medium
Technical Field
The present application relates to the field of communications technologies, and in particular, to a login method, an apparatus, a computer device, and a storage medium.
Background
A WeChat applet, abbreviated as an applet, is an application which can be used without downloading and installation, realizes the dream of 'touchable' application, and can be opened by scanning a two-dimensional code or searching the application by a user. With the development of information technology, more and more business handling modes are migrated from offline to online, and nowadays, a user only needs to complete operations on online PC web pages, mobile-side apps and applets. However, when a user operates the system, the user often needs to log in the service system through an account password, and the method is low in safety, so that the user can log in the service system by adopting the technologies of face recognition and fingerprint verification.
However, since the business systems are various and distributed, if each system separately develops a face recognition authentication system, a lot of resources such as manpower, material resources, and time are consumed.
Therefore, the existing systems adopt respective face login authentication modes, and the problems of consuming resources such as manpower, material resources, time and the like exist.
Disclosure of Invention
In view of the above, it is necessary to provide a login method, a login device, a computer device, and a storage medium for solving the technical problem that the above systems use their respective face login authentication methods, which consume resources such as manpower, material resources, and time.
A method of logging in, the method comprising:
when a login operation aiming at the third-party application is detected, calling a general authentication applet; the universal authentication applet is used for acquiring a user face image through a local camera and sending the user face image to a universal authentication server; the universal authentication server is used for identifying the face image of the user and feeding back an identification result;
and after receiving the identification result, sending the identification result to an application login server corresponding to the third-party application, so that the application login server can log in the account of the user according to the identification result.
In one embodiment, the sending the identification result to the application login server corresponding to the third-party application includes:
when the fact that the user logs in the third-party application through scanning and authenticating the two-dimensional code is detected, the general authentication server sends the identification result to the application login server;
and when detecting that the user logs in the third-party application through triggering operation, the universal authentication server feeds back the identification result to the universal authentication applet, and the universal authentication applet sends the identification result to the application login server.
In one embodiment, after the user is detected to log in the third-party application through a triggering operation, the method further includes:
receiving an application identifier sent by the third-party application;
and sending the application identifier to the general authentication applet for the general authentication applet to send the identification result to an application login server corresponding to the application identifier according to the application identifier.
In one embodiment, before the step of detecting that the user logs in the third-party application by scanning the authentication two-dimensional code, the method further includes:
receiving an authentication two-dimensional code generation request sent by the third-party application;
the two-dimension code generation request is sent to the universal authentication server, and the universal authentication server generates the authentication two-dimension code according to the authentication two-dimension code generation request; the authentication two-dimensional code includes: the program number of the general authentication applet, the path information of the third party application and a two-dimensional code identifier generated by the unique identifier tool library;
and sending the authentication two-dimensional code to the third-party application for displaying by the third-party application.
In one embodiment, after it is detected that the user logs in the third-party application by scanning the authentication two-dimensional code, the method further includes:
receiving user account information input by a user in the universal authentication applet;
when the face image of the user is successfully identified, setting a callback function; the callback function is used for binding the two-dimension code identification with the user account information;
and executing the callback function, and returning the user account information to the application login server corresponding to the two-dimensional code identifier so that the application login server can perform login operation according to the user account information.
In one embodiment, the method further comprises:
acquiring a plurality of candidate face images from a database;
matching the user face image with the candidate face image;
and when the candidate face image which is the same as the user face image is matched, judging that the user face image is successfully identified.
In one embodiment, after the sending the identification result to the application login server corresponding to the third-party application, the method further includes:
and clearing the cache data of the general authentication applet for other third-party applications to call.
A login device, the device comprising:
the applet calling module is used for calling the universal authentication applet when the login operation aiming at the third-party application is detected; the universal authentication applet is used for acquiring a user face image through a local camera and sending the user face image to a universal authentication server; the universal authentication server is used for identifying the face image of the user and feeding back an identification result;
and the result sending module is used for sending the identification result to an application login server corresponding to the third-party application after receiving the identification result so that the application login server can log in the account of the user according to the identification result.
A computer device comprising a memory and a processor, the memory storing a computer program, the processor implementing the following steps when executing the computer program:
when a login operation aiming at the third-party application is detected, calling a general authentication applet; the universal authentication applet is used for acquiring a user face image through a local camera and sending the user face image to a universal authentication server; the universal authentication server is used for identifying the face image of the user and feeding back an identification result;
and after receiving the identification result, sending the identification result to an application login server corresponding to the third-party application, so that the application login server can log in the account of the user according to the identification result.
A computer-readable storage medium, on which a computer program is stored which, when executed by a processor, carries out the steps of:
when a login operation aiming at the third-party application is detected, calling a general authentication applet; the universal authentication applet is used for acquiring a user face image through a local camera and sending the user face image to a universal authentication server; the universal authentication server is used for identifying the face image of the user and feeding back an identification result;
and after receiving the identification result, sending the identification result to an application login server corresponding to the third-party application, so that the application login server can log in the account of the user according to the identification result.
According to the login method, the login device, the computer equipment and the storage medium, when the login operation aiming at the third-party application is detected, the universal authentication applet is called, the universal authentication applet is adopted to collect the face image of the user and send the face image to the universal authentication server for identification, an identification result is obtained, then the identification result is sent to the application login server corresponding to the third-party application, and the application login server carries out the login operation according to the identification result. The account information of each application is integrated through the universal authentication applet, the problem of information isolated island of each application is solved, the login process is simplified, the user does not need to register an account password in each application, and the login operation of each application can be realized only through the universal authentication applet. In addition, on the basis of simplifying the user login operation, login verification is carried out through face recognition, and the safety of a user account is improved, so that the problem that a large amount of manpower, material resources and time are consumed for developing an authentication system of each application in the traditional method is solved.
Drawings
FIG. 1a is a diagram of an application environment for a login method in one embodiment;
FIG. 1b is a diagram of another application environment for a login method in one embodiment;
FIG. 2 is a flowchart illustrating a login method according to an embodiment;
FIG. 3 is a flowchart illustrating application of a login method in one embodiment;
FIG. 4 is an interaction sequence diagram of a login method in another embodiment;
FIG. 5 is a flowchart of another application of the login method in one embodiment;
FIG. 6 is another interaction sequence diagram of the login method in another embodiment;
FIG. 7 is a block diagram showing the structure of a login device in one embodiment;
FIG. 8 is a diagram illustrating an internal structure of a computer device according to an embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
The login method provided by the application can be applied to the application environment shown in fig. 1. Fig. 1a shows an application environment diagram when the third-party application is an app or an applet, in which an application login server 102 communicates with a terminal 104 through a network. Wherein the terminal 104 communicates with the universal authentication server 106 via a network. FIG. 1b illustrates an application environment when the third party application is a web page or kiosk, where the application login server 102 communicates with the universal authentication server 106 over a network. The terminal 104 may be, but not limited to, various personal computers, notebook computers, smart phones, tablet computers, and portable wearable devices, and the application login server 102 and the general authentication server 106 may be implemented by independent servers or a server cluster composed of a plurality of servers.
The universal authentication applet is displayed on the terminal 104, and when the application login server 102 detects that the user logs in the third-party application, the universal authentication applet is called, so that the user can acquire a face image through the application login applet, then the application login applet sends the acquired face image of the user to the universal authentication server 106, the universal authentication server 106 identifies the face image of the user, and an identification result is generated. Finally, the general authentication server 106 feeds back the identification result to the application login server 102, or the general authentication server 106 feeds back the identification result to the application login applet, and the application login applet sends the identification result to the application login server 102.
In one embodiment, as shown in fig. 2, a login method is provided, which is described by taking the method as an example applied to the terminal 104 in fig. 1, and includes the following steps:
step S202, when the login operation aiming at the third-party application is detected, a general authentication applet is called; the universal authentication applet is used for acquiring a user face image through the local camera and sending the user face image to the universal authentication server; the universal authentication server is used for identifying the face image of the user and feeding back an identification result.
The third-party application represents an application program for logging in by a user, and may be an app, an applet, a web page, an all-in-one machine, or the like.
The universal authentication applet can be suitable for different third-party applications and can be called by the third-party applications.
In a specific implementation, when the third-party application is a web page or an all-in-one machine, an application environment diagram of the third-party application is as shown in fig. 1b, and an authentication two-dimensional code is displayed on a login interface of the third-party application, where the authentication two-dimensional code includes an application identifier of a general authentication applet. When the user scans the authentication two-dimensional code through the terminal 102 and completes the identification of the authentication two-dimensional code, the universal authentication applet is called, that is, the universal authentication applet is called. Meanwhile, when the universal authentication applet is called, the universal authentication applet can also acquire the unique identifier of the authentication two-dimensional code.
When the third-party application is an app or an applet, the generic authentication applet and the third-party application need to send a set transfer parameter to invoke the generic authentication applet, and an application environment diagram of the generic authentication applet is shown in fig. 1 a. Specifically, when the login application server 102 of the third-party application detects a trigger operation of the user on the login interface of the third-party application, an applet calling request is generated, and the calling request and the set transfer parameters are sent to the universal authentication applet together, so as to complete the calling of the universal authentication applet. In addition, initial delivery parameters will be recorded while the generic applet is being invoked.
The content included in the transfer parameters can be represented by the following table 1, and mainly includes: from (application source), application name, identification card number, real name, etc. The first column in the table indicates the field of the transfer parameter, the second column indicates the type of the string of the transfer parameter, the third column indicates whether the transfer parameter is necessary for transfer, and the fourth column indicates the meaning and the desired numerical logic of the transfer parameter.
The from represents a form of a third-party application calling the universal authentication applet, and may be: an applet or an app.
Wherein, action represents service scenario parameter, that is, parameter transferred according to service requirement of third party application. For example, when the action value is REALNAME _ AUTH, it indicates that the third party application needs to verify whether the user's face image matches the identification card and name. For example, if the app wants to verify whether the identity card and the name input by the user are input by the user, when the general authentication applet is called, the parameters may be passed as follows: pages/face-auth? from app & action ═ real _ AUTH & cid ═ 412325xxxxxx203& Name ═ Name.
TABLE 1
Figure BDA0002358382120000071
And step S204, after receiving the identification result, sending the identification result to an application login server corresponding to the third-party application so as to allow the application login server to perform login operation according to the identification result.
In a specific implementation, when the third-party application is a web page or an all-in-one machine, after the face image of the user is collected by the universal authentication applet, the face image of the user is sent to the universal authentication server 106, and after the universal authentication server 106 receives the face image of the user, the face image of the user is matched with a plurality of candidate face images stored in the database according to a matching algorithm. When the face image of the user is matched in the database, judging that the matching is successful; otherwise, if the user face image is not matched in the database, judging that the matching fails; and taking the matching result as the recognition result of the face image of the user. Finally, the general authentication server 106 sends the identification result to the application login server 102, so that the application login server 102 performs a login operation on the account of the user according to the identification result.
When the third-party application is an app or an applet, after the general authentication applet collects the face image of the user, the face image of the user is sent to the general authentication server 106, and the general authentication server 106 recognizes the face image of the user to generate a recognition result. And feeds back the identification result to the general authentication applet 104, and the general authentication applet sends the identification result to the application login server 102, thereby completing the login operation to the account of the user. The method for recognizing the face image of the user is the same as that of the third-party application which is a web page or an all-in-one machine, and is not described herein again.
According to the login method, when login operation aiming at the third-party application is detected, the universal authentication applet is called, the universal authentication applet is adopted to collect the face image of the user and send the face image to the universal authentication server for identification, an identification result is obtained, then the identification result is sent to the application login server corresponding to the third-party application, and the application login server performs login operation according to the identification result. The account information of each application is integrated through the universal authentication applet, the information island problem of each application is solved, the login process is simplified, the user does not need to register an account number and a password in each application, and the login operation of each application can be realized only through the universal authentication applet. In addition, on the basis of simplifying the user login operation, login verification is carried out through face recognition, and the safety of a user account is improved, so that the problem that a large amount of manpower, material resources and time are consumed for developing an authentication system of each application in the traditional method is solved.
In an embodiment, the step of sending the identification result to the application login server corresponding to the third-party application includes: when the fact that the user logs in the third-party application through scanning the authentication two-dimensional code is detected, the general authentication server sends the identification result to the application login server; and when the fact that the user logs in the third-party application through triggering operation is detected, the general authentication server feeds the identification result back to the general authentication applet, and the general authentication applet sends the identification result to the application login server.
In the specific implementation, when it is detected that the user logs in the third-party application by scanning the authentication two-dimensional code, that is, the third-party application is a web page or an all-in-one machine, the user scans the authentication two-dimensional code displayed in the third-party application through the handheld terminal to call the universal authentication applet, the universal authentication applet sends the user face image acquired through the local camera to the universal authentication server for identification, and receives an identification result fed back by the universal authentication server, and meanwhile, the universal authentication applet calls a corresponding interface to receive a token (generally used as an invitation and a login system) sent by the universal authentication server, and sends the token and the identification result to the application login server, so that the application login server performs login operation according to the identification result.
When it is detected that the user logs in the third-party application through a trigger operation, that is, the third-party application is an app or an applet, the user may log in the third-party application in the handheld terminal, for example, by clicking a login button in a display interface, a call to the universal authentication applet may be triggered. At this time, after receiving the user face image sent by the universal authentication applet, the universal authentication server directly returns the recognition result and token to the application login server of the third-party application, and further enables the application login server to perform login operation according to the recognition result.
In the embodiment, different login methods are adopted according to different forms of the third-party application, so that the universal authentication applet can be suitable for the third-party applications in various forms, the development cost and the development workload of the third-party application on authentication login are reduced, and the manpower, material resources and time resources are saved.
In an embodiment, after the step of detecting that the user logs in the third-party application through the trigger operation is performed, the method further includes: receiving an application identifier sent by a third party application; and sending the application identifier to the general authentication applet for sending the identification result to the application login server corresponding to the application identifier by the general authentication applet according to the application identifier.
The application identifier represents a transfer parameter sent by the third-party application to the universal authentication applet, and may be a parameter that can identify the third-party application, such as an application name and an application path.
In a specific implementation, when a user logs in a third-party application through an app or an applet, the universal authentication applet records transfer parameters sent by the third-party application when the universal authentication applet is called. Wherein the transfer parameter not only includes the application identification, but also includes the parameter as in the first column of table 1. Wherein the transfer parameter may represent a set of variables in the form of key value pairs, and the parameters may be partitioned by "&", for example, the transfer parameter may be represented in the form of: from app & appName & skip 1. Different methods for calling the universal authentication applet by different third-party applications are different, and the universal applet provides a plurality of calling methods for the third-party applications to call.
After the universal authentication applet records the application identifier of the third-party application, after the universal authentication applet receives the recognition result of the face image of the user fed back by the universal authentication server, the recognition result can be sent to the corresponding application login server according to the application identifier, and then login operation is completed.
In this embodiment, the general authentication applet receives the application identifier of the third-party application, so that the identification result of identifying the face image of the user is sent to the application login server corresponding to the application identifier, and the login operation of the user on the third-party application corresponding to the application identifier is completed.
In an embodiment, before the step of detecting that the user logs in the third-party application by scanning the authentication two-dimensional code, the method further includes: receiving an authentication two-dimensional code generation request sent by a third-party application; sending a two-dimension code generation request to a universal authentication server, and generating an authentication two-dimension code by the universal authentication server; the authentication two-dimensional code includes: the program number of the general authentication applet, the path information of the third party application and the two-dimensional code identification generated by the unique identification tool library; and sending the authentication two-dimensional code to a third-party application for displaying by the third-party application.
The authentication two-dimensional code can represent a two-dimensional code scanned by a user before logging in the third-party application.
In the specific implementation, before a user logs in a third-party application by scanning an authentication two-dimensional code, the third-party application is triggered to send an authentication two-dimensional code generation request to a universal authentication server, and after the universal authentication server receives the authentication two-dimensional code generation request, an authentication two-dimensional code consisting of a program number of a universal authentication applet, an application path of the third-party application and a uuid generated by a unique identification tool library is generated. And then, the universal authentication server sends the generated authentication two-dimensional code to the third-party application, so that the third-party application displays the authentication two-dimensional code, and the user can scan the authentication two-dimensional code conveniently.
