CN113645239B - Application login method and device, user terminal and storage medium - Google Patents

Application login method and device, user terminal and storage medium Download PDF

Info

Publication number
CN113645239B
CN113645239B CN202110916300.4A CN202110916300A CN113645239B CN 113645239 B CN113645239 B CN 113645239B CN 202110916300 A CN202110916300 A CN 202110916300A CN 113645239 B CN113645239 B CN 113645239B
Authority
CN
China
Prior art keywords
login
server
encrypted data
data
credential
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110916300.4A
Other languages
Chinese (zh)
Other versions
CN113645239A (en
Inventor
原玉琬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Puhui Enterprise Management Co Ltd
Original Assignee
Ping An Puhui Enterprise Management Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Puhui Enterprise Management Co Ltd filed Critical Ping An Puhui Enterprise Management Co Ltd
Priority to CN202110916300.4A priority Critical patent/CN113645239B/en
Publication of CN113645239A publication Critical patent/CN113645239A/en
Application granted granted Critical
Publication of CN113645239B publication Critical patent/CN113645239B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The embodiment of the application provides an application login method, an application login device, a user terminal and a storage medium, and relates to the technical field of process optimization, wherein the method comprises the following steps: acquiring a first login certificate from a server through a first function page, and acquiring a second function page from the server through the first login certificate; when touch operation on a specific control included in the second function page is detected, encrypting the first login certificate, splicing according to the encrypted data and the quick login identification to obtain spliced data to write in the clipboard, and downloading and installing the target application; and when the starting operation of the target application is detected, reading the splicing data from the clipboard to obtain encrypted data, obtaining a second login certificate from the server by using the encrypted data, and accessing the server by using the second login certificate in the target application. By adopting the method and the device, the user loss rate can be reduced in the process of switching different product forms. The present application relates to blockchain techniques, such as targeting applications as blockchain applications.

Description

Application login method and device, user terminal and storage medium
Technical Field
The present application relates to the field of process optimization technologies, and in particular, to an application login method, an application login device, a user terminal, and a storage medium.
Background
Currently, many companies promote their own services through different product forms, such as APP, applet, public number, H5, etc., which run on different platforms, each of which has advantages and complements each other, rather than being a simple substitute. For example, the APP is supported by a native mobile phone operating system, user experience is optimal, but the cost of obtaining customers is high because the user needs to download the APP; h5 can open the H5 page to perform the business process only by forwarding the link to the user, the cost of acquiring the customer is relatively low, but the user experience is relatively poor due to the fact that the H5 page runs on a browser and depends on the limitation of a network and a design language of the H5 page.
Generally, when a service is operated, different services are realized by combining the product forms. For example, the customer is obtained through an H5 page, the user becomes the customer of our product with the lowest cost, and then the follow-up more complex business process is carried out after the user is guided to download the APP. However, in this case, because the H5 and the APP belong to two product forms and cannot share information with each other, after the user completes registration, login and some simple business processes at the H5 end, the user still needs to perform login operation after downloading the APP, and a user behavior breakpoint easily occurs in the process. Similarly, the business of some companies can be promoted through the small program, and then the APP is guided to be downloaded to carry out the complex business process. However, the above process requires repeated operations to verify the identity when switching to a different product form, resulting in lost users.
Disclosure of Invention
The embodiment of the application login method and device, the user terminal and the storage medium can reduce the user loss rate in the process of switching to different product forms.
In a first aspect, an embodiment of the present application provides an application login method, including:
displaying a first function page;
sending a login request to a server through the first function page so that the server generates a first login credential after the login request is verified;
receiving the first login credential sent by the server, and acquiring a second function page from the server through the first login credential, wherein the second function page comprises a control for indicating downloading of a target application, and the first function page and the second function page do not belong to the target application;
when touch operation on the control is detected, the first login certificate is encrypted to obtain encrypted data;
acquiring a quick login identifier, and splicing the quick login identifier and the encrypted data to obtain spliced data;
writing the spliced data into a clipboard, and downloading the target application through an application management platform;
after the target application is installed, when the starting operation of the target application is detected, reading the splicing data from the clipboard, and acquiring the encrypted data through the splicing data;
and acquiring a second login credential from the server by using the encrypted data, and accessing the server by using the second login credential in the target application.
Optionally, before reading the splicing data from the clipboard, the method further includes:
parsing at least one datum in the clipboard;
and when the data comprising the quick login identification is analyzed, determining that the data comprising the quick login identification is the spliced data.
Optionally, the encrypting the first login credential to obtain encrypted data includes:
encrypting the first login certificate to obtain an encrypted character string, and determining the encrypted character string as encrypted data; or the like, or, alternatively,
and encrypting the first login certificate to obtain an encrypted character string, converting the encrypted character string into an encrypted image, and determining the encrypted image as encrypted data.
Optionally, when the encrypted data is an encrypted character string, the obtaining a second login credential from the server by using the encrypted data includes:
decrypting the encrypted data to obtain the first login certificate;
sending the first login credential to a server so that the server generates a second login credential after the first login credential passes authentication;
and receiving the second login credential sent by the server.
Optionally, when the encrypted data is an encrypted character string, the obtaining a second login credential from the server by using the encrypted data includes:
sending the encrypted data to the server so that the server can decrypt the encrypted data to obtain the first login credential, and generating a second login credential after the first login credential passes authentication;
and receiving the second login credential sent by the server.
Optionally, the method further includes:
acquiring a channel number and the expiration time of the first login certificate, wherein the channel number represents the source of the login request;
the encrypting the first login credential to obtain an encrypted character string includes:
and encrypting the first login certificate, the channel number and the expiration time of the first login certificate to obtain an encrypted character string.
Optionally, when the encrypted data is an encrypted character string, the obtaining a second login credential from the server by using the encrypted data includes:
decrypting the encrypted data to obtain the first login certificate, the channel number and the expiration time of the first login certificate;
when the first login credential is determined to be not expired according to the expiration time of the first login credential, sending the first login credential and the channel number to the server, so that the server performs user identity authentication according to a check rule corresponding to the channel number after passing the authentication of the first login credential, and generates a second login credential after passing the user identity authentication;
and receiving the second login credential sent by the server.
In a second aspect, an embodiment of the present application provides an application login apparatus, including:
the display module is used for displaying a first function page;
the communication module is used for sending a login request to a server through the first function page so that the server generates a first login credential after the login request is verified;
the communication module is further configured to receive the first login credential sent by the server, and obtain a second function page from the server through the first login credential, where the second function page includes a control indicating downloading of a target application, and the first function page and the second function page do not belong to the target application;
the processing module is used for encrypting the first login certificate to obtain encrypted data when the touch operation on the control is detected;
the splicing module is used for acquiring a quick login identifier and splicing the quick login identifier and the encrypted data to obtain spliced data;
the read-write module is used for writing the spliced data into a clipboard and downloading the target application through an application management platform;
the processing module is further configured to, after the target application is installed, read the splicing data from the clipboard through the read-write module when a start operation of the target application is detected, and obtain the encrypted data through the splicing data;
the processing module is further configured to obtain a second login credential from the server by using the encrypted data, and access the server by using the second login credential in the target application.
In a third aspect, an embodiment of the present application provides a user terminal, including a processor and a memory, where the processor and the memory are connected to each other, where the memory is used to store computer program instructions, and the processor is configured to execute the program instructions to implement the method according to the first aspect.
In a fourth aspect, embodiments of the present application provide a computer-readable storage medium having stored therein computer program instructions, which, when executed by a processor, are configured to perform the method according to the first aspect.
In summary, the user terminal may send a login request to the server through the first function page, so that the server generates a first login credential after the login request is verified; the user terminal receives a first login certificate sent by the server, and acquires a second function page from the server through the first login certificate, wherein the second function page comprises a control for indicating downloading of a target application; when the user terminal detects touch operation on the control, the first login certificate is encrypted to obtain encrypted data, a quick login identifier is obtained, and the quick login identifier and the encrypted data are spliced to obtain spliced data; the user terminal writes the splicing data into the shear plate, downloads the target application through the application management platform, reads the splicing data from the shear plate when the starting operation of the target application is detected after the target application is installed, acquires the encrypted data through the splicing data, acquires a second login certificate from the server through the encrypted data, and accesses the server through the second login certificate in the target application. By adopting the method and the device, the quick login among different product forms can be realized, the repeated operation of executing identity verification is not required to be executed when different product forms are switched as in the prior art, and therefore the user operation breakpoints can be effectively avoided, and the user loss rate is further reduced.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1a is an exemplary diagram of an application login scenario provided in an embodiment of the present application;
FIG. 1b is a diagram illustrating another example of an application login scenario provided in an embodiment of the present application;
fig. 2 is a schematic flowchart of an application login method according to an embodiment of the present application;
fig. 3 is a schematic flowchart of an application login method according to still another embodiment of the present application;
fig. 4 is a schematic diagram of a network architecture of an application login system according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of an application login apparatus according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of a user terminal according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application.
The embodiment of the application provides an application login scheme, which can realize quick login between different product forms, such as between H5 and APP, thereby effectively avoiding user operation breakpoints and further reducing the user loss rate. It should be noted that, the application login scheme can not only realize convenient login between H5 and APP, but also realize convenient login between H5 and applet, applet and APP, and between public numbers and APP, etc. The application login scheme may be performed by a user terminal. The user terminal can be an intelligent terminal such as a smart phone, an intelligent wearable device (such as a smart watch) and a tablet computer.
The application login scheme specifically comprises the following steps: the user terminal displays the first function page and sends a login request to the server through the first function page, so that the server generates a first login credential after the login request is verified. And the user terminal receives a first login certificate sent by the server and acquires a second function page from the server through the first login certificate, wherein the second function page comprises a control for indicating downloading of the target application. Wherein the first functional page and the second functional page do not belong to the target application. For example, the target application may be a target APP. The first and second function pages may both be pages of a target applet or pages of a target public number. As another example, the target application is a target applet or a target APP. The first function page and the second function page may be both H5 pages. And when the user terminal detects the touch operation on the control, the first login certificate is encrypted to obtain encrypted data. And the user terminal acquires the quick login identification and performs splicing processing on the quick login identification and the encrypted data to obtain spliced data. And the user terminal writes the spliced data into the clipboard and downloads the target application through the application management platform. After the target application is installed, when the starting operation of the target application is detected, the user terminal reads splicing data from the clipboard and acquires encrypted data through the splicing data. And the user terminal acquires the second login credential from the server by using the encrypted data and accesses the server by using the second login credential in the target application. According to the application login scheme, a set of mutual trust mechanism is established among different products to realize a convenient login process, an encryption technology is introduced to ensure the safety of the mechanism, and the process realizes quick login among different product forms, so that the problems of operation breakpoints and the like of a user are effectively avoided, and the user loss rate is reduced.
In an application scenario, referring to the example of the application login scenario shown in fig. 1 a-1 b, a user a may open an application a using a smartphone and browse to a link address 1 in the application a, for example, browse to the link address 1 in a chat interface of the application a with reference to fig. 1a, or browse to the link address 1 in a social circle of the application a, for example, a friend circle with reference to fig. 1 b. The link address 1 may be shared by user b to user a. In other application scenarios, the link address 1 may also be pushed to the user a by the application server a (which is the server corresponding to the application a). The user a may click on the link address 11. After the smart phone detects that the user A clicks the link address 1, an access request can be initiated to the application server B according to the link address 1, the application server B responds to the access request, and the page 1 is returned to the smart phone. The smartphone may display page 1. Page 1 may be a login page including a login information entry box and a login button, and user a may enter login information on page 1 and click the login button. And after detecting the click operation of the login button, the smart phone sends a login request to the application server B. After the login request is verified, the application server B generates a token1 (corresponding to the first login credential), and sends the token1 to the smartphone. The smart phone can receive token1 sent by the application server B, and obtain page 2 from the application server B through the token1, where the page 2 includes a control indicating to download the application B. The user A can click the control, when the smart phone detects that the user A clicks the control, the token1 is encrypted to obtain encrypted data, the quick login identification is obtained, and the quick login identification and the encrypted data are spliced to obtain spliced data. The smart phone can write the splicing data into the clipboard and download the application B through an application market or an application center. After downloading the application B is finished, the smartphone may automatically install the application B or install the application B by the user a using the smartphone. After the application B is installed, when the starting operation of the application B is detected, the smart phone can read the splicing data from the clipboard, and obtain the encrypted data through the splicing data, so that token2 (corresponding to the second login certificate) is obtained from the application server B according to the encrypted data, and the token2 is used for accessing the server in the application B. Here, as shown in fig. 1a to 1B, after the application B is installed, an installation button included in a download interface of the user terminal may be changed into an open button, the user a may click the open button, and the smartphone may detect a touch operation on the open button, where the touch operation on the open button is a start operation on the application B.
In yet another application scenario, the link address 1 may also be displayed in the smartphone in other ways. Page 1 may also be obtained from the server by other means. After receiving the token1 sent by the application server B, the user terminal may also obtain other pages from the server through the token1, where the other pages may display some services, such as some services provided by the application B, so that the user a experiences. After the application B is installed, the smart phone can display the icon of the application B on the system desktop, the user can quit the downloading interface, the icon of the application B displayed on the system desktop is clicked, the smart phone can detect the clicking operation of the icon of the application B, and the clicking operation of the icon of the application B is the starting operation of the application B.
It should be noted that the above is only an example of a scenario, and the application login scheme may also be used in other scenarios, which are not listed here.
Referring to fig. 2, a flowchart of an application login method provided in the embodiment of the present application is schematically shown. The method may be applied to the aforementioned user terminal. Specifically, the method may comprise the steps of:
s201, displaying a first function page.
The first function page may be a login page. The first function page may include a user information input box and a login button, and the login mode may be an account password login mode, which is not limited herein.
In an embodiment, when the first function page is a login page, before the first function page is displayed, the user terminal may display a registration page, where the registration page includes a user information input box and a registration button, and the registration mode may be an account password registration mode. In an application scenario, a user can input registration information based on a registration page and send a registration request to a server, the server performs user registration according to the registration request, and after the registration is successful, returns a login page to a user terminal, and the user terminal displays the login page.
In one embodiment, the first function page may be a login registration page. The first function page may include a user information input box and a login registration button. The login mode may be a secret-free login registration mode of the mobile phone, and the like, which is not limited herein.
In one embodiment, the user terminal may scan the target two-dimensional code image and send an access request for the first function page to the server according to the target two-dimensional code image, so that the server returns the first function page to the user terminal in response to the access request for the first function page, and the user terminal displays the first function page.
In one embodiment, the user terminal may scan the target two-dimensional code image into a third functional page, where the third functional page does not belong to the target application. When the user terminal detects a touch operation, such as a click operation, on the target control on the third function interface, the user terminal sends an access request for the first function page to the server, so that the server responds to the access request for the first function page and returns the first function page to the user terminal, and the user terminal displays the first function page.
In one embodiment, the user terminal may send an access request for the first function page to the server when detecting a touch operation, such as a click operation, on the target link address, so that the server returns the first function page to the user terminal in response to the access request for the first function page, and the user terminal displays the first function page.
In one embodiment, the user terminal may send an access request for the third function page to the server when detecting a touch operation on the target link address, so that the server returns the third function page to the user terminal in response to the access request for the third function page, and the user terminal displays the third function page. When the user terminal detects a touch operation, such as a click operation, on the target control on the third function interface, the user terminal sends an access request for the first function page to the server, so that the server responds to the access request for the first function page and returns the first function page to the user terminal, and the user terminal displays the first function page.
In one embodiment, the aforementioned third function page may be a page displaying one or more services of the target application, and/or the aforementioned third function page may be the aforementioned registration page.
S202, sending a login request to a server through the first function page, so that the server generates a first login credential after the login request is verified.
In the embodiment of the application, the user terminal can send the login request to the server through the first function page, and the server can receive the login request and verify the login request. The server may generate a first login credential after the login request is authenticated.
In one embodiment, the user terminal may send a login request to the server after detecting a click operation on a login button, where the login request carries user information input based on the user information input box. The server may generate a first login credential after the login information is verified, and send the first login credential to the user terminal.
In one embodiment, the user terminal may send a login registration request to the server after detecting a click operation on a login registration button, where the login registration request carries user information input based on the user information input box. The server may generate a first login credential after the user information is verified, and send the first login credential to the user terminal.
S203, receiving the first login credential sent by the server, and obtaining a second function page from the server through the first login credential, wherein the second function page comprises a control for indicating downloading of a target application, and the first function page and the second function page do not belong to the target application.
Wherein, the control can be presented in the form of a button and the like.
In one embodiment, the control may display "download". And/or the control may display the name of the target application.
In one embodiment, the second function page may also display guidance information that may be used to guide or attract a user to download the target application. The guidance information may include information such as a function profile for the target application or a promotion for the target application.
In the embodiment of the application, the user terminal can send an access request to the second function page to the server, and the access request to the second function page carries the first login credential. The server may verify the first login credential after receiving the access request for the second function page, and return the second function page to the user terminal in response to the access request for the second function page after the verification is passed. The user terminal may display a second function page.
In one embodiment, the user terminal may display a fourth function page including a button indicating opening of the target application. The fourth function page does not belong to the target application. After detecting the touch operation, such as a click operation, on the button, the user terminal inquires whether a target application is installed, and after confirming that the target application is not installed, sends an access request for the second function page to the server, wherein the access request for the second function page carries the first login credential. And after the server receives the access request to the second function page, the server verifies the first login certificate, and after the first login certificate is verified, the server returns the second function page to the user terminal in response to the access request to the second function page. The user terminal may display a second function page.
S204, when the touch operation on the control is detected, the first login certificate is encrypted to obtain encrypted data.
In the embodiment of the application, the user terminal encrypts the first login credential to obtain the encrypted data in the following manner: and the user terminal encrypts the first login credential to obtain an encrypted character string, and determines the encrypted character string as encrypted data. The reason why the data are encrypted is that if the data are not encrypted and stored in the clipboard directly, the data in the clipboard are visible and operable to the user, and if the user carelessly leaks or other people illegally obtain the data in the clipboard, illegal persons can use the data directly to pretend to be the user to log in the server, which leads to unnecessary economic loss of the user or other people.
In the embodiment of the application, the method for the user terminal to encrypt the first login credential to obtain the encrypted character string may be as follows: and the user terminal encrypts the first login certificate by using the encryption key to obtain an encrypted character string. The encryption key may be obtained locally by the user terminal or obtained from the server by the user terminal. In one embodiment, the user terminal may obtain an encryption key from a server when a touch operation on the control (which is a control instructing to download the target application) is detected, and encrypt the first login credential by using the encryption key. Obtaining the encryption key from the server has the following advantages: the whole interaction process is safer, and safe production accidents are not caused after the secret key stored in the client is leaked.
S205, acquiring a quick login identifier, and splicing the quick login identifier and the encrypted data to obtain spliced data.
In the embodiment of the application, the user terminal can obtain the quick login identification, and the quick login identification and the encrypted data are spliced according to the specified data format to obtain spliced data. Therefore, the reason why the shortcut login identification and the encrypted data are spliced is that under the condition that a large amount of data exists in the clipboard, the spliced data can be quickly and efficiently identified from the large amount of data through the shortcut login identification after the second application is installed.
For example, assume a first token, as follows:
{
"token":"xxxxxxxx"
}
and, assume that the encrypted data is a 32-bit string, as follows:
yyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyy
the user terminal can splice the quick login identifier fastlogin/and the 32-bit string according to the specified data format to obtain spliced data as follows:
fastlogin://yyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyy。
and S206, writing the spliced data into a clipboard, and downloading the target application through an application management platform.
In the embodiment of the application, the user terminal can write the splicing data into a clipboard of the user terminal and download the target application through the application management platform. The application management platform can provide functions such as downloading functions of one or more applications. For example, when the target application is a target APP, the application management platform may be an application market, an application center, an application store, or the like. When the target application is a target applet, the application management platform may be an applet management platform or the like.
And S207, after the target application is installed, when the starting operation of the target application is detected, reading the splicing data from the clipboard, and acquiring the encrypted data through the splicing data.
In the embodiment of the application, after the target application is installed, when the starting operation of the target application is detected, the user terminal can analyze at least one datum in the clipboard; and when the data comprising the quick login identification are analyzed, determining that the data comprising the quick login identification are spliced data. The user terminal can read the encrypted data from the clipboard, determine the character string after the shortcut login identification in the spliced data as the encrypted data, and then acquire the encrypted data.
S208, acquiring a second login credential from the server by using the encrypted data, and accessing the server by using the second login credential in the target application.
In the embodiment of the application, the user terminal can acquire the second login credential from the server by using the encrypted data, and access the server by using the second login credential in the target application.
In one embodiment, when the encrypted data is an encrypted character string, the manner in which the user terminal obtains the second login credential from the server by using the encrypted data may be as follows: the user terminal decrypts the encrypted data to obtain a first login credential and sends the first login credential to the server, so that the server generates a second login credential after the first login credential is authenticated; and the user terminal receives the second login certificate sent by the server. The user terminal can obtain the decryption key and decrypt the encrypted data by using the decryption key.
In one embodiment, when the encrypted data is an encrypted character string, the manner in which the user terminal obtains the second login credential from the server by using the encrypted data may be as follows: the user terminal sends the encrypted data to the server so that the server can decrypt the encrypted data to obtain a first login credential, and generates a second login credential after the first login credential passes authentication; and the user terminal receives the second login credential sent by the server. The server may obtain the decryption key and perform decryption processing on the encrypted data using the decryption key.
In one embodiment, the user terminal may also obtain an expiration time of the first login credential. The user terminal encrypts the first login credential to obtain encrypted data in the following manner: and the user terminal encrypts the first login certificate and the expiration time of the first login certificate to obtain an encrypted character string, and determines the encrypted character string as encrypted data. Specifically, the user terminal may encrypt the first login credential and the expiration time of the first login credential with the encryption key.
In an embodiment, the user terminal may further obtain the channel number, and accordingly, the user terminal encrypts the first login credential and the expiration time of the first login credential to obtain the encrypted data in the following manner: and the user terminal encrypts the first login certificate and the channel number to obtain an encrypted character string, and determines the encrypted character string as encrypted data. Specifically, the user terminal may encrypt the first login credential and the channel number using the encryption key. The channel number is used to indicate the source of the login request, and here, the user terminal may obtain the locally stored channel number.
In one embodiment, when the encrypted data is an encrypted character string and the encrypted character is obtained by encrypting the first login credential and the expiration time of the first login credential, the manner in which the user terminal obtains the second login credential from the server by using the encrypted data may be as follows: the user terminal decrypts the encrypted data to obtain a first login credential and expiration time of the first login credential, and when determining that the first login credential is not expired according to the expiration time of the first login credential, the user terminal sends the first login credential to the server so that the server generates a second login credential after authenticating the first login credential; and the user terminal receives the second login certificate sent by the server. The user terminal can decrypt the encrypted data by using the decryption key.
In one embodiment, when the encrypted data is an encrypted character string and the encrypted character is obtained by encrypting the first login credential and the expiration time of the first login credential, the manner in which the user terminal obtains the second login credential from the server by using the encrypted data may be as follows: the user terminal sends the encrypted data to the server so that the server can decrypt the encrypted data to obtain a first login credential and the expiration time of the first login credential, and when the first login credential is determined to be unexpired according to the expiration time of the first login credential and the server is determined to have a login credential matched with the first login credential, the user terminal generates a second login credential after the first login credential is authenticated; and the user terminal receives the second login certificate sent by the server.
In an embodiment, when the encrypted data is an encrypted character string and the encrypted character is obtained by encrypting according to the first login credential and the channel number, the manner of the user terminal obtaining the second login credential from the server by using the encrypted data may be as follows: the user terminal decrypts the encrypted data to obtain a first login certificate and a channel number, and sends the first login certificate and the channel number to the server, so that the server performs user identity authentication according to a verification rule corresponding to the channel number after the first login certificate passes authentication, and generates a second login certificate after the user identity authentication passes; and the user terminal receives the second login certificate sent by the server. In one embodiment, the difficulty level of the verification rule may be determined according to the credibility corresponding to the channel number, for example, the higher the credibility corresponding to the channel number, the simpler the verification rule.
In an embodiment, when the encrypted data is an encrypted character string and the encrypted character is obtained by encrypting according to the first login credential and the channel number, the manner of the user terminal obtaining the second login credential from the server by using the encrypted data may be as follows: the user terminal sends the encrypted data to the server so that the server can decrypt the encrypted data to obtain a first login certificate and a channel number, and when the first login certificate is determined to be unexpired according to the expiration time of the first login certificate and the server is determined to have a login certificate matched with the first login certificate, after the first login certificate is authenticated, user identity authentication is carried out according to a verification rule corresponding to the channel number, and after the user identity authentication is passed, a second login certificate is generated; and the user terminal receives the second login certificate sent by the server.
It can be seen that, in the embodiment shown in fig. 2, the user terminal may send a login request to the server through the first function page, so that the server generates the first login credential after the login request is verified; the user terminal receives a first login certificate sent by the server, and acquires a second function page from the server through the first login certificate, wherein the second function page comprises a control for indicating downloading of a target application; when the user terminal detects touch operation on the control, the first login certificate is encrypted to obtain encrypted data, a quick login identifier is obtained, and the quick login identifier and the encrypted data are spliced to obtain spliced data; the user terminal writes the splicing data into the shear plate, downloads the target application through the application management platform, reads the splicing data from the shear plate when the starting operation of the target application is detected after the target application is installed, acquires the encrypted data through the splicing data, acquires a second login certificate from the server through the encrypted data, and accesses the server through the second login certificate in the target application. By adopting the method and the device, the rapid login between different product forms, such as H5 and APP, can be realized, so that the operation breakpoints of the user are effectively avoided, and the user loss rate is reduced.
Referring to fig. 3, a flowchart of an application login method according to still another embodiment of the present application is shown. The method may be applied to the aforementioned user terminal. Specifically, the method may comprise the steps of:
s301, displaying a first function page;
s302, a login request is sent to a server through the first function page, so that the server generates a first login credential after the login request is verified to be passed.
S303, receiving the first login credential sent by the server, and obtaining a second function page from the server through the first login credential, wherein the second function page comprises a control for indicating downloading of a target application, and the first function page and the second function page do not belong to the target application.
Steps S301 to S303 can refer to steps S201 to S203 in the embodiment of fig. 2, which are not described herein again.
S304, when touch operation on the control is detected, a channel number and the expiration time of the first login certificate are obtained, the first login certificate, the channel number and the expiration time of the first login certificate are encrypted, an encrypted character string is obtained, the encrypted character string is determined to be encrypted data, and the channel number represents the source of the login request.
For example, the first login credential, the channel number, the expiration time of the first login credential, are as follows:
{
"token":"xxxxxxxx",
"channel":"H5",
"expire_time":"2021-05-25 23:59:59"
}
s305, acquiring a quick login identifier, and splicing the quick login identifier and the encrypted data to obtain spliced data.
S306, writing the splicing data into the clipboard, and downloading the target application through the application management platform.
S307, after the target application is installed, when the starting operation of the target application is detected, reading the splicing data from the clipboard, and acquiring the encrypted data through the splicing data.
Step S305 to step S307 can refer to step S205 to step S207 in the embodiment of fig. 2, which is not described herein again.
S308, decrypting the encrypted data to obtain the first login certificate, the channel number and the expiration time of the first login certificate.
S309, when the first login credential is determined to be not expired according to the expiration time of the first login credential, sending the first login credential and the channel number to the server, so that the server performs user identity authentication according to a check rule corresponding to the channel number after passing the authentication of the first login credential, and generates a second login credential after passing the user identity authentication.
S310, receiving the second login credential sent by the server.
S311, the server is accessed in the target application by utilizing the second login credential.
In steps S308 to S311, the user terminal may decrypt the encrypted data to obtain the first login credential, the channel number, and the expiration time of the first login credential, and when it is determined that the first login credential is not expired according to the expiration time of the first login credential, send the first login credential and the channel number to the server, so that the server performs user identity authentication according to the verification rule corresponding to the channel number after passing the authentication of the first login credential, and generates the second login credential after passing the user identity authentication. The user terminal can receive the second login credential sent by the server and access the server by using the second login credential in the target application. The process can effectively ensure the effectiveness and the safety of the login process.
In one embodiment, the user terminal may send the encrypted data to the server, so that the server decrypts the encrypted data to obtain the first login credential, the channel number, and the expiration time of the first login credential, and when it is determined that the first login credential is not expired according to the expiration time of the first login credential and when it is determined that the server stores a login credential matching the first login credential, after it is determined that the first login credential passes authentication, performs user identity authentication according to a check rule corresponding to the channel number, so as to generate the second login credential after the user identity authentication passes. The user terminal can receive the second login credential sent by the server and access the server by using the second login credential in the target application. The process can effectively ensure the effectiveness and the safety of the login process.
In one embodiment, the aforementioned encrypted data may be an encrypted image in addition to the encrypted character string. Specifically, the way for the user terminal to encrypt the first login credential to obtain the encrypted data may be: and the user terminal encrypts the first login certificate to obtain an encrypted character string, converts the encrypted character string into an encrypted image and determines the encrypted image as encrypted data. In one embodiment, the manner of converting the encrypted character string into the encrypted image may be: and converting the encrypted character string into a binary code, and hiding the binary code into the target image to obtain the encrypted image. In one embodiment, when the encrypted data is an encrypted image, a specific process of acquiring the second login credential from the server by using the encrypted data may refer to a specific process of acquiring the second login credential from the server by using the encrypted data when the encrypted data is an encrypted character string. When the encrypted data is an encrypted image, the process of decrypting the encrypted data in the specific process of acquiring the second login certificate from the server by using the encrypted data is as follows: and acquiring the binary code according to the encrypted image, converting the binary code into an encrypted character string, and then decrypting the encrypted character string.
As can be seen, in the embodiment shown in fig. 3, the user terminal may encrypt the first login credential, the channel number, and the expiration time of the first login credential to obtain an encrypted character string, and then may perform a related verification operation according to the first login credential, the channel number, and the expiration time of the first login credential, so as to ensure validity and security of the application login process.
Please refer to fig. 4, which is a schematic diagram of a network architecture of an application login system according to an embodiment of the present application. The application login system includes a user terminal 10 and a server 20. Wherein:
the user terminal 10 may display the first function page and transmit a login request to the server 20 through the first function page. The server 20 may receive the login request sent by the user terminal 10, and generate the first login credential after the login request is authenticated, and send the first login credential to the user terminal 10. The user terminal 10 may receive the first login credential sent by the server 20, and obtain a second function page from the server 20 through the first login credential, where the second function page includes a control indicating downloading of the target application, and the first function page and the second function page do not belong to the target application. When the user terminal 10 detects a touch operation on the control, the first login credential is encrypted to obtain encrypted data, the quick login identifier is obtained, the quick login identifier and the encrypted data are spliced to obtain spliced data, the spliced data is written into the clipboard, and the target application is downloaded through the application management platform. After the target application is installed, when the starting operation of the target application is detected, the user terminal 10 reads the splicing data from the clipboard, and obtains the encrypted data through the splicing data. Thereafter, the user terminal 10 may acquire the second login credential from the server 20 using the encrypted data, and access the server 20 using the second login credential in the target application. By adopting the method and the device, rapid login between different product forms such as H5 and APP can be realized, so that the operation breakpoints of the user are effectively avoided, and the loss rate of the user is reduced.
For example, the target application may be a blockchain application, and the application management platform may be a blockchain application management platform.
Please refer to fig. 5, which is a schematic structural diagram of an application login apparatus according to an embodiment of the present application. The apparatus may be applied to the aforementioned user terminal. Specifically, the apparatus may include:
the display module 501 is configured to display a first function page.
The communication module 502 is configured to send a login request to a server through the first function page, so that the server generates a first login credential after the login request is verified.
The communication module 502 is further configured to receive the first login credential sent by the server, and obtain a second function page from the server through the first login credential, where the second function page includes a control indicating to download a target application, and the first function page and the second function page do not belong to the target application.
The processing module 503 is configured to, when the touch operation on the control is detected, encrypt the first login credential to obtain encrypted data.
And the splicing module 504 is configured to obtain a shortcut login identifier, and splice the shortcut login identifier and the encrypted data to obtain spliced data.
And the read-write module 505 is configured to write the splicing data into the clipboard.
A downloading module 506, configured to download the target application through the application management platform.
The processing module 503 is further configured to, after the target application is installed, when a start operation of the target application is detected, read the splicing data from the clipboard through the read-write module 505, and obtain the encrypted data through the splicing data.
The processing module 503 is further configured to obtain a second login credential from the server by using the encrypted data, and access the server by using the second login credential in the target application.
In an optional embodiment, the processing module 503 is further configured to parse at least one data in the clipboard before reading the splicing data from the clipboard; and when the data comprising the quick login identification is analyzed, determining that the data comprising the quick login identification is the splicing data.
In an optional implementation manner, the processing module 503 performs an encryption process on the first login credential to obtain encrypted data, specifically: encrypting the first login certificate to obtain an encrypted character string, and determining the encrypted character string as encrypted data; or, encrypting the first login certificate to obtain an encrypted character string, converting the encrypted character string into an encrypted image, and determining the encrypted image as encrypted data.
In an optional implementation manner, when the encrypted data is an encrypted character string, the processing module 503 obtains a second login credential from the server by using the encrypted data, specifically: decrypting the encrypted data to obtain the first login certificate; sending the first login credential to a server so that the server generates a second login credential after the first login credential passes authentication; and receiving the second login credential sent by the server.
In an optional implementation manner, when the encrypted data is an encrypted character string, the processing module 503 obtains a second login credential from the server by using the encrypted data, specifically: sending the encrypted data to the server so that the server can decrypt the encrypted data to obtain the first login credential, and generating a second login credential after the first login credential passes authentication; and receiving the second login credential sent by the server.
In an optional embodiment, the processing module 503 is further configured to obtain a channel number and an expiration time of the first login credential, where the channel number indicates a source of the login request; the processing module 503 encrypts the first login credential to obtain an encrypted character string, specifically: and encrypting the first login certificate, the channel number and the expiration time of the first login certificate to obtain an encrypted character string.
In an optional implementation manner, when the encrypted data is an encrypted character string, the processing module 503 obtains a second login credential from the server by using the encrypted data, specifically, decrypts the encrypted data, and obtains the first login credential, the channel number, and the expiration time of the first login credential; when the first login credential is determined to be not expired according to the expiration time of the first login credential, sending the first login credential and the channel number to the server, so that the server performs user identity authentication according to a check rule corresponding to the channel number after passing the authentication of the first login credential, and generates a second login credential after passing the user identity authentication; and receiving the second login credential sent by the server.
It can be seen that, in the embodiment shown in fig. 5, the application login device may send a login request to the server through the first function page, so that the server generates the first login credential after the login request is verified; the application login device receives a first login certificate sent by the server, and acquires a second function page from the server through the first login certificate, wherein the second function page comprises a control for indicating downloading of a target application; when the application login device detects touch operation on the control, the first login certificate is encrypted to obtain encrypted data, a quick login identifier is obtained, and the quick login identifier and the encrypted data are spliced to obtain spliced data; the application login device writes the splicing data into the clipboard, downloads the target application through the application management platform, reads the splicing data from the clipboard when the starting operation of the target application is detected after the target application is installed, obtains the encrypted data through the splicing data, further obtains a second login certificate from the server through the encrypted data, and accesses the server through the second login certificate in the target application. By adopting the method and the device, the rapid login between different product forms, such as H5 and APP, can be realized, so that the operation breakpoints of the user are effectively avoided, and the user loss rate is reduced.
Please refer to fig. 6, which is a schematic structural diagram of a ue according to an embodiment of the present disclosure. The user terminal described in this embodiment may include: one or more processors 1000 and memory 2000. The processor 1000 and the memory 2000 may be connected by a bus or the like. In one embodiment, the user terminal may further include a user interface (not shown), such as a display screen and a touch screen, wherein the display screen is used for interface display and the like, and the touch screen is used for touch sensing and the like. In one embodiment, the display screen and the touch screen may be replaced by a touch display screen, and in one embodiment, the user terminal may further include a network interface (not shown), which may be used to receive or transmit data and the like through a standard wired or wireless communication interface.
Processor 1000 may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic, discrete hardware components, etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The memory 2000 may be a high-speed RAM memory or a non-volatile memory (e.g., a disk memory). The memory 2000 is used for storing a set of program codes, and the processor 1000 may call the program codes stored in the memory 2000. Specifically, the method comprises the following steps:
a processor 1000 for displaying a first function page; sending a login request to a server through the first function page so that the server generates a first login credential after the login request is verified; receiving the first login credential sent by the server, and acquiring a second function page from the server through the first login credential, wherein the second function page comprises a control for indicating downloading of a target application, and the first function page and the second function page do not belong to the target application; when the touch operation on the control is detected, encrypting the first login certificate to obtain encrypted data; acquiring a quick login identifier, and splicing the quick login identifier and the encrypted data to obtain spliced data; writing the spliced data into a clipboard, and downloading the target application through an application management platform; after the target application is installed, when the starting operation of the target application is detected, reading the splicing data from the clipboard, and acquiring the encrypted data through the splicing data; and acquiring a second login credential from the server by using the encrypted data, and accessing the server by using the second login credential in the target application.
In one embodiment, the processor 1000 is further configured to parse at least one data in the clipboard before reading the splice data from the clipboard; and when the data comprising the quick login identification is analyzed, determining that the data comprising the quick login identification is the splicing data.
In an embodiment, the processor 1000 performs an encryption process on the first login credential to obtain encrypted data, which is specifically used for: encrypting the first login certificate to obtain an encrypted character string, and determining the encrypted character string as encrypted data; or, encrypting the first login credential to obtain an encrypted character string, converting the encrypted character string into an encrypted image, and determining the encrypted image as encrypted data.
In an embodiment, when the encrypted data is an encrypted character string, the processor 1000 obtains a second login credential from the server by using the encrypted data, and is specifically configured to: decrypting the encrypted data to obtain the first login certificate; sending the first login credential to a server so that the server generates a second login credential after the first login credential passes authentication; and receiving the second login credential sent by the server.
In an embodiment, when the encrypted data is an encrypted character string, the processor 1000 obtains a second login credential from the server by using the encrypted data, and is specifically configured to: sending the encrypted data to the server so that the server can decrypt the encrypted data to obtain the first login credential, and generating a second login credential after the first login credential passes authentication; and receiving the second login credential sent by the server.
In one embodiment, the processor 1000 is further configured to obtain a channel number and an expiration time of the first login credential, the channel number indicating a source of the login request.
In an embodiment, the processor 1000 performs an encryption process on the first login credential to obtain an encrypted character string, which is specifically configured to: and encrypting the first login certificate, the channel number and the expiration time of the first login certificate to obtain an encrypted character string.
In an embodiment, when the encrypted data is an encrypted character string, the processor 1000 obtains a second login credential from the server by using the encrypted data, and is specifically configured to: decrypting the encrypted data to obtain the first login certificate, the channel number and the expiration time of the first login certificate; when the first login credential is determined to be not expired according to the expiration time of the first login credential, sending the first login credential and the channel number to the server, so that the server performs user identity authentication according to a check rule corresponding to the channel number after passing the authentication of the first login credential, and generates a second login credential after passing the user identity authentication; and receiving the second login credential sent by the server.
In a specific implementation, the processor 1000 described in this embodiment of the present application may execute the implementation described in the embodiment of fig. 2 and the embodiment of fig. 3, and may also execute the implementation described in this embodiment of the present application, which is not described herein again.
The functional modules in the embodiments of the present application may be integrated into one processing module, or each module may exist alone physically, or two or more modules are integrated into one module. The integrated module can be realized in a form of sampling hardware, and can also be realized in a form of sampling software functional modules.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. The computer readable storage medium may be volatile or non-volatile. For example, the computer storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), or the like. The computer-readable storage medium may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function, and the like; the storage data area may store data created according to the use of the blockchain node, and the like.
The block chain is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism and an encryption algorithm. A block chain (Blockchain), which is essentially a decentralized database, is a series of data blocks associated by using a cryptographic method, and each data block contains information of a batch of network transactions, so as to verify the validity (anti-counterfeiting) of the information and generate a next block. The blockchain may include a blockchain underlying platform, a platform product service layer, an application service layer, and the like.
While the present invention has been described with reference to a preferred embodiment, it will be understood by those skilled in the art that various changes in form and detail may be made without departing from the spirit and scope of the invention.

Claims (8)

1. An application login method, comprising:
displaying a first function page;
sending a login request to a server through the first function page so that the server generates a first login credential after the login request is verified;
receiving the first login credential sent by the server, and acquiring a second function page from the server through the first login credential, wherein the second function page comprises a control for indicating downloading of a target application, and the first function page and the second function page do not belong to the target application;
when the touch operation on the control is detected, encrypting the first login certificate to obtain encrypted data;
acquiring a quick login identifier, and splicing the quick login identifier and the encrypted data to obtain spliced data;
writing the spliced data into a clipboard, and downloading the target application through an application management platform;
after the target application is installed, when the starting operation of the target application is detected, reading the splicing data from the clipboard, and acquiring the encrypted data through the splicing data;
acquiring a second login credential from the server by using the encrypted data, and accessing the server by using the second login credential in the target application;
the encrypted data is obtained by encrypting according to the first login certificate and a channel number, and the channel number represents the source of the login request; the obtaining a second login credential from the server using the encrypted data includes:
decrypting the encrypted data to obtain a first login credential and the channel number, and sending the first login credential and the channel number to a server, or sending the encrypted data to the server, and decrypting the encrypted data by the server to obtain the first login credential and the channel number, so that the server performs user identity authentication according to a verification rule corresponding to the channel number after passing the authentication of the first login credential, and generates a second login credential after passing the user identity authentication; the difficulty level of the check rule is determined according to the credibility corresponding to the channel number;
and receiving the second login credential sent by the server.
2. The method of claim 1, wherein prior to reading the splice data from the clipboard, the method further comprises:
parsing at least one datum in the clipboard;
and when the data comprising the quick login identification is analyzed, determining that the data comprising the quick login identification is the spliced data.
3. The method of claim 1, wherein said encrypting the first login credential to obtain encrypted data comprises:
encrypting the first login certificate to obtain an encrypted character string, and determining the encrypted character string as encrypted data; or the like, or, alternatively,
and encrypting the first login certificate to obtain an encrypted character string, converting the encrypted character string into an encrypted image, and determining the encrypted image as encrypted data.
4. The method of claim 3, further comprising:
acquiring a channel number and the expiration time of the first login certificate, wherein the channel number represents the source of the login request;
the encrypting the first login credential to obtain an encrypted character string includes:
and encrypting the first login certificate, the channel number and the expiration time of the first login certificate to obtain an encrypted character string.
5. The method according to claim 4, wherein when the encrypted data is an encrypted character string, the obtaining a second login credential from the server by using the encrypted data comprises:
decrypting the encrypted data to obtain the first login certificate, the channel number and the expiration time of the first login certificate;
when the first login credential is determined to be not expired according to the expiration time of the first login credential, sending the first login credential and the channel number to the server, so that the server performs user identity authentication according to a check rule corresponding to the channel number after passing the authentication of the first login credential, and generates a second login credential after passing the user identity authentication;
and receiving the second login credential sent by the server.
6. An application login apparatus, comprising:
the display module is used for displaying a first function page;
the communication module is used for sending a login request to a server through the first function page so that the server generates a first login credential after the login request is verified;
the communication module is further configured to receive the first login credential sent by the server, and obtain a second function page from the server through the first login credential, where the second function page includes a control indicating downloading of a target application, and the first function page and the second function page do not belong to the target application;
the processing module is used for encrypting the first login certificate to obtain encrypted data when the touch operation on the control is detected;
the splicing module is used for acquiring a quick login identifier and splicing the quick login identifier and the encrypted data to obtain spliced data;
the read-write module is used for writing the spliced data into the shear plate;
the downloading module is used for downloading the target application through the application management platform;
the processing module is further configured to, after the target application is installed, read the splicing data from the clipboard through the read-write module when a start operation of the target application is detected, and obtain the encrypted data through the splicing data;
the processing module is further configured to obtain a second login credential from the server by using the encrypted data, and access the server by using the second login credential in the target application;
the encrypted data is obtained by encrypting according to the first login certificate and a channel number, and the channel number represents the source of the login request; the processing module is specifically configured to, when obtaining the second login credential from the server by using the encrypted data:
decrypting the encrypted data to obtain a first login credential and the channel number, and sending the first login credential and the channel number to a server, or sending the encrypted data to the server, decrypting the encrypted data by the server to obtain the first login credential and the channel number, so that the server performs user identity authentication according to a verification rule corresponding to the channel number after passing the authentication of the first login credential, and generates a second login credential after passing the user identity authentication; the difficulty level of the check rule is determined according to the credibility corresponding to the channel number;
and receiving the second login credential sent by the server.
7. A user terminal comprising a processor and a memory, the processor and the memory being interconnected, wherein the memory is configured to store computer program instructions and the processor is configured to execute the program instructions to implement the method of any one of claims 1-5.
8. A computer-readable storage medium, having stored thereon computer program instructions, which, when executed by a processor, are adapted to perform the method of any one of claims 1-5.
CN202110916300.4A 2021-08-10 2021-08-10 Application login method and device, user terminal and storage medium Active CN113645239B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110916300.4A CN113645239B (en) 2021-08-10 2021-08-10 Application login method and device, user terminal and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110916300.4A CN113645239B (en) 2021-08-10 2021-08-10 Application login method and device, user terminal and storage medium

Publications (2)

Publication Number Publication Date
CN113645239A CN113645239A (en) 2021-11-12
CN113645239B true CN113645239B (en) 2022-10-28

Family

ID=78420627

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110916300.4A Active CN113645239B (en) 2021-08-10 2021-08-10 Application login method and device, user terminal and storage medium

Country Status (1)

Country Link
CN (1) CN113645239B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108322461A (en) * 2018-01-31 2018-07-24 百度在线网络技术(北京)有限公司 Method, system, device, equipment and the medium of application program automated log on
CN109815656A (en) * 2018-12-11 2019-05-28 平安科技(深圳)有限公司 Login authentication method, device, equipment and computer readable storage medium
CN110121894A (en) * 2017-01-16 2019-08-13 华为技术有限公司 A kind of method for down loading, device and the relevant device of signing information collection
CN112883361A (en) * 2021-01-29 2021-06-01 平安科技(深圳)有限公司 Function jump method and device of application program, computer equipment and storage medium

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090055642A1 (en) * 2004-06-21 2009-02-26 Steven Myers Method, system and computer program for protecting user credentials against security attacks

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110121894A (en) * 2017-01-16 2019-08-13 华为技术有限公司 A kind of method for down loading, device and the relevant device of signing information collection
CN108322461A (en) * 2018-01-31 2018-07-24 百度在线网络技术(北京)有限公司 Method, system, device, equipment and the medium of application program automated log on
CN109815656A (en) * 2018-12-11 2019-05-28 平安科技(深圳)有限公司 Login authentication method, device, equipment and computer readable storage medium
CN112883361A (en) * 2021-01-29 2021-06-01 平安科技(深圳)有限公司 Function jump method and device of application program, computer equipment and storage medium

Also Published As

Publication number Publication date
CN113645239A (en) 2021-11-12

Similar Documents

Publication Publication Date Title
US9741033B2 (en) System and method for point of sale payment data credentials management using out-of-band authentication
US20180295121A1 (en) Secure element authentication
US20220209951A1 (en) Authentication method, apparatus and device, and computer-readable storage medium
TR201810238T4 (en) The appropriate authentication method and apparatus for the user using a mobile authentication application.
CN111353903B (en) Network identity protection method and device, electronic equipment and storage medium
US10045210B2 (en) Method, server and system for authentication of a person
KR20170129866A (en) Automated demonstration of device integrity using block chains
KR20180017734A (en) System and method for authentication, user terminal, authentication server and service server for executing the same
US20140137206A1 (en) Password-free, token-based wireless access
CN112039826B (en) Login method and device applied to applet end, electronic equipment and readable medium
EP2690840B1 (en) Internet based security information interaction apparatus and method
CN111628871B (en) Block chain transaction processing method and device, electronic equipment and storage medium
CN111092719B (en) Label data refreshing method and system, payment method and system
CN113553572A (en) Resource information acquisition method and device, computer equipment and storage medium
CN111200593A (en) Application login method and device and electronic equipment
CN111783049A (en) User information processing method and system based on block chain
US10972465B1 (en) Secure authentication through visual codes containing unique metadata
JP2018530054A (en) Payment authentication method and apparatus for mobile terminal and mobile terminal
CN109740319B (en) Digital identity verification method and server
CN114363088A (en) Method and device for requesting data
CN112202794A (en) Transaction data protection method and device, electronic equipment and medium
EP3410332B1 (en) A system and method for transferring data to an authentication device
CN113645239B (en) Application login method and device, user terminal and storage medium
CN115378609A (en) Electronic certificate display method, verification method, terminal and server
CN112995160B (en) Data decryption system and method, terminal, server and non-transient storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant