CN111262869A - Login method, storage medium and computer equipment - Google Patents

Login method, storage medium and computer equipment Download PDF

Info

Publication number
CN111262869A
CN111262869A CN202010053461.0A CN202010053461A CN111262869A CN 111262869 A CN111262869 A CN 111262869A CN 202010053461 A CN202010053461 A CN 202010053461A CN 111262869 A CN111262869 A CN 111262869A
Authority
CN
China
Prior art keywords
login
information
client
certificate
free
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010053461.0A
Other languages
Chinese (zh)
Inventor
吴思
李润静
胡松青
张俊杰
谢逸民
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gree Electric Appliances Inc of Zhuhai
Zhuhai Lianyun Technology Co Ltd
Original Assignee
Gree Electric Appliances Inc of Zhuhai
Zhuhai Lianyun Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gree Electric Appliances Inc of Zhuhai, Zhuhai Lianyun Technology Co Ltd filed Critical Gree Electric Appliances Inc of Zhuhai
Priority to CN202010053461.0A priority Critical patent/CN111262869A/en
Publication of CN111262869A publication Critical patent/CN111262869A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/108Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses a login method, a storage medium and computer equipment. The login-free authentication voucher in the method can realize intercommunication and interoperability among the clients on the same terminal, so that the login process can be simplified, the authentication and login can be avoided under the condition of not calling authorization, and the use experience of a user is improved.

Description

Login method, storage medium and computer equipment
Technical Field
The present invention relates to the field of computer technologies, and in particular, to a login method, a storage medium, and a computer device.
Background
When the third-party account of the current mobile phone app authorizes login, manual operation is needed, the user jumps to an account authorization page of the third-party app and clicks authorization to perform account authorization login, if the microblog app is used, the user uses a QQ account to authorize login, the user jumps to an account authorization interface of the QQ app to perform operation authorization, and then jumps back to the microblog app; such a process is cumbersome and does not allow for a quick and easy experience of opening to log in.
Disclosure of Invention
The technical problem to be solved by the invention is as follows: how to reduce the operation of calling authorization by a user, simplify the login process, realize authentication-free login and improve the user experience.
In order to solve the technical problem, the invention provides a login method, a storage medium and a computer device.
In a first aspect of the present invention, a login method is provided, which includes:
when a client to be logged in is opened, reading a pre-stored login-free authentication certificate, wherein the login-free authentication certificate comprises a general certificate;
determining login information according to the plain text information in the universal voucher;
and performing authentication-free login on the client to be logged in based on the login information.
Preferably, the login-free authentication credential is generated based on account information of the client who first completes login by using an account.
Preferably, the plaintext information includes the account information and the validity time of the universal certificate.
Preferably, the method further comprises:
judging whether the time for the client to be logged in to read the pre-stored login-free authentication voucher is within the valid time of the general voucher or not;
and when the time for the client to be logged in to read the pre-stored login-free authentication voucher is within the valid time of the general voucher, determining login information according to the plaintext information in the general voucher.
Preferably, the login-free authentication credential further includes a client credential generated by the client who completes login with the account at first and corresponding to the account information.
Preferably, based on the login information, after the authentication-free login is performed by the client to be logged in, the method further includes:
acquiring a client-side certificate which is generated by the client to be logged in and has completed authentication-free login and corresponds to the login information;
and storing the client-side certificate corresponding to the login information into the login-free authentication certificate to generate a new login-free authentication certificate.
Preferably, when logging in again at the client to be logged in, the method further includes:
determining login information according to plaintext information of the general certificate and/or plaintext information of a client certificate generated by the client to be logged in historical login operation;
and performing authentication-free login on the client to be logged in based on the login information.
Preferably, when logging in again at the client to be logged in, the method further includes:
comparing the login information determined according to the plaintext information of the universal certificate with the login information determined according to the plaintext information of the client-side certificate generated by the client side to be logged in the historical login operation;
and when the login information determined according to the plaintext information of the general certificate is consistent with the login information determined according to the plaintext information of the client certificate generated by the client to be logged in the historical login operation, performing authentication-free login on the client to be logged in based on the plaintext information of the general certificate or the login information determined according to the plaintext information of the client certificate generated by the client to be logged in the historical login operation.
Preferably, the login information includes user identification information, where the user identification information includes a user mobile phone number and/or a mailbox.
In a second aspect of the present invention, a storage medium is provided, in which a computer program is stored, which computer program, when being executed by a processor, is capable of implementing the login method as described above.
In a third aspect of the present invention, there is provided a computer apparatus comprising: a processor and a storage medium having stored thereon a computer program which, when executed by the processor, is capable of implementing the above-described login method.
Compared with the prior art, one or more embodiments in the above scheme can have the following advantages or beneficial effects:
by applying the login method provided by the invention, the pre-stored login-free authentication voucher is read, wherein the login-free authentication voucher comprises the general voucher, the login information is determined according to the plaintext information in the general voucher, and the authentication-free login is carried out on the client to be logged in based on the login information. The login-free authentication certificate is utilized, so that the login process can be simplified, and the authentication-free login can be realized under the condition of not calling the authorization.
Drawings
The scope of the present disclosure may be better understood by reading the following detailed description of exemplary embodiments in conjunction with the accompanying drawings. Wherein the included drawings are:
fig. 1 shows a flowchart of a login method provided in an embodiment of the present application.
Fig. 2 shows a flowchart of a method for generating login-free authentication credentials according to an embodiment of the present application.
Fig. 3 shows a flowchart of another login method provided in an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention clearer, the following will describe in detail an implementation method of the present invention with reference to the accompanying drawings and embodiments, so that how to apply technical means to solve the technical problems and achieve the technical effects can be fully understood and implemented.
In the prior art, when the login is authorized by a third-party account of the current mobile phone app, manual operation is required, the login is firstly skipped to an account authorization page of the third-party app and authorization is clicked to perform account authorization login, such as microblog app, the login is authorized by using a QQ account, the login is required to be skipped to an account authorization interface of the QQ app to perform operation authorization, and then the microblog app is skipped back; such a process is cumbersome and does not allow for a quick and easy experience of opening to log in.
In view of the above, the present application provides a method for determining login information according to plaintext information in a universal credential by reading a pre-stored login-free authentication credential, and performing an authentication-free login on a client to be logged in based on the login information. The login-free authentication certificate is utilized, so that the login process can be simplified, and the authentication-free login can be realized under the condition of not calling the authorization.
Example one
Referring to fig. 1, fig. 1 shows a flowchart of a login method provided in an embodiment of the present application, which includes steps S101 to S103.
In step S101, when the client to be logged in is opened, a pre-stored login-free authentication credential is read, where the login-free authentication credential includes a general credential.
The pre-stored login-free authentication credentials can be generated based on account information of a client who completes login by using an account. The account information of the client that completes login by using the account at least includes user identification information, such as a mobile phone number and/or a mailbox having a unique user identification, and the account information may further include basic information of the user, such as a user name and a user gender of the client that completes login. The login-free authentication credential may be pre-stored in a temporary database on the terminal where the client to be logged in is located, and for the sake of security, the login-free authentication credential may also be encrypted.
As an example, the reading of the pre-stored login authentication credential may be to receive a login-free authentication credential pushed by a terminal where the client to be logged in is located, and read the received login-free authentication credential to analyze plaintext information in the login-free authentication credential. As another example, the pre-stored login authentication credentials may be read, and the to-be-logged client directly reads the login-free authentication credentials in a temporary database on the terminal where the to-be-logged client is located in a preset manner.
In step S102, the login information is determined according to the plain text information in the universal certificate.
In this embodiment of the present application, the universal credential is generated based on account information of a client that has completed login, and plaintext information of the universal credential may include all information of the account information of the client, or may include only part of information of the account information of the client. It should be noted that the plaintext information at least includes user identification information, for example, a mobile phone number and/or a mailbox having a unique user identification.
The plaintext information may include account information and a validity time of the universal credential.
The step can be specifically that the plain text information in the general voucher is matched with the historical login data of the client to be logged in, and when the matching is successful, the successfully matched user information is used as login information. As an example, when the plaintext information includes a mobile phone number, the mobile phone number is found in the historical login data of the client to be logged in according to the mobile phone number, that is, the mobile phone number is used as login information, and account information corresponding to the mobile phone number is called from the client to be logged in. As another example, when the plaintext information includes a mobile phone number and a user name, when the mobile phone number is found in the historical login data of the client to be logged in, and the user name in the account information corresponding to the mobile phone number is the same as the user name in the plaintext information, the mobile phone number and the user name may be used as login information, and the user name is directly displayed to log in.
It should be noted that, in the valid time of the universal credential in the plaintext information, it can also be determined whether the time for the client to log in to read the pre-stored login-free authentication credential is within the valid time of the universal credential; and when the time for the client to be logged in to read the pre-stored login-free authentication voucher is within the valid time of the general voucher, determining login information according to the plain text information in the general voucher. By setting the effective time, the universal certificate can be prevented from being effective for a long time, and the safety management of the client login process can be enhanced.
In step S103, an authentication-free login is performed at the client to be logged in based on the login information.
After the login information is determined, the account corresponding to the login information is in a logged-in state at the client to be logged in, so that the operation of calling authorization by a user can be omitted, and authentication-free login can be directly performed. Therefore, the user experience is improved, and the password input among the accounts is reduced. In addition, when the user identification information in the login information is a mobile phone number, the binding operation of the mobile phone number can be reduced, and the login process is greatly simplified.
After the authentication-free login is completed, the method further comprises the following steps:
acquiring a client-side certificate which is generated by a client to be logged in and has completed authentication-free login and corresponds to login information; and storing the client-side certificate corresponding to the login information into the login-free authentication certificate to generate a new login-free authentication certificate. And (4) generating a client certificate by the client and storing the client certificate to form a new login-free authentication certificate.
When the client to be logged in logs in again, determining login information according to the plaintext information of the universal certificate and/or the plaintext information of the client certificate generated by the client to be logged in the historical login operation; and performing authentication-free login on the client to be logged in based on the login information. Therefore, various authentication-free login modes are provided for the user, and the flexibility of the login-free process is improved beneficially.
The login method provided by the embodiment of the application reads the pre-stored login-free authentication credentials, wherein the login-free authentication credentials comprise the general credentials, determines the login information according to the plaintext information in the general credentials, and performs authentication-free login on the client to be logged in based on the login information. The universal certificate can be intercommunicated and used among a plurality of clients on the same terminal, so that the operation of calling authorization by a user can be omitted, the login process is simplified, authentication-free login is practiced, and the user experience is greatly improved.
Example two
Referring to fig. 2, fig. 2 is a schematic flowchart illustrating a method for generating a login-free authentication credential according to an embodiment of the present application.
Step S201: and logging in the first application software.
When the first application software on the mobile phone logs in for the first time, a preset database is read, and whether a login-free authentication certificate exists or not is judged. It should be noted that other terminals may be used, and a mobile phone will be described as an example in the present application.
When the login-free authentication certificate does not exist, the first application software is logged in by using user information such as an account number and a password, and when the login is successful, the server of the first application software generates an encrypted data packet of the certificate of the first application software corresponding to the user information.
The user information in the self certificate can be obtained by decrypting the encrypted data packet of the self certificate. The user information may include a user name, a mobile phone number, a mailbox number, a gender, and the like for logging in the first application software.
Step S202: and after the first application software successfully logs in, acquiring a first application software certificate and a general certificate corresponding to the account information, so that the first application software certificate and the general certificate corresponding to the user information are used as login-free authentication certificates.
After the first application software successfully logs in, a general certificate can be generated based on the account information, and as an example, the first application software can send the account information successfully logged in to a mobile phone, and the mobile phone generates the general certificate and stores the general certificate to a specified position. The mobile phone is used for generating the general voucher, and the general voucher is stored locally, so that the relative safety is high, and the safety of account information is facilitated. As another example, after the universal certificate is generated for the first application according to the account information, the universal certificate is stored in a designated location for use by other application software on the same mobile phone. Specifically, the general-purpose voucher may be stored in a certain format, for example, in an analyzable format such as json.
When the general certificate is generated, the mobile phone can also encrypt the general certificate by adopting a dynamic encryption algorithm so as to generate a safe general certificate, and meanwhile, a decryption method can be dynamically distributed for other application software on the mobile phone. As an example, when a general encryption algorithm is used to encrypt the general certificate, a common decryption method may be provided for other application software on the mobile phone; as another example, when adding new application software, the mobile phone may dynamically allocate a different key to each application software, and at the same time, the mobile phone performs encryption in an encryption manner corresponding to the application software, so as to ensure that different encryption and decryption methods of the application software are different, thereby being more beneficial to data security.
After the first application software is successfully logged in, the first application software certificate corresponding to the account information can be used as auxiliary verification of the first application software, for example, under the condition that the first application software is uninstalled and reinstalled, the authentication-free login can be performed by using a general certificate in the existing login-free authentication certificate; the login of the first application software can be verified in an auxiliary manner by using the self-certificate corresponding to the user information stored in the login-free authentication certificate after the login-free is performed by using the general certificate in the existing login-free authentication certificate, so that the safety in the login process can be improved. In addition, after the software is reinstalled, the self-certificate stored by the first application software in the application-free software certificate can be used for directly performing authentication-free login. The method can provide multiple authentication-free login modes for application software, and is favorable for improving the flexibility of login-free.
After step S201 and step S202, a login-free authentication credential including a self credential and a general credential corresponding to the user information for logging in the first application software may be obtained, and the credentials may be intercommunicated and interworked between all clients installed on the same terminal, thereby simplifying the user login process.
Specific application referring to fig. 3, fig. 3 is a schematic flowchart illustrating another login method provided in the embodiment of the present application, which includes steps S301 to S305.
Step S301: and when the second application software is opened, reading pre-stored login-free authentication credentials, wherein the login-free authentication credentials comprise general credentials and application software credentials.
The step can be that, by monitoring the state of the second application software, when the state information of the opening of the second application software is acquired, the login-free authentication voucher is pushed to the second application software. The step can also be that the second application software directly reads the pre-stored login-free authentication voucher at the appointed position in a preset mode.
The second application software analyzes the login-free authentication credential by reading the received login-free authentication credential, and obtains plaintext information of the login-free authentication credential after analysis. The plaintext information at least comprises a unique identifier in account information when logging in first application software, such as a mobile phone number or a mailbox. The plaintext information may also include other basic information such as the user name and gender when logging into the first application software. In addition, the plaintext information may also include the validity time of the universal credential.
Step S302: and judging whether the time for the second application software to read the pre-stored login-free authentication is within the valid time of the general certificate.
When reading the pre-stored login-free authentication credential, firstly, judging whether the time for reading the pre-stored login-free authentication credential is within the valid time of the general credential according to the valid time of the general credential in the plaintext information, and if the time for reading the pre-stored login-free authentication credential is within the valid time of the general credential, the second application software can log in without authentication, and executing step S303; if the time for reading the pre-stored login-free authentication certificate is not within the valid time of the general certificate, the authentication-free login based on the general certificate cannot be carried out.
Step S303: and determining login information according to plaintext information in the login-free authentication certificate.
The step may specifically be that account information when logging in the first application software is obtained according to the read plaintext information of the general certificate in the login-free authentication certificate, the account information includes a unique identifier such as a mobile phone number and/or a mailbox, and the account information can be matched with historical login data of the second application software based on the mobile phone number and/or the mailbox, and when the matching is successful, the successfully matched user information is used as login information. As an example, when the plaintext information includes a mobile phone number, the mobile phone number is found in the historical login data of the second application software, that is, the mobile phone number is used as login information, and account information corresponding to the mobile phone number is called in the second application software. As another example, the plaintext information may further include basic user information of the first application software except the unique identifier, for example, the plaintext information includes a mobile phone number and a user name, and when the mobile phone number is found in the historical login data of the second application software and the user name in the account information corresponding to the mobile phone number is the same as the user name of the first application software, the mobile phone number and the user name may be used as login information to directly display the user name for login.
Step S304: and performing authentication-free login on the second application software based on the login information.
When the application software is opened every time, the whole login-free authentication voucher is read, wherein plaintext information in the general voucher can be used as login information of the second application software, and the account of the second application software corresponding to the login information is in a logged-in state when the second application software is opened. The login-free authentication can be directly realized, the authentication-free login of the second application software is realized, the operation of calling authorization by a user is reduced, the user experience is improved, and the password input among accounts is reduced. When the mobile phone number is used as the unique identifier, the binding operation of the mobile phone number can be reduced.
Step S305: and acquiring a second application software certificate after the second application software successfully logs in, and storing the second application software certificate for generating a new login-free authentication certificate.
The second application software credentials corresponding to the login information of the second application software are stored to the designated location, and a new login-free authentication credential may be generated, for example, the pre-stored login-free authentication credential includes a general credential and a first application software credential of the first application software, and the storage format may be { "general credential": xxxxxx, "application credentials": { "first application software": 1111' }, after a second login credential corresponding to the login information of the second application software is stored to the same position of the login-free authentication credential, a storage format of a new login-free authentication credential generated is { "general credential": xxxxxx, "application credentials": [ { "first application software": "1111" }, { "second application software": "22222"}]}.
When the second application software logs in again, on one hand, the second application software can directly log in by using the general certificate; on the other hand, the stored second application software certificate of the second application software can be directly used for authentication-free login, the second login certificate is used as the login-free verification certificate of the second application software, and the security is higher; and the authentication-free login is performed based on the login information determined by the plaintext information of the general certificate and the plaintext information of the second application software certificate generated by the second application software in the historical login operation. By storing the self-certificate of the application software to the authentication-free login certificate, more authentication-free login modes can be provided, so that the security is improved, and the flexibility of the authentication-free login modes is improved.
In addition, when the application software is logged in again, the login information determined according to the plain text information of the general-purpose certificate can be compared with the login information determined according to the plain text information of the application software certificate generated by the application software in the historical login operation; and when the login information determined according to the plaintext information of the general certificate is consistent with the login information determined according to the plaintext information of the application software certificate generated by the application software in the historical login operation, performing authentication-free login based on the plaintext information of the general certificate or the login information determined according to the plaintext information of the application software certificate generated by the application software in the historical login operation. Therefore, the second verification of the login process can be realized by using the self certificate of the application software, and the login safety can be greatly improved.
In the login method provided by the embodiment of the application, the account information successfully logged in the first application software is used to obtain the first application software certificate and the general certificate corresponding to the account information, the first application software certificate and the general certificate are stored as the login-free authentication certificate, when the second application software is opened, the login information is determined from the plaintext information of the login-free authentication certificate by reading the pre-stored login-free authentication certificate, and the authentication-free login is performed on the second application software based on the login information. The universal certificate can realize intercommunication and interoperability among the clients on the same terminal, and after successful login is performed on one client, other application software can save the operation of calling authorization by a user, so that the login process is simplified, and the use experience of the user is improved. In addition, the application software certificate generated by the client is stored in the login-free authentication certificate, and when the client logs in again, the application software certificate stored before can be used for carrying out auxiliary verification on the operation process of logging in again of the client, so that the login safety can be improved.
In another aspect of the present application, there is also provided a storage medium having a computer program stored therein, where the computer program is capable of implementing the login method as follows when executed by a processor:
when a client to be logged in is opened, reading a pre-stored login-free authentication certificate, wherein the login-free authentication certificate comprises a general certificate;
determining login information according to the plaintext information in the universal certificate;
and performing authentication-free login on the client to be logged in based on the login information.
In another aspect of the present application, there is also provided a computer apparatus, including: a processor and a storage medium having stored thereon a computer program that, when executed by the processor, is capable of implementing a login method as follows:
when a client to be logged in is opened, reading a pre-stored login-free authentication certificate, wherein the login-free authentication certificate comprises a general certificate;
determining login information according to the plaintext information in the universal certificate;
and performing authentication-free login on the client to be logged in based on the login information.
Although the embodiments of the present invention have been described above, the above description is only for the convenience of understanding the present invention, and is not intended to limit the present invention. It will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (11)

1. A login method, comprising:
when a client to be logged in is opened, reading a pre-stored login-free authentication certificate, wherein the login-free authentication certificate comprises a general certificate;
determining login information according to the plain text information in the universal voucher;
and performing authentication-free login on the client to be logged in based on the login information.
2. The method of claim 1, wherein the login-free authentication credential is generated based on account information of a client that first completes login with an account.
3. The method of claim 2, wherein the plaintext information comprises the account information and a universal credential validity time.
4. The method of claim 3, further comprising:
judging whether the time for the client to be logged in to read the pre-stored login-free authentication voucher is within the valid time of the general voucher or not;
and when the time for the client to be logged in to read the pre-stored login-free authentication voucher is within the valid time of the general voucher, determining login information according to the plaintext information in the general voucher.
5. The method of claim 2, wherein the login-free authentication credentials further comprise client credentials corresponding to the account information generated by the client that first completed login with the account.
6. The method according to claim 5, wherein after performing an authentication-free login by the client to be logged in based on the login information, the method further comprises:
acquiring a client-side certificate which is generated by the client to be logged in and has completed authentication-free login and corresponds to the login information;
and storing the client-side certificate corresponding to the login information into the login-free authentication certificate to generate a new login-free authentication certificate.
7. The method according to claim 6, wherein when logging in again at the client to log in, the method further comprises:
determining login information according to plaintext information of the general certificate and/or plaintext information of a client certificate generated by the client to be logged in historical login operation;
and performing authentication-free login on the client to be logged in based on the login information.
8. The method according to claim 6, wherein when logging in again at the client to log in, the method further comprises:
comparing the login information determined according to the plaintext information of the universal certificate with the login information determined according to the plaintext information of the client-side certificate generated by the client side to be logged in the historical login operation;
and when the login information determined according to the plaintext information of the general certificate is consistent with the login information determined according to the plaintext information of the client certificate generated by the client to be logged in the historical login operation, performing authentication-free login on the client to be logged in based on the plaintext information of the general certificate or the login information determined according to the plaintext information of the client certificate generated by the client to be logged in the historical login operation.
9. The method of claim 1, wherein the login information comprises user identification information, wherein the user identification information comprises a user phone number and/or a mailbox.
10. A storage medium, characterized in that the storage medium has stored therein a computer program which, when executed by a processor, is capable of implementing a login method as claimed in any one of claims 1 to 9.
11. A computer device, comprising: processor and storage medium, in which a computer program is stored which, when being executed by the processor, is able to carry out a login method as claimed in any one of claims 1 to 9.
CN202010053461.0A 2020-01-17 2020-01-17 Login method, storage medium and computer equipment Pending CN111262869A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010053461.0A CN111262869A (en) 2020-01-17 2020-01-17 Login method, storage medium and computer equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010053461.0A CN111262869A (en) 2020-01-17 2020-01-17 Login method, storage medium and computer equipment