In this embodiment, after the user scans the authentication two-dimensional code, the universal authentication applet can determine the target application login server to which the identification result is to be sent according to the two-dimensional code identifier and the path information of the third-party application, and the universal authentication applet can be called according to the program number.
In an embodiment, after the step of detecting that the user logs in the third-party application by scanning the authentication two-dimensional code is performed, the method further includes: receiving user account information input by a user in the universal authentication applet; when the face image of the user is successfully identified, setting a callback function; the callback function is used for binding the two-dimension code identification with the user account information; and executing a callback function, and returning the user account information to the application login server corresponding to the two-dimensional code identification so as to carry out login operation by the application login server according to the user account information.
In specific implementation, when the third-party application is a web page or an all-in-one machine, a user can log in through scanning and authenticating the two-dimensional code. When the application login server of the third-party application detects that a user finishes scanning the authentication two-dimensional code displayed in the web page or the all-in-one machine through the handheld terminal, a universal authentication applet is called at the handheld terminal, and meanwhile, the universal authentication applet obtains the uuid of the authentication two-dimensional code. And then, the universal authentication applet receives account information such as the identification number, the name and the like input by the user, and sends the face image of the user to a universal authentication server for identification through the face image of the user collected by the local camera. And when the received recognition result returned by the universal authentication server is successful, the universal authentication applet sets a callback function, and binds the account information input by the user and the uuid identifier of the authentication two-dimensional code, so that the universal authentication applet can send the account information of the user to the universal authentication server corresponding to the uuid identifier, and further perform login operation on the user account.
In this embodiment, the user account information and the two-dimension code identifier of the authentication two-dimension code are bound, and the user account information is sent to the application login server of the third-party application, so that the corresponding authentication two-dimension code is determined according to the two-dimension code identifier, the corresponding third-party application is determined according to the path information of the third-party application in the authentication two-dimension code, and finally the application login server completes the login operation of the user on the third-party application according to the user account information.
In one embodiment, the method further comprises: acquiring a plurality of candidate face images from a database; matching the user face image with the candidate face image; and when the candidate face image which is the same as the face image of the user is matched, judging that the face image of the user is successfully identified.
In a specific implementation, the generic authentication applet will store the face image in the database after the user first logs in to take the face image. When the user logs in again, the face image is shot, the universal authentication server obtains a plurality of candidate face images from the database after receiving the user face image collected by the universal authentication applet, the user face image and the candidate face images are matched according to corresponding matching methods, and when one candidate face image is the same as the user face image, the user face image is judged to be successfully identified. On the contrary, if the candidate face image identical to the user face image is not matched in the database, the user face image is judged to be failed to be identified.
Optionally, the third-party application may set the action value according to a requirement, for example, it may be set that the third-party application can only be logged in for a specific user, and when the user face image is identified, it is only necessary to match the user face image collected by the general authentication applet with the face image of the specific user stored in the database, and determine whether the collected user face image is the face image of the specific user.
In the embodiment, the face image of the user is matched and identified to generate the identification result, so that the application login server can determine whether the user can perform login operation according to the identification result, the user does not need to remember the account number and the password of each application system, and only face identification is needed to perform operation in each application system, so that the login convenience of the user is greatly improved, and the account login safety is improved by performing face identification.
In an embodiment, after the step of sending the identification result to the application login server corresponding to the third party application, the method further includes: and clearing the cache data of the general authentication applet for other third-party applications to call.
In specific implementation, when the third-party application is an app or an applet, after the universal authentication applet finishes collecting the face image of the user and sends the identification result received from the universal authentication server to the application login server of the third-party application, the universal authentication applet clears the previous cache data to restore the initial configuration for other third-party applications to call
In this embodiment, by removing the cache data in the generic authentication applet, that is, removing the application information transmitted by the third-party application, the initial configuration of the generic authentication applet is recovered, and data pollution caused when other third-party applications call the generic authentication applet next time can be prevented.
In order to better understand the above method, an application example of the login method of the present application is described in detail below.
When the fact that the user logs in the third-party application through scanning the authentication two-dimensional code is detected, real-name authentication is conducted through a web page or an all-in-one machine, an application flow chart of the login method is shown in figure 3, and the method mainly comprises the following steps:
the web page can get the two-dimensional code and the unique identifier uuid of the universal authentication applet through the interface a1 provided by the universal authentication applet. The interface A1 does not need to transfer parameters, and the two-dimensional code returned by the interface A1 is picture information generated by the applet apid + page path + uuid generated by the unique identification tool library.
The web page starts polling the two-dimensional code state using interface a2, the two-dimensional code state comprising: 0 unscanned, 1 scanned, 2 authenticated. When polling to status of two-dimensional code is 1, the web page displays the scanned code, and when polling to status a2, interface a2 simultaneously returns a code (validity period 5 minutes) containing user information.
3. And (3) scanning the two-dimensional code by the user to open the small universal authentication program, acquiring the uuid by the small universal authentication program, and calling an interface B1 to change the state of the two-dimensional code of the uuid into 1.
4. The user carries out face recognition on the universal authentication applet, after the recognition is successful, the universal authentication applet calls the interface B2 to enable the uuid two-dimensional code state to be 2, and the rear end binds uuid and face brushing user information during the calling.
5. At this time, when the web page polls the interface a2, the two-dimensional code state is changed to 2, polling is stopped, and the code containing the real name information can be acquired in the field of the interface return value.
The web page calls the interface A3 with code as a parameter, and the interface A3 returns specific real name information. Specifically, a field in a polling interface return value at the back end represents a code of real name information, and when the field has a value, the code is taken to call the interface A3 to return the specific real name information; the real name information may include a name, an identification card, and the like.
As shown in fig. 4, is a sequence diagram of the interaction between a web page or kiosk, a generic authentication applet and an applet backend server. Firstly, a web page or an all-in-one machine sends a two-dimensional code generation request to an applet back-end server, the applet back-end server generates a two-dimensional code carrying uuid, the two-dimensional code is returned to the web page or the all-in-one machine for display, and meanwhile, the web page scans a code scanning result of the polling request. And the user calls the general authentication applet to perform face brushing authentication by scanning the two-dimensional code, a face brushing result is generated at the applet back-end server, and the face brushing result is returned to the web page or the all-in-one machine by the applet back-end server.
When it is detected that a user logs in a third-party application through an app or an applet, an application flowchart of login in the application is shown in fig. 5, and the main steps include:
1. first, the generic authentication applet and the third party application agree on delivery parameters, and the specific delivery parameters are shown in table 1. Wherein, from represents the source, if the app value is app, and the applet is miniProaram.
2. Initial data including from, action, etc. are recorded at the initial stage of the general authentication applet being called up.
3. And carrying out face recognition.
4. After the face recognition is successful, different buttons are displayed on the interface of the general authentication applet according to the action processing logic and the from value, the user can return the face brushing result to the third-party application, namely the app or the applet by clicking the buttons, and the user jumps back to the program interface of the third party.
5. And after successfully returning to the third party, clearing the initial data cached before the universal authentication applet, and displaying a 'return home page' button for other third party applications to call again.
As shown in fig. 6, it is a sequence diagram of the interaction between the app or third party applet, the generic authentication applet and the applet backend server. Firstly, the app or the applet carries transfer parameters to call the general authentication applet, the general authentication applet collects a face image of a user and sends the face image to the applet back-end server for identification. After the applet back-end server finishes identification, the identification result is fed back to the general authentication applet, and when the general authentication applet returns to the app or the third-party applet, the identification result is sent to the app or the third-party applet.
In the embodiment, the account information of each application is integrated through the universal authentication applet, the problem of information isolated island of each application is solved, the login process is simplified, a user does not need to register an account password in each application, and the login operation of each application can be realized only through the universal authentication applet. In addition, on the basis of simplifying the user login operation, login verification is carried out through face recognition, and the safety of a user account is improved, so that the problem that a large amount of manpower, material resources and time are consumed for developing an authentication system of each application in the traditional method is solved.
It should be understood that although the steps in the flowcharts of fig. 2, 3 and 5 are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least some of the steps in fig. 2, 3, and 5 may include multiple sub-steps or multiple stages that are not necessarily performed at the same time, but may be performed at different times, and the order of performing the sub-steps or stages is not necessarily sequential, but may be performed alternately or alternatingly with other steps or at least some of the sub-steps or stages of other steps.
In one embodiment, as shown in fig. 7, there is provided a login apparatus including: an applet calling module 702 and a result sending module 704, wherein:
an applet calling module 702 configured to call a generic authentication applet when a login operation for a third party application is detected; the universal authentication applet is used for acquiring a user face image through the local camera and sending the user face image to the universal authentication server; the universal authentication server is used for identifying the face image of the user and feeding back an identification result;
and the result sending module 704 is configured to, after receiving the identification result, send the identification result to the application login server corresponding to the third-party application, so that the application login server logs in the account of the user according to the identification result.
In an embodiment, the result sending module 704 is specifically configured to: when the fact that the user logs in the third-party application through scanning the authentication two-dimensional code is detected, the general authentication server sends the identification result to the application login server; and when the fact that the user logs in the third-party application through triggering operation is detected, the general authentication server feeds the identification result back to the general authentication applet, and the general authentication applet sends the identification result to the application login server.
In one embodiment, the result sending module 704 includes:
the identification receiving submodule is used for receiving an application identification sent by a third-party application;
and the identification sending submodule is used for sending the application identification to the universal authentication applet for the universal authentication applet to send the identification result to the application login server corresponding to the application identification according to the application identification.
In one embodiment, the result sending module 704 further includes:
the request receiving submodule is used for receiving an authentication two-dimensional code generation request sent by a third-party application;
the request sending submodule is used for sending the two-dimension code generating request to the universal authentication server, and the universal authentication server generates an authentication two-dimension code; the authentication two-dimensional code includes: the program number of the general authentication applet, the path information of the third party application and the two-dimensional code identification generated by the unique identification tool library;
and the two-dimension code sending submodule is used for sending the authentication two-dimension code to the third-party application so as to display the authentication two-dimension code by the third-party application.
In one embodiment, the above apparatus further comprises:
the information receiving submodule is used for receiving user account information input by a user in the universal authentication applet;
the setting submodule is used for setting a callback function when the face image of the user is successfully identified; the callback function is used for binding the two-dimension code identification with the user account information;
and the execution submodule is used for executing the callback function and returning the user account information to the application login server corresponding to the two-dimensional code identification so as to carry out login operation for the application login server according to the user account information.
In an embodiment, the setting sub-module is further configured to: acquiring a plurality of candidate face images from a database; matching the user face image with the candidate face image; and when the candidate face image which is the same as the face image of the user is matched, judging that the face image of the user is successfully identified.
In one embodiment, the result sending module 704 is further configured to: and clearing the cache data of the general authentication applet for other third-party applications to call.
It should be noted that, the login apparatus of the present application corresponds to the login method of the present application one to one, and the technical features and the advantages thereof described in the embodiments of the login method are all applicable to the embodiments of the login apparatus, and specific contents may be referred to the description in the embodiments of the method of the present application, which is not described herein again, and thus is stated herein.
Further, each module in the above-described login apparatus may be entirely or partially implemented by software, hardware, or a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a computer device is provided, which may be a terminal, and its internal structure diagram may be as shown in fig. 8. The computer device includes a processor, a memory, a network interface, a display screen, and an input device connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a login method. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, a key, a track ball or a touch pad arranged on the shell of the computer equipment, an external keyboard, a touch pad or a mouse and the like.
Those skilled in the art will appreciate that the architecture shown in fig. 8 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, there is provided a computer device comprising a memory and a processor, the memory storing a computer program, the processor implementing the following steps when executing the computer program:
when a login operation aiming at the third-party application is detected, calling a general authentication applet; the universal authentication applet is used for acquiring a user face image through the local camera and sending the user face image to the universal authentication server; the universal authentication server is used for identifying the face image of the user and feeding back an identification result;
and after receiving the identification result, sending the identification result to an application login server corresponding to the third-party application so as to allow the application login server to log in the account of the user according to the identification result.
In one embodiment, the processor, when executing the computer program, further performs the steps of: when the fact that the user logs in the third-party application through scanning the authentication two-dimensional code is detected, the general authentication server sends the identification result to the application login server; and when the fact that the user logs in the third-party application through triggering operation is detected, the general authentication server feeds the identification result back to the general authentication applet, and the general authentication applet sends the identification result to the application login server.
In one embodiment, the processor, when executing the computer program, further performs the steps of: receiving an application identifier sent by a third party application; and sending the application identifier to the general authentication applet for sending the identification result to the application login server corresponding to the application identifier by the general authentication applet according to the application identifier.
In one embodiment, the processor, when executing the computer program, further performs the steps of: receiving an authentication two-dimensional code generation request sent by a third-party application; sending a two-dimension code generation request to a universal authentication server, and generating an authentication two-dimension code by the universal authentication server; the authentication two-dimensional code includes: the program number of the general authentication applet, the path information of the third party application and the two-dimensional code identification generated by the unique identification tool library; and sending the authentication two-dimensional code to a third-party application for displaying by the third-party application.
In one embodiment, the processor, when executing the computer program, further performs the steps of: receiving user account information input by a user in the universal authentication applet; when the face image of the user is successfully identified, setting a callback function; the callback function is used for binding the two-dimension code identification with the user account information; and executing a callback function, and returning the user account information to the application login server corresponding to the two-dimensional code identification so as to carry out login operation by the application login server according to the user account information.
In one embodiment, the processor, when executing the computer program, further performs the steps of: acquiring a plurality of candidate face images from a database; matching the user face image with the candidate face image; and when the candidate face image which is the same as the face image of the user is matched, judging that the face image of the user is successfully identified.
In one embodiment, the processor, when executing the computer program, further performs the steps of: and clearing the cache data of the general authentication applet for other third-party applications to call.
In one embodiment, a computer-readable storage medium is provided, having a computer program stored thereon, which when executed by a processor, performs the steps of:
when a login operation aiming at the third-party application is detected, calling a general authentication applet; the universal authentication applet is used for acquiring a user face image through the local camera and sending the user face image to the universal authentication server; the universal authentication server is used for identifying the face image of the user and feeding back an identification result;
and after receiving the identification result, sending the identification result to an application login server corresponding to the third-party application so as to allow the application login server to log in the account of the user according to the identification result.
In one embodiment, the computer program when executed by the processor further performs the steps of: when the fact that the user logs in the third-party application through scanning the authentication two-dimensional code is detected, the general authentication server sends the identification result to the application login server; and when the fact that the user logs in the third-party application through triggering operation is detected, the general authentication server feeds the identification result back to the general authentication applet, and the general authentication applet sends the identification result to the application login server.
In one embodiment, the computer program when executed by the processor further performs the steps of: receiving an application identifier sent by a third party application; and sending the application identifier to the general authentication applet for sending the identification result to the application login server corresponding to the application identifier by the general authentication applet according to the application identifier.
In one embodiment, the computer program when executed by the processor further performs the steps of: receiving an authentication two-dimensional code generation request sent by a third-party application; sending a two-dimension code generation request to a universal authentication server, and generating an authentication two-dimension code by the universal authentication server; the authentication two-dimensional code includes: the program number of the general authentication applet, the path information of the third party application and the two-dimensional code identification generated by the unique identification tool library; and sending the authentication two-dimensional code to a third-party application for displaying by the third-party application.
In one embodiment, the computer program when executed by the processor further performs the steps of: receiving user account information input by a user in the universal authentication applet; when the face image of the user is successfully identified, setting a callback function; the callback function is used for binding the two-dimension code identification with the user account information; and executing a callback function, and returning the user account information to the application login server corresponding to the two-dimensional code identification so as to carry out login operation by the application login server according to the user account information.
In one embodiment, the computer program when executed by the processor further performs the steps of: acquiring a plurality of candidate face images from a database; matching the user face image with the candidate face image; and when the candidate face image which is the same as the face image of the user is matched, judging that the face image of the user is successfully identified.
In one embodiment, the computer program when executed by the processor further performs the steps of: and clearing the cache data of the general authentication applet for other third-party applications to call.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. A method of logging in, the method comprising:
when a login operation aiming at the third-party application is detected, calling a general authentication applet; the universal authentication applet is used for acquiring a user face image through a local camera and sending the user face image to a universal authentication server; the universal authentication server is used for identifying the face image of the user and feeding back an identification result;
and after receiving the identification result, sending the identification result to an application login server corresponding to the third-party application, so that the application login server can log in the account of the user according to the identification result.
2. The method according to claim 1, wherein the sending the identification result to an application login server corresponding to the third-party application comprises:
when the fact that the user logs in the third-party application through scanning and authenticating the two-dimensional code is detected, the general authentication server sends the identification result to the application login server;
and when detecting that the user logs in the third-party application through triggering operation, the universal authentication server feeds back the identification result to the universal authentication applet, and the universal authentication applet sends the identification result to the application login server.
3. The method of claim 2, wherein after detecting that the user logs in the third-party application through a triggering operation, the method further comprises:
receiving an application identifier sent by the third-party application;
and sending the application identifier to the general authentication applet for the general authentication applet to send the identification result to an application login server corresponding to the application identifier according to the application identifier.
4. The method of claim 2, wherein before the step of detecting that the user logs in the third-party application by scanning the authentication two-dimensional code, the method further comprises:
receiving an authentication two-dimensional code generation request sent by the third-party application;
sending the two-dimension code generation request to the universal authentication server, and generating the authentication two-dimension code by the universal authentication server; the authentication two-dimensional code includes: the program number of the general authentication applet, the path information of the third party application and a two-dimensional code identifier generated by the unique identifier tool library;
and sending the authentication two-dimensional code to the third-party application for displaying by the third-party application.
5. The method of claim 4, wherein after detecting that the user logs in the third-party application by scanning the authentication two-dimensional code, the method further comprises:
receiving user account information input by a user in the universal authentication applet;
when the face image of the user is successfully identified, setting a callback function; the callback function is used for binding the two-dimension code identification with the user account information;
and executing the callback function, and returning the user account information to the application login server corresponding to the two-dimensional code identifier so that the application login server can perform login operation according to the user account information.
6. The method of claim 5, further comprising:
acquiring a plurality of candidate face images from a database;
matching the user face image with the candidate face image;
and when the candidate face image which is the same as the user face image is matched, judging that the user face image is successfully identified.
7. The method of claim 1, wherein after sending the identification result to the application login server corresponding to the third-party application, further comprising:
and clearing the cache data of the general authentication applet for other third-party applications to call.
8. A login apparatus, the apparatus comprising:
the applet calling module is used for calling the universal authentication applet when the login operation aiming at the third-party application is detected; the universal authentication applet is used for acquiring a user face image through a local camera and sending the user face image to a universal authentication server; the universal authentication server is used for identifying the face image of the user and feeding back an identification result;
and the result sending module is used for sending the identification result to an application login server corresponding to the third-party application after receiving the identification result so that the application login server can log in the account of the user according to the identification result.
9. A computer device comprising a memory and a processor, the memory storing a computer program, wherein the processor implements the steps of the method of any one of claims 1 to 7 when executing the computer program.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 7.
CN202010014556.1A 2020-01-07 2020-01-07 Login method, login device, computer equipment and storage medium Active CN111259358B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010014556.1A CN111259358B (en) 2020-01-07 2020-01-07 Login method, login device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010014556.1A CN111259358B (en) 2020-01-07 2020-01-07 Login method, login device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN111259358A true CN111259358A (en) 2020-06-09
CN111259358B CN111259358B (en) 2022-09-06

Family

ID=70952524

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010014556.1A Active CN111259358B (en) 2020-01-07 2020-01-07 Login method, login device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111259358B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112543194A (en) * 2020-12-03 2021-03-23 武汉联影医疗科技有限公司 Mobile terminal login method and device, computer equipment and storage medium
CN113515735A (en) * 2020-10-10 2021-10-19 腾讯科技(深圳)有限公司 Data processing method, device, equipment and medium
CN115396277A (en) * 2022-08-24 2022-11-25 数字广东网络建设有限公司 Login state management method, device, equipment and storage medium
CN115458105A (en) * 2022-09-16 2022-12-09 江苏至真健康科技有限公司 Rapid filing method and system for eye screening
CN113515735B (en) * 2020-10-10 2024-05-17 腾讯科技(深圳)有限公司 Data processing method, device, equipment and medium

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104253784A (en) * 2013-06-25 2014-12-31 腾讯科技(深圳)有限公司 Logging and authorization method and system
CN105100108A (en) * 2015-08-18 2015-11-25 赛肯(北京)科技有限公司 Login authentication method, device and system based on face identification
CN105162604A (en) * 2015-09-25 2015-12-16 赛肯(北京)科技有限公司 Feature image identification based verification method and system, and verification server
KR20160084751A (en) * 2015-01-06 2016-07-14 주식회사 케이티 Biometric method interlocked universal subscriber identification module
CN105791262A (en) * 2015-12-30 2016-07-20 广东亿迅科技有限公司 APP real name authentication secure login system and method based on mobile phone IMSI
WO2017029708A1 (en) * 2015-08-18 2017-02-23 株式会社Pips Personal authentication system
CN108600154A (en) * 2018-03-05 2018-09-28 武汉高科国有控股集团有限公司 A kind of government affairs remote authentication system and method
US20180309758A1 (en) * 2016-05-09 2018-10-25 Aetna Inc. Unified authentication software development kit
CN109472227A (en) * 2018-10-29 2019-03-15 广州云从信息科技有限公司 A kind of cross-terminal recognition of face verification method and system
CN110213246A (en) * 2019-05-16 2019-09-06 南瑞集团有限公司 A kind of wide area multiple-factor identity authorization system
CN110334489A (en) * 2019-07-12 2019-10-15 广州大白互联网科技有限公司 A kind of unified single sign-on system and method
CN110472714A (en) * 2019-08-22 2019-11-19 广东创能科技股份有限公司 A kind of program and method of the verifying of multipath reality people's real example

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104253784A (en) * 2013-06-25 2014-12-31 腾讯科技(深圳)有限公司 Logging and authorization method and system
KR20160084751A (en) * 2015-01-06 2016-07-14 주식회사 케이티 Biometric method interlocked universal subscriber identification module
CN105100108A (en) * 2015-08-18 2015-11-25 赛肯(北京)科技有限公司 Login authentication method, device and system based on face identification
WO2017029708A1 (en) * 2015-08-18 2017-02-23 株式会社Pips Personal authentication system
CN105162604A (en) * 2015-09-25 2015-12-16 赛肯(北京)科技有限公司 Feature image identification based verification method and system, and verification server
CN105791262A (en) * 2015-12-30 2016-07-20 广东亿迅科技有限公司 APP real name authentication secure login system and method based on mobile phone IMSI
US20180309758A1 (en) * 2016-05-09 2018-10-25 Aetna Inc. Unified authentication software development kit
CN108600154A (en) * 2018-03-05 2018-09-28 武汉高科国有控股集团有限公司 A kind of government affairs remote authentication system and method
CN109472227A (en) * 2018-10-29 2019-03-15 广州云从信息科技有限公司 A kind of cross-terminal recognition of face verification method and system
CN110213246A (en) * 2019-05-16 2019-09-06 南瑞集团有限公司 A kind of wide area multiple-factor identity authorization system
CN110334489A (en) * 2019-07-12 2019-10-15 广州大白互联网科技有限公司 A kind of unified single sign-on system and method
CN110472714A (en) * 2019-08-22 2019-11-19 广东创能科技股份有限公司 A kind of program and method of the verifying of multipath reality people's real example

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113515735A (en) * 2020-10-10 2021-10-19 腾讯科技(深圳)有限公司 Data processing method, device, equipment and medium
CN113515735B (en) * 2020-10-10 2024-05-17 腾讯科技(深圳)有限公司 Data processing method, device, equipment and medium
CN112543194A (en) * 2020-12-03 2021-03-23 武汉联影医疗科技有限公司 Mobile terminal login method and device, computer equipment and storage medium
CN115396277A (en) * 2022-08-24 2022-11-25 数字广东网络建设有限公司 Login state management method, device, equipment and storage medium
CN115396277B (en) * 2022-08-24 2024-01-02 数字广东网络建设有限公司 Login state management method, device, equipment and storage medium
CN115458105A (en) * 2022-09-16 2022-12-09 江苏至真健康科技有限公司 Rapid filing method and system for eye screening
CN115458105B (en) * 2022-09-16 2023-05-09 江苏至真健康科技有限公司 Quick filing method and system for eye screening

Also Published As

Publication number Publication date
CN111259358B (en) 2022-09-06

Similar Documents

Publication Publication Date Title
CN111259358B (en) Login method, login device, computer equipment and storage medium
CN109146679B (en) Intelligent contract calling method and device based on block chain and electronic equipment
WO2020087778A1 (en) Multiple system login method, apparatus, computer device and storage medium
CN107038579B (en) Electronic payment service processing method, electronic payment method and electronic payment device
WO2020253061A1 (en) Page generating method and apparatus, computer device, and storage medium
CN110505201B (en) Conference information processing method, conference information processing device, computer equipment and storage medium
CN108418797B (en) Webpage access method and device, computer equipment and storage medium
CN111275448A (en) Face data processing method and device and computer equipment
CN111078559B (en) Method, device, medium and computer equipment for extracting function call in java code
CN108763888B (en) User profile processing method and device, computer equipment and storage medium
CN113225610A (en) Screen projection method, device, equipment and storage medium
CN111210190B (en) File signing method, device, computer equipment and storage medium
CN112560815B (en) File calling method, device, medium and electronic equipment
CN108418809B (en) Chat data processing method and device, computer equipment and storage medium
CN112233749B (en) Health detection report acquisition method and device, computer equipment and storage medium
CN109447825A (en) Method, apparatus, computer equipment and the storage medium of online declaration form processing
CN113255505A (en) Certificate photo generation method, device, equipment and storage medium
CN111431857A (en) Authorized access method and device for super account book and storage medium
CN110247879B (en) Generation method and generation system of elevator calling authentication code, and elevator calling authentication method and system
CN113326539B (en) Method, device and system for private data leakage detection aiming at applet
CN112738007B (en) Management authority transfer synchronous updating method, device and computer readable storage medium
CN110490005B (en) Method, device and computer readable storage medium for processing resource transfer request
JP7342504B2 (en) Information processing device, system, method for generating provisioning data, and program
CN110807378B (en) License information processing method and device, computer equipment and storage medium
CN113595871B (en) Account login method and device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant