CN113722687A - Application software login method, device, medium and equipment - Google Patents

Application software login method, device, medium and equipment Download PDF

Info

Publication number
CN113722687A
CN113722687A CN202111004549.4A CN202111004549A CN113722687A CN 113722687 A CN113722687 A CN 113722687A CN 202111004549 A CN202111004549 A CN 202111004549A CN 113722687 A CN113722687 A CN 113722687A
Authority
CN
China
Prior art keywords
application software
login
target application
data
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111004549.4A
Other languages
Chinese (zh)
Inventor
王有国
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Kangjian Information Technology Shenzhen Co Ltd
Original Assignee
Kangjian Information Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Kangjian Information Technology Shenzhen Co Ltd filed Critical Kangjian Information Technology Shenzhen Co Ltd
Priority to CN202111004549.4A priority Critical patent/CN113722687A/en
Publication of CN113722687A publication Critical patent/CN113722687A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2133Verifying human interaction, e.g., Captcha

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The application relates to artificial intelligence, and provides an application software login method, device, medium and equipment, wherein the method comprises the following steps: sending an opening request of target application software to a server through a terminal; the terminal receives an opening instruction returned by the server according to the opening request, and opens a login interface of the target application software according to the opening instruction; receiving a login instruction generated by the server according to the login request to acquire historical login data corresponding to the target application software; and calling a verification code interface to obtain verification data corresponding to the historical login data, and automatically filling the historical login data and the verification data corresponding to the historical login data into the login interface so as to log in the target application software. When the target application software is logged in, the historical login data and the verification code are automatically detected, and the historical login data and the verification code are automatically filled in the login interface of the target application software to complete automatic login, so that the login time is saved.

Description

Application software login method, device, medium and equipment
Technical Field
The invention relates to the field of artificial intelligence, in particular to a method, a device, a medium and equipment for logging in application software.
Background
With the development of terminal technology, users can conveniently use client software of various operators through devices such as personal computers, mobile phones and IPADs. Some client software is not used frequently, so that the client software is uninstalled after being used. When the corresponding client software is uninstalled, the historical login data of the client software is deleted. If the user needs to install the same client software on the same device again, the login data still needs to be input again when the user logs in the corresponding client, and the use is inconvenient. Further, as the amount of login data used increases, the memory burden on the user increases, so that the user takes a lot of time to re-login each time.
Disclosure of Invention
The invention provides an application software login method, device, medium and equipment, and mainly aims to call corresponding historical login data and verification data to complete automatic login in the subsequent installation and login process, save login time and simplify login operation flow.
In order to achieve the above object, the present invention provides an application software login method, including:
sending an opening request of target application software to a server through a terminal;
the terminal receives an opening instruction returned by the server according to the opening request, and responds to the opening instruction to open a login interface of the target application software;
judging whether the target application software is legal application software or not, and if the target application software is the legal application software, sending a login request to the server;
receiving a login instruction generated by the server according to the login request, and responding to the login instruction to obtain historical login data corresponding to the target application software;
calling a verification code interface to obtain verification data corresponding to the historical login data;
and automatically filling the historical login data and the verification data corresponding to the historical login data into the login interface, and logging in the target application software through the historical login data and the verification data corresponding to the historical login data.
Optionally, the sending, by the terminal, the request for opening the target application software to the server includes:
receiving touch operation of a user in a display area where the target application software is located;
and judging whether the touch operation is a preset touch operation.
And if the touch operation is a preset touch operation, sending an opening request of the target application software to a server.
Optionally, acquiring first position information of the current position of the terminal and second position information of the terminal when the target application software is logged in for the first time;
calculating a position difference value between the first position information and the second position information, and determining whether to send a login request to the server according to the position difference value and a position difference value threshold value;
and if the position difference value is smaller than the set position difference value threshold, sending a login request to the server.
Optionally, the sending a login request to the server includes:
acquiring a first communication network currently connected with the terminal and a second communication network connected with the terminal when the terminal logs in the target application software for the first time;
judging whether the first communication network and the second communication network are the same communication network;
and when the first communication network and the second communication network are the same communication network, sending a login request to the server.
Optionally, the determining whether the target application software is a valid application software includes:
sending an authentication request to a server, wherein the authentication request comprises: an application software identifier;
receiving a verification result returned by the server after verifying the target application software according to the verification request, wherein the verification result comprises verification passing or verification failing;
when the verification result is that the verification is passed, the target application software is legal application software; and when the verification result is that the verification is not passed, the target application software is illegal application software.
Optionally, in the step of obtaining historical login data corresponding to the target application software in response to the login instruction, if historical login data corresponding to the target application software does not exist in the terminal, obtaining current login data of a current user through the login interface, and generating corresponding verification data; uploading the current login data and the current verification data through the login interface to log in the target application software; storing the current login data and the authentication data of the current user in the terminal.
Optionally, in the step of obtaining historical login data corresponding to the target application software in response to the login instruction, if a plurality of pieces of historical login data corresponding to the target application software exist in the terminal, the plurality of pieces of historical login data are displayed, and the target login data are determined from the plurality of pieces of historical login data according to a selection instruction.
In order to achieve the above object, the present invention provides an application software registration apparatus, including:
the request sending module is used for sending an opening request of the target application software to the server;
the first receiving module is used for receiving an opening instruction returned by the server according to the opening request and responding to the opening instruction to open a login interface of the target application software;
the judging module is used for judging whether the target application software is legal application software or not, and if the target application software is the legal application software, sending a login request to the server;
the second receiving module is used for receiving a login instruction generated by the server according to the login request and responding to the login instruction to acquire historical login data corresponding to the target application software;
the interface calling module is used for calling a verification code interface to obtain verification data corresponding to the historical login data;
and the filling module is used for automatically filling the historical login data and the verification data corresponding to the historical login data into the login interface, and logging in the target application software through the historical login data and the verification data corresponding to the historical login data.
In order to achieve the above object, the present invention provides a computer device, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, wherein the processor implements the steps of the above application software login method when executing the computer program.
To achieve the above object, the present invention provides a computer-readable storage medium having a computer program stored thereon, wherein the computer program is executed by a processor to implement the steps of the application software login method.
As described above, the application software login method, device, medium and apparatus provided by the present invention have the following beneficial effects:
the invention discloses an application software login method, which comprises the following steps: sending an opening request of target application software to a server through a terminal; the terminal receives an opening instruction returned by the server according to the opening request, and opens a login interface of the target application software according to the opening instruction; whether the target application software is legal or not is judged, and the legality of the application software is judged, so that automatic login of part of application software is avoided, and the safety of an application software account is improved; if the application software is legal, sending a login request to the server; receiving a login instruction generated by the server according to the login request to acquire historical login data corresponding to the target application software; and calling a verification code interface to obtain verification data corresponding to the historical login data, automatically filling the historical login data and the verification data corresponding to the historical login data into the login interface, and logging in the target application software through the historical login data and the verification data corresponding to the historical login data. When the target application software is logged in, whether the historical login data corresponding to the target application software exists in the terminal or not is automatically detected, if yes, the corresponding verification code is called, and the historical login data and the verification code are automatically filled into a login interface of the target application software to complete automatic login, so that login time is saved, and a login operation process is simplified.
Drawings
FIG. 1 is a schematic diagram of an application environment of an application software login method according to an embodiment of the present invention;
FIG. 2 is a flowchart of an application login method according to an embodiment of the present invention;
FIG. 3 is a flowchart of a method for sending an open request of target application software to a server through a terminal according to an embodiment of the present invention;
FIG. 4 is a flowchart of a method for determining whether the target application is a valid application according to an embodiment of the present invention;
FIG. 5 is a flowchart of a method for sending a login request to the server according to an embodiment of the present invention;
FIG. 6 is a flowchart of a method for sending a login request to the server according to another embodiment of the present invention;
fig. 7 is a block diagram of an application software login apparatus according to an embodiment of the present invention.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
The invention provides an application software login method which is applied to an electronic device 1. Fig. 1 is a schematic diagram of an application environment of an application software login method according to an embodiment of the present invention.
In the present embodiment, the electronic device 1 may be a terminal device having an arithmetic function, such as a smart phone, a tablet computer, a portable computer, and a desktop computer.
The electronic device 1 includes: a processor 12, a memory 11, an imaging device 13, a network interface 14, and a communication bus 15.
The memory 11 includes at least one type of readable storage medium. The at least one type of readable storage medium may be a non-volatile storage medium such as a flash memory, a hard disk, a multimedia card, a card-type memory 11, and the like. In some embodiments, the readable storage medium may be an internal storage unit of the electronic apparatus 1, such as a hard disk of the electronic apparatus 1. In other embodiments, the readable storage medium may also be an external memory 11 of the electronic device 1, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, which are provided on the electronic device 1.
In the present embodiment, the readable storage medium of the memory 11 is generally used for storing the application software registration program 10 and the like installed in the electronic device 1. The memory 11 may also be used to temporarily store data that has been output or is to be output.
The processor 12 may be a Central Processing Unit (CPU), microprocessor or other data Processing chip in some embodiments, and is used for executing program codes stored in the memory 11 or Processing data, such as executing the application software login program 10.
The imaging device 13 may be a part of the electronic device 1 or may be independent of the electronic device 1. In some embodiments, the electronic device 1 is a terminal device having a camera, such as a smart phone, a tablet computer, a portable computer, and the like, and then the camera 13 is the camera of the electronic device 1. In other embodiments, the electronic device 1 may be a server, and the camera 13 is independent from the electronic device 1 and connected to the electronic device 1 through a network, for example, the camera 13 is installed in a specific location, such as an office or a monitoring area, and captures a real-time image of a target entering the specific location in real time, and transmits the captured real-time image to the processor 12 through the network.
The network interface 14 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface), and is typically used to establish a communication link between the electronic apparatus 1 and other electronic devices.
The communication bus 15 is used to realize connection communication between these components.
Fig. 1 only shows the electronic device 1 with components 11-15, but it is to be understood that not all of the shown components are required to be implemented, and that more or fewer components may alternatively be implemented.
Optionally, the electronic device 1 may further include a user interface, the user interface may include an input unit such as a Keyboard (Keyboard), a voice input device such as a microphone (microphone) or other equipment with a voice recognition function, a voice output device such as a sound box, a headset, etc., and optionally the user interface may further include a standard wired interface, a wireless interface.
Optionally, the electronic device 1 may further comprise a display, which may also be referred to as a display screen or a display unit. In some embodiments, the display device may be an LED display, a liquid crystal display, a touch-sensitive liquid crystal display, an Organic Light-Emitting Diode (OLED) touch device, or the like. The display is used for displaying information processed in the electronic apparatus 1 and for displaying a visualized user interface.
Optionally, the electronic device 1 further comprises a touch sensor. The area provided by the touch sensor for the user to perform touch operation is called a touch area. Further, the touch sensor described herein may be a resistive touch sensor, a capacitive touch sensor, or the like. The touch sensor may include not only a contact type touch sensor but also a proximity type touch sensor. Further, the touch sensor may be a single sensor, or may be a plurality of sensors arranged in an array, for example.
The area of the display of the electronic device 1 may be the same as or different from the area of the touch sensor. Optionally, a display is stacked with the touch sensor to form a touch display screen. The device detects touch operation triggered by a user based on the touch display screen.
Optionally, the electronic device 1 may further include a Radio Frequency (RF) circuit, a sensor, an audio circuit, and the like, which are not described herein again.
The application is operational with numerous general purpose or special purpose computing system environments or configurations. For example: personal computers, server computers, hand-held or portable devices, tablet-type devices, multiprocessor systems, microprocessor-based systems, set top boxes, programmable consumer electronics, network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above systems or devices, and the like. The application may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The application may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
In the embodiment shown in fig. 1, the memory 11, which is a machine-readable medium, may include an operating system, and an application software login program 10; the processor 12, when executing the application software login program 10 stored in the memory 11, executes the steps of the application software login method as shown in fig. 2:
s20, sending an opening request of the target application software to the server through the terminal;
s21, the terminal receives an opening instruction returned by the server according to the opening request, and opens the login interface of the target application software according to the opening instruction;
s22, judging whether the target application software is legal application software, if so, sending a login request to the server;
s23, receiving a login instruction generated by the server according to the login request to obtain historical login data corresponding to the target application software;
and S24, calling a verification code interface to obtain verification data corresponding to the historical login data, automatically filling the historical login data and the verification data corresponding to the historical login data into the login interface, and logging in the target application software through the historical login data and the verification data corresponding to the historical login data.
Therefore, the application software login method of the invention sends the opening request of the target application software to the server through the terminal; the terminal receives an opening instruction returned by the server according to the opening request, and opens a login interface of the target application software according to the opening instruction; whether the target application software is legal or not is judged, and the legality of the application software is judged, so that automatic login of part of application software is avoided, and the safety of an application software account is improved; if the application software is legal, sending a login request to the server; receiving a login instruction generated by the server according to the login request to acquire historical login data corresponding to the target application software; and calling a verification code interface to obtain verification data corresponding to the historical login data, automatically filling the historical login data and the verification data corresponding to the historical login data into the login interface, and logging in the target application software through the historical login data and the verification data corresponding to the historical login data. When the target application software is logged in, whether the historical login data corresponding to the target application software exists in the terminal or not is automatically detected, if yes, the corresponding verification code is called, and the historical login data and the verification code are automatically filled into a login interface of the target application software to complete automatic login, so that login time is saved, and a login operation process is simplified. The historical login data is stored in the installation catalog of the non-application software when the target application software is logged in for the first time, so that the corresponding historical login data cannot be deleted when the target application software is uninstalled. If the target application software is reinstalled on the same device, the corresponding historical login data can still be used.
In step S20, an open request of the target application software is sent to the server through the terminal;
the target Application software refers to APP-Application, and may specifically exist in an intelligent terminal (specifically, a smartphone).
The server may be an independent server, or may be a cloud server that provides basic cloud computing services such as a cloud service, a cloud database, cloud computing, a cloud function, cloud storage, a Network service, cloud communication, a middleware service, a domain name service, a security service, a Content Delivery Network (CDN), and a big data and artificial intelligence platform.
In one embodiment, as shown in fig. 3, sending an open request of target application software to a server through a terminal includes:
s301, receiving touch operation of a user in a display area where the target application software is located;
the preset touch operation may be an operation of pressing the display area where the target application software is located with a finger of a user for a long time, an operation of drawing a circle in the display area where the target application software is located with the finger of the user, and an operation of clicking the display area where the target application software is located with the finger of the user for multiple times. The following description will be made by taking two types of the preset touch operations as examples.
The operation that the user presses the display area where the target application software is located with fingers for a long time is defined as a first touch operation; and defining the operation of drawing a circle in the display area where the target application software is positioned by the finger of the user as a second touch operation.
S302, judging whether the touch operation is a preset touch operation;
specifically, the determining whether the preset touch operation is a first touch operation includes: and determining whether the duration of the first touch operation staying in the display area where the target application software is located exceeds a preset value. The preset value may be 1 second, 2 seconds, or other time duration. For example, after the duration of the first touch operation staying in the display area where the target application software is located exceeds 2 seconds, the preset touch operation is the first touch operation.
Specifically, the determining whether the preset touch operation is a second touch operation includes: and determining whether an operation track formed by the second touch operation in a display area where the target application software is located is a closed coil. The closed coil may be an ellipse, a rectangle, or other closed coils. For example, when the user finger draws an elliptical coil in the display area where the target application software is located, the preset touch operation is a second touch operation.
And S303, if the touch operation is a preset touch operation, sending an opening request of the target application software to a server.
In the embodiment, a touch operation of a user in a display area where the target application software is located is received; judging whether the touch operation is a preset touch operation or not; and if the touch operation is a preset touch operation, sending an opening request of the target application software to a server. The terminal can send the opening request of the target application software to the server only when the touch operation of the user is the preset touch operation, so that the safety of the software is improved.
In step S21, the terminal receives an open instruction returned by the server according to the open request, and opens the login interface of the target application software according to the open instruction;
the login interface is an interactive interface for filling in login data and corresponding verification codes. The touch operation of the user on the target application software may be specifically a direct operation of the user on the APP, or an access operation of the user on the APP through a link or a website. When a user clicks a target application software icon, the target application software is triggered, an opening request is sent to a server by the target application software, the server sends a corresponding opening instruction to the target application software after receiving the opening request sent by the target application software, and the target application software opens a login interface according to the opening instruction, so that the target application software is started.
In an embodiment, as shown in fig. 4, the determining whether the target application software is a legitimate application software includes:
s401, sending an authentication request to a server, wherein the authentication request comprises: an application software identifier;
each application software has an application software identifier corresponding to the application software, and the application software identifiers correspond to the application software one by one; the application identification may be configured in the application by a technician.
The authentication request may also include other content in addition to the application identification, such as: the content of the actual request of the user for the application software. Whether the authentication request carries other content may be set by a technician or a user.
S402, receiving a verification result returned after the server verifies the target application software according to the verification request.
The server verifies the target application software according to the received application software identification, generates a verification result and sends the verification result to the terminal; wherein, the verification result comprises: verification passed or verification failed. The server receives a verification request, compares the application software identification with the application software identification in an application software identification list in the server, and when the application software identification is consistent with the application software identification in the application software identification list or the received application software identification exists in the application software identification list, the verification is passed, and the application software is confirmed to be legal application software, namely the application software belongs to application software capable of automatically logging in; and when the received application software identification is inconsistent with the application software identification in the application software identification list or the received application software identification does not exist in the application software identification list, if the verification fails, the application software is determined to be illegal application software.
Further, the terminal can correspondingly store the verification result and the corresponding application software identifier in a verification result list of the terminal, so that when a login request for logging in the application software is received again, the verification result is directly obtained in the terminal, the process is simplified, and the verification delay caused by the situation that the server is not reachable or the network is blocked once is avoided.
In an embodiment, as shown in fig. 5, the sending the login request to the server includes:
s501, acquiring first position information of the current position of the terminal and second position information of the terminal when the target application software is logged in for the first time;
the location information may include: the longitude and latitude of the terminal, etc.
The current position information of the terminal can be obtained by a positioning module carried by the terminal. The terminal can acquire the position information of the terminal through the positioning module when the target application software logs in for the first time and the login interface of the target application software is opened for the second time, and the first position information and the second position information are stored in a fixed file of the terminal, and the fixed file is stored in a non-target application software installation directory of the terminal, so that the historical login data cannot be automatically deleted after the application software is unloaded. The terminal can acquire the historical position information, namely the second position information, when the target application software logs in for the first time according to the fixed file. Meanwhile, the terminal can also acquire the position information of the login interface of the target application software when the login interface of the target application software is opened for the second time through the positioning module, namely the position information when the login interface of the target application software is opened at this time.
Step S502, calculating a position difference between the first position information and the second position information, and determining whether to send a login request to the server according to the position difference and a position difference threshold.
And if the position difference value of the first position information and the second position information is larger than or equal to the position difference value threshold value, determining that the terminal exceeds the login range, and at the moment, the terminal cannot send a login request to the server.
According to the rule that a user logs in a certain unusual application software, except for special situations, the distance between the places where the user logs in the same application software twice is usually not too far, if the position difference value between the first position information and the second position information of the terminal is greater than or equal to the position difference value threshold value, the distance between the places where the user logs in the target application software twice is considered to be too far, the user who logs in the target application software twice is very likely to be different from one person, the terminal is possibly in an unsafe state and is not suitable for password-free login, and the terminal does not send a login request to the server.
If the position difference value between the first position information and the second position information of the terminal is smaller than the position difference value threshold value, the distance between the two places for logging in the target application software is considered to be short, the users for logging in the target application software are possibly the same person, the terminal is in a safe state and can log in without a password, and the terminal sends a login request to the server.
According to the application software login method provided by the embodiment of the invention, after the target application software is judged to be a legal program, according to the position difference value between the first position information and the second position information of the terminal, when the position difference value is smaller than the position difference value threshold value, the front and the back users logging in the target application software are considered to be the same person, the users are not changed, the terminal is safe, and at the moment, the login of the target application software is allowed to be carried out without inputting verification data and login data, so that the times of inputting the login data and the verification data by the users on the premise of safety can be reduced, the operation steps of the users are simplified, and the speed of starting the application software and the efficiency of safety verification are improved.
In an embodiment, as shown in fig. 6, the sending the login request to the server includes:
s601, acquiring a first communication network currently connected with the terminal and a second communication network connected with the terminal when the terminal logs in the target application software for the first time;
the communication network may include an IP Address (Internet Protocol Address) of the terminal.
The terminal can acquire the IP address of the terminal and store the IP address in the log when detecting that the terminal logs in the target application software each time. The terminal can obtain a first IP address of the terminal when the terminal currently logs in the target application software and a second IP address of the terminal when the terminal logs in the target application software for the first time according to the log.
S602, judging whether the first communication network and the second communication network are the same communication network;
s603, when the first communication network and the second communication network are the same communication network, send a login request to the server.
Specifically, the terminal judges whether a first IP address of the terminal when the terminal currently logs in the target application software and a second IP address of the terminal when the terminal logs in the target application software for the first time are the same IP address. When a first IP address of the terminal when the terminal logs in the target application software at present and a second IP address of the terminal when the terminal logs in the target application software for the first time belong to the same IP address, the first communication network and the second communication network can be determined to be the same communication network.
Except for special cases, in the case of logging in the same target application software twice before and after, a user generally uses a certain fixed communication network. If the first communication network and the second communication network are not the same communication network, it can be considered that the communication network used by the user when logging in the target application software twice is changed, and the reason of the common situation is probably that the user is changed, and the latter user only needs to log in the target application software through the communication network which is commonly used by the user because the latter user does not know what the account number and the password of the communication network of the former user are, so that the terminal has a security risk and is not suitable for password-free login.
If the first communication network and the second communication network are the same communication network, the two previous and next users logging in the target application software can be considered as the same person, which indicates that the terminal is safe and can allow the authentication data and the login data not to be input.
According to the application software login method provided by the embodiment of the invention, under the condition that the target application software is legal, a first communication network and a second communication network of a terminal are obtained, and whether the target application software is the same person or not is judged according to the first communication network and the second communication network; if yes, allowing the user not to input verification data and login data to log in the target application software, so that the number of times of inputting passwords by the user on the premise of safety can be reduced, and the speed of starting the application software and the efficiency of safety verification are improved.
In step S23, receiving a login instruction generated by the server according to the login request to obtain historical login data corresponding to the target application software;
the historical login data corresponding to the target application software can be stored in a fixed file, and the fixed file is stored in a non-target application software installation directory of the terminal, so that the historical login data cannot be automatically deleted after the application software is uninstalled. It should be noted that the fixed file may be encrypted by using an AES encryption method, so that the security of the data may be improved. If the fixed file is encrypted by AES, a corresponding decryption mode is needed for decryption when the history login data is used for logging in corresponding application software. In this embodiment, the historical login data may be an account number, which may be in the form of characters, such as the normal cell phone number 186XXX199XX, or may be a cell phone number that is not used in the market, and has a difference in digits or number segments from the normal cell phone number, and does not conflict with the normal cell phone number in the market. For example, the normal cell phone number is 12345678910, and the non-commercially available cell phone number is 123569.
Of course, a first relationship list representing the relationship between the application software and the historical login data may be stored in the fixed file. In the first relationship list, an application software may correspond to a historical login data. Since each piece of software has an application software identifier, the first relationship list may represent a mapping relationship between the identifier of the application software and the historical login data, and then the historical login data may be found according to the software application identifiers in the first relationship list. For example, a first application software identification corresponds to first historical login data, a second application software identification corresponds to second historical login data, a third application software identification corresponds to third historical login data, and so on; of course, one application identifier may correspond to a plurality of historical login data, for example, a first application identifier corresponds to a first historical login data, a second historical login data, a third historical login procedure, etc.; the plurality of application software identifiers may also correspond to one historical login data, for example, the first application software identifier, the second application software identifier, and the third application software identifier all correspond to the first historical login data. When judging whether historical login data corresponding to the target application software identifier exists in the terminal, searching whether the target application software identifier exists in the first relation list, and if so, determining corresponding login data according to the relation between the application software identifier in the first relation list and the historical login data.
The historical login data refers to login data that has been successfully logged in.
In step S24, a verification code interface is called to obtain verification data corresponding to the historical login data, the historical login data and the verification data corresponding to the historical login data are automatically filled into the login interface, and the target application software is logged in through the historical login data and the verification data corresponding to the historical login data.
In the terminal, a second relationship list indicating a relationship between the history log-in data and the authentication data is stored, for example, the first history log-in data corresponds to the first authentication data, the second history log-in data corresponds to the second authentication data, the third history log-in data corresponds to the third authentication data, and so on. After the historical login data are determined, automatically acquiring verification data corresponding to the historical login data from the second relation list through a verification data interface, then automatically filling the historical login data and the verification data into a login interface of the target application software, and logging in the target application software through the historical login data and the verification data.
Of course, the first relationship list and the second relationship list may be the same list.
It should be noted that the verification data corresponding to the target login data may be an encrypted password, and when the target application software is logged in by using the target login data and the corresponding encrypted password, the encrypted password is decrypted. The Encryption password may be a password encrypted by using an MD5(Message-Digest Algorithm) Algorithm and/or TEA (Tiny Encryption Algorithm), and the password is decrypted by using MD5 and TEA for double Encryption, and then decrypted by using MD5 and TEA.
In an embodiment, in the step of obtaining historical login data corresponding to the target application software in response to the login instruction, if the historical login data corresponding to the target application software does not exist in the terminal, obtaining current login data of a current user through the login interface, and generating corresponding verification data; uploading current login data and current verification data through the login interface to log in the target application software; and storing the current login data and the verification data of the current user in the terminal.
The fact that no historical login data corresponding to the target application software exists in the terminal means that no login data corresponding to the application software exists in the first relation list.
The process for logging in the target application software for the first time comprises the following steps:
the terminal executes touch operation on the target application software in a display area of the target application software and sends an opening request of the target application software to the server;
the server receives the opening request and generates an opening instruction;
the terminal receives an opening instruction returned by the server according to the opening request, and responds to the opening instruction to open a login interface of the target application software;
after a login interface of the target application software is opened, a terminal sends a login request to the server, wherein the login request comprises a target application software identifier;
and the server receives the login request and acquires a terminal identifier of the terminal, wherein the terminal identifier can be unique login data which is allocated to the terminal in advance, and the unique login data means that the data is unique. If the terminal is a mobile phone, the login data is the mobile phone number of the mobile phone, and the mobile phone number can be used as the login data of the target application software;
sending the mobile phone number and the target application software identification corresponding to the mobile phone number to a server through a mobile network, wherein the server generates verification data, associates the verification data with the target application software identification and sends the verification data to the mobile phone;
the mobile phone receives the verification data and the target application software identification sent by the server;
and calling a data filling interface of the target application software to fill the verification data and the login data in a login boundary identified by the target application software so as to complete the login of the target application software.
In one embodiment, before sending the mobile phone number and the target application software identification to the server, the method further includes:
and after the server receives the mobile phone number and the target application software identification, decrypting the mobile phone number and the target application software identification according to a decryption rule corresponding to the preset encryption rule.
Specifically, the mobile phone number and the target application software identifier may be encrypted by using a Hash encryption algorithm. And carrying out Hash operation on the verification data, namely hashing the verification data into a Hash value with a fixed length and Hash mapping data, wherein the Hash value and the Hash mapping data are required to be sent to the server together.
In the embodiment, when the target application software is logged in by the user for the first time, the login data and the verification data of the user can be automatically recorded in the fixed file for automatic searching and use when the target application software is started next time, so that the time for inputting the login data when the user uses the same target application software again is saved.
In an embodiment, in the step of obtaining the historical login data corresponding to the target application software in response to the login instruction, if a plurality of pieces of historical login data corresponding to the target application software exist in the terminal, the plurality of pieces of historical login data are displayed, and the target login data are determined from the plurality of pieces of historical login data according to a selection instruction.
Specifically, if a user registers a plurality of historical login data in the process of using the target application software, a plurality of historical login data corresponding to the target application software are recorded in a fixed file of the terminal; for example, historical login data a, historical login data B, and historical login data C; and when the target application software is logged in again, the historical login data A, the historical login data B and the historical login data C are searched and displayed, the target login data is determined from the three login data through a selection instruction of a user, then the target verification code corresponding to the target login data is searched according to the second relation list, and the target application software is logged in through the target login data and the target verification code.
In the embodiment, when the target application software is logged in, whether the historical login data corresponding to the target application software exists in the terminal is automatically detected, if yes, the corresponding verification code is called, and the historical login data and the verification code are automatically filled into the login interface of the target application software to complete automatic login, so that login time is saved, and the login operation flow is simplified.
As shown in fig. 7, an embodiment of the present application further provides an application software login apparatus, where the apparatus includes:
a request sending module 701, configured to send an opening request of target application software to a server;
a first receiving module 702, configured to receive an opening instruction returned by the server according to the opening request, and open a login interface of the target application software in response to the opening instruction;
a judging module 703, configured to judge whether the target application software is a valid application software, and if the target application software is the valid application software, send a login request to the server;
a second receiving module 704, configured to receive a login instruction generated by the server according to the login request, and obtain historical login data corresponding to the target application software in response to the login instruction;
an interface calling module 705, configured to call a verification code interface to obtain verification data corresponding to the historical login data;
a filling module 706, configured to automatically fill the historical login data and the verification data corresponding to the historical login data into the login interface, and log in the target application software through the historical login data and the verification data corresponding to the historical login data.
In one embodiment, when the request sending module sends an opening request of target application software to a server, a touch operation of a user in a display area where the target application software is located is received; judging whether the touch operation is a preset touch operation or not; and if the touch operation is a preset touch operation, sending an opening request of the target application software to a server.
In an embodiment, when sending a login request to the server, the determining module first obtains first location information of a current location of the terminal and second location information of the terminal when the target application software is logged in for the first time; calculating a position difference value between the first position information and the second position information, and determining whether to send a login request to the server according to the position difference value and a position difference value threshold value; and if the position difference value is smaller than the set position difference value threshold, sending a login request to the server.
In an embodiment, when sending a login request to the server, the determining module first obtains a first communication network currently connected to the terminal and a second communication network connected to the terminal when logging in the target application software for the first time; judging whether the first communication network and the second communication network are the same communication network; and when the first communication network and the second communication network are the same communication network, sending a login request to the server.
In an embodiment, the determining module sends an authentication request to the server when determining that the target application software is a valid application software, where the authentication request includes: an application software identifier; receiving a verification result returned by the server after verifying the target application software according to the verification request, wherein the verification result comprises verification passing or verification failing; when the verification result is that the verification is passed, the target application software is legal application software; and when the verification result is that the verification is not passed, the target application software is illegal application software.
In an embodiment, when the second receiving module obtains the historical login data corresponding to the target application software in response to the login instruction, if the historical login data corresponding to the target application software does not exist in the terminal, the second receiving module obtains the current login data of the current user through the login interface and generates corresponding verification data; uploading the current login data and the current verification data through the login interface to log in the target application software; storing the current login data and the authentication data of the current user in the terminal.
In an embodiment, when the second receiving module obtains the historical login data corresponding to the target application software in response to the login instruction, if a plurality of pieces of historical login data corresponding to the target application software exist in the terminal, the plurality of pieces of historical login data are displayed, and the target login data are determined from the plurality of pieces of historical login data according to a selection instruction.
In the above embodiments, the implementation of the application software login apparatus substantially corresponds to the specific implementation of the application software login method shown in fig. 2, and is not described herein again.
When the target application software is logged in, whether the historical login data corresponding to the target application software exists in the terminal or not is automatically detected, if yes, the corresponding verification code is called, and the historical login data and the verification code are automatically filled into a login interface of the target application software to complete automatic login, so that login time is saved, and a login operation process is simplified.
In an embodiment of the present application, there is also provided a computer readable storage medium having a computer program stored thereon, which when executed by a processor, causes the processor to perform the steps of:
sending an opening request of target application software to a server through a terminal;
the terminal receives an opening instruction returned by the server according to the opening request, and responds to the opening instruction to open a login interface of the target application software;
judging whether the target application software is legal application software or not, and if the target application software is the legal application software, sending a login request to the server;
receiving a login instruction generated by the server according to the login request, and responding to the login instruction to obtain historical login data corresponding to the target application software;
calling a verification code interface to obtain verification data corresponding to the historical login data;
and automatically filling the historical login data and the verification data corresponding to the historical login data into the login interface, and logging in the target application software through the historical login data and the verification data corresponding to the historical login data.
In an embodiment, the sending, by the terminal, the request for opening the target application software to the server includes:
receiving touch operation of a user in a display area where the target application software is located;
judging whether the touch operation is a preset touch operation or not;
and if the touch operation is a preset touch operation, sending an opening request of the target application software to a server.
In one embodiment, first position information of the current position of the terminal and second position information of the terminal when the target application software is logged in for the first time are obtained;
calculating a position difference value between the first position information and the second position information, and determining whether to send a login request to the server according to the position difference value and a position difference value threshold value;
and if the position difference value is smaller than the set position difference value threshold, sending a login request to the server.
In one embodiment, the sending the login request to the server includes:
acquiring a first communication network currently connected with the terminal and a second communication network connected with the terminal when the terminal logs in the target application software for the first time;
judging whether the first communication network and the second communication network are the same communication network;
and when the first communication network and the second communication network are the same communication network, sending a login request to the server.
In an embodiment, the determining whether the target application software is a valid application software includes:
sending an authentication request to a server, wherein the authentication request comprises: an application software identifier;
receiving a verification result returned by the server after verifying the target application software according to the verification request, wherein the verification result comprises verification passing or verification failing;
when the verification result is that the verification is passed, the target application software is legal application software; and when the verification result is that the verification is not passed, the target application software is illegal application software.
In an embodiment, in the step of obtaining historical login data corresponding to the target application software in response to the login instruction, if the historical login data corresponding to the target application software does not exist in the terminal, obtaining current login data of a current user through the login interface, and generating corresponding verification data; uploading the current login data and the current verification data through the login interface to log in the target application software; storing the current login data and the authentication data of the current user in the terminal.
In an embodiment, in the step of obtaining the historical login data corresponding to the target application software in response to the login instruction, if a plurality of pieces of historical login data corresponding to the target application software exist in the terminal, the plurality of pieces of historical login data are displayed, and the target login data are determined from the plurality of pieces of historical login data according to a selection instruction.
The application is operational with numerous general purpose or special purpose computing system environments or configurations. For example: personal computers, server computers, hand-held or portable devices, tablet-type devices, multiprocessor systems, microprocessor-based systems, set top boxes, programmable consumer electronics, network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above systems or devices, and the like. The application may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The application may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
An embodiment of the present application further provides a computer device, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor executes the computer program to perform the following steps:
sending an opening request of target application software to a server through a terminal;
the terminal receives an opening instruction returned by the server according to the opening request, and responds to the opening instruction to open a login interface of the target application software;
judging whether the target application software is legal application software or not, and if the target application software is the legal application software, sending a login request to the server;
receiving a login instruction generated by the server according to the login request, and responding to the login instruction to obtain historical login data corresponding to the target application software;
calling a verification code interface to obtain verification data corresponding to the historical login data;
and automatically filling the historical login data and the verification data corresponding to the historical login data into the login interface, and logging in the target application software through the historical login data and the verification data corresponding to the historical login data.
The above steps are substantially the same as the specific embodiments of the method and the device for logging in the application software, and are not described herein again.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, apparatus, article, or method that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, apparatus, article, or method. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, apparatus, article, or method that includes the element.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-mentioned division of the functional units and modules is illustrated, and in practical applications, the above-mentioned function distribution may be performed by different functional units and modules according to needs, that is, the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above-mentioned functions. Each functional unit and module in the embodiments may be integrated in one processing unit, or each unit may exist alone physically, or two or more units are integrated in one unit, and the integrated unit may be implemented in a form of hardware, or in a form of software functional unit. In addition, specific names of the functional units and modules are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the present application. The specific working processes of the units and modules in the system may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and reference may be made to the related descriptions of other embodiments for parts that are not described or illustrated in a certain embodiment.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
In the embodiments provided in the present invention, it should be understood that the disclosed apparatus/terminal device and method may be implemented in other ways. For example, the above-described embodiments of the apparatus/terminal device are merely illustrative, and for example, the division of the modules or units is only one logical division, and there may be other divisions when actually implemented, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments. Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) as described above and includes instructions for enabling a terminal device (e.g., a mobile phone, a computer, a server, or a network device) to execute the method according to the embodiments of the present invention.
It will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by a program instructing relevant hardware, where the program may be stored in a machine-readable storage medium, and the above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (10)

1. An application software login method is characterized by comprising the following steps:
sending an opening request of target application software to a server through a terminal;
the terminal receives an opening instruction returned by the server according to the opening request, and responds to the opening instruction to open a login interface of the target application software;
judging whether the target application software is legal application software or not, and if the target application software is the legal application software, sending a login request to the server;
receiving a login instruction generated by the server according to the login request, and responding to the login instruction to obtain historical login data corresponding to the target application software;
calling a verification code interface to obtain verification data corresponding to the historical login data;
and automatically filling the historical login data and the verification data corresponding to the historical login data into the login interface, and logging in the target application software through the historical login data and the verification data corresponding to the historical login data.
2. The method for logging in application software according to claim 1, wherein the sending of the request for opening the target application software to the server through the terminal comprises:
receiving touch operation of a user in a display area where the target application software is located;
judging whether the touch operation is a preset touch operation or not;
and if the touch operation is a preset touch operation, sending an opening request of the target application software to a server.
3. The method for logging in application software as claimed in claim 1, wherein the sending a login request to the server comprises:
acquiring first position information of the current position of the terminal and second position information of the terminal when the target application software is logged in for the first time;
calculating a position difference value between the first position information and the second position information, and determining whether to send a login request to the server according to the position difference value and a position difference value threshold value;
and if the position difference value is smaller than the set position difference value threshold, sending a login request to the server.
4. The method for logging in application software as claimed in claim 1, wherein the sending a login request to the server comprises:
acquiring a first communication network currently connected with the terminal and a second communication network connected with the terminal when the terminal logs in the target application software for the first time;
judging whether the first communication network and the second communication network are the same communication network;
and when the first communication network and the second communication network are the same communication network, sending a login request to the server.
5. The method according to claim 1, wherein said determining whether the target application software is a legitimate application software comprises:
sending an authentication request to a server, wherein the authentication request comprises: an application software identifier;
receiving a verification result returned by the server after verifying the target application software according to the verification request, wherein the verification result comprises verification passing or verification failing;
when the verification result is that the verification is passed, the target application software is legal application software; and when the verification result is that the verification is not passed, the target application software is illegal application software.
6. The application software login method according to claim 1, wherein in the step of obtaining historical login data corresponding to the target application software in response to the login instruction, if the historical login data corresponding to the target application software does not exist in the terminal, current login data of a current user is obtained through the login interface, and corresponding verification data is generated; uploading the current login data and the current verification data through the login interface to log in the target application software; storing the current login data and the authentication data of the current user in the terminal.
7. The method according to claim 1, wherein in the step of acquiring the historical login data corresponding to the target application software in response to the login instruction, if a plurality of pieces of historical login data corresponding to the target application software exist in the terminal, the plurality of pieces of historical login data are displayed, and the target login data are determined from the plurality of pieces of historical login data according to a selection instruction.
8. An application software login apparatus, comprising:
the request sending module is used for sending an opening request of the target application software to the server;
the first receiving module is used for receiving an opening instruction returned by the server according to the opening request and responding to the opening instruction to open a login interface of the target application software;
the judging module is used for judging whether the target application software is legal application software or not, and if the target application software is the legal application software, sending a login request to the server;
the second receiving module is used for receiving a login instruction generated by the server according to the login request and responding to the login instruction to acquire historical login data corresponding to the target application software;
the interface calling module is used for calling a verification code interface to obtain verification data corresponding to the historical login data;
and the filling module is used for automatically filling the historical login data and the verification data corresponding to the historical login data into the login interface, and logging in the target application software through the historical login data and the verification data corresponding to the historical login data.
9. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the steps of the application software login method according to any one of claims 1 to 7 are implemented when the computer program is executed by the processor.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the application software login method according to any one of claims 1 to 7.
CN202111004549.4A 2021-08-30 2021-08-30 Application software login method, device, medium and equipment Pending CN113722687A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111004549.4A CN113722687A (en) 2021-08-30 2021-08-30 Application software login method, device, medium and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111004549.4A CN113722687A (en) 2021-08-30 2021-08-30 Application software login method, device, medium and equipment

Publications (1)

Publication Number Publication Date
CN113722687A true CN113722687A (en) 2021-11-30

Family

ID=78679069

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111004549.4A Pending CN113722687A (en) 2021-08-30 2021-08-30 Application software login method, device, medium and equipment

Country Status (1)

Country Link
CN (1) CN113722687A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105993156A (en) * 2015-10-23 2016-10-05 深圳还是威健康科技有限公司 Server access authentication method and device
CN108551443A (en) * 2018-03-30 2018-09-18 平安科技(深圳)有限公司 A kind of application login method, device, terminal device and storage medium
CN112714179A (en) * 2020-12-25 2021-04-27 携程旅游网络技术(上海)有限公司 Client multitask installation method, system, equipment and medium based on browser

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105993156A (en) * 2015-10-23 2016-10-05 深圳还是威健康科技有限公司 Server access authentication method and device
CN108551443A (en) * 2018-03-30 2018-09-18 平安科技(深圳)有限公司 A kind of application login method, device, terminal device and storage medium
CN112714179A (en) * 2020-12-25 2021-04-27 携程旅游网络技术(上海)有限公司 Client multitask installation method, system, equipment and medium based on browser

Similar Documents

Publication Publication Date Title
US10904007B2 (en) Authentication device based on biometric information, control server connected to the same, and login method based on biometric information thereof
US20220191016A1 (en) Methods, apparatuses, and computer program products for frictionless electronic signature management
EP2761429B1 (en) Policy compliance-based secure data access
CN105306204B (en) Security verification method, device and system
CN104468531B (en) The authorization method of sensitive data, device and system
CN106453245B (en) Verify the method and device of identity
US9426130B2 (en) Methods, devices and systems for anti-counterfeiting authentication
CN103095457A (en) Login and verification method for application program
EP2978162B1 (en) Anti-counterfeiting verification method, device and system
CN107171789A (en) A kind of safe login method, client device and server
EP3176719B1 (en) Methods and devices for acquiring certification document
US20200067709A1 (en) Methods, apparatuses, and computer program products for frictionlesscustody chain management
WO2014111022A1 (en) Mobile terminal user information display method, mobile terminal, and service system
CN112559993A (en) Identity authentication method, device and system and electronic equipment
US20210152359A1 (en) Authentication device based on biometric information, control server and application server, and operation method thereof
CN110795737A (en) Method and terminal equipment for upgrading service application range of electronic identity card
CN109597727B (en) Detection method, detection device, server and detection system of electronic equipment
CN114650154B (en) Webpage authority behavior control method and device, computer equipment and storage medium
US10826901B2 (en) Systems and method for cross-channel device binding
CN111666567A (en) Detection method, device, computer program and medium for malicious modification of application program
CN108768973B (en) Trusted application operation request auditing method and trusted application management server
CN113722687A (en) Application software login method, device, medium and equipment
WO2015006903A1 (en) Data processing system, center apparatus and program
CN109522708B (en) Method and device for safely controlling running environment of application program
CN114391134A (en) Flashing processing method and related device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination