CN111324876A - Exchange login method and device - Google Patents

Exchange login method and device Download PDF

Info

Publication number
CN111324876A
CN111324876A CN202010115110.8A CN202010115110A CN111324876A CN 111324876 A CN111324876 A CN 111324876A CN 202010115110 A CN202010115110 A CN 202010115110A CN 111324876 A CN111324876 A CN 111324876A
Authority
CN
China
Prior art keywords
shadow
exchange
account
user
primary
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010115110.8A
Other languages
Chinese (zh)
Inventor
赵倩
王鑫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hainan Xinruan Software Co ltd
Original Assignee
Hainan Xinruan Software Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hainan Xinruan Software Co ltd filed Critical Hainan Xinruan Software Co ltd
Priority to CN202010115110.8A priority Critical patent/CN111324876A/en
Publication of CN111324876A publication Critical patent/CN111324876A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Finance (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Accounting & Taxation (AREA)
  • General Engineering & Computer Science (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • General Business, Economics & Management (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention discloses a method and a device for logging in an exchange. The technical scheme of the invention firstly judges whether a shadow exchange logged in by a user has a corresponding main exchange; then, when all corresponding main exchanges are subjected to shadow transaction, judging whether a primary account number for logging in the main exchanges has a shadow account number corresponding to the shadow exchanges; and finally, when a shadow account corresponding to the shadow transaction place exists in the primary account for logging in the primary transaction place, logging in the shadow transaction place by using the login information corresponding to the shadow account. According to the invention, the incidence relation between the primary account and the shadow account can be established, so that the shadow account and the primary account can share the login information of the same user, and then when the user logs in the shadow exchange, a series of login processes such as registration authentication and the like are not required to be carried out again, the shadow exchange can be logged in only by utilizing the login information of the primary account corresponding to the shadow account, and the condition that the user needs to carry out registration authentication respectively when logging in different exchanges is avoided.

Description

Exchange login method and device
Technical Field
The invention relates to the technical field of computers, in particular to a trading post login method and device.
Background
The exchange is a platform for realizing asset transaction, the number of exchanges is increasing nowadays, users can perform asset transaction in different exchanges, and the exchanges can be shown to the users in a specific webpage or APP form and provide an operation and display interface for the users.
The existing exchange bottom product structure, such as an APP structure of a certain exchange, distinguishes users based on an exchange ID unique to the user, so that if a user needs to perform transactions in different exchanges, the user needs to log in the corresponding exchange with different IDs, and different transactions need to store login information of the user. However, taking two different exchanges as an example, after the same user completes account operations such as registration login, user authentication, security item change, and the like in one exchange, the same user needs to perform related operations again in another exchange, and has two completely different and unrelated accounts, so that the manner causes complexity and inconvenience in account operation for the same user.
Disclosure of Invention
The invention provides a method and a device for logging in an exchange, which are used for solving the problem of complicated operation caused by the fact that different transactions need to be respectively registered and authenticated when a user logs in at present.
In a first aspect, an embodiment of the present invention provides an exchange login method, including:
judging whether a shadow exchange logged by a user has a corresponding main exchange, wherein the shadow exchange and the main exchange are different exchanges, and the shadow exchange and the main exchange have an association relation;
if yes, judging whether a shadow account corresponding to the shadow transaction exists in a primary account for logging in the primary transaction place, wherein the shadow account and the primary account share login information of the user, and the login information is used for representing an account, a login password, authentication information and safety item information of the user;
and if so, logging in the shadow exchange by using login information corresponding to the shadow account.
With reference to the first aspect, in an implementation manner of the first aspect, before the determining whether the shadow exchange logged in by the user has a corresponding primary exchange, the method further includes:
acquiring a primary account number of a user logging in a primary exchange and a shadow exchange having an association relationship with the primary exchange;
establishing a shadow account number in the shadow exchange for the user;
and establishing a mapping relation between the primary account and the shadow account of the user, wherein the mapping relation is used for enabling the primary account and the shadow account of the user to share login information of the user.
With reference to the first aspect, in an implementation manner of the first aspect, after the determining whether a shadow account corresponding to the shadow transaction exists in the primary account registered to the primary transaction, the method further includes:
if not, determining whether the user authorizes the shadow account to log in;
if the user is authorized, establishing a shadow account number in the shadow exchange for the user;
and establishing a mapping relation between the primary account and the shadow account of the user, wherein the mapping relation is used for enabling the primary account and the shadow account of the user to share login information of the user.
With reference to the first aspect, in an implementation manner of the first aspect, after the determining whether the shadow exchange logged in by the user has a corresponding primary exchange, the method further includes:
if not, prompting the user to input an account and a login password for registration;
after the registration is passed, prompting the user to input a name and a certificate number for authentication;
and after the authentication is passed, prompting the user to carry out mobile phone number security verification or mailbox security verification.
With reference to the first aspect, in an implementation manner of the first aspect, the step of logging in the shadow exchange by using login information corresponding to the shadow account number includes:
judging whether a primary account corresponding to the shadow account is in a locked state;
if not, logging in the shadow exchange by using the login information corresponding to the shadow account.
In a second aspect, an embodiment of the present invention provides an exchange login apparatus, including:
the system comprises a first judgment module, a second judgment module and a third judgment module, wherein the first judgment module is used for judging whether a shadow exchange logged by a user has a corresponding main exchange or not, the shadow exchange and the main exchange are different exchanges, and an association relationship exists between the shadow exchange and the main exchange;
the second judgment module is used for judging whether a primary account number for logging in the primary transaction place has a shadow account number corresponding to the shadow transaction place when the primary transaction place corresponding to the shadow transaction place is logged in by a user, wherein the shadow account number and the primary account number share login information of the user, and the login information is used for representing an account number, a login password, authentication information and safety item information of the user;
and the login module is used for logging in the shadow exchange by utilizing login information corresponding to the shadow account when a shadow account corresponding to the shadow exchange exists in a primary account for logging in the primary exchange.
With reference to the second aspect, in an implementation manner of the second aspect, the apparatus further includes:
the data acquisition module is used for acquiring a primary account number of a user logging in a primary exchange and a shadow exchange having an association relation with the primary exchange;
the first account number establishing module is used for establishing a shadow account number in the shadow exchange for the user;
the first mapping relationship establishing module is used for establishing a mapping relationship between the primary account and the shadow account of the user, and the mapping relationship is used for enabling the primary account and the shadow account of the user to share login information of the user.
With reference to the second aspect, in an implementation manner of the second aspect, the apparatus further includes:
the authorization module is used for determining whether the user authorizes the shadow account to log in when the primary account which logs in the primary exchange does not have the shadow account corresponding to the shadow exchange;
the second account establishing module is used for establishing a shadow account in the shadow exchange for the user when the user authorizes the shadow account to log in;
the second mapping relationship establishing module is used for establishing a mapping relationship between the primary account and the shadow account of the user, and the mapping relationship is used for enabling the primary account and the shadow account of the user to share login information of the user.
With reference to the second aspect, in an implementation manner of the second aspect, the apparatus further includes:
the registration module is used for prompting the user to input an account number and a login password for registration when the shadow exchange logged in by the user does not have a corresponding main exchange;
the authentication module is used for prompting the user to input a name and a certificate number for authentication after the registration is passed;
and the safety verification module is used for prompting the user to carry out mobile phone number safety verification or mailbox safety verification after the authentication is passed.
With reference to the second aspect, in an implementation manner of the second aspect, the login module further includes:
a state judgment unit, configured to judge whether a primary account corresponding to the shadow account is in a locked state;
and the login unit is used for logging in the shadow trading exchange by using login information corresponding to the shadow account when the primary account corresponding to the shadow account is not in the locked state.
According to the technical scheme, the embodiment of the invention provides an exchange login method and device. In the technical scheme of the invention, whether a shadow exchange logged by a user has a corresponding main exchange is judged, wherein the shadow exchange and the main exchange are two different exchanges, and the shadow exchange and the main exchange have an association relation; then, when all corresponding main exchanges are subjected to shadow transaction, judging whether a primary account number for logging in the main exchanges has a shadow account number corresponding to the shadow exchanges, wherein the shadow account number and the primary account number share login information of the user, and the login information is used for representing an account number, a login password, authentication information and safety item information of the user; and finally, when a shadow account corresponding to the shadow transaction place exists in the primary account for logging in the primary transaction place, logging in the shadow transaction place by using the login information corresponding to the shadow account. According to the technical scheme, the incidence relation between the primary account and the shadow account can be established, so that the shadow account and the primary account can share login information of the same user, then when the user logs in the shadow exchange, a series of login processes such as login authentication and the like do not need to be carried out again, the user can log in the shadow exchange only by utilizing the login information of the primary account corresponding to the shadow account, and the user is prevented from logging in different transactions and needing to carry out the login authentication respectively.
Drawings
In order to more clearly illustrate the technical solution of the present invention, the drawings needed to be used in the embodiment will be briefly described below, and it is obvious to those skilled in the art that other drawings can be obtained according to the drawings without any creative effort.
Fig. 1 is a flowchart of an exchange login method according to an embodiment of the present invention;
fig. 2 is a flowchart of a method for establishing a mapping relationship according to an embodiment of the present invention;
fig. 3 is a flowchart of another mapping relationship establishment method provided in the embodiment of the present invention;
FIG. 4 is a flow chart of another method for registering with an exchange according to an embodiment of the present invention;
FIG. 5 is a flowchart of a method for logging on a shadow exchange according to an embodiment of the present invention;
fig. 6 is a block diagram of an apparatus for registering an exchange according to an embodiment of the present invention.
Detailed Description
In order to make those skilled in the art better understand the technical solution of the present invention, the technical solution in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings.
Fig. 1 is a flowchart of an exchange login method according to an embodiment of the present invention. As shown in fig. 1, the exchange login method provided in the embodiment of the present invention includes:
s101, judging whether a shadow exchange logged by a user has a corresponding main exchange, wherein the shadow exchange and the main exchange are different exchanges, and the shadow exchange and the main exchange have an association relationship.
In the embodiment of the invention, the shadow exchange and the main exchange are actually different exchange platforms, one exchange platform is determined as the main exchange and the other platforms which are associated with the main exchange platform are determined as the shadow exchange through the factors such as the characteristics, the similarity and the association of the exchanges between the platforms.
Each user must have an account number when transacting on an exchange to ensure that the information of the user is real and effective, so the user has a primary account number on the primary exchange and a shadow account number on the shadow exchange, because the shadow exchange has an association relationship with the primary exchange, in order to enable the user to directly log in by using the information registered by the user at the primary exchange when logging in the shadow exchange, the association relationship or mapping relationship needs to be established between the shadow account number of the user in the shadow exchange and the primary account number in the primary exchange, so that the shadow account number and the primary account number can share the login information of the user.
Specifically, fig. 2 is a flowchart of a method for establishing a mapping relationship according to an embodiment of the present invention. As shown in fig. 2, in the embodiment of the present invention, before the determining whether the shadow exchange logged in by the user has a corresponding primary exchange, the method further includes:
s201, acquiring a primary account number of a user logging in a primary exchange and a shadow exchange having an association relation with the primary exchange. In the embodiment of the invention, the association relationship between the main exchange and the shadow exchange is configured in advance.
S202, establishing a shadow account number in the shadow exchange for the user.
S203, establishing a mapping relation between the primary account and the shadow account of the user, wherein the mapping relation is used for enabling the primary account and the shadow account of the user to share login information of the user.
In the embodiment of the invention, an Open Authorization (OAUTH) mode is used for authorizing a primary account to register a User Identification (UID), namely a shadow account, in a shadow exchange, and a mapping relation between the shadow account UID and the primary account UID is established, so that the primary account corresponding to the shadow account can be searched, the shadow account corresponding to the primary account can also be searched, the two accounts share user information, and the user information comprises registration information, security item setting and the like. Among other things, the OAUTH protocol provides a secure, open, and simple standard for authorization of user resources. The difference from the conventional authorization method is that the authorization of the OAUTH does not make the third party reach the account information (such as the user name and the password) of the user, that is, the third party can apply for the authorization of the user resource without using the user name and the password of the user, so that the OAUTH is safe.
It should be noted that, in the embodiment of the present invention, the main exchange may establish an association relationship with a plurality of shadow exchanges, that is, the main exchange and the shadow exchanges are not in a one-to-one correspondence relationship, but may be in a one-to-many relationship, and all shadow exchanges having an association relationship with one main exchange may form an exchange set, so that, when a shadow exchange logged in by a user belongs to the exchange set, the shadow exchange may be logged in the shadow exchange according to the login information of the main exchange corresponding to the exchange set.
S102, if a shadow transaction place logged in by a user has a corresponding primary transaction place, judging whether a primary account number logged in the primary transaction place has a shadow account number corresponding to the shadow transaction place, wherein the shadow account number and the primary account number share login information of the user, and the login information is used for representing an account number, a login password, authentication information and safety item information of the user.
In the embodiment of the invention, even though the mapping relationship between the primary account number and the shadow account number of the primary exchange is established in advance, whether the primary account number has the corresponding shadow account number is also judged when the user logs in the shadow exchange, and the primary account number does not establish the mapping relationship with the current shadow account number because omission may occur when the mapping relationship is established in advance.
The authentication information comprises the nationality, name, identification number and the like of the user, and the safety item information comprises the safety item mobile phone number, mailbox and the like bound by the user.
S103, if the primary account number for logging in the primary exchange has a shadow account number corresponding to the shadow exchange, logging in the shadow exchange by using the login information corresponding to the shadow account number.
It can be seen that, in the exchange login method provided in the embodiment of the present invention, it is first determined whether a shadow exchange logged in by a user has a corresponding main exchange, where the shadow exchange and the main exchange are two different exchanges, and an association relationship exists between the shadow exchange and the main exchange; then, when all corresponding main exchanges are subjected to shadow transaction, judging whether a primary account number for logging in the main exchanges has a shadow account number corresponding to the shadow exchanges, wherein the shadow account number and the primary account number share login information of the user, and the login information is used for representing an account number, a login password, authentication information and safety item information of the user; and finally, when a shadow account corresponding to the shadow transaction place exists in the primary account for logging in the primary transaction place, logging in the shadow transaction place by using the login information corresponding to the shadow account. According to the technical scheme, the incidence relation between the primary account and the shadow account can be established, so that the shadow account and the primary account can share login information of the same user, then when the user logs in the shadow exchange, a series of login processes such as login authentication and the like do not need to be carried out again, the user can log in the shadow exchange only by utilizing the login information of the primary account corresponding to the shadow account, and the user is prevented from logging in different transactions and needing to carry out the login authentication respectively.
Fig. 3 is a flowchart of another mapping relationship establishing method according to an embodiment of the present invention. As shown in fig. 3, in the embodiment of the present invention, after the determining whether a shadow account corresponding to the shadow transaction exists in the primary account logged in the primary transaction, the method further includes:
s301, if the primary account number of the primary transaction place does not have a shadow account number corresponding to the shadow transaction place, determining whether the user authorizes the shadow account number to log in.
Generally, the establishment of the mapping relationship between the primary account and the shadow account needs to be authorized by the user, and it is confirmed that the user allows the shadow exchange to directly use the registered information to log in.
S302, if the user authorizes the shadow account to log in, a shadow account in the shadow exchange is established for the user.
S303, establishing a mapping relation between the primary account and the shadow account of the user, wherein the mapping relation is used for enabling the primary account and the shadow account of the user to share login information of the user.
Therefore, according to the method provided by the embodiment of the invention, when the user logs in the shadow exchange, the mapping relation between the primary account and the shadow account is also judged, so that the shadow exchange can conveniently log in by directly using the user login information in the primary exchange, the user login time is saved, and the operation flow of user login is reduced.
Fig. 4 is a flowchart of another method for logging in to an exchange according to an embodiment of the present invention. As shown in fig. 4, in the embodiment of the present invention, after the determining whether the shadow exchange logged in by the user has a corresponding primary exchange, the method further includes:
s401, if not, prompting the user to input an account and a login password for registration.
In the embodiment of the invention, if the logged shadow exchange does not have a main exchange associated with the shadow exchange, the normal process is adopted to carry out the processes of registration, authentication and the like, and an account number and a login password are required to be provided during registration.
S402, after the registration is passed, prompting the user to input a name and a certificate number for authentication.
During the authentication process, the nationality of the user may need to be verified, and the specific verification content needs to be selected according to the actual situation used in the transaction.
And S403, after the authentication is passed, prompting the user to carry out mobile phone number safety verification or mailbox safety verification.
Generally, in order to ensure the safety of assets and information of a user in a trading exchange, after the registration information and the authentication information of the user are verified, the mobile phone number or the mailbox of the user can be verified, specifically, a verification code is sent to a mobile phone number provided by the user or a verification code is sent to a mailbox provided by the user, and the user fills the received verification code into a verification page for verification.
Therefore, the method provided by the embodiment of the invention also provides another exchange login method, so as to ensure that the shadow exchange can normally log in when no corresponding main exchange exists.
FIG. 5 is a flowchart of a method for logging on a shadow exchange according to an embodiment of the present invention. As shown in fig. 5, in the embodiment of the present invention, the step of logging in the shadow exchange by using the login information corresponding to the shadow account includes:
s501, judging whether a primary account corresponding to the shadow account is in a locked state.
In the embodiment of the invention, because a user logs in the login information in the main exchange required by the shadow transaction, whether the login of the shadow transaction exchange is related to the state of the primary account number in the main exchange is allowed, if the primary account number is normal, the shadow transaction exchange can log in by using the shadow account number corresponding to the primary account number; if the primary account number is abnormal, namely the primary account number is in a locked unavailable state, the shadow exchange cannot log in by using the shadow account number, and the login security of the shadow exchange is further ensured.
And S502, if not, logging in the shadow exchange by using the login information corresponding to the shadow account.
Therefore, the method provided by the embodiment of the invention can also judge the state of the primary account and correlate the state of the shadow account, and if the primary account is locked and cannot be used for some reason, the shadow account cannot be used.
As can be seen from the above, the method for logging in to a trading exchange provided in the embodiment of the present invention can establish an association relationship between a primary account and a shadow account, so that the shadow account and the primary account can share login information of a same user, and then when the user logs in to the shadow trading exchange, a series of login processes such as login authentication and the like do not need to be performed again, and the shadow trading exchange can be logged in only by using the login information of the primary account corresponding to the shadow account, thereby avoiding the need for performing respective login authentication when the user logs in to different trades.
In addition, when the shadow exchange capable of realizing login information sharing logs in for the first time, a primary account of the primary exchange with a configured shadow account function needs to be used for activation, and a registration function of the shadow exchange is unavailable and needs to be registered in the primary exchange; the user logs in the shadow exchange to verify and use the data of the main exchange and synchronizes the safety item information of the main exchange. Synchronous security items in the shadow exchange cannot be configured, and bound mobile phones or mailboxes cannot be modified, which all need to go to the main exchange for configuration or modification; the shadow exchange cannot perform user authentication and needs to go to the main exchange for authentication.
Fig. 6 is a block diagram of an apparatus for registering an exchange according to an embodiment of the present invention. As shown in fig. 6, an exchange login apparatus according to an embodiment of the present invention includes:
the first judging module 61 is configured to judge whether a shadow exchange logged in by a user has a corresponding main exchange, where the shadow exchange and the main exchange are different exchanges, and there is an association relationship between the shadow exchange and the main exchange; a second determination module 62, configured to determine, when a shadow transaction place that a user logs in has a corresponding primary transaction place, whether a shadow account corresponding to the shadow transaction place exists in a primary account that logs in the primary transaction place, where the shadow account and the primary account share login information of the user, and the login information is used to indicate an account, a login password, authentication information, and security item information of the user; and the login module 63 is configured to log in the shadow exchange by using login information corresponding to the shadow account when a shadow account corresponding to the shadow exchange exists in a primary account for logging in the primary exchange.
Wherein the apparatus further comprises: the data acquisition module is used for acquiring a primary account number of a user logging in a primary exchange and a shadow exchange having an association relation with the primary exchange; the first account number establishing module is used for establishing a shadow account number in the shadow exchange for the user; the first mapping relationship establishing module is used for establishing a mapping relationship between the primary account and the shadow account of the user, and the mapping relationship is used for enabling the primary account and the shadow account of the user to share login information of the user.
The device further comprises: the authorization module is used for determining whether the user authorizes the shadow account to log in when the primary account which logs in the primary exchange does not have the shadow account corresponding to the shadow exchange; the second account establishing module is used for establishing a shadow account in the shadow exchange for the user when the user authorizes the shadow account to log in; the second mapping relationship establishing module is used for establishing a mapping relationship between the primary account and the shadow account of the user, and the mapping relationship is used for enabling the primary account and the shadow account of the user to share login information of the user.
The device further comprises: the registration module is used for prompting the user to input an account number and a login password for registration when the shadow exchange logged in by the user does not have a corresponding main exchange; the authentication module is used for prompting the user to input a name and a certificate number for authentication after the registration is passed; and the safety verification module is used for prompting the user to carry out mobile phone number safety verification or mailbox safety verification after the authentication is passed.
The login module further comprises: a state judgment unit, configured to judge whether a primary account corresponding to the shadow account is in a locked state; and the login unit is used for logging in the shadow trading exchange by using login information corresponding to the shadow account when the primary account corresponding to the shadow account is not in the locked state.
As can be seen from the above, the method and apparatus for logging in a transaction place provided in the embodiment of the present invention can establish an association relationship between a primary account and a shadow account, so that the shadow account and the primary account can share login information of a same user, and then when the user logs in the shadow transaction place, the user can log in the shadow transaction place only by using login information of the primary account corresponding to the shadow account without performing a series of login processes such as login authentication again, thereby avoiding the need for performing respective login authentication when the user logs in different transactions.
The invention is operational with numerous general purpose or special purpose computing system environments or configurations. For example: personal computers, server computers, hand-held or portable devices, tablet-type devices, multiprocessor systems, microprocessor-based systems, set top boxes, programmable consumer electronics, network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above systems or devices, and the like.
The invention may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The invention may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
Other embodiments of the invention will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This invention is intended to cover any variations, uses, or adaptations of the invention following, in general, the principles of the invention and including such departures from the present disclosure as come within known or customary practice within the art to which the invention pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the invention being indicated by the following claims.
It will be understood that the invention is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the invention is limited only by the appended claims.

Claims (10)

1. An exchange login method, comprising:
judging whether a shadow exchange logged by a user has a corresponding main exchange, wherein the shadow exchange and the main exchange are different exchanges, and the shadow exchange and the main exchange have an association relation;
if yes, judging whether a shadow account corresponding to the shadow transaction exists in a primary account for logging in the primary transaction place, wherein the shadow account and the primary account share login information of the user, and the login information is used for representing an account, a login password, authentication information and safety item information of the user;
and if so, logging in the shadow exchange by using login information corresponding to the shadow account.
2. The method of claim 1, further comprising, prior to determining whether the shadow exchange on which the user is logged has a corresponding primary exchange:
acquiring a primary account number of a user logging in a primary exchange and a shadow exchange having an association relationship with the primary exchange;
establishing a shadow account number in the shadow exchange for the user;
and establishing a mapping relation between the primary account and the shadow account of the user, wherein the mapping relation is used for enabling the primary account and the shadow account of the user to share login information of the user.
3. The method according to claim 1, wherein after the determining whether a shadow account corresponding to the shadow transaction exists in the primary account registered to the primary transaction, further comprising:
if not, determining whether the user authorizes the shadow account to log in;
if the user is authorized, establishing a shadow account number in the shadow exchange for the user;
and establishing a mapping relation between the primary account and the shadow account of the user, wherein the mapping relation is used for enabling the primary account and the shadow account of the user to share login information of the user.
4. The method of claim 1, wherein after determining whether the shadow exchange on which the user is logged has a corresponding primary exchange, further comprising:
if not, prompting the user to input an account and a login password for registration;
after the registration is passed, prompting the user to input a name and a certificate number for authentication;
and after the authentication is passed, prompting the user to carry out mobile phone number security verification or mailbox security verification.
5. The method of claim 1, wherein the step of logging in the shadow exchange using login information corresponding to the shadow account number comprises:
judging whether a primary account corresponding to the shadow account is in a locked state;
if not, logging in the shadow exchange by using the login information corresponding to the shadow account.
6. An exchange login apparatus, comprising:
the system comprises a first judgment module, a second judgment module and a third judgment module, wherein the first judgment module is used for judging whether a shadow exchange logged by a user has a corresponding main exchange or not, the shadow exchange and the main exchange are different exchanges, and an association relationship exists between the shadow exchange and the main exchange;
the second judgment module is used for judging whether a primary account number for logging in the primary transaction place has a shadow account number corresponding to the shadow transaction place when the primary transaction place corresponding to the shadow transaction place is logged in by a user, wherein the shadow account number and the primary account number share login information of the user, and the login information is used for representing an account number, a login password, authentication information and safety item information of the user;
and the login module is used for logging in the shadow exchange by utilizing login information corresponding to the shadow account when a shadow account corresponding to the shadow exchange exists in a primary account for logging in the primary exchange.
7. The apparatus of claim 6, further comprising:
the data acquisition module is used for acquiring a primary account number of a user logging in a primary exchange and a shadow exchange having an association relation with the primary exchange;
the first account number establishing module is used for establishing a shadow account number in the shadow exchange for the user;
the first mapping relationship establishing module is used for establishing a mapping relationship between the primary account and the shadow account of the user, and the mapping relationship is used for enabling the primary account and the shadow account of the user to share login information of the user.
8. The apparatus of claim 6, further comprising:
the authorization module is used for determining whether the user authorizes the shadow account to log in when the primary account which logs in the primary exchange does not have the shadow account corresponding to the shadow exchange;
the second account establishing module is used for establishing a shadow account in the shadow exchange for the user when the user authorizes the shadow account to log in;
the second mapping relationship establishing module is used for establishing a mapping relationship between the primary account and the shadow account of the user, and the mapping relationship is used for enabling the primary account and the shadow account of the user to share login information of the user.
9. The apparatus of claim 6, further comprising:
the registration module is used for prompting the user to input an account number and a login password for registration when the shadow exchange logged in by the user does not have a corresponding main exchange;
the authentication module is used for prompting the user to input a name and a certificate number for authentication after the registration is passed;
and the safety verification module is used for prompting the user to carry out mobile phone number safety verification or mailbox safety verification after the authentication is passed.
10. The apparatus of claim 6, wherein the login module further comprises:
a state judgment unit, configured to judge whether a primary account corresponding to the shadow account is in a locked state;
and the login unit is used for logging in the shadow trading exchange by using login information corresponding to the shadow account when the primary account corresponding to the shadow account is not in the locked state.
CN202010115110.8A 2020-02-25 2020-02-25 Exchange login method and device Pending CN111324876A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010115110.8A CN111324876A (en) 2020-02-25 2020-02-25 Exchange login method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010115110.8A CN111324876A (en) 2020-02-25 2020-02-25 Exchange login method and device

Publications (1)

Publication Number Publication Date
CN111324876A true CN111324876A (en) 2020-06-23

Family

ID=71171157

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010115110.8A Pending CN111324876A (en) 2020-02-25 2020-02-25 Exchange login method and device

Country Status (1)

Country Link
CN (1) CN111324876A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112231654A (en) * 2020-10-16 2021-01-15 北京天融信网络安全技术有限公司 Operation and maintenance data isolation method and device, electronic equipment and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103297410A (en) * 2012-03-05 2013-09-11 盛大计算机(上海)有限公司 Account intercommunication system and using method thereof
CN106302612A (en) * 2015-06-10 2017-01-04 阿里巴巴集团控股有限公司 The creation method of account and device

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103297410A (en) * 2012-03-05 2013-09-11 盛大计算机(上海)有限公司 Account intercommunication system and using method thereof
CN106302612A (en) * 2015-06-10 2017-01-04 阿里巴巴集团控股有限公司 The creation method of account and device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112231654A (en) * 2020-10-16 2021-01-15 北京天融信网络安全技术有限公司 Operation and maintenance data isolation method and device, electronic equipment and storage medium
CN112231654B (en) * 2020-10-16 2024-02-06 北京天融信网络安全技术有限公司 Operation and data isolation method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
US9251327B2 (en) Method and system for providing behavioral bi-directional authentication
CN104077689B (en) A kind of method of Information Authentication, relevant apparatus and system
CN111917773B (en) Service data processing method and device and server
US10212151B2 (en) Method for operating a designated service, service unlocking method, and terminal
CN104751334B (en) Service processing method, device and system
TWI756200B (en) Method and device for account binding and business processing
CN108243404B (en) Method, device and equipment for verifying binding state of mobile phone number
CN104869175A (en) Cross-platform account resource sharing implementation method, device and system
CN105323253A (en) Identity verification method and device
CN104753894A (en) Data processing method, device and system
CN101221641A (en) On-line trading method and its safety affirmation equipment
CN111107063B (en) Login method and device
CN111832005A (en) Application authorization method, application authorization device and electronic equipment
CN107483477B (en) Account management method and account management system
CN106685945B (en) Service request processing method, service handling number verification method and terminal thereof
CN111324876A (en) Exchange login method and device
US9996875B2 (en) Online bidding system
CN106998315B (en) Method, device and system for registration authentication
CN107909370B (en) Multiple safety control method and system for electronic payment platform
CN105427100A (en) Bank card transaction method, apparatus and system
CN111275506A (en) Bill issuing method and block link point equipment
CN113132925B (en) Short message authentication method, system, short message gateway equipment and terminal equipment
CN106127482A (en) A kind of information processing method and electronic equipment
CN116015710A (en) Client automatic authentication login method, device, terminal and storage medium
CN114881756A (en) Letter verification method, system and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200623