CN112989302A - Login method and device for access service and computing equipment - Google Patents

Login method and device for access service and computing equipment Download PDF

Info

Publication number
CN112989302A
CN112989302A CN202110449026.4A CN202110449026A CN112989302A CN 112989302 A CN112989302 A CN 112989302A CN 202110449026 A CN202110449026 A CN 202110449026A CN 112989302 A CN112989302 A CN 112989302A
Authority
CN
China
Prior art keywords
user
information
role information
login
role
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110449026.4A
Other languages
Chinese (zh)
Inventor
张伊凡
邢天宇
刘旭
曹园园
周威
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Rajax Network Technology Co Ltd
Zhejiang Koubei Network Technology Co Ltd
Original Assignee
Rajax Network Technology Co Ltd
Zhejiang Koubei Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Rajax Network Technology Co Ltd, Zhejiang Koubei Network Technology Co Ltd filed Critical Rajax Network Technology Co Ltd
Priority to CN202110449026.4A priority Critical patent/CN112989302A/en
Publication of CN112989302A publication Critical patent/CN112989302A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The embodiment of the invention discloses a login method, a login device and a computing device of an access member service, wherein the method comprises the following steps: monitoring code scanning operation of a user, and inquiring local cache information; extracting user historical role information from the local cache information, wherein the user historical role information is first user role information used for requesting a storage service or second user role information used for requesting a pickup service; obtaining role information of a user to be logged in according to the historical role information of the user; and performing service login by using the role information of the user to be logged in. According to the embodiment of the invention, the historical roles of the user are cached, and the user does not need to manually select the roles after scanning the code, so that the user operation is simplified, and the user access efficiency is improved; if the user scans the code by mistake, the historical role of the user can be used as a reference, and the problems that the user cannot normally access the part, and the user repeatedly scans the code to log in or performs subsequent misoperation are avoided.

Description

Login method and device for access service and computing equipment
Technical Field
The embodiment of the invention relates to the technical field of intelligent distribution, in particular to a login method and device for an access member service, a computing device and a computer storage medium.
Background
The intelligent cabinet is used as a terminal solution of the instant distribution industry, so that the user experience is optimized while the resource occupation of a distribution party can be effectively released. In an unmanned intelligent cabinet service scenario, there are two types of roles that participate: the first is a part storing side (such as a meal rider) and the second is a part taking side (such as a meal taking customer). During the peak hours, a group of riders corresponds to a group of customers, and the riders gather in front of the intelligent cabinet for accessing the parts in a certain time period. The intelligent cabinet is used as an interactive middleware between a storage side and a pickup side, and the efficiency of storing articles (such as packages, meals and the like) and extracting the articles is a crucial link in the application process of the intelligent cabinet.
In the prior art, in one case, an intelligent cabinet provides a piece storage two-dimensional code and a piece taking two-dimensional code at the same time, a piece storage side scans the piece storage two-dimensional code to store pieces, and a piece taking side scans the piece taking two-dimensional code to take pieces; the other situation is that the intelligent cabinet provides the two-dimensional code for the combined access part, and the two-dimensional code for the combined access part is scanned by the part storing party and the part taking party to enter a program, and the steps of login, role selection, subsequent operation and the like are carried out. In this process, a user may scan a code incorrectly (for example, a part storing side scans a part two-dimensional code incorrectly, a part taking side scans a part two-dimensional code incorrectly), a role selection error (a role is selected incorrectly after the part storing and taking one-dimensional code is scanned), and the like, thereby causing problems of abnormal part accessing, wrong payment, influence on service efficiency, and the like, and leading to customer complaints or user loss.
Disclosure of Invention
In view of the above, embodiments of the present invention are proposed to provide a login method, apparatus and computing device for an accessor service, and computer storage medium that overcome or at least partially solve the above problems.
According to an aspect of an embodiment of the present invention, there is provided a login method for an accessor service, including:
monitoring code scanning operation of a user, and inquiring local cache information;
extracting user historical role information from the local cache information, wherein the user historical role information is first user role information used for requesting a storage service or second user role information used for requesting a pickup service;
obtaining role information of a user to be logged in according to the historical role information of the user;
and performing service login by using the role information of the user to be logged in.
In an alternative mode, the user history role information is obtained when the user history logs in the accessor service and is written into the local cache information.
In an optional manner, after the monitoring the user code scanning operation, the method further includes:
judging whether the current role information of the user can be determined or not according to the code scanning operation of the user;
the obtaining of the role information of the user to be logged in according to the historical role information of the user specifically comprises:
if the current role information of the user can be determined, obtaining the role information of the user to be logged in according to the historical role information of the user and/or the current role information of the user;
and if the current role information of the user cannot be determined, using the historical role information of the user as the role information of the user to be logged in.
In an optional manner, the obtaining role information of the user to be logged in according to the historical role information of the user and/or the current role information of the user further includes:
judging whether the current role information of the user is consistent with the historical role information of the user;
if the current role information of the user is consistent with the historical role information of the user, taking the current role information of the user or the historical role information of the user as the role information of the user to be logged in;
and if the current role information of the user is inconsistent with the historical role information of the user, sending prompt information for the user to select roles, and confirming operation according to the role selection of the user to obtain the role information of the user to be logged in.
In an optional manner, after querying the local cache information, the method further includes:
inquiring a user login token according to the local cache information;
judging whether the user login token is expired;
the service login by using the role information of the user to be logged in further comprises the following steps:
if the user login token is not expired, performing service login by using the user login token information and the role information of the user to be logged in;
if the user login token is expired, prompting the user to perform authorized login, acquiring user login information after the user performs authorized login operation, and performing service login by using the user login information and the role information of the user to be logged in.
In an optional manner, if the user login token is not queried according to the local cache information, the method further includes:
judging whether the current role information of the user can be determined or not according to the code scanning operation of the user;
if the current role information of the user can be determined, prompting the user to perform authorized login, acquiring the user login information after the user performs authorized login operation, and performing service login by using the user login information and the current role information of the user;
if the current role information of the user cannot be determined, skipping to present a user role selection page, and obtaining the role information of the user to be logged in according to the role selection confirmation operation executed by the user in the user role selection page; and prompting the user to perform authorized login, acquiring user login information after the user performs authorized login operation, and performing service login by using the user login information and the role information of the user to be logged in.
In an optional manner, if the local cache information is not queried, the method further includes:
judging whether the current role information of the user can be determined or not according to the code scanning operation of the user;
if the current role information of the user can be determined, skipping to present a user login page, and after the user executes login operation, performing service login by using the user login information and the current role information of the user;
if the current role information of the user cannot be determined, skipping to present a user role selection page, and obtaining the role information of the user to be logged in according to the role selection confirmation operation executed by the user in the user role selection page; and jumping to present a user login page, and after the user executes login operation, performing service login by using the user login information and the role information of the user to be logged in.
In an optional manner, the determining whether the current role information of the user can be determined according to the user code scanning operation further includes:
acquiring identification code information obtained by code scanning operation of a user; the identification code is a first identification code provided by the intelligent cabinet and used for providing a storage service, a second identification code provided by the intelligent cabinet and used for providing a pickup service or a third identification code provided by the intelligent cabinet and used for providing an access service and an integration service;
if the identification code information indicates that the identification code is the first identification code, determining that the current role information of the user is the first user role information;
if the identification code information indicates that the identification code is a second identification code, determining that the current role information of the user is second user role information;
and if the identification code information indicates that the identification code is the third identification code, judging that the current role information of the user cannot be determined.
According to another aspect of the embodiments of the present invention, there is provided a login device for an accessor service, including:
the monitoring module is used for monitoring code scanning operation of a user and inquiring local cache information;
the extracting module is used for extracting user historical role information from the local cache information, wherein the user historical role information is first user role information used for requesting a storage service or second user role information used for requesting a pickup service;
the role determining module is used for obtaining role information of the user to be logged in according to the historical role information of the user;
and the login module is used for performing service login by using the role information of the user to be logged in.
In an alternative mode, the user history role information is obtained when the user history logs in the accessor service and is written into the local cache information.
In an optional manner, the apparatus further comprises:
the judging module is used for judging whether the current role information of the user can be determined according to the code scanning operation of the user;
the role determination module is further to:
if the current role information of the user can be determined, obtaining the role information of the user to be logged in according to the historical role information of the user and/or the current role information of the user;
and if the current role information of the user cannot be determined, using the historical role information of the user as the role information of the user to be logged in.
In an optional manner, the role determination module is further configured to:
judging whether the current role information of the user is consistent with the historical role information of the user;
if the current role information of the user is consistent with the historical role information of the user, taking the current role information of the user or the historical role information of the user as the role information of the user to be logged in;
and if the current role information of the user is inconsistent with the historical role information of the user, sending prompt information for the user to select roles, and confirming operation according to the role selection of the user to obtain the role information of the user to be logged in.
In an optional manner, the login module is further configured to: inquiring a user login token according to the local cache information; judging whether the user login token is expired; if the user login token is not expired, performing service login by using the user login token information and the role information of the user to be logged in; if the user login token is expired, prompting the user to perform authorized login, acquiring user login information after the user performs authorized login operation, and performing service login by using the user login information and the role information of the user to be logged in.
In an optional manner, the apparatus further comprises:
the judging module is used for judging whether the current role information of the user can be determined according to the code scanning operation of the user;
the login module is further configured to: if the current role information of the user can be determined, prompting the user to perform authorized login, acquiring the user login information after the user performs authorized login operation, and performing service login by using the user login information and the current role information of the user;
if the current role information of the user cannot be determined, skipping to present a user role selection page, and obtaining the role information of the user to be logged in according to the role selection confirmation operation executed by the user in the user role selection page; and prompting the user to perform authorized login, acquiring user login information after the user performs authorized login operation, and performing service login by using the user login information and the role information of the user to be logged in.
In an optional manner, the apparatus further comprises:
the judging module is used for judging whether the current role information of the user can be determined according to the code scanning operation of the user;
the login module is further configured to: if the current role information of the user can be determined, skipping to present a user login page, and after the user executes login operation, performing service login by using the user login information and the current role information of the user;
if the current role information of the user cannot be determined, skipping to present a user role selection page, and obtaining the role information of the user to be logged in according to the role selection confirmation operation executed by the user in the user role selection page; and jumping to present a user login page, and after the user executes login operation, performing service login by using the user login information and the role information of the user to be logged in.
In an optional manner, the determining module is further configured to:
acquiring identification code information obtained by code scanning operation of a user; the identification code is a first identification code provided by the intelligent cabinet and used for providing a storage service, a second identification code provided by the intelligent cabinet and used for providing a pickup service or a third identification code provided by the intelligent cabinet and used for providing an access service and an integration service;
if the identification code information indicates that the identification code is the first identification code, determining that the current role information of the user is the first user role information;
if the identification code information indicates that the identification code is a second identification code, determining that the current role information of the user is second user role information;
and if the identification code information indicates that the identification code is the third identification code, judging that the current role information of the user cannot be determined.
According to still another aspect of an embodiment of the present invention, there is provided a computing device including: the system comprises a processor, a memory, a communication interface and a communication bus, wherein the processor, the memory and the communication interface complete mutual communication through the communication bus;
the memory is used for storing at least one executable instruction, and the executable instruction enables the processor to execute the operation corresponding to the login method of the access piece service.
According to another aspect of the embodiments of the present invention, there is provided a computer storage medium, where at least one executable instruction is stored, and the executable instruction causes a processor to perform an operation corresponding to the login method of the above accessor service.
According to the login method and device for the access member service, provided by the embodiment of the invention, after the code scanning operation of the user is monitored, the local cache information is inquired, the historical role information of the user is obtained, the role information of the user to be logged in is obtained according to the historical role information of the user, and the service login is carried out by utilizing the role information of the user to be logged in. According to the embodiment of the invention, the historical roles of the user are cached, and the user does not need to manually select the roles after scanning the code, so that the user operation is simplified, and the user access efficiency is improved; if the user scans the code by mistake, the historical role of the user can be used as a reference, and the problems that the user cannot normally access the part, and the user repeatedly scans the code to log in or performs subsequent misoperation are avoided.
The foregoing description is only an overview of the technical solutions of the embodiments of the present invention, and the embodiments of the present invention can be implemented according to the content of the description in order to make the technical means of the embodiments of the present invention more clearly understood, and the detailed description of the embodiments of the present invention is provided below in order to make the foregoing and other objects, features, and advantages of the embodiments of the present invention more clearly understandable.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the embodiments of the invention. Also, like reference numerals are used to refer to like parts throughout the drawings. In the drawings:
FIG. 1 shows a flow diagram of a method of login for an accessor service, according to one embodiment of the invention;
FIG. 2 shows a flow diagram of a method of login for an accessor service, according to another embodiment of the invention;
FIG. 3 shows a flow diagram of a method of login for an accessor service, according to yet another embodiment of the invention;
FIG. 4 is a schematic diagram of a login device for an accessor service according to one embodiment of the invention;
FIG. 5 illustrates a schematic structural diagram of a computing device, according to an embodiment of the invention.
Detailed Description
Exemplary embodiments of the present invention will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the invention are shown in the drawings, it should be understood that the invention can be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art.
Taking the meal access service as an example, the meal access service of the intelligent cabinet is a meal access activity in which a large number of riders and customers participate, so that high requirements are required on convenience and efficiency. At the peak of the day, there are many riders and customers gathering and staying in front of the intelligent cabinet. In the environment, a rider or a customer may mistakenly scan the code, or the rider or the customer scans the two-dimensional code of the access piece and needs to go through a complicated process of manually selecting a role and then performing subsequent operation.
Fig. 1 shows a flowchart of a login method of an accessor service according to one embodiment of the invention, as shown in fig. 1, the method comprising the steps of:
step 101, monitoring a code scanning operation of a user, and inquiring local cache information.
The execution main body of the embodiment of the invention can be a client side at a user side, wherein the user refers to a user at a storing side or a user at a fetching side, taking the service of accessing a meal as an example, and a rider and a customer are collectively called as users. The client side of the user side can be an access service application program, and can also be an applet or a public number, a service number and the like embedded in the WeChat or Payment device. In this embodiment, an identification code (such as a two-dimensional code) is attached to the surface of the intelligent cabinet body or is displayed on the electronic screen of the intelligent cabinet. The identification codes include, but are not limited to: the first identification code is used for providing the storage service, the second identification code is used for providing the pickup service, and the third identification code is used for providing the access piece integration service.
In order to improve the efficiency of the user accessing the meal, different from the prior art, the present embodiment queries the local cache information first after monitoring the code scanning operation of the user. The local cache information is information stored locally by the client. If the user has used the accessor service before, the client locally caches the user's historical login information. In the prior art, the local cache information is usually a user login token (i.e. user token) to facilitate the user to login next time. In this embodiment, unlike the prior art, the local cache information includes user history role information in addition to the user token. The user history role information is obtained when the user history logs in the accessor service and is written into the local cache information. Specifically, when the user logs in the accessor service last time, the role information used by the user last time is obtained, and after the service is completed, the role information used by the user last time is written into the local cache information.
Optionally, the local cache information includes, but is not limited to: user login tokens, user historical role information, intelligent cabinet information, and the like, which are information retained in the user historical login behavior.
And 102, extracting user historical role information from the local cache information, wherein the user historical role information is first user role information used for requesting a storage service or second user role information used for requesting a pickup service.
The user history role information is role information of a user using an access service before, and specifically may be role information of a user using a service last time. Taking the meal access service as an example, if the last meal storage service is used by the user and the service is successful, the historical role information of the user is the first user role information, namely the rider; if the user used the meal taking service last time and the service was successful, the user historical role information is second user role information, namely the customer.
And 103, obtaining the role information of the user to be logged in according to the historical role information of the user.
And 104, performing service login by using the role information of the user to be logged in.
And after the historical role information of the user is obtained, obtaining the role information of the user to be logged in according to the historical role information of the user, and performing service login by using the role information of the user to be logged in.
As an optional implementation manner, the user history role information may be directly used as the role information of the user to be logged in, that is, the user does not need to select a role, and the user history role information is directly used for logging in. For example, the user scans the two-dimensional code integrated with the access part, the client cannot determine the user role based on the code scanning operation of the user, the user role can be obtained by inquiring the historical role information of the user in the local cache information, and the user can log in by directly utilizing the historical role information of the user.
According to the login method of the access member service, provided by the embodiment of the invention, after the code scanning operation of the user is monitored, the local cache information is inquired firstly, the historical role information of the user is obtained, the role information of the user to be logged in is obtained according to the historical role information of the user, and the service login is carried out by utilizing the role information of the user to be logged in. According to the embodiment of the invention, the historical roles of the user are cached, and the user does not need to manually select the roles after scanning the code, so that the user operation is simplified, and the user access efficiency is improved; if the user scans the code by mistake, the historical role of the user can be used as a reference, and the problems that the user cannot normally access the part, and the user repeatedly scans the code to log in or performs subsequent misoperation are avoided.
Fig. 2 shows a flowchart of a login method of an accessor service according to another embodiment of the invention, which method comprises the following steps, as shown in fig. 2:
step 201, monitoring the code scanning operation of the user, and inquiring local cache information.
If the user has used the accessor service before, the client locally caches the user's historical login information. The cache information stored locally by the client includes but is not limited to: user login tokens (such as tokens), user historical role information, intelligent cabinet information, and the like, which are information retained in the user historical login behavior.
Step 202, extracting the historical role information of the user from the local cache information.
The user history role information is obtained when the user history logs in the accessor service and is written into the local cache information. Specifically, when the user logs in the accessor service last time, the role information used by the user last time is obtained, and after the service is completed, the role information used by the user last time is written into the local cache information. Taking the meal access service as an example, if the last meal storage service is used by the user and the service is successful, the historical role information of the user is the first user role information, namely the rider; if the user used the meal taking service last time and the service was successful, the user historical role information is second user role information, namely the customer.
Step 203, judging whether the current role information of the user can be determined or not according to the code scanning operation of the user, if so, executing step 204; if not, go to step 205.
In this embodiment, an identification code (such as a two-dimensional code) is attached to the surface of the intelligent cabinet body or is displayed on the electronic screen of the intelligent cabinet. The identification codes include, but are not limited to: the first identification code is used for providing the storage service, the second identification code is used for providing the pickup service, and the third identification code is used for providing the access piece integration service.
In the step, identification code information obtained by code scanning operation of a user is obtained; and identifying whether the identification code is a first identification code, a second identification code or a third identification code according to the identification code information. If the identification code information indicates that the identification code is the first identification code, determining that the current role information of the user is the first user role information; if the identification code information indicates that the identification code is a second identification code, determining that the current role information of the user is second user role information; and if the identification code information indicates that the identification code is the third identification code, judging that the current role information of the user cannot be determined.
Taking the meal access service as an example, if the first identification code providing the meal storage service is identified by the identification code information obtained by the code scanning operation of the user, the current user role is indicated as a rider; if the second identification code providing the meal taking service is identified by the identification code information obtained by the code scanning operation of the user, the current user role is shown as a customer; if the identification code information obtained through the code scanning operation of the user identifies that the user scans the third identification code providing the service of accessing the meal unification, the current role information of the user cannot be determined.
Step 204, obtaining the role information of the user to be logged in according to the historical role information of the user and/or the current role information of the user, and executing step 206.
According to the above description, in addition to the problem of code scanning by a user in the prior art, the problem of updating a two-dimensional code of an intelligent cabinet, gray scale expansion (but the server cannot be synchronized), or omission of a two-dimensional code attached to the intelligent cabinet also exists in the prior art, and in these cases, the current role information of the user determined according to the code scanning operation of the user may be inaccurate.
In order to avoid the influence caused by the problems, under the condition that the current role information of the user is determined according to the code scanning operation of the user, the current role information of the user is compared with the historical role information of the user, and whether the current role information of the user is consistent with the historical role information of the user is judged.
If the current role information of the user is consistent with the historical role information of the user, the problem of mistaken code scanning does not exist, and any one of the current role information of the user and the historical role information of the user can be used as the role information of the user to be logged in.
If the current role information of the user is inconsistent with the historical role information of the user, the problem of code scanning by mistake is indicated. In this case, prompt information is sent out for the user to select roles, and the role information of the user to be logged in is obtained according to the role selection confirmation operation of the user. For example, the user finishes the meal storage service last time, the role is the rider, and the historical role of the rider is stored in a local cache; when the user scans the code again, the user carelessly scans the meal fetching code, the client program matches the current role of the user with the historical role in the local cache, if the inconsistency is found, prompt information is sent, for example, a prompt box is presented in a client program page, prompt information of 'whether role switching is carried out or not different from the last role' is displayed in the prompt box, and if the user selects role switching, the current role information of the user is switched to a rider.
Step 205, using the historical role information of the user as the role information of the user to be logged in, and executing step 206.
If the user scans the third identification code providing the accessor-in-one service, the current role information of the user cannot be determined. In this case, the user history role information may be directly used as the role information of the user to be logged in. That is, the client program does not need to show a user role selection page to the user, the user selects the role, the operation step of selecting the role is omitted, and the user history role information is directly used for logging in.
And step 206, performing service login by using the user login token and the role information of the user to be logged in.
According to the login method of the access member service provided by the embodiment of the invention, after the code scanning operation of a user is monitored, local cache information is inquired, and historical role information of the user is obtained from the local cache information; and judging whether the current role information of the user can be determined according to the code scanning operation of the user. If the current role information of the user can be determined, comparing whether the current role information of the user is consistent with the historical role information of the user, and if not, sending prompt information for the user to switch roles. And if the current role information of the user cannot be determined, performing service login by using the historical role information of the user. According to the embodiment of the invention, the historical roles of the user are cached, and after the user scans the code, the preset processing logic is adopted, so that on one hand, a direct access for providing service is provided under the condition that the current role of the user is not determined, the role does not need to be manually selected, the user operation is simplified, and the user access efficiency is improved; on the other hand, a prompt is given under the condition that the user selects the role by mistake, so that the user can switch the role in time conveniently, the problem that the user exits from the operation of re-code scanning login after finding out the code scanning mistake in the subsequent operation is avoided, and the problem that the user experience is influenced due to wrong payment caused by the fact that the condition cannot be solved in the subsequent operation process of the user is also avoided.
Fig. 3 shows a flowchart of a login method of an accessor service according to yet another embodiment of the invention, as shown in fig. 3, the method comprising the steps of:
step 301, monitoring a code scanning operation of a user, inquiring local cache information, and if the local cache information can be inquired, executing step 302; if the local cache information cannot be queried, go to step 309.
If the user has used the accessor service before, the client locally caches the user's historical login information. The cache information stored locally by the client includes but is not limited to: user login tokens (such as tokens), user historical role information, intelligent cabinet information, and the like, which are information retained in the user historical login behavior.
If the user has not used the accessor service before, the client does not locally cache the historical login information of the user, and a result which cannot be queried can be obtained when the local cache information is queried. In this case, the user needs to perform operations such as selecting a role and registering in accordance with a conventional processing method.
Step 302, inquiring a user login token according to local cache information, wherein the user login token can be inquired, and executing step 303; if the user login token cannot be queried, go to step 312.
After the local cache information is obtained through query, the user token is further queried.
As an optional implementation manner, first, whether the local cache information contains the user token is queried, and if so, the user token is used for subsequent login; and if the local cache information does not contain the user token, sending a request to the server, and inquiring the user token in a user identity database of the server.
For example, assuming that the client is a wechat applet, the user starts a wechat code scanning function to scan a code and pull up the wechat applet, and the wechat applet acquires a user open account (hereinafter referred to as openid) of the wechat open platform. Firstly, the WeChat applet inquires whether the local cache information contains a user token, and if so, the user token is used for subsequent login; and if the local cache information does not contain the user token, sending a request carrying the openid to the server so that the server can query the user token by using the openid.
If the user token cannot be inquired at both the local cache information and the server, the user is required to select roles, authorize login and the like according to the existing processing mode.
Step 303, extracting the historical role information of the user from the local cache information.
The historical user role information is first user role information used for requesting the storage service or second user role information used for requesting the pickup service.
Step 304, judging whether the current role information of the user can be determined according to the code scanning operation of the user, if so, executing step 305; if not, go to step 306.
Reference may be made specifically to the description related to step 203 in the above embodiments.
Step 305, obtaining the role information of the user to be logged in according to the historical role information of the user and/or the current role information of the user, and executing step 307.
Reference may be made specifically to the description related to step 204 in the above embodiments.
Step 306, using the historical role information of the user as the role information of the user to be logged in, and executing step 307.
Reference may be made specifically to the description related to step 205 in the above embodiments.
Step 307, judging whether the user login token is expired, if so, executing step 314; if not, go to step 308.
In an actual service scenario, in order to ensure the security of a user account, the user token has a validity period. In this step, before login, it is determined whether the token of the user has expired, and if so, the user is prompted to perform authorized login again, that is, step 314 is executed.
And 308, performing service login by using the user login token and the role information of the user to be logged in, and ending the method.
If the user token is not overdue, the user token and the role information of the user to be logged in determined in the steps can be utilized to log in the service, the logging step is executed by the background of the client, the user does not sense, and the front page of the client directly enters the main process menu page.
That is to say, after the user scans the code, on the premise that the user token is not expired and the historical role information of the user is cached locally, if the user scans the two-dimensional code integrating the access part, the client background directly determines the role of the user and enters the main flow entry page after background login, the user does not sense the role determination and login process, the user operation is simplified, and the efficiency of accessing the part by the user is improved. If the user scans the code to store the two-dimensional code or fetch the two-dimensional code, the client background matches the current role with the historical role, and the background login is performed after the matching is consistent, so that the user has no perception on the role matching and login process, the user operation is simplified, and the user access efficiency is improved; when the matching is inconsistent, prompt information is sent to allow a user to select roles, the roles can be conveniently switched by the user in time under the condition that the user scans the codes by mistake, the problem that the user quits the operation of scanning the codes again and logging in after finding out the code scanning mistake in the subsequent operation is solved, and the problem that the user experience is influenced due to wrong payment caused by the fact that the user cannot know the condition in the subsequent operation process is also solved.
Step 309, judging whether the current role information of the user can be determined or not according to the code scanning operation of the user, if so, executing step 311; if not, go to step 310.
And 310, jumping to present a user role selection page, obtaining the role information of the user to be logged in according to the role selection confirmation operation executed by the user in the user role selection page, and executing 311.
And 311, jumping to present a user login page for the user to log in, and ending the method.
And after the user performs login operation, performing service login by using the user login information and the role information of the user to be logged in. In step 309, if the current role information of the user can be determined, the role information of the user to be logged in is the current role information of the user.
If the local cache information is not queried, operations such as role selection and login can be performed according to the existing processing flow (i.e., step 309 to step 311).
Step 312, judging whether the current role information of the user can be determined according to the code scanning operation of the user, if so, executing step 314; if not, go to step 313.
And 313, jumping to present a user role selection page, obtaining the role information of the user to be logged in according to the role selection confirmation operation executed by the user in the user role selection page, and executing 314.
And step 314, prompting the user to perform authorized login, acquiring user login information after the user performs authorized login operation, performing service login by using the user login information and the role information of the user to be logged in, and ending the method.
In step 312, if the current role information of the user can be determined, the role information of the user to be logged in is the current role information of the user.
In the case that the user token is not queried, the role selection, authorized login, and other operations may be performed according to the existing processing flow (i.e., step 312 to step 314).
In the embodiment of the invention, the historical roles of the user are cached, and after the user scans codes, the advanced processing logic is adopted, so that on one hand, a direct access for providing services under the condition of not determining the current role of the user is realized, the role does not need to be manually selected, the user operation is simplified, and the user access efficiency is improved; on the other hand, a prompt is given under the condition that the user selects the role by mistake, the identity of the pickup party and the storage party can be switched autonomously under a predictable condition, the problem that the user quits from the operation of re-code scanning login after finding that the code scanning is wrong in the subsequent operation is solved, and the problem that the user experience is influenced due to wrong payment caused by the fact that the user cannot know the condition in the subsequent operation process is also solved.
Fig. 4 is a schematic structural diagram of a login device of an accessor service according to an embodiment of the invention. As shown in fig. 4, the apparatus 400 includes: a monitoring module 410, an extraction module 420, a role determination module 430, and a login module 440.
The monitoring module 410 is used for monitoring code scanning operation of a user and inquiring local cache information;
an extracting module 420, configured to extract user historical role information from the local cache information, where the user historical role information is first user role information used to request a storage service or second user role information used to request a pickup service;
the role determination module 430 is configured to obtain role information of the user to be logged in according to the historical role information of the user;
and the login module 440 is configured to log in the service by using the role information of the user to be logged in.
In an alternative mode, the user history role information is obtained when the user history logs in the accessor service and is written into the local cache information.
In an optional manner, the apparatus further comprises:
the judging module 450 is configured to judge whether the current role information of the user can be determined according to the code scanning operation of the user;
the role determination module 430 is further configured to:
if the current role information of the user can be determined, obtaining the role information of the user to be logged in according to the historical role information of the user and/or the current role information of the user;
and if the current role information of the user cannot be determined, using the historical role information of the user as the role information of the user to be logged in.
In an optional manner, the role determination module 430 is further configured to:
judging whether the current role information of the user is consistent with the historical role information of the user;
if the current role information of the user is consistent with the historical role information of the user, taking the current role information of the user or the historical role information of the user as the role information of the user to be logged in;
and if the current role information of the user is inconsistent with the historical role information of the user, sending prompt information for the user to select roles, and confirming operation according to the role selection of the user to obtain the role information of the user to be logged in.
In an optional manner, the login module 440 is further configured to: inquiring a user login token according to the local cache information; judging whether the user login token is expired; if the user login token is not expired, performing service login by using the user login token information and the role information of the user to be logged in; if the user login token is expired, prompting the user to perform authorized login, acquiring user login information after the user performs authorized login operation, and performing service login by using the user login information and the role information of the user to be logged in.
In an optional manner, the apparatus further comprises:
the judging module is used for judging whether the current role information of the user can be determined according to the code scanning operation of the user;
the login module is further configured to: if the current role information of the user can be determined, prompting the user to perform authorized login, acquiring the user login information after the user performs authorized login operation, and performing service login by using the user login information and the current role information of the user;
if the current role information of the user cannot be determined, skipping to present a user role selection page, and obtaining the role information of the user to be logged in according to the role selection confirmation operation executed by the user in the user role selection page; and prompting the user to perform authorized login, acquiring user login information after the user performs authorized login operation, and performing service login by using the user login information and the role information of the user to be logged in.
In an optional manner, the apparatus further comprises:
the judging module is used for judging whether the current role information of the user can be determined according to the code scanning operation of the user;
the login module is further configured to: if the current role information of the user can be determined, skipping to present a user login page, and after the user executes login operation, performing service login by using the user login information and the current role information of the user;
if the current role information of the user cannot be determined, skipping to present a user role selection page, and obtaining the role information of the user to be logged in according to the role selection confirmation operation executed by the user in the user role selection page; and jumping to present a user login page, and after the user executes login operation, performing service login by using the user login information and the role information of the user to be logged in.
In an optional manner, the determining module is further configured to:
acquiring identification code information obtained by code scanning operation of a user; the identification code is a first identification code provided by the intelligent cabinet and used for providing a storage service, a second identification code provided by the intelligent cabinet and used for providing a pickup service or a third identification code provided by the intelligent cabinet and used for providing an access service and an integration service;
if the identification code information indicates that the identification code is the first identification code, determining that the current role information of the user is the first user role information;
if the identification code information indicates that the identification code is a second identification code, determining that the current role information of the user is second user role information;
and if the identification code information indicates that the identification code is the third identification code, judging that the current role information of the user cannot be determined.
The descriptions of the modules refer to the corresponding descriptions in the method embodiments, and are not repeated herein.
According to the login device of the access member service, provided by the embodiment of the invention, after the code scanning operation of the user is monitored, the local cache information is inquired firstly, the historical role information of the user is obtained, the role information of the user to be logged in is obtained according to the historical role information of the user, and the service login is carried out by utilizing the role information of the user to be logged in. According to the embodiment of the invention, the historical roles of the user are cached, and the user does not need to manually select the roles after scanning the code, so that the user operation is simplified, and the user access efficiency is improved; if the user scans the code by mistake, the historical role of the user can be used as a reference, and the problems that the user cannot normally access the part, and the user repeatedly scans the code to log in or performs subsequent misoperation are avoided.
The embodiment of the invention also provides a nonvolatile computer storage medium, wherein the computer storage medium stores at least one executable instruction, and the executable instruction can execute the login method of the access piece service in any method embodiment.
Fig. 5 is a schematic structural diagram of a computing device according to an embodiment of the present invention, and a specific embodiment of the present invention does not limit a specific implementation of the computing device.
As shown in fig. 5, the computing device may include: a processor (processor)502, a Communications Interface 504, a memory 506, and a communication bus 508.
Wherein:
the processor 502, communication interface 504, and memory 506 communicate with one another via a communication bus 508.
A communication interface 504 for communicating with network elements of other devices, such as clients or other servers.
The processor 502 is configured to execute the program 510, and may specifically execute the relevant steps in the above login method embodiment of the accessor service.
In particular, program 510 may include program code that includes computer operating instructions.
The processor 502 may be a central processing unit CPU, or an Application Specific Integrated Circuit (ASIC), or one or more Integrated circuits configured to implement an embodiment of the present invention. The computing device includes one or more processors, which may be the same type of processor, such as one or more CPUs; or may be different types of processors such as one or more CPUs and one or more ASICs.
And a memory 506 for storing a program 510. The memory 506 may comprise high-speed RAM memory, and may also include non-volatile memory (non-volatile memory), such as at least one disk memory.
The program 510 may specifically be configured to enable the processor 502 to execute a login method of an accessor service in any of the above-described method embodiments. For specific implementation of each step in the program 510, reference may be made to corresponding steps and corresponding descriptions in units in the foregoing embodiment of the login method for an access service, which are not described herein again. It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described devices and modules may refer to the corresponding process descriptions in the foregoing method embodiments, and are not described herein again.
The algorithms or displays presented herein are not inherently related to any particular computer, virtual system, or other apparatus. Various general purpose systems may also be used with the teachings herein. The required structure for constructing such a system will be apparent from the description above. In addition, embodiments of the present invention are not directed to any particular programming language. It is appreciated that a variety of programming languages may be used to implement the teachings of embodiments of the present invention as described herein, and any descriptions of specific languages are provided above to disclose preferred embodiments of the invention.
In the description provided herein, numerous specific details are set forth. It is understood, however, that embodiments of the invention may be practiced without these specific details. In some instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure an understanding of this description.
Similarly, it should be appreciated that in the foregoing description of exemplary embodiments of the invention, various features of the embodiments of the invention are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure and aiding in the understanding of one or more of the various inventive aspects. However, the disclosed method should not be interpreted as reflecting an intention that: that is, the claimed embodiments of the invention require more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed embodiment. Thus, the claims following the detailed description are hereby expressly incorporated into this detailed description, with each claim standing on its own as a separate embodiment of this invention.
Those skilled in the art will appreciate that the modules in the device in an embodiment may be adaptively changed and disposed in one or more devices different from the embodiment. The modules or units or components of the embodiments may be combined into one module or unit or component, and furthermore they may be divided into a plurality of sub-modules or sub-units or sub-components. All of the features disclosed in this specification (including any accompanying claims, abstract and drawings), and all of the processes or elements of any method or apparatus so disclosed, may be combined in any combination, except combinations where at least some of such features and/or processes or elements are mutually exclusive. Each feature disclosed in this specification (including any accompanying claims, abstract and drawings) may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise.
Furthermore, those skilled in the art will appreciate that while some embodiments herein include some features included in other embodiments, rather than other features, combinations of features of different embodiments are meant to be within the scope of the invention and form different embodiments. For example, in the following claims, any of the claimed embodiments may be used in any combination.
The various component embodiments of the invention may be implemented in hardware, or in software modules running on one or more processors, or in a combination thereof. Those skilled in the art will appreciate that a microprocessor or Digital Signal Processor (DSP) may be used in practice to implement some or all of the functionality of some or all of the components according to embodiments of the present invention. Embodiments of the invention may also be implemented as apparatus or device programs (e.g., computer programs and computer program products) for performing a portion or all of the methods described herein. Such programs implementing embodiments of the present invention may be stored on computer-readable media or may be in the form of one or more signals. Such a signal may be downloaded from an internet website or provided on a carrier signal or in any other form.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and that those skilled in the art will be able to design alternative embodiments without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. Embodiments of the invention may be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In the unit claims enumerating several means, several of these means may be embodied by one and the same item of hardware. The usage of the words first, second and third, etcetera do not indicate any ordering. These words may be interpreted as names. The steps in the above embodiments should not be construed as limiting the order of execution unless specified otherwise.

Claims (14)

1. A login method of an access member service is characterized by comprising the following steps:
monitoring code scanning operation of a user, and inquiring local cache information;
extracting user historical role information from the local cache information, wherein the user historical role information is first user role information used for requesting a storage service or second user role information used for requesting a pickup service;
obtaining role information of a user to be logged in according to the historical role information of the user;
and performing service login by using the role information of the user to be logged in.
2. The method of claim 1, wherein the user history role information is obtained and written to local cache information when the user history logs in to the accessor service.
3. The method of claim 1, wherein after the monitoring the user code scanning operation, the method further comprises:
judging whether the current role information of the user can be determined or not according to the code scanning operation of the user;
the obtaining of the role information of the user to be logged in according to the historical role information of the user specifically comprises:
if the current role information of the user can be determined, obtaining the role information of the user to be logged in according to the historical role information of the user and/or the current role information of the user;
and if the current role information of the user cannot be determined, using the historical role information of the user as the role information of the user to be logged in.
4. The method according to claim 3, wherein obtaining role information of a user to be logged in according to the historical role information of the user and/or the current role information of the user further comprises:
judging whether the current role information of the user is consistent with the historical role information of the user;
if the current role information of the user is consistent with the historical role information of the user, taking the current role information of the user or the historical role information of the user as the role information of the user to be logged in;
and if the current role information of the user is inconsistent with the historical role information of the user, sending prompt information for the user to select roles, and confirming operation according to the role selection of the user to obtain the role information of the user to be logged in.
5. The method of claim 1, wherein after querying the local cache information, the method further comprises:
inquiring a user login token according to the local cache information;
judging whether the user login token is expired;
the service login by using the role information of the user to be logged in further comprises the following steps:
if the user login token is not expired, performing service login by using the user login token information and the role information of the user to be logged in;
if the user login token is expired, prompting the user to perform authorized login, acquiring user login information after the user performs authorized login operation, and performing service login by using the user login information and the role information of the user to be logged in.
6. The method of claim 5, wherein if the user login token is not queried according to the local cache information, the method further comprises:
judging whether the current role information of the user can be determined or not according to the code scanning operation of the user;
if the current role information of the user can be determined, prompting the user to perform authorized login, acquiring the user login information after the user performs authorized login operation, and performing service login by using the user login information and the current role information of the user;
if the current role information of the user cannot be determined, skipping to present a user role selection page, and obtaining the role information of the user to be logged in according to the role selection confirmation operation executed by the user in the user role selection page; and prompting the user to perform authorized login, acquiring user login information after the user performs authorized login operation, and performing service login by using the user login information and the role information of the user to be logged in.
7. The method of claim 1, wherein if the local cache information is not queried, the method further comprises:
judging whether the current role information of the user can be determined or not according to the code scanning operation of the user;
if the current role information of the user can be determined, skipping to present a user login page, and after the user executes login operation, performing service login by using the user login information and the current role information of the user;
if the current role information of the user cannot be determined, skipping to present a user role selection page, and obtaining the role information of the user to be logged in according to the role selection confirmation operation executed by the user in the user role selection page; and jumping to present a user login page, and after the user executes login operation, performing service login by using the user login information and the role information of the user to be logged in.
8. The method of claim 3, 6 or 7, wherein the determining whether the current role information of the user can be determined according to the user code scanning operation further comprises:
acquiring identification code information obtained by code scanning operation of a user; the identification code is a first identification code provided by the intelligent cabinet and used for providing a storage service, a second identification code provided by the intelligent cabinet and used for providing a pickup service or a third identification code provided by the intelligent cabinet and used for providing an access service and an integration service;
if the identification code information indicates that the identification code is the first identification code, determining that the current role information of the user is the first user role information;
if the identification code information indicates that the identification code is a second identification code, determining that the current role information of the user is second user role information;
and if the identification code information indicates that the identification code is the third identification code, judging that the current role information of the user cannot be determined.
9. A login device for an accessor service, comprising:
the monitoring module is used for monitoring code scanning operation of a user and inquiring local cache information;
the extracting module is used for extracting user historical role information from the local cache information, wherein the user historical role information is first user role information used for requesting a storage service or second user role information used for requesting a pickup service;
the role determining module is used for obtaining role information of the user to be logged in according to the historical role information of the user;
and the login module is used for performing service login by using the role information of the user to be logged in.
10. The apparatus of claim 9, further comprising:
the judging module is used for judging whether the current role information of the user can be determined according to the code scanning operation of the user;
the role determination module is further to:
if the current role information of the user can be determined, obtaining the role information of the user to be logged in according to the historical role information of the user and/or the current role information of the user;
and if the current role information of the user cannot be determined, using the historical role information of the user as the role information of the user to be logged in.
11. The apparatus of claim 10, wherein the role determination module is further configured to:
judging whether the current role information of the user is consistent with the historical role information of the user;
if the current role information of the user is consistent with the historical role information of the user, taking the current role information of the user or the historical role information of the user as the role information of the user to be logged in;
and if the current role information of the user is inconsistent with the historical role information of the user, sending prompt information for the user to select roles, and confirming operation according to the role selection of the user to obtain the role information of the user to be logged in.
12. The apparatus of claim 10, wherein the determining module is further configured to:
acquiring identification code information obtained by code scanning operation of a user; the identification code is a first identification code provided by the intelligent cabinet and used for providing a storage service, a second identification code provided by the intelligent cabinet and used for providing a pickup service or a third identification code provided by the intelligent cabinet and used for providing an access service and an integration service;
if the identification code information indicates that the identification code is the first identification code, determining that the current role information of the user is the first user role information;
if the identification code information indicates that the identification code is a second identification code, determining that the current role information of the user is second user role information;
and if the identification code information indicates that the identification code is the third identification code, judging that the current role information of the user cannot be determined.
13. A computing device, comprising: the system comprises a processor, a memory, a communication interface and a communication bus, wherein the processor, the memory and the communication interface complete mutual communication through the communication bus;
the memory is used for storing at least one executable instruction, and the executable instruction causes the processor to execute the operation corresponding to the login method of the accessor service according to any one of claims 1-8.
14. A computer storage medium having stored therein at least one executable instruction that causes a processor to perform operations corresponding to a method of logging into an accessor service of any of claims 1-8.
CN202110449026.4A 2021-04-25 2021-04-25 Login method and device for access service and computing equipment Pending CN112989302A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110449026.4A CN112989302A (en) 2021-04-25 2021-04-25 Login method and device for access service and computing equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110449026.4A CN112989302A (en) 2021-04-25 2021-04-25 Login method and device for access service and computing equipment

Publications (1)

Publication Number Publication Date
CN112989302A true CN112989302A (en) 2021-06-18

Family

ID=76340119

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110449026.4A Pending CN112989302A (en) 2021-04-25 2021-04-25 Login method and device for access service and computing equipment

Country Status (1)

Country Link
CN (1) CN112989302A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104598788A (en) * 2015-02-14 2015-05-06 成都我来啦网格信息技术有限公司 Multiple login methods based on intelligent storage cabinet
CN108806105A (en) * 2018-06-07 2018-11-13 深圳市丰巢科技有限公司 It is a kind of that part method, addressee method and two-way express delivery cabinet are posted based on two-way express delivery cabinet
CN111859327A (en) * 2020-07-24 2020-10-30 杭州鸿雁电器有限公司 Login role identification method and device
CN112233336A (en) * 2020-12-08 2021-01-15 浙江口碑网络技术有限公司 Cabinet opening control method, user side, computing equipment and computer storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104598788A (en) * 2015-02-14 2015-05-06 成都我来啦网格信息技术有限公司 Multiple login methods based on intelligent storage cabinet
CN108806105A (en) * 2018-06-07 2018-11-13 深圳市丰巢科技有限公司 It is a kind of that part method, addressee method and two-way express delivery cabinet are posted based on two-way express delivery cabinet
CN111859327A (en) * 2020-07-24 2020-10-30 杭州鸿雁电器有限公司 Login role identification method and device
CN112233336A (en) * 2020-12-08 2021-01-15 浙江口碑网络技术有限公司 Cabinet opening control method, user side, computing equipment and computer storage medium

Similar Documents

Publication Publication Date Title
CN109409043B (en) Login method of application system, terminal equipment and medium
CN110213356B (en) Login processing method based on data processing and related equipment
CN113129526B (en) Cabinet opening control method, server, computing device and computer storage medium
CN108234505B (en) Account login method and system
EP3447669A1 (en) Information leakage detection method and device, server, and computer-readable storage medium
KR20120135041A (en) Access monitoring method, information processing apparatus, and computer-readable medium storing access monitoring program
CN109657434B (en) Application access method and device
CN104753909A (en) Updated information authentication method, device and system
CN104424352A (en) System and method for providing agent service to user terminal
CN106657096B (en) WEB vulnerability detection method, device and system
US9348999B2 (en) User terminal, reliability management server, and method and program for preventing unauthorized remote operation
CN113553557A (en) Application secret-free login method and device, electronic equipment and storage medium
CN112990830B (en) Role switching method and device in file access process and computing equipment
CN112433936A (en) Test method, test device and storage medium
CN113643482B (en) Cabinet opening control method and device and computing equipment
CN115065510B (en) Login method, device, system, electronic equipment and readable storage medium
CN112989302A (en) Login method and device for access service and computing equipment
CN108345613B (en) Risk identification method and device
CN106326419B (en) Network automata processing method and device
CN115291762A (en) Service item triggering method and device, storage medium and computer equipment
CN109327814B (en) Short message processing method and device, electronic equipment and readable storage medium
CN108848183B (en) Login method and device for simulation user
CN114971632A (en) Social platform binding system, method and device, electronic equipment and storage medium
CN112749975A (en) Method for automatically processing refund request and automatic processing platform
CN111385358B (en) Synchronization method and device of session control object and server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210618