Publications (1)

Publication Number Publication Date
CN111262869A true CN111262869A (en) 2020-06-09

Family

ID=70954274

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010053461.0A Pending CN111262869A (en) 2020-01-17 2020-01-17 Login method, storage medium and computer equipment

Country Status (1)

Country Link
CN (1) CN111262869A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112364312A (en) * 2020-10-27 2021-02-12 连尚(新昌)网络科技有限公司 Application login method, electronic device and computer readable storage medium
CN114357397A (en) * 2021-12-28 2022-04-15 北京骑胜科技有限公司 Method and system for logging in system by user
CN115442809A (en) * 2022-11-08 2022-12-06 北京紫光青藤微系统有限公司 Login method and device

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101877637A (en) * 2009-04-30 2010-11-03 中国移动通信集团江西有限公司 Single sign-on method and single sign-on system
CN102231716A (en) * 2011-06-30 2011-11-02 重庆新媒农信科技有限公司 Instant communication service login method
CN104184701A (en) * 2013-05-21 2014-12-03 腾讯科技(深圳)有限公司 Third-party application log-in method, device and terminal
US9288195B2 (en) * 2009-11-17 2016-03-15 Secureauth Corporation Single sign on with multiple authentication factors
CN105516163A (en) * 2015-12-18 2016-04-20 网易(杭州)网络有限公司 Login method, terminal device and communication system
CN107147617A (en) * 2017-04-01 2017-09-08 北京五八信息技术有限公司 A kind of single-point logging method and device
CN107888568A (en) * 2017-10-23 2018-04-06 广州星耀悦教育科技有限公司 Unified identity authentication data managing method, electronic equipment, storage medium and system
CN109218326A (en) * 2018-10-10 2019-01-15 广州虎牙信息科技有限公司 Login validation method, device, storage medium and server
CN110032855A (en) * 2019-02-28 2019-07-19 招银云创(深圳)信息技术有限公司 Login method, device, computer equipment and the storage medium of application
CN110298162A (en) * 2019-05-22 2019-10-01 深圳壹账通智能科技有限公司 Application client login method, device, computer equipment and storage medium

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101877637A (en) * 2009-04-30 2010-11-03 中国移动通信集团江西有限公司 Single sign-on method and single sign-on system
US9288195B2 (en) * 2009-11-17 2016-03-15 Secureauth Corporation Single sign on with multiple authentication factors
CN102231716A (en) * 2011-06-30 2011-11-02 重庆新媒农信科技有限公司 Instant communication service login method
CN104184701A (en) * 2013-05-21 2014-12-03 腾讯科技(深圳)有限公司 Third-party application log-in method, device and terminal
CN105516163A (en) * 2015-12-18 2016-04-20 网易(杭州)网络有限公司 Login method, terminal device and communication system
CN107147617A (en) * 2017-04-01 2017-09-08 北京五八信息技术有限公司 A kind of single-point logging method and device
CN107888568A (en) * 2017-10-23 2018-04-06 广州星耀悦教育科技有限公司 Unified identity authentication data managing method, electronic equipment, storage medium and system
CN109218326A (en) * 2018-10-10 2019-01-15 广州虎牙信息科技有限公司 Login validation method, device, storage medium and server
CN110032855A (en) * 2019-02-28 2019-07-19 招银云创(深圳)信息技术有限公司 Login method, device, computer equipment and the storage medium of application
CN110298162A (en) * 2019-05-22 2019-10-01 深圳壹账通智能科技有限公司 Application client login method, device, computer equipment and storage medium

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112364312A (en) * 2020-10-27 2021-02-12 连尚(新昌)网络科技有限公司 Application login method, electronic device and computer readable storage medium
CN114357397A (en) * 2021-12-28 2022-04-15 北京骑胜科技有限公司 Method and system for logging in system by user
CN114357397B (en) * 2021-12-28 2023-08-01 北京骑胜科技有限公司 Method and system for logging in system by user
CN115442809A (en) * 2022-11-08 2022-12-06 北京紫光青藤微系统有限公司 Login method and device

Similar Documents

Publication Publication Date Title
EP3723399A1 (en) Identity verification method and apparatus
JP7352008B2 (en) First element contactless card authentication system and method
CN109005155B (en) Identity authentication method and device
CN111556006B (en) Third-party application system login method, device, terminal and SSO service platform
CN110299996B (en) Authentication method, equipment and system
CN108768970B (en) Binding method of intelligent equipment, identity authentication platform and storage medium
US9191394B2 (en) Protecting user credentials from a computing device
US9264420B2 (en) Single sign-on for network applications
CN111262869A (en) Login method, storage medium and computer equipment
CN103188221A (en) Application login method, application login device and mobile terminal
CN105721412A (en) Method and device for authenticating identity between multiple systems
CN106161348B (en) Single sign-on method, system and terminal
CN111800377B (en) Mobile terminal identity authentication system based on safe multi-party calculation
CN106161475B (en) Method and device for realizing user authentication
CN107819766B (en) Security authentication method, system and computer readable storage medium
CN106656955A (en) Communication method and system and user terminal
WO2012176506A1 (en) Single sign-on system, single sign-on method, and authentication server linking program
CN113726766A (en) Offline identity authentication method, system and medium
WO2018099407A1 (en) Account authentication login method and device
CN115225286A (en) Application access authentication method and device
CN112084485B (en) Data acquisition method, device, equipment and computer storage medium
CN115189975B (en) Login method, login device, electronic equipment and storage medium
CN113271306B (en) Data request and transmission method, device and system
Sabouri A cloud-based model to facilitate mobility of privacy-preserving attribute-based credential users
CN115883091A (en) Client authentication method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200609