CN112910876A - Login method and device and electronic equipment - Google Patents

Login method and device and electronic equipment Download PDF

Info

Publication number
CN112910876A
CN112910876A CN202110114719.8A CN202110114719A CN112910876A CN 112910876 A CN112910876 A CN 112910876A CN 202110114719 A CN202110114719 A CN 202110114719A CN 112910876 A CN112910876 A CN 112910876A
Authority
CN
China
Prior art keywords
login
equipment
code
request
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110114719.8A
Other languages
Chinese (zh)
Other versions
CN112910876B (en
Inventor
乔泽慧
钱晓智
冯光帅
邱慧
张之弢
李金明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Absolute Health Ltd
Original Assignee
Beijing Absolute Health Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Absolute Health Ltd filed Critical Beijing Absolute Health Ltd
Priority to CN202110114719.8A priority Critical patent/CN112910876B/en
Publication of CN112910876A publication Critical patent/CN112910876A/en
Application granted granted Critical
Publication of CN112910876B publication Critical patent/CN112910876B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords

Abstract

The invention provides a login method, a login device and electronic equipment, wherein the login method, the login device and the electronic equipment respond to the received login request and acquire a login code carried in the login request; the login code is generated by the server in advance based on the equipment identification of the target equipment and is sent to the target equipment; and acquiring login conditions from the login codes, and if the login request meets the login conditions, determining that the first equipment which sends the login request successfully logs in. In the method, the only login code can be generated in advance through the device identifier of the target device, and the device receiving the login code can directly log in according to the login code, so that the login operation is simplified, and the experience of the user is improved.

Description

Login method and device and electronic equipment
Technical Field
The present invention relates to the field of computer technologies, and in particular, to a login method, a login device, and an electronic device.
Background
In the related art, login is usually performed based on a mobile phone number, a verification code, an account number, a password, third party authorization and other manners; the method requires the user to actively perform login operations such as input or click, and may further require the user to manually confirm the login again in the situation that the user has logged in, so that the operation process is complicated and the experience is poor.
Disclosure of Invention
In view of this, the present invention provides a login method, a login device and an electronic device, so as to simplify login operations of a user and improve user experience.
In a first aspect, an embodiment of the present invention provides a login method, where the method is applied to a server; the method comprises the following steps: in response to receiving the login request, acquiring a login code carried in the login request; the login code is generated by the server in advance based on the equipment identifier of the target equipment and is sent to the target equipment; and acquiring login conditions from the login codes, and if the login request meets the login conditions, determining that the first equipment which sends the login request successfully logs in.
Further, the login condition is generated by the server in advance based on the preset login time and is stored in the login code.
Further, the login condition includes a login validity period; the method comprises the steps of obtaining login conditions from a login code, and determining that the first device sending the login request successfully logs in if the login request meets the login conditions, wherein the steps comprise: if the login code is valid and the receiving time of the login request meets the login valid period, the first device is confirmed to be successfully logged in; and if the login code is invalid or the receiving time of the login request does not meet the login validity period, determining that the first device fails to login.
Further, before the step of confirming that the first device is successfully logged in if the login code is valid and the receiving time of the login request meets the login valid period, the method further comprises: if the login code is not analyzed, analyzing the login code to obtain an analysis result; the analysis result comprises a device identifier and a login condition of the target device; and if the equipment identifier and the login condition of the target equipment are matched with the analysis result corresponding to the equipment identifier of the target equipment stored in advance by the server, determining that the login code is valid.
Further, the login condition comprises a login request validity period; after determining that the first device has failed to log in, the method further comprises: if the receiving time of the login request meets the validity period of the login request, acquiring the equipment identifier of the target equipment from the login code; acquiring the equipment identifier of the first equipment through a preset third-party service, and determining that the first equipment is successfully logged in if the equipment identifier of the first equipment is matched with the equipment identifier of the target equipment; and if the receiving time of the login request does not meet the validity period of the login request, or the device identification of the first device is not matched with the device identification of the target device, determining that the first device fails to login.
Further, the device identification includes a user identification number set in the device.
Further, after determining that the first device fails to log in, the method further includes: generating a first verification code corresponding to the equipment identification of the target equipment in response to receiving the verification request; saving the first verification code and the valid time of the first verification code; calling a preset short message platform to send the first verification code to the target equipment; and receiving a second verification code sent by the first equipment, and if the second verification code is matched with the first verification code and the receiving time of the second verification code meets the effective time, determining that the first equipment is successfully logged in.
Further, in response to receiving the login request, the method further comprises: if the first equipment is in a logged-in state, determining that the first equipment is logged in successfully; and if the first equipment is in the unregistered state, executing the step of acquiring the login code carried in the login request.
Further, after determining that the first device is successfully logged in, the method further includes: and obtaining a login state identifier corresponding to the equipment identifier of the first equipment, and sending the login state identifier to the first equipment so that the first equipment displays a logged-in page.
In a second aspect, an embodiment of the present invention provides a login method, where the method is applied to a first terminal device; the method comprises the following steps: responding to login trigger operation, and generating a login request based on a preset login code; the login code is generated by the server in advance based on the equipment identifier of the target equipment and is sent to the target equipment; sending the login request to a server so as to obtain a login code carried in the login request through the server; and acquiring login conditions from the login codes, and if the login request meets the login conditions, determining that the first terminal equipment which sends the login request successfully logs in.
Further, after sending the login request to the server, the method further includes: displaying a login page; if the displayed logging-in page is a verification code logging-in page, responding to the trigger operation aiming at the verification request, sending the verification request to the server so as to generate a first verification code corresponding to the equipment identifier of the target equipment through the server, and storing the first verification code and the effective time of the first verification code; responding to the input operation aiming at the verification code input box, sending the input second verification code to the server, judging whether the second verification code is matched with the first verification code through the server, judging whether the receiving time of the second verification code meets the effective time, and if the second verification code is matched with the first verification code, determining that the first terminal equipment is successfully logged in.
In a third aspect, an embodiment of the present invention provides a login method, where the method is applied to a second terminal device; the method comprises the following steps: determining a target equipment identifier, and sending the target equipment identifier to a server so as to generate a login code based on the target equipment identifier through the server; storing the target equipment identification and the corresponding login code; wherein the target device identification comprises one or more; the target equipment identification comprises a user identification number set in the equipment; generating a sending request based on the target equipment identification in response to the sending trigger operation; and sending the sending request to a server so as to send the corresponding login code to the corresponding target equipment through the server according to the target equipment identification.
In a fourth aspect, an embodiment of the present invention provides a login apparatus, where the apparatus is disposed in a server; the device comprises: the login code acquisition module is used for responding to the received login request and acquiring the login code carried in the login request; the login code is generated by the server in advance based on the equipment identifier of the target equipment and is sent to the target equipment; and the login determining module is used for acquiring login conditions from the login codes, and if the login request meets the login conditions, determining that the first equipment which sends the login request successfully logs in.
In a fifth aspect, an embodiment of the present invention provides a login apparatus, where the apparatus is disposed in a first terminal device; the device comprises: the login request generation module is used for responding to login trigger operation and generating a login request based on a preset login code; the login code is generated by the server in advance based on the equipment identifier of the target equipment and is sent to the target equipment; the login request sending module is used for sending the login request to the server so as to obtain a login code carried in the login request through the server; and acquiring login conditions from the login codes, and if the login request meets the login conditions, determining that the first terminal equipment which sends the login request successfully logs in.
In a sixth aspect, an embodiment of the present invention provides a login apparatus, where the apparatus is disposed in a second terminal device; the device comprises: the target equipment identification sending module is used for determining the target equipment identification and sending the target equipment identification to the server so as to generate a login code based on the target equipment identification through the server; storing the target equipment identification and the corresponding login code; wherein the target device identification comprises one or more; the target equipment identification comprises a user identification number set in the equipment; a sending request sending module, configured to generate a sending request based on the target device identifier in response to a sending trigger operation; and sending the sending request to a server so as to send the corresponding login code to the corresponding target equipment through the server according to the target equipment identification.
In a seventh aspect, an embodiment of the present invention provides an electronic device, including a processor and a memory, where the memory stores machine executable instructions capable of being executed by the processor, and the processor executes the machine executable instructions to implement the login method of any one of the first aspect, the second aspect, or the third aspect.
In an eighth aspect, embodiments of the present invention provide a machine-readable storage medium storing machine-executable instructions that, when invoked and executed by a processor, cause the processor to implement the login method of any one of the first, second or third aspects.
The embodiment of the invention has the following beneficial effects:
the embodiment of the invention provides a login method, a login device and electronic equipment, wherein the login method, the login device and the electronic equipment respond to the received login request and acquire a login code carried in the login request; the login code is generated by the server in advance based on the equipment identification of the target equipment and is sent to the target equipment; and acquiring login conditions from the login codes, and if the login request meets the login conditions, determining that the first equipment which sends the login request successfully logs in. In the method, the unique login code can be generated through the device identification generation of the target device in advance, and the device receiving the login code can directly log in according to the login code, so that the login operation is simplified, and the experience of the user is improved.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
In order to make the aforementioned and other objects, features and advantages of the present invention comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and other drawings can be obtained by those skilled in the art without creative efforts.
Fig. 1 is a flowchart of a login method according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of a login method according to an embodiment of the present invention;
fig. 3 is a flowchart of a specific login method according to an embodiment of the present invention;
fig. 4 is a timing diagram of a login method according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of a login apparatus according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
To make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions of the present invention will be clearly and completely described below with reference to the accompanying drawings, and it is apparent that the described embodiments are some, but not all embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
At present, the traditional login mode only supports modes of mobile phone + verification code, mobile phone + password or third party authorized login and the like; in the traditional login mode, in a situation that a user logs in, the user may manually log in again. The user is required to perform active operation, the operation process is complicated, the experience is poor, and the user may quit the application in the login process, so that the user is lost. In addition, in the existing fast login mode, since the fast login is not accessed to the third-party service and short message verification and verification are not performed, the risk of non-self login exists, and the reliability and the safety are poor. Based on this, the login method, the login device and the electronic device provided by the embodiment of the invention can be applied to electronic devices such as servers, and particularly can be applied to electronic devices with login functions.
The first embodiment is as follows:
in order to facilitate understanding of the embodiment, a detailed description is first given of a login method disclosed in the embodiment of the present invention, where the method is applied to a server; as shown in fig. 1, the method comprises the steps of:
step S102, responding to the received login request, and acquiring a login code carried in the login request; the login code is generated by the server in advance based on the equipment identifier of the target equipment and is sent to the target equipment;
the login request is usually sent by a terminal device, for example, a mobile phone, a tablet computer, or the like; the login request usually includes information such as login code and request time. The above-mentioned registration code is usually a parsable code, which may also be called code, and is generally expressed in the form of a string of characters; the login code is generated by the server in advance based on the device identification encryption of the target device, so that each device identification corresponds to a unique login code, wherein the device identification of the target device usually refers to the device identification which is logged in before; also understood as device identifications that have already been registered; the device identifier may be a mobile phone number or the like set in the device, and each device identifier is unique. For example, a pre-registered user's mobile phone number may be encrypted to generate a corresponding login code, and the corresponding login code may be sent to the corresponding target device according to the mobile phone number.
The embodiment is generally applied to a marketing promotion scene of a target application, and when a target page promotion marketing needs to be performed on a user who has registered the target application, a generated login code is generally sent to corresponding target equipment through a server; for example, first, a target device identifier for promotion is selected from the device identifiers, and then, according to the target device identifier (for example, an account name, a mobile phone number, a mailbox number, and the like), a login code corresponding to the target device identifier is obtained from login codes pre-generated and stored in a server; the login code is then sent to the target device. In response to receiving the login request, a login code, such as a login code that may be obtained from the login request via a Software Development Kit (SDK), may be obtained from the login request.
Wherein, each device identification corresponds to a unique login code. In order to facilitate display of a target page in a target device, a server generally sets a login code in a website of the target page, for example, the login code is directly set in the last position of the website to generate a link, the link is not favorable for sending due to long length and is clicked by a user, the link can be translated to obtain a short link convenient for sending, and the short link can open a login page of a target application or a landing page of the target application, wherein the landing page is a page needing marketing popularization.
In addition, the sending mode of sending the login code to the target device can be sent in a mode of short message, mail, public number and the like; specifically, a short message containing a login code may be sent to the target device through a device identifier of the target device, such as a mobile phone number of the target device; or sending a mail containing the login code to the target device through a mailbox in the account information of the user corresponding to the device identifier of the target device.
And step S104, obtaining login conditions from the login codes, and if the login request meets the login conditions, determining that the first equipment which sends the login request successfully logs in.
In order to ensure the timeliness of the login code, the validity time of the login code is usually set when the login code is generated. The login conditions are generated in advance by the server based on preset login time and are stored in the login code. The preset login time generally includes the valid time of the login code, the valid time of the login request, and the like. For example, it may be preset that the target device can log in according to the login code within a specified time period. The login condition thus typically includes a login validity period, which may be used to determine whether the login request is valid.
Specifically, the login condition may be obtained from the login code in an analytic manner. And judging whether the request time in the login request or the receiving time of the login request meets the login condition. If yes, the first device sending the login request is determined to be successfully logged in, and the login mode can be understood as fast login. In addition, when the server responds to the login request, the first device sending the login request usually displays a login loading page, and when the server determines that the first device is successfully logged in, the first device displays a target page.
The embodiment of the invention provides a login method, which is used for responding to a received login request and acquiring a login code carried in the login request; the login code is generated by the server in advance based on the equipment identification of the target equipment and is sent to the target equipment; and acquiring login conditions from the login codes, and if the login request meets the login conditions, determining that the first equipment which sends the login request successfully logs in. In the method, the unique login code can be generated through the device identification generation of the target device in advance, and the device receiving the login code can directly log in according to the login code, so that the login operation is simplified, and the experience of the user is improved.
Example two:
the present embodiment also provides another login method, which is implemented on the basis of the foregoing embodiment, and the present embodiment mainly describes an implementation manner of a step of obtaining a login condition from a login code, and determining that a first device sending the login request successfully logs in if the login request satisfies the login condition, and a specific implementation manner of the previous step, and specifically includes the following steps:
step 202, in response to receiving a login request, obtaining a login code carried in the login request; the login code is generated by the server in advance based on the equipment identifier of the target equipment and is sent to the target equipment;
step 204, if the login code is not analyzed, analyzing the login code to obtain an analysis result; the analysis result comprises a device identifier and a login condition of the target device;
in order to avoid that the login code is used for multiple times or used by other users, the effective use times of the login code can be set, and can be set to be one time generally; specifically, when the server generates a login code based on the device identifier of the target device, the allowed number of times of use of the login code is set to one. If the login code is analyzed, when the user of the target device performs the triggering operation on the login code again, the user is prompted to log in again, and at this time, an account number, a password and the like need to be output. After receiving the login code, the server first determines whether the login code has been previously analyzed, and if not, analyzes the login code, wherein the specific analysis mode corresponds to the generation mode, either the encoding mode or the encryption mode, and the corresponding analysis mode may be the decoding mode or the decryption mode. The parsing result generally includes the device identifier and the login condition of the target device.
Step 206, if the device identifier and the login condition of the target device are matched with the analysis result corresponding to the device identifier of the target device pre-stored by the server, determining that the login code is valid;
after the server generates the login code based on the device identifier of the target device, the server usually pre-stores the analysis result corresponding to the login code of the device identifier of the target device; when the login processing is carried out, the server analyzes the analysis result corresponding to the equipment identifier of the target equipment, and then matches the analysis result corresponding to the equipment identifier of the target equipment which is stored in advance, and if the analysis result is matched with the analysis result, the login code is determined to be valid. In addition, if the login code cannot be analyzed or the analysis result is not consistent with the analysis result stored in advance by the server, it means that the login code is not the login code transmitted by the server, and the login code may be invalid due to factors such as the device and the network. For example, the analysis result may be a code violation due to a network failure.
Step 208, if the login code is valid and the receiving time of the login request meets the login valid period, confirming that the first device is successfully logged in;
therefore, the server confirms that the first device successfully logs in only when the login code is valid and the receiving time of the login request meets the login validity period, and the first device is the same as the target device at the moment. The login validity period is usually the valid time from the time when the server sends the login code, and the target device can perform fast login based on the login code, for example, the login validity period may be 1 hour, that is, the target user can perform fast login based on the login code within 1 hour after the target device receives the login code; it can also be understood that the server receives the login request within 1 hour after sending the login code, that is, the receiving time of the login request is within 1 hour of the login validity period, and then the server can confirm that the first device has successfully logged in.
Step 210, if the login code is invalid, or the receiving time of the login request does not meet the login validity period, determining that the first device fails to login;
if the login code cannot be analyzed, or the login code is analyzed, or the analysis result of the login code is inconsistent with the corresponding analysis result pre-stored by the server, the login code is invalid, and at this time, the login failure of the first device can be determined; or the time of receiving the login request exceeds the login validity period, for example, the login validity period may be 1 hour, and the server receives the login request after 1 hour after sending the login code, that is, the time of receiving the login request exceeds 1 hour of the login validity period, it may be determined that the first device has failed to login.
Further, the login condition includes a login request validity period; the valid period of the login request can be understood as the second valid time of the login code, and the valid period of the login request is usually larger than the valid period of the login; for example, the validity period of the login request may be 7 days, that is, within 7 days after the target device receives the login code, the login code is valid, that is, the target device can log in based on the login code. After determining that the first device fails to log in, the method further includes:
step 212, if the receiving time of the login request meets the validity period of the login request, acquiring the device identifier of the target device from the login code;
the device identifier includes a user identification number set in the device, for example, a mobile phone number corresponding to a mobile phone card installed in the mobile phone device. Specifically, if the validity period of the login request is 7 days, the time of receiving the login request is 2 days, and the validity period of the login request is met, the device identifier of the target device, that is, the mobile phone number, may be obtained from the analysis result of the login code.
Step 214, acquiring the device identifier of the first device through a preset third-party service, and if the device identifier of the first device is matched with the device identifier of the target device, determining that the first device is successfully logged in;
the preset server may be a service side providing login capability, and the device identifier of the first device may be obtained through a preset third-party service, and if the device identifier of the first device matches the device identifier of the target device, the first device and the target device are the same device, and it is determined that the first device is successfully logged in. Specifically, the third-party service may be requested through the device identifier of the target device, and whether the device identifier of the first device matches the device identifier of the target device is determined. In addition, it may also be determined whether the device identifier of the first device matches the device identifier of the target device by obtaining a Process ID (PID).
In step 216, if the receiving time of the login request does not meet the validity period of the login request, or the device identifier of the first device does not match the device identifier of the target device, it is determined that the login of the first device fails.
If the login request validity period is 7 days and the reception time of the login request is 8 days, the login request validity period is not satisfied, and it may be determined that the first device has failed in login. Or, the receiving time of the login request meets the validity period of the login request, but the device identifier of the first device does not match the device identifier of the target device, and at this moment, the first device and the target device are not the same, and it is determined that the login of the first device fails.
The device login method of steps 212-216 above may be referred to as silent login, and the login process does not require any operation by the user, during which the page being logged in is always displayed on the first device. In the above manner, by comparing the consistency between the device identifier of the first device sending the login request and the device identifier of the target device, it can be determined that the first device is the target device, so that the user operation is simplified, the user experience is improved, and the login safety and reliability are improved.
However, after determining that the first device has failed to log in step 216, the method further comprises:
step 218, in response to receiving the verification request, generating a first verification code corresponding to the device identifier of the target device; saving the first verification code and the valid time of the first verification code;
when the server determines that the equipment identifier of the first equipment is inconsistent with the equipment identifier of the target equipment, the server automatically enables the first equipment to display a verification code login page, and when a user sends a verification request on the verification code login page, the server responds to the received verification request and generates a first verification code corresponding to the equipment identifier of the target equipment; the verification request carries a verified mobile phone number, which is a mobile phone number corresponding to the device identifier of the target device. And simultaneously saving the first verification code and the valid time of the first verification code, wherein the valid time is usually 1 minute and can be specifically set according to actual needs.
Step 220, calling a preset short message platform to send the first verification code to the target equipment;
after the first verification code is generated, a preset short message platform can be called through the mobile phone number inquiry interface, and the first verification code is sent to the target equipment.
Step 222, receiving a second verification code sent by the first device, and if the second verification code is matched with the first verification code and the receiving time of the second verification code meets the valid time, determining that the first device is successfully logged in.
After a user of the target device receives the first verification code, the verification code can be input into a verification code input box displayed by the first device, then the verification control is clicked, the server can receive a second verification code sent by the first device, and if the second verification code is matched with the first verification code and the receiving time of the second verification code meets the effective time, the first device is determined to be successfully logged in.
In the foregoing manner, the first device and the target device may be the same device or different devices.
In addition, after responding to the received login request, the method further comprises: if the first equipment is in a logged-in state, determining that the first equipment is logged in successfully; and if the first equipment is in the unregistered state, executing the step of acquiring the login code carried in the login request.
Since there may be situations where the user of the target device is already logged in, for example, the running background of the target device is already logged in the target application. Therefore, it is necessary to first determine whether the user of the target device is in the logged-in state. If the device identifier of the first device sending the login request is in the logged-in state, the first device can directly jump to a target page, the target page of the logged-in target application is displayed for the user, and at the moment, the user can directly operate the content displayed on the page. And if the first equipment is in the unregistered state, continuing to execute the step of acquiring the login code carried in the login request. This way, repeated login of device identification is avoided.
Further, after determining that the first device is successfully logged in, the method further includes: and obtaining a login state identifier corresponding to the equipment identifier of the first equipment, and sending the login state identifier to the first equipment so that the first equipment displays a logged-in page.
After the first device successfully logs in, the server usually obtains a login state identifier corresponding to the device identifier of the first device, wherein the login state identifier is generated in advance and stored in the server; then, the login state identifier is sent to the first equipment, so that the first equipment displays a page after login, wherein the page after login generally refers to a target page which is needed in an application scene of marketing promotion; the specific target page can be set according to the marketing strategy of a business party; for example, the game information page may be a commodity information page for specifying a commodity in a shopping site, or a game activity page newly launched in a game site.
In the above manner, a unique login code can be generated through the device identifier of each target device, the login code includes the device identifier of the target device, the login validity period and the login request validity period, the server can directly perform fast login by analyzing the login code, the user of the target device can complete login only by performing simple click operation, the login operation of the user is simplified, the experience of the user is improved, and meanwhile, by comparing the device identifier of the first device with the device identifier of the target device, whether the first device sending the login request is the target device can be determined, and the reliability and the safety of the login service are improved. If the quick login fails, the user can login in a silent login and mobile phone number verification code mode, and login modes are enriched.
Example three:
the embodiment provides a login method, which is applied to first terminal equipment and comprises the following steps:
step 302, responding to login trigger operation, and generating a login request based on a preset login code; the login code is generated by the server in advance based on the equipment identifier of the target equipment and is sent to the target equipment;
after receiving the login code sent by the server, the first terminal device responds to the operation of clicking the login code and generates a login request based on the preset login code. In actual implementation, the first terminal device usually receives a login link sent by the server, the link includes a website indicating a target webpage and a login code, and after responding to a login trigger operation, a login request is generated based on the login code preset in the login link; and meanwhile, the first terminal device displays the login page of the target webpage.
Step 304, sending the login request to a server so as to obtain a login code carried in the login request through the server; and acquiring login conditions from the login codes, and if the login request meets the login conditions, determining that the first terminal equipment which sends the login request successfully logs in.
In the above manner, the server is generated in advance through the device identifier of the target device, so that the only login code can be generated, and the device receiving the login code can directly log in according to the login code, thereby simplifying the login operation and improving the experience of the user.
Further, after sending the login request to the server, the method further includes:
displaying a login page; if the displayed logging-in page is a verification code logging-in page, responding to the trigger operation aiming at the verification request, sending the verification request to the server so as to generate a first verification code corresponding to the equipment identifier of the target equipment through the server, and storing the first verification code and the effective time of the first verification code; responding to the input operation aiming at the verification code input box, sending the input second verification code to the server, judging whether the second verification code is matched with the first verification code through the server, judging whether the receiving time of the second verification code meets the effective time, and if the second verification code is matched with the first verification code, determining that the first terminal equipment is successfully logged in.
Example four:
the embodiment provides a login method, which is applied to a second terminal device and comprises the following steps:
step 402, determining a target device identifier, and sending the target device identifier to a server so as to generate a login code based on the target device identifier through the server; storing the target equipment identification and the corresponding login code; wherein the target device identification comprises one or more; the target equipment identification comprises a user identification number set in the equipment;
taking a target page of marketing popularization application as an example, a target device identifier needing marketing can be determined firstly, and can be understood as a registered mobile phone number of a target user; sending the target equipment identifier to a server so that the server can encrypt or encode the target equipment identifier in advance to generate a login code; and correspondingly storing the target equipment identification and the generated login code into a server.
In addition, the website of the target page can be sent to the server, so that the login code is set in the website of the target page through the server, specifically, the login code can be added at the last position of the website of the target page to generate a marketing link, and then the marketing link is translated to obtain a short link, namely the login link.
Step 404, in response to the sending trigger operation, generating a sending request based on the target device identifier; and sending the sending request to a server so as to send the corresponding login code to the corresponding target equipment through the server according to the target equipment identification.
After a marketing system for marketing promotion determines a user to be sent, a sending request containing a target equipment identifier can be sent to a server, so that the server sends a corresponding marketing link containing a login code to corresponding target equipment according to the target equipment identifier. So that the target device can log in according to the login code.
In the mode, the second terminal device can determine the target device identification in advance, generates the login code in advance through the server, and sends the login link containing the login code to the corresponding target device in response to the sending triggering operation, so that the target device can directly log in according to the login code, the login operation is simplified, and the experience of the user is improved.
Example five:
referring to fig. 2, the embodiment provides a framework diagram of a login method; the embodiment takes an application scenario of a marketing promotion target page as an example. The marketing system (also called as a business system) is arranged in the terminal equipment and is used for setting a marketing strategy; the business party (or the business person) utilizes the marketing system to connect the database, the Apollo and the short-chain service (configuration center) through a user center (running on a server), namely, a database interface arranged in the server, and generates a login link (which can also be called a marketing link) with a code (corresponding to the login code) based on the website of the target page and the equipment identification of the target equipment. And meanwhile, the short message of the promotion link is sent to the corresponding target equipment through the message centers of other components. After the login is determined to be successful, Token (corresponding to the login status identifier) needs to be acquired from the user center and sent to the unified login page (corresponding to the target page displayed by the first device).
Referring to fig. 3 and fig. 4, the present embodiment further provides a flowchart and a sequence diagram of a specific login method; firstly, a salesman of a target application confirms a registered mobile phone number (userid in the figure, corresponding to the equipment identifier of the target equipment) of a target user, namely a user sending a promotion short message (including a login link) and a website of a target webpage needing promotion and marketing from a business system according to a marketing strategy, then a server generates a login code according to the registered mobile phone number of the user, and then generates a short link (corresponding to the login link) according to the website of the target webpage promoting and marketing and the login code, wherein the login validity period is included. And then, configuring a short message template based on the login link through a marketing system, adding a website parameter, selecting a user needing to send a short message, and sending the login link corresponding to the user to the target equipment of the corresponding user through a server.
After receiving the short message of the login link, the first device can click the link in the short message, firstly, the short message is analyzed, whether the device identifier of the first device logs in is judged, if the device identifier logs in, the first device directly jumps to a long link, namely a website link of a target webpage, and a user can operate on a page displayed by the long link. And if the equipment identifier is not logged in, sending the code to a server, analyzing the code through the server, if the analysis result is effective, sending the effective Token to a service landing page (corresponding to the target page) to determine that the quick login is successful, then directly skipping to the long link by the first equipment, and enabling a user to operate on the page displayed by the long link. If the analysis result is invalid, firstly, the device identifier of the first device can be obtained in an ID obtaining mode through a silent login mode, and if the device identifier of the first device is matched with the device identifier of the target device, the first device is determined to be successful in silent login. If the device identifier of the first device is not matched with the device identifier of the target device, login needs to be performed in a mobile phone number and verification code mode.
The specific login method provided by the mode has the same technical characteristics as the login method provided by the embodiment, so that the same technical problems can be solved, and the same technical effects are achieved.
Example six:
corresponding to the above method embodiment, this embodiment discloses a login device, which is disposed in a server, and as shown in fig. 5, the device includes:
a login code obtaining module 51, configured to obtain a login code carried in a login request in response to receiving the login request; the login code is generated by the server in advance based on the equipment identifier of the target equipment and is sent to the target equipment;
and the login determining module 52 is configured to obtain a login condition from the login code, and if the login request meets the login condition, determine that the first device sending the login request successfully logs in.
The embodiment of the invention provides a login device, which responds to the received login request and acquires a login code carried in the login request; the login code is generated by the server in advance based on the equipment identification of the target equipment and is sent to the target equipment; and acquiring login conditions from the login codes, and if the login request meets the login conditions, determining that the first equipment which sends the login request successfully logs in. In the method, the unique login code can be generated through the device identification generation of the target device in advance, and the device receiving the login code can directly log in according to the login code, so that the login operation is simplified, and the experience of the user is improved.
Further, the login condition is generated by the server in advance based on a preset login time and is stored in the login code.
Further, the login condition includes a login validity period; the login determination module is further configured to: if the login code is valid and the receiving time of the login request meets the login valid period, the first device is confirmed to be successfully logged in; and if the login code is invalid or the receiving time of the login request does not meet the login validity period, determining that the first device fails to login.
Further, the device also comprises an analysis module, which is used for analyzing the login code to obtain an analysis result if the login code is not analyzed; the analysis result comprises a device identifier and a login condition of the target device; and if the equipment identifier and the login condition of the target equipment are matched with the analysis result corresponding to the equipment identifier of the target equipment stored in advance by the server, determining that the login code is valid.
Further, the login condition includes a login request validity period; the login determination module is further configured to: if the receiving time of the login request meets the validity period of the login request, acquiring the equipment identifier of the target equipment from the login code; acquiring the equipment identifier of the first equipment through a preset third-party service, and determining that the first equipment is successfully logged in if the equipment identifier of the first equipment is matched with the equipment identifier of the target equipment; and if the receiving time of the login request does not meet the validity period of the login request, or the device identification of the first device is not matched with the device identification of the target device, determining that the first device fails to login.
Further, the device identifier includes a user identification number set in the device.
Further, the login determination module is further configured to: generating a first verification code corresponding to the equipment identification of the target equipment in response to receiving the verification request; saving the first verification code and the valid time of the first verification code; calling a preset short message platform to send the first verification code to the target equipment; and receiving a second verification code sent by the first equipment, and if the second verification code is matched with the first verification code and the receiving time of the second verification code meets the effective time, determining that the first equipment is successfully logged in.
Further, the apparatus further includes a login status determining module, configured to determine that the first device is successfully logged in if the first device is in a logged-in status; and if the first equipment is in the unregistered state, executing the step of acquiring the login code carried in the login request.
Further, the device further includes a login state identifier sending module, configured to obtain a login state identifier corresponding to the device identifier of the first device, and send the login state identifier to the first device, so that the first device displays a page after login.
The login device provided by the mode has the same technical characteristics as the login method provided by the embodiment, so that the same technical problems can be solved, and the same technical effects are achieved.
Example seven:
corresponding to the above method embodiment, this embodiment provides a login apparatus, which is disposed in a first terminal device; the device includes:
the login request generation module is used for responding to login trigger operation and generating a login request based on a preset login code; the login code is generated by the server in advance based on the equipment identifier of the target equipment and is sent to the target equipment;
the login request sending module is used for sending the login request to the server so as to obtain a login code carried in the login request through the server; and acquiring login conditions from the login codes, and if the login request meets the login conditions, determining that the first terminal equipment which sends the login request successfully logs in.
Further, the login request sending module is further configured to: displaying a login page; if the displayed logging-in page is a verification code logging-in page, responding to the trigger operation aiming at the verification request, sending the verification request to the server so as to generate a first verification code corresponding to the equipment identifier of the target equipment through the server, and storing the first verification code and the effective time of the first verification code; responding to the input operation aiming at the verification code input box, sending the input second verification code to the server, judging whether the second verification code is matched with the first verification code through the server, judging whether the receiving time of the second verification code meets the effective time, and if the second verification code is matched with the first verification code, determining that the first terminal equipment is successfully logged in.
The login device provided in the above manner has the same technical features as the login method provided in the above embodiment, so that the same technical problems can be solved, and the same technical effects can be achieved.
Example eight:
corresponding to the above method embodiment, this embodiment provides a login apparatus, which is disposed in a second terminal device; the device includes:
the target equipment identification sending module is used for determining the target equipment identification and sending the target equipment identification to the server so as to generate a login code based on the target equipment identification through the server; storing the target equipment identification and the corresponding login code; wherein the target device identification comprises one or more; the target equipment identification comprises a user identification number set in the equipment;
a sending request sending module, configured to generate a sending request based on the target device identifier in response to a sending trigger operation; and sending the sending request to a server so as to send the corresponding login code to the corresponding target equipment through the server according to the target equipment identification.
The login device provided in the above-mentioned mode has the same technical features as the login method provided in the above-mentioned embodiment, so the same technical problems can be solved, and the same technical effects can be achieved.
Example nine:
the embodiment also provides an electronic device, which comprises a processor and a memory, wherein the memory stores machine executable instructions capable of being executed by the processor, and the processor executes the machine executable instructions to realize the login method.
Referring to fig. 6, the electronic device includes a processor 100 and a memory 101, the memory 101 stores machine executable instructions capable of being executed by the processor 100, and the processor 100 executes the machine executable instructions to implement the login method.
Further, the electronic device shown in fig. 6 further includes a bus 102 and a communication interface 103, and the processor 100, the communication interface 103, and the memory 101 are connected through the bus 102.
The memory 101 may include a high-speed Random Access Memory (RAM) and may also include a non-volatile memory (non-volatile memory), such as at least one disk memory. The communication connection between the network element of the system and at least one other network element is realized through at least one communication interface 103 (which may be wired or wireless), and the internet, a wide area network, a local network, a metropolitan area network, and the like can be used. The bus 102 may be an ISA bus, PCI bus, EISA bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one double-headed arrow is shown in FIG. 6, but that does not indicate only one bus or one type of bus.
Processor 100 may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware or instructions in the form of software in the processor 100. The processor 100 may be a general-purpose processor, and includes a Central Processing Unit (CPU), a Network Processor (NP), and the like; the device can also be a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, a discrete Gate or transistor logic device, or a discrete hardware component. The various methods, steps and logic blocks disclosed in the embodiments of the present invention may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present invention may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in the memory 101, and the processor 100 reads the information in the memory 101 and completes the steps of the method of the foregoing embodiment in combination with the hardware thereof.
The present embodiments also provide a machine-readable storage medium having stored thereon machine-executable instructions that, when invoked and executed by a processor, cause the processor to implement the above-described login method.
The login method, the login device, and the computer program product of the electronic device provided in the embodiments of the present invention include a computer-readable storage medium storing a program code, where instructions included in the program code may be used to execute the method described in the foregoing method embodiments, and specific implementations may refer to the method embodiments and are not described herein again.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the system and the apparatus described above may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In addition, in the description of the embodiments of the present invention, unless otherwise explicitly specified or limited, the terms "mounted," "connected," and "connected" are to be construed broadly, e.g., as meaning either a fixed connection, a removable connection, or an integral connection; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meaning of the above terms in the present invention can be understood in specific cases for those skilled in the art.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
In the description of the present invention, it should be noted that the terms "center", "upper", "lower", "left", "right", "vertical", "horizontal", "inner", "outer", etc., indicate orientations or positional relationships based on the orientations or positional relationships shown in the drawings, and are only for convenience of description and simplicity of description, but do not indicate or imply that the device or element being referred to must have a particular orientation, be constructed and operated in a particular orientation, and thus, should not be construed as limiting the present invention. Furthermore, the terms "first," "second," and "third" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance.
Finally, it should be noted that: although the present invention has been described in detail with reference to the foregoing embodiments, those skilled in the art will understand that the following embodiments are merely illustrative of the present invention, and not restrictive, and the scope of the present invention is not limited thereto: any person skilled in the art can modify or easily conceive the technical solutions described in the foregoing embodiments or equivalent substitutes for some technical features within the technical scope of the present disclosure; such modifications, changes or substitutions do not depart from the spirit and scope of the embodiments of the present invention, and they should be construed as being included therein. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (10)

1. A login method is characterized in that the method is applied to a server; the method comprises the following steps:
in response to receiving a login request, obtaining a login code carried in the login request; the login code is generated by the server in advance based on the equipment identification of the target equipment and is sent to the target equipment;
and acquiring login conditions from the login codes, and if the login request meets the login conditions, determining that the first equipment which sends the login request successfully logs in.
2. The method according to claim 1, wherein the login condition is generated by the server in advance based on a preset login time and stored in the login code;
the login condition comprises a login valid period; the step of obtaining the login condition from the login code, and if the login request meets the login condition, determining that the first device sending the login request successfully logs in comprises:
if the login code is valid and the receiving time of the login request meets the login valid period, the first device is confirmed to be successfully logged in;
if the login code is invalid, or the receiving time of the login request does not meet the login validity period, determining that the first device fails to login;
before the step of confirming that the first device is successfully logged in if the login code is valid and the receiving time of the login request meets the login validity period, the method further comprises:
if the login code is not analyzed, analyzing the login code to obtain an analysis result; the analysis result comprises a device identifier and a login condition of the target device;
if the equipment identifier of the target equipment is matched with the login condition, the analysis result corresponding to the equipment identifier of the target equipment is matched with the analysis result corresponding to the equipment identifier of the target equipment, which is stored in advance by the server, and the login code is determined to be valid;
the login condition comprises a login request validity period; after determining that the first device failed to log in, the method further comprises:
if the receiving time of the login request meets the validity period of the login request, acquiring the equipment identifier of the target equipment from the login code;
acquiring the equipment identifier of the first equipment through a preset third-party service, and determining that the first equipment is successfully logged in if the equipment identifier of the first equipment is matched with the equipment identifier of the target equipment;
if the receiving time of the login request does not meet the validity period of the login request, or the device identifier of the first device is not matched with the device identifier of the target device, determining that the login of the first device fails;
wherein the equipment identification comprises a user identification number set in the equipment;
after determining that the first device failed to log in, the method further comprises:
generating a first verification code corresponding to the equipment identification of the target equipment in response to receiving a verification request; saving the first verification code and the valid time of the first verification code;
calling a preset short message platform to send the first verification code to the target equipment;
receiving a second verification code sent by the first equipment, and if the second verification code is matched with the first verification code and the receiving time of the second verification code meets the effective time, determining that the first equipment is successfully logged in;
in response to receiving the login request, the method further comprises:
if the first equipment is in a logged-in state, determining that the first equipment is logged in successfully;
and if the first equipment is in the unregistered state, executing the step of acquiring the login code carried in the login request.
3. The method of any of claims 1 or 2, wherein after determining that the first device login is successful, the method further comprises:
and obtaining a login state identifier corresponding to the equipment identifier of the first equipment, and sending the login state identifier to the first equipment so that the first equipment displays a logged-in page.
4. A login method is characterized in that the method is applied to a first terminal device; the method comprises the following steps:
responding to login trigger operation, and generating a login request based on a preset login code; the login code is generated by the server in advance based on the equipment identification of the target equipment and is sent to the target equipment;
sending the login request to the server so as to obtain a login code carried in the login request through the server; acquiring login conditions from the login codes, and if the login request meets the login conditions, determining that the first terminal equipment which sends the login request successfully logs in;
after sending the login request to the server, the method further includes:
displaying a login page;
if the displayed logging-in page is a verification code logging-in page, responding to a trigger operation aiming at a verification request, sending the verification request to the server, generating a first verification code corresponding to the equipment identifier of the target equipment through the server, and storing the first verification code and the valid time of the first verification code;
responding to the input operation aiming at the verification code input box, sending the input second verification code to the server, judging whether the second verification code is matched with the first verification code or not through the server, judging whether the receiving time of the second verification code meets the effective time or not, and if yes, determining that the first terminal equipment is successfully logged in.
5. A login method, characterized in that the method is applied to a second terminal device; the method comprises the following steps:
determining a target equipment identifier, and sending the target equipment identifier to a server so as to generate a login code based on the target equipment identifier through the server; storing the target equipment identification and the corresponding login code; wherein the target device identification comprises one or more; the target equipment identification comprises a user identification number set in the equipment;
generating a sending request based on the target equipment identification in response to the sending trigger operation; and sending the sending request to the server so as to send the corresponding login code to the corresponding target equipment through the server according to the target equipment identification.
6. A login device is characterized in that the device is arranged on a server; the device comprises:
the login code acquisition module is used for responding to a received login request and acquiring a login code carried in the login request; the login code is generated by the server in advance based on the equipment identification of the target equipment and is sent to the target equipment;
and the login determining module is used for acquiring login conditions from the login codes, and if the login request meets the login conditions, determining that the first equipment which sends the login request successfully logs in.
7. A login device is characterized in that the device is arranged on a first terminal device; the device comprises:
the login request generation module is used for responding to login trigger operation and generating a login request based on a preset login code; the login code is generated by the server in advance based on the equipment identification of the target equipment and is sent to the target equipment;
the login request sending module is used for sending the login request to the server so as to obtain a login code carried in the login request through the server; and acquiring login conditions from the login codes, and if the login request meets the login conditions, determining that the first terminal equipment which sends the login request successfully logs in.
8. A login device is characterized in that the device is arranged on a second terminal device; the device comprises:
the target equipment identification sending module is used for determining a target equipment identification, sending the target equipment identification to a server and generating a login code based on the target equipment identification through the server; storing the target equipment identification and the corresponding login code; wherein the target device identification comprises one or more; the target equipment identification comprises a user identification number set in the equipment;
a sending request sending module, configured to generate a sending request based on the target device identifier in response to a sending trigger operation; and sending the sending request to the server so as to send the corresponding login code to the corresponding target equipment through the server according to the target equipment identification.
9. An electronic device comprising a processor and a memory, the memory storing machine executable instructions executable by the processor, the processor executing the machine executable instructions to implement the login method of any one of claims 1-5.
10. A machine-readable storage medium having stored thereon machine-executable instructions which, when invoked and executed by a processor, cause the processor to implement the login method of any one of claims 1-5.
CN202110114719.8A 2021-01-27 2021-01-27 Login method and device and electronic equipment Active CN112910876B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110114719.8A CN112910876B (en) 2021-01-27 2021-01-27 Login method and device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110114719.8A CN112910876B (en) 2021-01-27 2021-01-27 Login method and device and electronic equipment

Publications (2)

Publication Number Publication Date
CN112910876A true CN112910876A (en) 2021-06-04
CN112910876B CN112910876B (en) 2023-04-28

Family

ID=76119280

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110114719.8A Active CN112910876B (en) 2021-01-27 2021-01-27 Login method and device and electronic equipment

Country Status (1)

Country Link
CN (1) CN112910876B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114679336A (en) * 2022-05-10 2022-06-28 北京自如信息科技有限公司 Identity authentication method, system, authentication device and readable storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105592065A (en) * 2015-11-05 2016-05-18 中国银联股份有限公司 Method and system for website registration on the basis of mobile phone message
US20180225442A1 (en) * 2014-06-16 2018-08-09 Paypal, Inc. Systems and methods for authenticating a user based on a computing device
CN108900559A (en) * 2018-09-26 2018-11-27 平安普惠企业管理有限公司 Management method, device, computer equipment and the storage medium of logging on authentication
CN109089264A (en) * 2018-08-02 2018-12-25 江苏满运软件科技有限公司 A kind of mobile terminal exempts from the method and system of close login
CN110298162A (en) * 2019-05-22 2019-10-01 深圳壹账通智能科技有限公司 Application client login method, device, computer equipment and storage medium
CN111865889A (en) * 2019-12-10 2020-10-30 北京嘀嘀无限科技发展有限公司 Login request processing method, system, device, electronic equipment and storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180225442A1 (en) * 2014-06-16 2018-08-09 Paypal, Inc. Systems and methods for authenticating a user based on a computing device
CN105592065A (en) * 2015-11-05 2016-05-18 中国银联股份有限公司 Method and system for website registration on the basis of mobile phone message
CN109089264A (en) * 2018-08-02 2018-12-25 江苏满运软件科技有限公司 A kind of mobile terminal exempts from the method and system of close login
CN108900559A (en) * 2018-09-26 2018-11-27 平安普惠企业管理有限公司 Management method, device, computer equipment and the storage medium of logging on authentication
CN110298162A (en) * 2019-05-22 2019-10-01 深圳壹账通智能科技有限公司 Application client login method, device, computer equipment and storage medium
CN111865889A (en) * 2019-12-10 2020-10-30 北京嘀嘀无限科技发展有限公司 Login request processing method, system, device, electronic equipment and storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114679336A (en) * 2022-05-10 2022-06-28 北京自如信息科技有限公司 Identity authentication method, system, authentication device and readable storage medium
CN114679336B (en) * 2022-05-10 2024-04-12 北京自如信息科技有限公司 Authentication method, authentication system, authentication device, and readable storage medium

Also Published As

Publication number Publication date
CN112910876B (en) 2023-04-28

Similar Documents

Publication Publication Date Title
US8869254B2 (en) User verification using voice based password
TWI758260B (en) Website login method and login system based on mobile phone short message
CN109040070B (en) File transmission method, device and computer readable storage medium
CN107241336B (en) Identity verification method and device
CN105227536A (en) A kind of Quick Response Code login method and equipment
CN110691085B (en) Login method, login device, password management system and computer readable medium
CN103001975A (en) Method, system and device used for controlling login and based on two-dimensional code
WO2023050524A1 (en) Im-based user identity authentication method and apparatus, and server and storage medium
CN108737398B (en) Processing method and device of trust system, computer equipment and storage medium
CN114915435A (en) Service data access method and system
CN115022047B (en) Account login method and device based on multi-cloud gateway, computer equipment and medium
CN112910876A (en) Login method and device and electronic equipment
US11323434B1 (en) System and method for secure two factor authentication
CN110601832A (en) Data access method and device
CN102685090B (en) System login method
CN104301285B (en) Login method for web system
CN113824727A (en) Webpage login verification method, device, server and storage medium
CN113114623B (en) Data connection method, device, terminal equipment and computer readable storage medium
CN114640956B (en) Short message issuing method, device, system and electronic equipment
US11153312B2 (en) User authentication method, evaluation device, non-transitory computer-readable storage medium, and user authentication system
CN112149100A (en) Verification method, verification device, electronic equipment and storage medium
CN110673971A (en) Processing method and device for expiration of login session and user terminal
CN104980430B (en) Terminal authentication method, apparatus and system
CN116132097B (en) System login method and device, electronic equipment and storage medium
CN111918224B (en) Short message verification method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 100102 201 / F, block C, 2 lizezhong 2nd Road, Chaoyang District, Beijing

Applicant after: Beijing Shuidi Technology Group Co.,Ltd.

Address before: 100102 201 / F, block C, 2 lizezhong 2nd Road, Chaoyang District, Beijing

Applicant before: Beijing Health Home Technology Co.,Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant