CN113438228B - Application login method and device and readable storage medium - Google Patents

Application login method and device and readable storage medium Download PDF

Info

Publication number
CN113438228B
CN113438228B CN202110698970.3A CN202110698970A CN113438228B CN 113438228 B CN113438228 B CN 113438228B CN 202110698970 A CN202110698970 A CN 202110698970A CN 113438228 B CN113438228 B CN 113438228B
Authority
CN
China
Prior art keywords
module
application module
login
target application
encryption unit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110698970.3A
Other languages
Chinese (zh)
Other versions
CN113438228A (en
Inventor
邓志阳
唐佐平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Kingdee Software China Co Ltd
Original Assignee
Kingdee Software China Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Kingdee Software China Co Ltd filed Critical Kingdee Software China Co Ltd
Priority to CN202110698970.3A priority Critical patent/CN113438228B/en
Publication of CN113438228A publication Critical patent/CN113438228A/en
Application granted granted Critical
Publication of CN113438228B publication Critical patent/CN113438228B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Debugging And Monitoring (AREA)
  • Storage Device Security (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The embodiment of the application provides a login method and related equipment for an application, which can reduce maintenance cost and error rate. The method comprises the following steps: responding to the login instruction, and acquiring an encryption unit brevity code corresponding to the login account according to the login instruction; determining N module identifications corresponding to the encryption unit brevity codes and the total number of users allowed to log in the application module corresponding to each module identification in the N module identifications from a preset mapping table, wherein the preset mapping table is used for representing the association relation between the encryption unit brevity codes and the total number of the users allowed to log in the module identifications and the application modules corresponding to the module identifications; if the login account is the first time of logging in the target application module, acquiring the number of users currently logged in by the target application module from the database; and if the number of the users currently logged in by the target application module does not exceed the total number of the users allowed to be logged in by the target application module, logging in the target application module through the login account.

Description

Application login method and device and readable storage medium
Technical Field
The present application relates to the field of communications, and in particular, to a login method and apparatus for an application, and a readable storage medium.
Background
In a catering cloud system, store application permission site encryption service exists (namely, product release needs to encrypt an application module, the application module is placed in an encryption unit of a customer ordering system, and a customer selects a corresponding encryption unit through the customer ordering system to place an order and then can use the application in the system); however, when the product is released every time, the sale modes of different versions are different, and the product can be packaged for sale as a whole module or can be sold as a split module; different versions of different application types belong to different sales modules; the modules sold in different versions have different brevity codes, and the application modules belong to different encryption units under different versions, so that when a client logs in a system product, whether an order encryption unit purchased by the client contains the application module needs to be verified, and then whether permission is given or not is judged.
In the catering cloud store module permission encryption, when versions are issued in different versions, different codes are respectively developed by each application module according to different sales modes, application types and module brevity codes to identify whether a corresponding module exists in a customer order or not to perform permission encryption.
However, in this way, different versions need to be respectively made with a set of encrypted codes, the code reuse rate is low, the compatibility of different patches of different versions is poor, the maintenance cost is very high, the workload of adding and modifying the module encryption each time is large, and the error rate is very high.
Disclosure of Invention
A first aspect of an embodiment of the present application provides a login method for an application, including:
responding to a login instruction, and acquiring an encryption unit brevity code corresponding to a login account according to the login instruction;
determining N module identifications corresponding to the encryption unit brevity code and the total number of users allowed to log in the application module corresponding to each module identification in the N module identifications from a preset mapping table, wherein the preset mapping table is used for representing the association relation between the encryption unit brevity code and the module identifications and the total number of users allowed to log in the application module corresponding to the module identifications, and N is an integer greater than or equal to 1;
if the login account is used for logging in the target application module for the first time, acquiring the number of users currently logged in by the target application module from a database, wherein the target application module is an application module corresponding to any one module identifier in the N module identifiers;
and if the number of the users currently logged in by the target application module does not exceed the total number of the users allowed to log in by the target application module, logging in the target application module through the login account.
In one possible design, the method further includes:
if the target application module is updated, acquiring a module identifier, a version, a sales mode, an application type and an encryption unit brevity code corresponding to the updated target application module;
adjusting the preset mapping table according to the updated module identification, version release version, sales mode, application type and encryption unit brevity code corresponding to the target application module;
the determining, from a preset mapping table, N module identifiers corresponding to the brevity code of the encryption unit and a total number of users permitted to log in the application module corresponding to each of the N module identifiers includes:
and matching the brevity code of the encryption unit with the adjusted preset mapping table to obtain the N module identifications and the total number of users allowed to log in the application module corresponding to each module identification in the N module identifications.
In one possible design, the obtaining, according to the login instruction, license encryption unit information corresponding to the target application includes:
and acquiring the encryption unit brevity codes corresponding to the login account from an order system according to the login instruction, wherein the order system stores the encryption unit brevity codes corresponding to a plurality of accounts including the login account.
In one possible design, the method further comprises:
and if the number of the currently logged-in users of the target application module is equal to the total number of the users allowed to log in by the target application module, sending prompt information.
In one possible design, the method includes:
and after the target application module is logged in through the login account, updating the number of users currently logged in by the target application module in the database.
A second aspect of the present application provides a login apparatus for an application, including:
the first acquisition unit is used for responding to a login instruction and acquiring an encryption unit brevity code corresponding to a login account according to the login instruction;
a determining unit, configured to determine, from a preset mapping table, N module identifiers corresponding to the encryption unit brevity code and a total number of users allowed to log in the application module corresponding to each of the N module identifiers, where the preset mapping table is used to indicate an association relationship between the encryption unit brevity code and the module identifiers and the total number of users allowed to log in the application module corresponding to the module identifiers, and N is an integer greater than or equal to 1;
a second obtaining unit, configured to obtain, from a database, a current number of users logged in by a target application module if the login account is to log in the target application module for the first time, where the target application module is an application module corresponding to any one of the N module identifiers;
and the login unit is used for logging in the target application module through the login account if the number of the users currently logged in by the target application module does not exceed the total number of the users allowed to be logged in by the target application module.
In one possible design, the apparatus further includes:
an update unit configured to:
if the target application module is updated, acquiring a module identifier, a version, a sales mode, an application type and an encryption unit brevity code corresponding to the updated target application module;
adjusting the preset mapping table according to the updated module identification, version release version, sales mode, application type and encryption unit brevity code corresponding to the target application module;
the determining unit is specifically configured to:
and matching the encryption unit brevity code with the adjusted preset mapping table to obtain the N module identifications and the total number of users allowed to log in the application module corresponding to each module identification in the N module identifications.
In one possible design, the first obtaining unit is specifically configured to:
and acquiring the encryption unit brevity codes corresponding to the login account from an order system according to the login instruction, wherein the order system stores the encryption unit brevity codes corresponding to a plurality of accounts including the login account.
In one possible design, the login unit is further configured to:
and if the number of the currently logged-in users of the target application module is equal to the total number of the users allowed to log in by the target application module, sending prompt information.
In one possible design, the update unit is further configured to:
and after the target application module is logged in through the login account, updating the number of users currently logged in by the target application module in the database.
A third aspect of embodiments of the present application provides a computer device, which includes at least one connected processor, a memory and a transceiver, where the memory is configured to store program codes, and the processor is configured to call the program codes in the memory to execute the steps of the login method of the application according to the first aspect.
A fourth aspect of the embodiments of the present application provides a computer storage medium, which includes instructions that, when executed on a computer, cause the computer to perform the steps of the method for logging in an application described in the first aspect.
In summary, it can be seen that, in the embodiment provided by the present application, the preset mapping table of the application module permission encryption information data in different versions is set in the database, so that when a user logs in through a login account, only the corresponding encryption unit brevity code needs to be obtained, the corresponding encryption unit can be searched from the preset mapping table, and meanwhile, whether the number of users currently logged in by the application module is less than or equal to the number of users allowed to log in is also determined, and if not, the application module is logged in through the login account. Therefore, when the application logs in, the version and the sales type of the module do not need to be concerned, and meanwhile, a set of encryption codes do not need to be made for different versions, so that the maintenance cost is reduced, and the error rate is reduced.
Drawings
Fig. 1 is a schematic diagram of an embodiment of a login method of an application provided in an embodiment of the present application;
fig. 2 is a schematic diagram of another embodiment of a login method of an application according to an embodiment of the present application;
fig. 3 is a schematic diagram of another embodiment of a login method of an application provided in an embodiment of the present application;
FIG. 4 is a schematic diagram of another embodiment of a login method for an application used in an embodiment of the present application;
fig. 5 is a virtual schematic diagram of a login device of an application according to an embodiment of the present application;
fig. 6 is a schematic hardware structure diagram of a server according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be described clearly and completely with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only some embodiments of the present application, and not all embodiments.
The terms "first," "second," and the like in the description and claims of this application and in the foregoing drawings are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It will be appreciated that the data so used may be interchanged under appropriate circumstances such that the embodiments described herein may be implemented in other sequences than those illustrated or described herein. Furthermore, the terms "comprise," "include," and "have," and any variations thereof, are intended to cover non-exclusive inclusions, such that a process, method, system, article, or apparatus that comprises a list of steps or modules is not necessarily limited to those steps or modules expressly listed, but may include other steps or modules not expressly listed or inherent to such process, method, article, or apparatus, the division of modules presented herein is merely a logical division that may be implemented in a practical application in a further manner, such that a plurality of modules may be combined or integrated into another system, or some feature vectors may be omitted, or not implemented, and such that couplings or direct couplings or communicative coupling between each other as shown or discussed may be through some interfaces, indirect couplings or communicative coupling between modules may be electrical or other similar, are not intended to be limiting in this application. The modules or sub-modules described as separate components may or may not be physically separated, may or may not be physical modules, or may be distributed in a plurality of circuit modules, and some or all of the modules may be selected according to actual needs to achieve the purpose of the present disclosure.
The following describes the method for logging in an application provided in the embodiments of the present application from the perspective of a login device of the application, where the login device of the application may be a server, or may be a service unit in the server, and is not particularly limited.
Referring to fig. 1, fig. 1 is a schematic diagram of an embodiment of a login method of an application according to an embodiment of the present application, including:
101. and responding to the login instruction, and acquiring the encryption unit brevity code corresponding to the login account according to the login instruction.
In this embodiment, when a user logs in a software product through a login account, an encryption unit brevity code corresponding to the login account may be obtained, and specifically, the encryption unit brevity code corresponding to the login account may be obtained from an order system according to a login instruction, where the order system stores encryption unit brevity codes corresponding to a plurality of accounts including the login account. It should be noted that different application modules in the software product are respectively stored in different encryption units according to different sales modes and versions, and the different encryption units have corresponding different encryption unit brevity codes.
In one embodiment, the operation of generating the login instruction at least includes one of a gesture operation, a sliding operation, a clicking operation and a voice control operation, for example, when a user performs a clicking operation on a login interface corresponding to the software product, the login device of the application may receive the clicking operation, and at this time, the clicking operation generates the login instruction, that is, the operation instruction may be defined in advance, for example, an operation of defining the sliding operation in advance as an operation of acquiring a simplified code of an encryption unit corresponding to the login account (such as a left-sliding operation, a right-sliding operation, an up-sliding operation, a down-sliding operation, and the like), or an operation of defining the clicking operation as an operation of acquiring a simplified code of an encryption unit corresponding to the login account (such as a double-clicking operation, a mouse-sliding operation, a long-pressing operation, a single-clicking operation, a simultaneous pressing operation of a left key and a right key of a roller mouse, and the like), or an operation of defining the gesture operation as an operation of acquiring a simplified code of an encryption unit corresponding to the login account (such as a left-swinging of a hand A wrist or an arm, which swings the wrist or the arm right, such as a four-finger contraction operation or a three-finger sliding operation, etc.), or defines a voice control operation as an operation of acquiring the brevity code of the encryption unit corresponding to the login account (such as receiving the voice of the query target reimbursement order), which are only for illustration and do not represent a limitation on the operation of generating the login instruction. Of course, the login instruction may also be generated by setting a corresponding shortcut key on an input device, for example, the input device is a keyboard, and the operation of obtaining the brevity code of the encryption unit corresponding to the login account is performed by setting a "CTRL + a key" on the keyboard, which is not limited specifically.
102. And determining N module identifications corresponding to the brevity codes of the encryption unit and the total number of users allowed to log in the application module corresponding to each module identification in the N module identifications from a preset mapping table.
In this embodiment, after obtaining the encryption unit brevity code corresponding to the login account, the login device of the application may obtain, from a preset mapping table, N module identifiers corresponding to the encryption unit brevity code and a total number of users permitted to log in by each of the N module identifiers, where the preset mapping table is used to represent an association relationship among the encryption unit brevity code, the module identifier, and a total number of users permitted to log in by an application module corresponding to the module identifier, and N is an integer greater than or equal to 1. That is to say, the login apparatus of the application may insert a preset mapping table into the database, where a field corresponding to the preset mapping table has an identifier of an application module, a version of the application, a sales mode, an application type, a brevity code of an encryption unit, and a total number of users allowed to log in by the application module, where the sales mode refers to that the application module in the software product can be sold by a single module, or by multiple modules, or all application modules in the software product can be sold together, and is not specifically limited.
The following describes the encryption unit and the brevity code of the encryption unit with reference to fig. 2:
referring to fig. 2, fig. 2 is a schematic diagram of an embodiment of a login method for an application according to an embodiment of the present application, where the software product has A, B, C three application modules, and the software product is updated repeatedly without stopping, and in different versions, in order to meet market demands, the sales modes are different, some versions are sold according to modules, some versions are sold together in a package, and thus different encryption units are generated according to different sales modes. As shown in fig. 2, the software product has three application modules, an application module a, an application module B and an application module C, and has three versions V1.0, V2.0 and V3.0, and is sold for a single application module in the sales mode of the version V1.0, for the sale of a single application module, the application module a is stored in the encryption unit a-1, the application module B is stored in the encryption unit B-1, and the application module C is stored in the encryption unit C-1; in the version of V2.0, an application module A and an application module B are packaged and sold, the application module A and the application module B are stored in an X-1 encryption unit at the moment, and the application module C is still sold separately and still stored in a C-1 encryption unit; in V3.0, A, B, C application modules are packaged and sold as a whole, at this time, A, B, C application modules store Y-1 encryption units, and different encryption units correspond to different encryption unit brevity codes, so that when logging in an application module, only knowing the encryption unit brevity code can determine the encryption unit corresponding to the encryption unit brevity code, and further can log in the application module in the encryption unit.
Referring to fig. 2 and fig. 3 in combination, when the user logs in the application module a, the order permission encryption unit information (i.e. the encryption unit brevity code) purchased by the user is obtained, then, the version number of the software product is not required to be concerned, and the matching is only required to be carried out according to the brevity codes of the encryption units and the preset mapping table, wherein the application module A corresponds to three encryption units A-1, X-1 and Y-1 in 3 versions respectively, and because the preset mapping table is used for representing the total number of users allowed to log in by the encryption unit brevity code, the application module identification and the application module corresponding to the application module identification, after the encryption unit brevity code is acquired from the order system, the corresponding module identifier corresponding to the brevity code of the encryption unit can be obtained by matching the brevity code of the encryption unit from the preset mapping table, and then the corresponding application module can be logged in.
In the above, only the preset mapping relationship table (two fields are mapped) in different sales modes is set forth, and similarly, if different application types (such as foreground service fields), different sales brevity codes (same version) and the like are also required to be targeted, only the mapping relationship of the corresponding fields needs to be established, and the multidimensional permission login verification can be realized by the permutation and combination mapping relationship of 3 fields and 4 fields, without limitation.
The preset mapping table is explained with reference to fig. 4 as follows:
referring to fig. 4, the module ID401 includes identifiers of a plurality of application modules, the simplified encryption unit code 402 corresponds to the identifiers of the application modules in the module ID401, the module name indicated as "food store POS" is module ID "CY _ POS" as indicated by 403, the corresponding simplified encryption unit codes are "CY _ QTYY", "CY _ POS", and "K3 Cloud _ ERP _ CYPOS", wherein the module name "food store POS" respectively generates three different permission units (foreground business, food Cloud POS, and food POS), each permission unit corresponds to one simplified encryption unit code, such as the simplified encryption unit code "CY _ QTYY" corresponding to foreground business, the simplified encryption unit code "CY _ POS" corresponding to food Cloud POS "and the simplified encryption unit code" K3Cloud _ POS "corresponding to food POS, so that after the simplified encryption unit code is found in the preset mapping table, the corresponding module identifier can be found in the preset mapping table, and further, whether to permit login can be judged. It should be understood that the illustration of the preset mapping table in fig. 4 is only an example, and of course, the preset mapping table may also be in other forms, and may also include other contents, such as the total number of users allowed to log in by each application module, which is not limited in particular.
It should be noted that, if the target application module is updated, the module identifier, the version release version, the sales mode, the application type, and the brevity code of the encryption unit corresponding to the updated target application module are obtained; and adjusting the preset mapping table according to the updated module identifier, version, sales mode, application type and encryption unit brevity code corresponding to the target application module, and matching the encryption unit brevity code with the adjusted preset mapping table to obtain N module identifiers and the total number of users allowed to log in the application module corresponding to each module identifier in the N module identifiers.
103. And if the login account is the first time of logging in the target application module, acquiring the number of users currently logged in by the target application module from the database.
In this embodiment, after determining the N module identifiers and the total number of users permitted to log in by each module identifier in the N module identifiers, the login device of the application may determine whether the login account is a first login target application module, and if so, obtain the number of users currently logged in by the target application module from the database, where the target application module is an application module corresponding to any one module identifier in the N module identifiers. If not, the login account is the one which has been logged in the target application module before, and the target application module is directly logged in through the login account.
104. And if the number of the users currently logged in by the target application module does not exceed the total number of the users allowed to log in by the target application module, logging in the target application module through the login account.
In this embodiment, if the number of users currently logged in by the target application module does not exceed the total number of users allowed to log in by the target application module, the target application module is logged in through the login account. For example, the application module a allows 10 users to log in, the user a logs in the application module a through the corresponding login account, the user a is marked in the database, the user b logs in the application module a through the corresponding login account, the database marks the user b, and so on, when the number of users marked in the database for the application module a reaches the total number of users allowed to log in, then subsequently logs in the application module a through the corresponding login account, then login is not allowed, when the number of users marked in the database for the application module a has not reached the total number of users allowed to log in, then subsequently logs in the application module a through the corresponding login account, then allows the user a to log in, and marks the user a. That is, after the target application module is logged in through the login account, the number of users currently logged in by the target application module in the database is updated.
It should be noted that, if the number of currently logged-in users of the target application module is equal to the total number of users allowed to log in by the target application module, a prompt message is sent, where the prompt message is used to indicate that the number of currently logged-in users of the target application module is full.
In summary, it can be seen that, in the embodiment provided by the present application, the preset mapping table of the application module permission encryption information data in different versions is set in the database, so that when a user logs in through a login account, only the corresponding encryption unit brevity code needs to be obtained, the corresponding encryption unit can be searched from the preset mapping table, and meanwhile, whether the number of users currently logged in by the application module is less than or equal to the number of users allowed to log in is also determined, and if not, the application module is logged in through the login account. Therefore, during login, the version and the sales type do not need to be concerned, and meanwhile, a set of encryption codes do not need to be made for different versions, so that the maintenance cost is reduced, and the error rate is reduced.
The embodiments of the present application are described above from the perspective of a login method of an application, and the embodiments of the present application are described below from the perspective of a login device of an application.
Referring to fig. 5, a schematic diagram of an embodiment of an application login device 500 is provided in the embodiment of the present application, where the application login device includes:
a first obtaining unit 501, configured to respond to a login instruction, and obtain an encryption unit brevity code corresponding to a login account according to the login instruction;
a determining unit 502, configured to determine, from a preset mapping table, N module identifiers corresponding to the encryption unit brevity code and a total number of users allowed to log in the application module corresponding to each of the N module identifiers, where the preset mapping table is used to represent an association relationship among the encryption unit brevity code, the module identifier, and the total number of users allowed to log in the application module corresponding to the module identifier, where N is an integer greater than or equal to 1;
a second obtaining unit 503, configured to obtain, from a database, a current number of users logged in by a target application module if the login account is that the target application module is logged in for the first time, where the target application module is an application module corresponding to any one of the N module identifiers;
a login unit 504, configured to log in the target application module through the login account if the current number of users logged in by the target application module does not exceed the total number of users allowed to log in by the target application module.
In one possible design, the apparatus further includes:
an updating unit 505, configured to:
if the target application module is updated, acquiring a module identifier, a version, a sales mode, an application type and an encryption unit brevity code corresponding to the updated target application module;
adjusting the preset mapping table according to the updated module identification, version release version, sales mode, application type and encryption unit brevity code corresponding to the target application module;
the determining unit 502 is specifically configured to:
and matching the encryption unit brevity code with the adjusted preset mapping table to obtain the N module identifications and the total number of users allowed to log in the application module corresponding to each module identification in the N module identifications.
In one possible design, the first obtaining unit 501 is specifically configured to:
and acquiring the encryption unit brevity codes corresponding to the login account from an order system according to the login instruction, wherein the order system stores the encryption unit brevity codes corresponding to a plurality of accounts including the login account.
In one possible design, the login unit 504 is further configured to:
and if the number of the currently logged-in users of the target application module is equal to the total number of the users allowed to log in by the target application module, sending prompt information.
In one possible design, the update unit 505 is further configured to:
and after the target application module is logged in through the login account, updating the number of users currently logged in by the target application module in the database.
The embodiment of the application also provides another login device of the application, and the login device of the application is deployed in the server. For easy understanding, referring to fig. 6, fig. 6 is a schematic diagram of a server structure provided in the embodiment of the present application, and the server 600 may have a relatively large difference due to different configurations or performances, and may include one or more Central Processing Units (CPUs) 622 (e.g., one or more processors) and a memory 632, and one or more storage media 630 (e.g., one or more mass storage devices) storing an application program 642 or data 644. Memory 632 and storage medium 630 may be, among other things, transient or persistent storage. The program stored on the storage medium 630 may include one or more modules (not shown), each of which may include a sequence of instructions operating on a server. Still further, the central processor 622 may be configured to communicate with the storage medium 630 to execute a series of instruction operations in the storage medium 630 on the server 600.
The Server 600 may also include one or more power supplies 626, one or more wired or wireless network interfaces 650, one or more input-output interfaces 658, and/or one or more operating systems 641, such as a Windows Server TM ,Mac OS X TM ,Unix TM ,Linux TM ,FreeBSD TM And so on.
The steps performed by the login means of the application in the above embodiments may be based on the server structure shown in fig. 6.
The embodiment of the present application further provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a computer, implements the method flow related to the login device of the application in any of the above method embodiments. Correspondingly, the computer can be a login device of the application.
The present invention also provides a computer program or a computer program product including a computer program, which, when executed on a computer, will make the computer implement the method flow related to the login device of the application in any of the above method embodiments. Correspondingly, the computer may be a login device of the application.
In the embodiment corresponding to fig. 1 described above, all or part of the implementation may be implemented by software, hardware, firmware or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product.
The computer program product includes one or more computer instructions. When loaded and executed on a computer, cause the processes or functions described in accordance with the embodiments of the application to occur, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored in a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, from one website site, computer, server, or data center to another website site, computer, server, or data center via wired (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that a computer can store or a data storage device, such as a server, a data center, etc., that is integrated with one or more available media. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., Solid State Disk (SSD)), among others.
It should be understood that the Processor referred to in this Application may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic, discrete hardware components, etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
It should also be understood that the number of processors in the present application may be one or more, and may be specifically adjusted according to an actual application scenario, and this is merely an example and is not limited herein. The number of the memories in the embodiment of the present application may be one or multiple, and may be specifically adjusted according to an actual application scenario, which is only an exemplary illustration and is not limited herein.
It should be further noted that, when the login device of the application includes a processor (or a processing unit) and a memory, the processor in this application may be integrated with the memory, or the processor and the memory may be connected through an interface, which may be specifically adjusted according to an actual application scenario, and is not limited.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solutions of the present application, or portions or all or portions of the technical solutions that contribute to the prior art, may be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, a server, or other devices) to execute all or part of the steps of the method according to the embodiment shown in fig. 1 of the present application.
It will be appreciated that the storage media or memories referred to in this application may comprise volatile memory or non-volatile memory, or may comprise both volatile and non-volatile memory. The non-volatile Memory may be a Read-Only Memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an Electrically Erasable PROM (EEPROM), or a flash Memory. Volatile Memory can be Random Access Memory (RAM), which acts as external cache Memory. By way of example, and not limitation, many forms of RAM are available, such as Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), Synchronous Dynamic Random Access Memory (SDRAM), Double Data Rate SDRAM (DDR SDRAM), Enhanced SDRAM (ESDRAM), SLDRAM (Synch link DRAM), and Direct Rambus RAM (DR RAM).
It should be noted that the memory described herein is intended to comprise, without being limited to, these and any other suitable types of memory.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present application.

Claims (10)

1. A login method of an application is characterized by comprising the following steps:
responding to a login instruction, and acquiring an encryption unit brevity code corresponding to a login account according to the login instruction;
determining N module identifications corresponding to the encryption unit brevity code and the total number of users allowed to log in the application module corresponding to each module identification in the N module identifications from a preset mapping table, wherein the preset mapping table is used for representing the association relation among the encryption unit brevity code, the module identifications and the total number of users allowed to log in the application module corresponding to the module identifications, and N is an integer greater than or equal to 1;
if the login account is the target application module which is logged in for the first time, acquiring the number of users of the target application module which are logged in at present from a database, wherein the target application module is an application module corresponding to any one module identifier in the N module identifiers;
and if the number of the users currently logged in by the target application module does not exceed the total number of the users allowed to be logged in by the target application module, logging in the target application module through the login account.
2. The method of claim 1, further comprising:
if the target application module is updated, acquiring a module identifier, a version, a sales mode, an application type and an encryption unit brevity code corresponding to the updated target application module;
adjusting the preset mapping table according to the updated module identification, version release version, sales mode, application type and encryption unit brevity code corresponding to the target application module;
the determining, from a preset mapping table, N module identifiers corresponding to the brevity code of the encryption unit and a total number of users permitted to log in the application module corresponding to each of the N module identifiers includes:
and matching the brevity code of the encryption unit with the adjusted preset mapping table to obtain the N module identifications and the total number of users allowed to log in the application module corresponding to each module identification in the N module identifications.
3. The method of claim 1, wherein the obtaining the encryption unit brevity code corresponding to the login account according to the login instruction comprises:
and acquiring the encryption unit brevity codes corresponding to the login account from an order system according to the login instruction, wherein the order system stores the encryption unit brevity codes corresponding to a plurality of accounts including the login account.
4. The method according to any one of claims 1 to 3, further comprising:
and if the number of the currently logged-in users of the target application module is equal to the total number of the users allowed to log in by the target application module, sending prompt information.
5. A method according to any one of claims 1 to 3, characterized in that the method comprises:
and after the target application module is logged in through the login account, updating the number of users currently logged in by the target application module in the database.
6. An apparatus for logging in an application, comprising:
the first acquisition unit is used for responding to a login instruction and acquiring an encryption unit brevity code corresponding to a login account according to the login instruction;
a determining unit, configured to determine, from a preset mapping table, N module identifiers corresponding to the encryption unit brevity code and a total number of users allowed to log in the application module corresponding to each of the N module identifiers, where the preset mapping table is used to represent an association relationship among the encryption unit brevity code, the module identifier, and the total number of users allowed to log in the application module corresponding to the module identifier, where N is an integer greater than or equal to 1;
a second obtaining unit, configured to obtain, from a database, a current number of users logged in by a target application module if the login account is a first login target application module, where the target application module is an application module corresponding to any one of the N module identifiers;
and the login unit is used for logging in the target application module through the login account if the current number of logged-in users of the target application module does not exceed the total number of users allowed to log in by the target application module.
7. The apparatus of claim 6, further comprising:
an update unit to:
if the target application module is updated, acquiring a module identifier, a version, a sales mode, an application type and an encryption unit brevity code corresponding to the updated target application module;
adjusting the preset mapping table according to the updated module identification, version release version, sales mode, application type and encryption unit brevity code corresponding to the target application module;
the determining unit is specifically configured to:
and matching the brevity code of the encryption unit with the adjusted preset mapping table to obtain the N module identifications and the total number of users allowed to log in the application module corresponding to each module identification in the N module identifications.
8. The apparatus according to claim 6, wherein the first obtaining unit is specifically configured to:
and acquiring the encryption unit brevity codes corresponding to the login account from an order system according to the login instruction, wherein the order system stores the encryption unit brevity codes corresponding to a plurality of accounts including the login account.
9. A computer device, comprising:
at least one connected processor, memory and transceiver, wherein the memory is configured to store program code and the processor is configured to invoke the program code in the memory to perform a login method for an application as claimed in any one of claims 1 to 5.
10. A computer storage medium characterized in that it comprises instructions which, when run on a computer, cause the computer to perform a login method for an application according to any one of claims 1 to 5.
CN202110698970.3A 2021-06-23 2021-06-23 Application login method and device and readable storage medium Active CN113438228B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110698970.3A CN113438228B (en) 2021-06-23 2021-06-23 Application login method and device and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110698970.3A CN113438228B (en) 2021-06-23 2021-06-23 Application login method and device and readable storage medium

Publications (2)

Publication Number Publication Date
CN113438228A CN113438228A (en) 2021-09-24
CN113438228B true CN113438228B (en) 2022-08-23

Family

ID=77753618

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110698970.3A Active CN113438228B (en) 2021-06-23 2021-06-23 Application login method and device and readable storage medium

Country Status (1)

Country Link
CN (1) CN113438228B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103001934A (en) * 2011-09-16 2013-03-27 腾讯科技(深圳)有限公司 Terminal application login method and terminal application login system
CN103259770A (en) * 2012-02-17 2013-08-21 腾讯科技(深圳)有限公司 Login method and login server
CN104270349A (en) * 2014-09-17 2015-01-07 广州中国科学院软件应用技术研究所 Isolation method and device for cloud computing multi-tenant application
CN110287691A (en) * 2019-05-21 2019-09-27 深圳壹账通智能科技有限公司 Application program login method, device, equipment and storage medium

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20060119732A (en) * 2006-01-27 2006-11-24 희 한 The simple code desing method for easy accessing of on- line information and url link service system
US8904503B2 (en) * 2013-01-15 2014-12-02 Symantec Corporation Systems and methods for providing access to data accounts within user profiles via cloud-based storage services
US11568385B2 (en) * 2015-10-12 2023-01-31 Walmart Apollo, Llc System, method, and non-transitory computer-readable storage media related to transactions using a mobile device
CN112771826B (en) * 2018-11-05 2023-01-10 深圳市欢太科技有限公司 Application program login method, application program login device and mobile terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103001934A (en) * 2011-09-16 2013-03-27 腾讯科技(深圳)有限公司 Terminal application login method and terminal application login system
CN103259770A (en) * 2012-02-17 2013-08-21 腾讯科技(深圳)有限公司 Login method and login server
CN104270349A (en) * 2014-09-17 2015-01-07 广州中国科学院软件应用技术研究所 Isolation method and device for cloud computing multi-tenant application
CN110287691A (en) * 2019-05-21 2019-09-27 深圳壹账通智能科技有限公司 Application program login method, device, equipment and storage medium

Also Published As

Publication number Publication date
CN113438228A (en) 2021-09-24

Similar Documents

Publication Publication Date Title
US9672053B2 (en) Service request processing
US9460307B2 (en) Managing sensitive data in cloud computing environments
US10250723B2 (en) Protocol-level identity mapping
US11025623B2 (en) Updating database drivers for client applications through a database server push
US11196554B2 (en) Default password removal
US20190318110A1 (en) System and method for automatically securing sensitive data in public cloud using a serverless architecture
EP1348159A2 (en) Decentralized appliance virus scanning
US20160261575A1 (en) Executing an operation over file repositories located in different authentication domains using a representational state transfer (rest)-compliant client
US8660996B2 (en) Monitoring files in cloud-based networks
US20230040121A1 (en) System support replicator
US10615968B1 (en) Shuffling cryptographic keys stored in clouds of a multi-cloud environment
US11418570B2 (en) Robust computing device identification framework
CN113312669A (en) Password synchronization method, device and storage medium
CN113438228B (en) Application login method and device and readable storage medium
CN112738249A (en) File uploading method, device, equipment and storage medium based on quantitative transaction
US11816714B2 (en) Service verification method and apparatus
US11804965B2 (en) Connecting configuration services using blockchain technology
US10606577B1 (en) System and method for assuring customers during software deployment
US10904295B2 (en) Dynamically updating feature set recommendation databases
US11297065B2 (en) Technology for computing resource liaison
CN113434541A (en) Method and device for sending query result, storage medium and electronic device
CN112769565A (en) Method and device for upgrading cryptographic algorithm, computing equipment and medium
CN112311716A (en) Data access control method and device based on openstack and server
US20240028399A1 (en) Automatically generating workflows across cloud services involving user-controlled components
CN114285743B (en) Method, device, electronic equipment and storage medium for updating configuration information

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant