CN114828000A - Login method, device and computer readable storage medium - Google Patents

Login method, device and computer readable storage medium Download PDF

Info

Publication number
CN114828000A
CN114828000A CN202210390512.8A CN202210390512A CN114828000A CN 114828000 A CN114828000 A CN 114828000A CN 202210390512 A CN202210390512 A CN 202210390512A CN 114828000 A CN114828000 A CN 114828000A
Authority
CN
China
Prior art keywords
login
message
user
target
web system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210390512.8A
Other languages
Chinese (zh)
Other versions
CN114828000B (en
Inventor
秦蓁
吕光旭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
China Information Technology Designing and Consulting Institute Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
China Information Technology Designing and Consulting Institute Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd, China Information Technology Designing and Consulting Institute Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN202210390512.8A priority Critical patent/CN114828000B/en
Publication of CN114828000A publication Critical patent/CN114828000A/en
Application granted granted Critical
Publication of CN114828000B publication Critical patent/CN114828000B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent

Abstract

The application provides a login method, a login device and a computer readable storage medium, relates to the technical field of communication, and can simplify the operation process while ensuring the login security. The method comprises the following steps: receiving a first request sent by terminal equipment; the first request is used for indicating that the Web system requests to log in a target account of a target application; based on the first request, sending a first 5G message to the terminal device, so that the terminal device displays the first 5G message on a target chat robot page of the 5G message, wherein the target chat robot page is a target application corresponding to the chat robot page in the 5G message; the first 5G message is a message card carrying a login key, and the login key is used for triggering a login target account by a user; receiving a message which is sent by terminal equipment and used for a user to approve login; and sending a first prompt message to the Web system according to the login approval message of the user, wherein the first prompt message is used for prompting the Web system to display a login success page.

Description

Login method, device and computer readable storage medium
Technical Field
The present application relates to the field of communications technologies, and in particular, to a login method, a login device, and a computer-readable storage medium.
Background
In the prior art, when a user performs a login operation on a Web system, the following method is generally adopted: in the first method, login is performed by inputting an account name, a password, and the like into a computer. This method has the risk that the account name and password are stolen. And secondly, receiving the verification code of the mobile phone number through the mobile terminal, and inputting the verification code across equipment to realize login. This method requires input across devices, and is cumbersome to operate. And in the third mode, under the condition that the mobile terminal comprises the target application, the target application scans the login two-dimensional code to realize login. This method can be implemented only when the target application is installed on the terminal device, and has limitations and cannot well meet the use requirements of users.
In summary, the login method provided by the prior art has the problems of poor safety, complex operation process, poor user experience and the like.
Disclosure of Invention
The application provides a login method, a login device and a computer-readable storage medium, which can simplify the operation process and improve the user experience while ensuring the login security.
In a first aspect, the present application provides a login method, including: receiving a first request sent by terminal equipment; the first request is used for indicating that the Web system requests to log in a target account of a target application; based on the first request, sending a first 5G message to the terminal equipment, so that the terminal equipment displays the first 5G message on a target chat robot (Chatbot) page of the 5G message, wherein the target chat robot page is a target application corresponding to the chat robot page in the 5G message; the first 5G message is a message card carrying a login key, and the login key is used for triggering a login target account by a user; receiving a message which is sent by terminal equipment and used for a user to approve login; and sending a first prompt message to the Web system according to the login approval message of the user, wherein the first prompt message is used for prompting the Web system to display a login success page.
Based on the technical scheme provided by the application, the following beneficial effects can be generated at least: by utilizing the 5G message, when receiving a message that the Web system requests to log in a target account of a target application, the first 5G message carrying a login key is sent to the terminal device, the login key is used for triggering the login target account by a user, so that the user can trigger the login by clicking the login key, the user operation is simplified, the user can realize the non-sensitive identity authentication in the login process, the login in the Web system can be quickly and conveniently completed, and the user experience is better. In addition, the login can be realized only by using the 5G message on the terminal equipment, and the 5G message fully inherits the characteristics of the code number system, the real-name system and the safety of the telecommunication service, so that the login of the Web system is carried out based on the 5G message, and the safety of the login operation is fully ensured.
Optionally, after sending the first 5G message to the terminal device based on the first request, the method further includes: receiving login verification information sent by terminal equipment; the login verification information is used for verifying whether the login operation of the target account is abnormal or not; performing login verification according to the login verification information to obtain a verification result; the sending a first prompt message to the Web system according to the login approval message of the user further includes: and in the case that the verification result is that the verification is passed, sending a first prompt message to the Web system.
Optionally, the performing login authentication according to the login authentication information to obtain an authentication result includes: when the login verification information comprises the identification of the terminal equipment and the address information of the Web system, determining a historical login address base of the target account according to the identification of the terminal equipment; the historical login address base comprises at least one historical login address of a target account; performing login verification on address information of the Web system according to the historical login address library to obtain a verification result; or when the login authentication information comprises the face feature information, the face feature information is authenticated according to the identity information of the user, and an authentication result is obtained.
Optionally, in a case that the verification result is that the verification is not passed, the method further includes: configuring a second 5G message; the second 5G message is a message card carrying abnormal prompt information and operable keys; the abnormity prompting information is used for prompting the abnormity of the target account of the user in the login process; the operable key is used for selecting whether to continuously log in the target account by the user; the operable key includes: continuing to log in the key; and sending the second 5G message to the terminal equipment so that the terminal equipment displays the second 5G message on the page of the target chat robot.
Optionally, after sending the second 5G message to the terminal device, the method further includes: receiving a message which is sent by the terminal equipment and used for the user to approve to continue logging in; and sending a login continuation prompt message to the Web system according to the message that the user agrees to continue login, wherein the login continuation prompt message is used for prompting the Web system to display a login success page.
Optionally, the performing login authentication according to the login authentication information to obtain an authentication result further includes: determining at least one login authentication mode; wherein at least one login authentication mode is related to the security level of the target chat robot; and performing login verification based on at least one login verification mode and login verification information corresponding to each login verification mode to obtain a verification result.
In a second aspect, the present application provides a login method, including: responding to a login trigger operation of a target account to be logged in, and sending a first request to a login device; the first request is used for indicating that the Web system requests to log in a target account of a target application; the login triggering operation is an operation that the terminal equipment scans a two-dimensional code displayed on an account login page of a target application in the Web system; receiving a first 5G message sent by a login device, and displaying the first 5G message on a target chat robot page, wherein the target chat robot page is a chat robot page corresponding to a target application in the 5G message; the first 5G message is a message card carrying a login key, and the login key is used for triggering a login target account by a user; responding to the operation of clicking a login key by a user, and sending a message that the user agrees to login to a login device; and receiving login success prompt information sent by the login device, wherein the login success prompt information is used for prompting that the target account of the user successfully logs in the Web system.
Optionally, after receiving the first 5G message sent by the login device and displaying the first 5G message on the target chat robot page, the method further includes: sending login verification information to a login device so that the login device performs login verification according to the login verification information to obtain a verification result; the login verification information is used for verifying whether the login operation of the target account is abnormal or not; the receiving of the login success prompt message sent by the login device further includes: and receiving login success prompt information sent by the login device under the condition that the verification result is that the user passes the verification, wherein the login success prompt information is used for prompting that the target account of the user successfully logs in the Web system.
Optionally, in a case that the verification result is that the verification is not passed, the method further includes: receiving a second 5G message sent by the login device, and displaying the second 5G message on a target chat robot page; the second 5G message is a message card carrying abnormal prompt information and operable keys; the abnormity prompting information is used for prompting the abnormity of the target account of the user in the login process; the operable key is used for selecting whether to continuously log in the target account by the user; the operable key includes: continuing to log in the key; and responding to the operation of clicking the login continuation key by the user, sending a message of the user agreeing to continue login to the login device, so that the login device sends a login continuation prompt message to the Web system according to the message of the user agreeing to continue login, wherein the login continuation prompt message is used for prompting the Web system to display a login success page.
In a third aspect, the present application provides a login device, including: the receiving module is used for receiving a first request sent by the terminal equipment; the first request is used for indicating that the Web system requests to log in a target account of a target application; the sending module is used for sending a first 5G message to the terminal equipment based on the first request so that the terminal equipment can display the first 5G message on a target chat robot page of the 5G message, and the target chat robot page is a target application corresponding to the chat robot page in the 5G message; the first 5G message is a message card carrying a login key, and the login key is used for triggering a login target account by a user; the receiving module is also used for receiving a message which is sent by the terminal equipment and used for the user to approve login; and the sending module is also used for sending a first prompt message to the Web system according to the login approval message of the user, wherein the first prompt message is used for prompting the Web system to display a login success page.
Optionally, the receiving module is further configured to receive login authentication information sent by the terminal device; the login verification information is used for verifying whether the login operation of the target account is abnormal or not; the device still includes: a verification module; the verification module is used for performing login verification according to the login verification information to obtain a verification result; and the sending module is further used for sending a first prompt message to the Web system under the condition that the verification result is that the verification is passed, wherein the first prompt message is used for prompting the Web system to display a login success page.
Optionally, the verification module is specifically configured to, when the login verification information includes: when the identification of the terminal equipment and the address information of the Web system exist, determining a historical login address base of a target account according to the identification of the terminal equipment; the historical login address base comprises at least one historical login address of a target account; performing login verification on address information of the Web system according to the historical login address library to obtain a verification result; or, when the login authentication information includes: and when the face characteristic information is obtained, verifying the face characteristic information according to the identity information of the user to obtain a verification result.
Optionally, the apparatus further comprises: a message configuration module; the message configuration module is used for configuring a second 5G message under the condition that the verification result is not verified; the second 5G message is a message card carrying abnormal prompt information and operable keys; the abnormity prompting information is used for prompting the abnormity of the target account of the user in the login process; the operable key is used for selecting whether to continuously log in the target account by the user; the operable key includes: continuing to log in the key; and the sending module is further used for sending the second 5G message to the terminal equipment so that the terminal equipment can display the second 5G message on the page of the target chat robot.
Optionally, the receiving module is further configured to receive a message that the user agrees to continue to log in, where the message is sent by the terminal device; and the sending module is also used for sending a login continuing prompt message to the Web system according to the information that the user agrees to continue login, and the login continuing prompt message is used for prompting the Web system to display a login success page.
Optionally, the verification module is further configured to determine at least one login verification manner; wherein at least one login authentication mode is related to the security level of the target chat robot; and performing login verification based on at least one login verification mode and login verification information corresponding to each login verification mode to obtain a verification result.
In a fourth aspect, the present application provides a login device, including: the sending module is used for responding to login triggering operation of a target account to be logged in and sending a first request to the login device; the first request is used for indicating that the Web system requests to log in a target account of a target application; the login triggering operation is an operation that the terminal equipment scans a two-dimensional code displayed on an account login page of a target application in the Web system; the receiving module is used for receiving the first 5G message sent by the login device and displaying the first 5G message on a target chat robot page, wherein the target chat robot page is a chat robot page corresponding to the target application in the 5G message; the first 5G message is a message card carrying a login key, and the login key is used for triggering a login target account by a user; the sending module is also used for responding to the operation of clicking the login key by the user and sending a message that the user agrees to login to the login device; and the receiving module is also used for receiving login success prompt information sent by the login device, and the login success prompt information is used for prompting that the target account of the user successfully logs in the Web system.
Optionally, the sending module is further configured to send login authentication information to the login apparatus, so that the login apparatus performs login authentication according to the login authentication information to obtain an authentication result; the login verification information is used for verifying whether the login operation of the target account is abnormal or not; and the receiving module is further used for receiving login success prompt information sent by the login device under the condition that the verification result is that the verification is passed, wherein the login success prompt information is used for prompting that the target account of the user successfully logs in the Web system.
Optionally, the receiving module is further configured to receive a second 5G message sent by the login device and display the second 5G message on the target chat robot page, if the verification result is that the verification is not passed; the second 5G message is a message card carrying abnormal prompt information and operable keys; the abnormity prompting information is used for prompting the abnormity of the target account of the user in the login process; the operable key is used for selecting whether to continuously log in the target account by the user; the operable key includes: continuing to log in the key; and the sending module is also used for responding to the operation of clicking the login continuation key by the user and sending a message of the user agreeing to continue login to the login device, so that the login device sends a login continuation prompt message to the Web system according to the message of the user agreeing to continue login, and the login continuation prompt message is used for prompting the Web system to display a login success page.
In a fifth aspect, the present application provides a computer-readable storage medium having stored therein instructions that, when executed on a computer, cause the computer to perform any one of the methods provided by the first or second aspects.
In a sixth aspect, the present application provides a computer program product comprising instructions which, when run on a computer, cause the computer to perform any of the methods provided in the first or second aspects above.
For the description of the second aspect to the sixth aspect in the present application, reference may be made to the detailed description of the first aspect; in addition, for the beneficial effects described in the second to sixth aspects, reference may be made to the beneficial effect analysis of the first aspect, and details are not repeated here.
Drawings
Fig. 1 is a schematic diagram of an architecture of a login system provided in the present application;
FIG. 2 is a flow chart of a login method provided herein;
fig. 3 is a schematic diagram of a 5G message provided in the present application;
FIG. 4 is a flow chart of another method of login provided herein;
FIG. 5 is a schematic diagram of another 5G message provided herein;
FIG. 6 is a flow chart of yet another login method provided herein;
FIG. 7 is a flow chart of yet another login method provided herein;
FIG. 8 is a flow chart of yet another method of login provided herein;
FIG. 9 is a flow chart of yet another login method provided herein;
FIG. 10 is a schematic structural diagram of a login device provided in the present application;
FIG. 11 is a schematic diagram of another exemplary embodiment of a login device provided herein;
fig. 12 is a schematic structural diagram of another login device provided in the present application.
Detailed Description
A logging method, a logging apparatus, and a computer-readable storage medium provided by the present application will be described in detail below with reference to the accompanying drawings.
The term "and/or" herein is merely an association describing an associated object, meaning that three relationships may exist, e.g., a and/or B, may mean: a exists alone, A and B exist simultaneously, and B exists alone.
The terms "first" and "second" and the like in the description and drawings of the present application are used for distinguishing different objects or for distinguishing different processes for the same object, and are not used for describing a specific order of the objects.
Furthermore, the terms "including" and "having," and any variations thereof, as referred to in the description of the present application, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus.
It should be noted that in the embodiments of the present application, words such as "exemplary" or "for example" are used to indicate examples, illustrations or explanations. Any embodiment or design described herein as "exemplary" or "e.g.," is not necessarily to be construed as preferred or advantageous over other embodiments or designs. Rather, use of the word "exemplary" or "such as" is intended to present concepts related in a concrete fashion.
In the description of the present application, the meaning of "a plurality" means two or more unless otherwise specified.
In order to facilitate understanding of the technical solutions of the present application, the following briefly introduces terms related to the present application.
1. The 5G message is constructed based on GSMA RCS UP standard, the multimedia and lightweight of the message are realized, and the interaction of the industry message is realized by introducing a message as a platform (MaaP) technology. The 5G message brings a brand-new man-machine interaction mode, a user can complete one-stop business experience of service searching, discovery, interaction, payment and the like in a message window, and a brand-new social and information service entrance is established.
By using the 5G message, the user can receive the 5G message at the native short message inlet of the terminal equipment without downloading the client. The 5G message service enables information communication among personal users to be richer and more convenient, and the users can send text information, pictures, audios, videos and other various media and various formats of information.
In addition, governments and businesses can act as service providers to deliver public and commercial services directly to end users using 5G messages, and users can also search and select services in a manner similar to application stores through the directory service functionality of 5G messages. The public services and the commercial services are presented on a message interface of a user in the form of rich media messages and interactive cards, and the user can exchange with a service provider or select services at any time to obtain efficient personalized services; the service provider and the users can also establish a convenient intelligent service channel to obtain more user feedback, thereby establishing closer contact with the users.
The 5G message upgrades the short message service in a terminal native mode on the basis of keeping the original communication habit of a user, fully inheriting the code number system, the real-name system, the safety, the interconnection and intercommunication and the telecommunication-level service quality of the telecommunication service. The 5G message integrates various media and message formats and can be seamlessly integrated with the traditional short message. The 5G message service provides efficient intelligent service for users by utilizing the capabilities of artificial intelligence, cloud computing, big data and the like, and meets the abundant information communication requirements and diversified service requirements of the users.
2. 5G message service, 5G message service is divided into two categories, one is the interactive message between individual users, and the other is the interactive message between industry clients and individual users.
Messages between individual users are further divided into: point-to-point messages, group messaging, and group chat messages. A point-to-point message refers to a message sent by one user to another user. Mass messaging: refers to a user inputting or selecting a plurality of contacts at a time and sending messages to the contact list in a group mode. The mass-sent message appears as a point-to-point message on the recipient terminal. Group chat messages refer to a user who can select a plurality of contacts with 5G messaging capability to create a group. After the group is successfully created, all the users who have joined the group can perform message interaction in the group. The 5G message service supports group management functions including group creation, group joining, group exiting, group member deletion, group disassociation, and the like.
An industry client interacts with individual users in the form of chat robots (chatbots) for messages over the carrier network.
The content of the message sent by the individual user to Chatbot for the business customer can contain media in the format of: text, pictures, audio, video, expressions, locations, contacts, and the like. Chatbot for an industry client sends message content to an individual user in a peer-to-peer and mass messaging manner in media formats that can include: text, pictures, audio, video, expressions, positions, contacts and the like, and can also contain rich media cards, and the message can also carry an option list (comprising 'suggestion reply' and 'suggestion operation').
The 5G message service supports the functionality of viewing Chatbot details including account number, name, avatar, service description, and customer service phone numbers. The user can view the Chatbot detailed information acquired by the terminal equipment. When the terminal equipment receives the message of the Chatbot for the first time, the terminal equipment inquires the operator network about the detailed information for checking the Chatbot, and shows the Chatbot to the user after the check is qualified, thereby ensuring the reliability of the message source. In addition, the user can store the Chatbot detailed information locally at the terminal device, or can delete the Chatbot detailed information already stored locally at the terminal device.
The individual user can interact with Chatbot by "suggest reply". The "suggest reply" is shown on the interface as a clickable button. When the user clicks the "suggest reply" button, the terminal sends the content defined by the "suggest reply" to Chatbot as a message. This transmitted content is visible to the user. An individual user can interact with Chatbot by "suggest action". The "suggested action" is shown on the interface as a clickable button. When the user clicks the 'suggest operation' key, the terminal executes the function defined by the 'suggest operation', such as: opening a specific webpage or APP, calling a telephone dialing application to complete an audio/video telephone call to a specific object, inquiring a position on a map and sending a local geographical position of a terminal, adding a calendar event, editing and drafting, sending a text message or an audio/video message and the like. Chatbot sends a message with three types of key presses: the floating key, the rich media card built-in key and the fixed key at the bottom of the message conversation interface. After the user clicks the float button, all float buttons disappear. After the user clicks the built-in button of the rich media card, the built-in button does not disappear. After the user clicks the fixed key, the fixed key does not disappear.
3. Deep links, which are deep links in an Application (App), link to a specific location within the App by using a Uniform Resource Identifier (URI), rather than just launching the App. If App is regarded as a website, then Deeplink is a page in the website, such as a product page, an activity promotion page, etc., and the Deeplink can directly jump to a specified page from the outside.
The 5G message also supports a Deeplink function and can jump to a designated Chatbot; meanwhile, according to the standard, operations such as sending specific message contents can be added after jumping to the designated Chatbot.
The above is an introduction of a part of concepts related in the embodiments of the present application, and details are not described below.
As described in the background art, in the prior art, when a user performs a login operation on a Web system, the following method is generally adopted: in the first method, login is performed by inputting an account name, a password, and the like into a computer. This method has the risk that the account name and password are stolen. And secondly, receiving the verification code of the mobile phone number through the mobile terminal, and inputting the verification code across equipment to realize login. This method requires input across devices, and is cumbersome to operate. And in the third mode, under the condition that the mobile terminal comprises the target application, the target application scans the login two-dimensional code to realize login. This method can be implemented only when the target application is installed on the terminal device, and has limitations and cannot well meet the use requirements of users.
In summary, the login method provided by the prior art has the problems of poor safety, complex operation process, poor user experience and the like.
In view of the above technical problems, an embodiment of the present application provides a login method, and the idea is as follows: by utilizing the 5G message, when receiving a message that the Web system requests to log in a target account of a target application, the first 5G message carrying a login key is sent to the terminal device, the login key is used for triggering the login target account by a user, so that the user can trigger the login by clicking the login key, the user operation is simplified, the user can realize the non-sensitive identity authentication in the login process, the login in the Web system can be quickly and conveniently completed, and the user experience is better. In addition, the login can be realized only by using the 5G message on the terminal equipment, and the 5G message fully inherits the characteristics of the code number system, the real-name system and the safety of the telecommunication service, so that the login of the Web system is carried out based on the 5G message, and the safety of the login operation is fully ensured.
Please refer to fig. 1, which is a schematic diagram illustrating a login system according to an embodiment of the present disclosure. As shown in fig. 1, the login system includes: terminal device 10, login apparatus 20, server 30.
And the terminal equipment 10 is used for receiving, viewing, editing and sending the 5G message. Optionally, the terminal device 10 may be a mobile phone, a tablet computer, a smart watch, or the like.
And a login device 20 for receiving login authentication information sent by the terminal device 10 and performing security authentication on the login operation of the target account.
And the server 30 is an enterprise server corresponding to the target account to be logged in, and is configured to complete service configuration according to the verification result fed back by the login device 20.
In some embodiments, the server 30 may be an independent physical server, may also be a server cluster or a distributed system formed by a plurality of physical servers, and may also be a cloud server providing basic cloud computing services such as a cloud service, a cloud database, cloud computing, cloud storage, a network service, cloud communication, a middleware service, a domain name service, a security service, a content distribution network, and a big data server.
In some embodiments, the login device 20 may exist independently of the server 30; alternatively, the login device 20 and the server 30 may be integrated.
The embodiments provided in the present application will be described in detail below with reference to the accompanying drawings.
The embodiment of the application provides a login method, which is applied to a login device in a login system shown in fig. 1. As shown in fig. 2, the method comprises the steps of:
s101, a login device receives a first request sent by a terminal device.
The first request is used for indicating that the Web system requests to log in a target account of the target application.
S102, the login device configures a first 5G message according to the first request.
The first 5G message is a message card carrying a login key, and the login key is used for triggering a login target account by a user.
Optionally, the login key may be a floating key or a built-in key of a message card. After the user clicks the floating key, the floating key disappears, and after the user clicks the built-in key of the message card, the built-in key does not disappear.
S103, the login device sends a first 5G message to the terminal device, so that the terminal device displays the first 5G message on a target chat robot page of the 5G message.
And the target chat robot page is a chat robot page corresponding to the target application in the 5G message. The target chat bot is a corresponding chat bot in the 5G message for the target application. Wherein, the target chat robot is used for carrying out message interaction with the individual user of the target application through the operator network. For example, the target chat robot may send 5G messages to individual users via peer-to-peer and group messaging, such as: text, pictures, audio, video, expressions, locations, contacts, and rich media message cards, among others.
Illustratively, the first 5G message presented on the target chat robot page may be in the form as shown in fig. 3.
In some embodiments, the user may trigger the target chat robot by scanning the two-dimensional code; or, the user can trigger the target chat robot by clicking the Deeplink; alternatively, the user may trigger the target chat robot by entering identification information of the target application in the message search box for searching.
In some embodiments, the 5G message of the terminal device is in an online state, i.e. the default target chat robot is in a logged-on state on the terminal device.
Therefore, based on the native characteristic of the 5G message (that is, the 5G message is a function of the terminal device itself), the user does not need to download or log in the target application on the terminal device, and only needs to be in the online state of the 5G message of the terminal device (that is, the target chat robot is in the login state on the terminal device), and the login operation of the target account in the Web system can be performed through the method provided by the embodiment of the present application.
In some embodiments, the user may indicate that the target account is approved to log in the Web system by clicking a login key carried in the message card, and the terminal device may generate a message that the user approves to log in, and send the message that the user approves to log in to the login device.
Optionally, the login apparatus may directly perform step S104 according to the will of the user (i.e., a login approval message sent by the terminal device), without verifying the login operation of the target account.
Because some applications are applied to the corresponding chat robots in the 5G messages, the security level is low, complicated verification is not needed, and only user authorization is needed, so that the login operation of the target account can be simplified. For example, if the target chat robot has only an online video playing function, and provides an online video playing tool for the user, the target chat robot has no greater security risk (e.g., personal privacy security, personal property security, etc.), and does not need a higher security level, as long as the user agrees to authorize login.
S104, the login device receives a message which is sent by the terminal equipment and allows the user to approve login.
S105, the login device configures a first prompt message according to the login approval message of the user.
The first prompt message is used for prompting the Web system to display a login success page.
S106, the login device sends a first prompt message to the Web system.
Correspondingly, the Web system receives the first prompt message and displays a login success page to prompt the user that the target account number is successfully logged in the Web system.
Based on the technical scheme provided by the embodiment of the application, at least the following beneficial effects can be generated: by utilizing the 5G message, when receiving a message that the Web system requests to log in a target account of a target application, the first 5G message carrying a login key is sent to the terminal device, the login key is used for triggering the login target account by a user, so that the user can trigger the login by clicking the login key, the user operation is simplified, the user can realize the non-sensitive identity authentication in the login process, the login in the Web system can be quickly and conveniently completed, and the user experience is better. In addition, the login can be realized only by utilizing the 5G message on the terminal equipment, downloading or related application is not needed, and the operation steps of the user are reduced. And because the 5G message fully inherits the characteristics of the code number system, the real name system and the safety of the telecommunication service, the login of the Web system is carried out based on the 5G message, and the safety of the login operation is fully ensured.
Optionally, as shown in fig. 4, after step S103, the method further includes: and verifying whether the login operation of the target account is abnormal or not. Specifically, the following steps S201 to S207 may be implemented:
s201, the login device receives login verification information sent by the terminal equipment.
The login verification information is used for verifying whether the login operation of the target account is abnormal or not.
S202, the login device carries out login verification according to the login verification information to obtain a verification result.
In some embodiments, when the login authentication information includes: when the identifier of the terminal device and the address information of the Web system are received, the login authentication process may be implemented as the following steps:
step a1, determining the historical login address base of the target account according to the identification of the terminal device.
The historical login address base comprises at least one historical login address of the target account.
And a2, performing login verification on the address information of the Web system according to the historical login address library to obtain a verification result.
Wherein, the verification result comprises: both pass and fail cases.
For example, if the address information of the Web system is the same as any one of the historical login addresses in the historical login address base, the verification result may be: and (6) passing the verification. If the address information of the Web system is not the same as any one of the historical login addresses in the historical login address base, the verification result may be: failing to pass the verification.
In other embodiments, when the login authentication information includes: and when the face characteristic information is obtained, verifying the face characteristic information according to the identity information of the user to obtain a verification result. For example, if the facial feature information matches the identity information of the user (e.g., the identity card of the user), the verification result may be: and (6) passing the verification. If the face feature information does not match the identity information of the user, the verification result may be: failing to pass the verification.
As a possible implementation manner, the terminal device may jump to a corresponding H5 page, and acquire facial feature information of the user by calling a native camera device of the terminal device, and then send the facial feature information to the login device as login verification information.
In some embodiments, the above method further comprises: determining at least one login authentication mode; wherein at least one login authentication mode is related to the security level of the target chat robot; and performing login verification based on at least one login verification mode and login verification information corresponding to each login verification mode to obtain a verification result.
It is understood that different applications have different functions, and the security level of the corresponding chat bot in the 5G message is different for the application. For example, the security levels of the chat robot corresponding to the application with the video playing function in the 5G message and the chat robot corresponding to the application with the payment function in the 5G message are different, and obviously, the security level of the chat robot corresponding to the application with the payment function in the 5G message is higher, and thus, the corresponding login authentication mode is more difficult. Therefore, the login authentication mode can be determined according to the security level of the target chat robot, and login authentication operation can be simplified as much as possible under the condition that login security is ensured.
In some embodiments, in the case that the verification result is that the verification is passed, the login apparatus sends login success prompt information to the terminal device, where the login success prompt information is used to prompt that the user target account successfully logs in the Web system. And simultaneously, the login device sends a first prompt message to the Web system, wherein the first prompt message is used for prompting the Web system to display a login success page.
Correspondingly, the terminal equipment receives login success prompt information sent by the login device and displays the login success prompt information on a target chat robot page; and the Web system receives the first prompt message sent by the login device and displays a login success page.
In some embodiments, in the case that the verification result is non-verification passed, the following steps S203-S207 are performed:
and S203, configuring a second 5G message by the login device.
The second 5G message is a message card carrying abnormal prompt information and operable keys; the abnormity prompting information is used for prompting the abnormity of the target account of the user in the login process; the operable key is used for selecting whether to continuously log in the target account by the user; the operable key includes: and continuing to log in the key.
Optionally, the operable key may be a floating key or a message card built-in key.
And S204, the login device sends the second 5G message to the terminal equipment, so that the terminal equipment displays the second 5G message on the page of the target chat robot.
Illustratively, the second 5G message presented on the target chat robot page may be in the form as shown in fig. 5.
In some embodiments, the user may indicate that the target account is agreed to continue to log on the Web system by clicking a login continuation key carried in the message card, and the terminal device may generate a message that the user agrees to continue to log on, and send the message that the user agrees to continue to log on to the login apparatus.
S205, the login device receives the message which is sent by the terminal equipment and the user agrees to continue login.
S206, the login device configures a continuous login prompt message according to the message that the user agrees to continue login.
And the continuous login prompt message is used for prompting the Web system to display a login success page.
S207, the login device transmits a login continuation prompt message to the Web system.
Based on the technical scheme, the following beneficial effects can be at least generated: the login verification is carried out through the login verification information, and the operation of the login verification is realized by the login device, so that the user operation is simplified, and the user experience is improved. In addition, one or more verification modes can be adapted according to the security level of the chat robot of the target application, and then the verification information is logged in to carry richer verification information forms, so that higher-level security verification is realized.
The embodiment of the application provides a login method, which is applied to terminal equipment in a login system shown in fig. 1. As shown in fig. 6, the method comprises the steps of:
s301, the terminal device detects a login trigger operation of a target account to be logged in.
The target account to be logged in is an account registered in the target application.
In some embodiments, the login triggering operation is an operation of scanning, by the terminal device, a two-dimensional code displayed on an account login page of the target application in the Web system.
In some embodiments, the terminal device supports recognizing a Deeplink corresponding to the chat robot. Optionally, the terminal device triggers a Deeplink by scanning a two-dimensional code displayed on a login page of an account of a target application in the Web system, so that the terminal device sends a first request to the login device and directly enters a page of the target chat robot. The Deeplink is used for jumping to a specified chat robot, and is also used for sending specific message content (namely a first request sent by the terminal device to the login device) after jumping. Optionally, the Deeplink may be set in a two-dimensional code displayed on an account login page of the target application, that is, the Deeplink is triggered by scanning the two-dimensional code.
Therefore, through introducing the deep link, the embodiment of the application can directly jump to the corresponding chat robot page and bring in specific message content, the user does not need to input the message content, the operation is simplified, and the use experience of the user is improved.
S302, responding to a login trigger operation of a target account to be logged in, and sending a first request to a login device by the terminal equipment.
The first request is used for indicating that the Web system requests to log in a target account of the target application.
S303, the terminal equipment receives the first 5G message sent by the login device.
S304, the terminal device displays the first 5G message on the page of the target chat robot.
The first 5G message is a message card carrying a login key, and the login key is used for triggering a login target account by a user.
S305, the terminal device detects the operation of clicking a login key by the user.
It should be understood that the operation of clicking the login key by the user indicates that the user agrees to login the target account on the Web system.
Optionally, after the user clicks the login key, the user may directly send a login approval message to the login apparatus according to the intention of the user (i.e., the user approves the login of the target account on the Web system), and step S306 is directly executed without verifying the login operation of the target account.
S306, responding to the operation that the user clicks the login key, the terminal equipment sends a message that the user agrees to login to the login device.
And S307, the terminal equipment receives login success prompt information sent by the login device.
And the login success prompt message is used for prompting that the target account of the user successfully logs in the Web system.
Based on the technical scheme provided by the embodiment of the application, at least the following beneficial effects can be generated: a user can execute login triggering operation of a target account to be logged in through terminal equipment; the user can also receive the 5G message through the 5G message page of the terminal device, and can trigger login by clicking the login key carried by the message card of the 5G message, so that the user operation is simplified, the login of the Web system can be quickly and conveniently completed, and the user experience is better.
Optionally, as shown in fig. 7, after step S305, the method further includes: the terminal equipment sends login verification information to the login device, so that the login device verifies whether the login operation of the target account is abnormal or not. Specifically, the following steps S401 to S405 may be implemented:
s401, the terminal equipment sends login verification information to the login device, so that the login device performs login verification according to the login verification information to obtain a verification result.
The login verification information is used for verifying whether the login operation of the target account is abnormal or not.
In some embodiments, in the case that the verification result is that the verification is passed, the terminal device receives login success prompt information sent by the login device, and the login success prompt information is used for prompting that the user target account is successfully logged in the Web system.
In some embodiments, in the case that the authentication result is that the authentication is not passed, the login apparatus configures a second 5G message and transmits the second 5G message to the terminal device. The second 5G message is a message card carrying abnormal prompt information and operable keys; the abnormity prompting information is used for prompting the abnormity of the target account of the user in the login process; the operable key is used for selecting whether to continuously log in the target account by the user; the operable key includes: and continuing to log in the key.
Accordingly, the terminal device performs the following steps S402 to S405:
s402, the terminal equipment receives a second 5G message sent by the login device.
And S403, the terminal equipment displays the second 5G message on the page of the target chat robot.
S404, the terminal device detects that the user clicks a continuous login key.
It should be understood that the user clicks the continue login button to indicate that the user knows that the target account is abnormal during the login process and agrees to continue the login of the target account on the Web system.
S405, the terminal equipment responds to the operation that the user clicks the login continuation key, and sends a message that the user agrees to continue login to the login device, so that the login device sends a login continuation prompt message to the Web system according to the message that the user agrees to continue login.
And the continuous login prompt message is used for prompting the Web system to display a login success page.
Based on the technical scheme, the following beneficial effects can be at least generated: the terminal equipment sends login authentication information to the login device, so that the login device performs login authentication according to the login authentication information to obtain an authentication result. Therefore, the operation of login verification is realized by the login device, so that the user can realize the non-inductive identity authentication in the login process, the login in the Web system can be quickly and conveniently completed, and the user experience is better.
In the following, for ease of understanding, the embodiments of the present application provide a complete login method for the login system shown in fig. 1. Illustratively, as shown in fig. 8, the method may include the steps of:
s501, detecting a login trigger operation of a target account to be logged in.
In some embodiments, the login triggering operation is an operation of scanning, by the terminal device, a two-dimensional code displayed on an account login page of the target application in the Web system.
S502, responding to a login trigger operation of a target account to be logged in, and sending a first request to a login device by the terminal equipment.
The first request is used for indicating that the Web system requests to log in a target account of the target application.
S503, the login device receives a first request sent by the terminal equipment, and configures a first 5G message according to the first request.
The first 5G message is a message card carrying a login key, and the login key is used for triggering a login target account by a user.
S504, the login device sends a first 5G message to the terminal equipment.
And S505, the terminal equipment receives the first 5G message sent by the login device, and displays the first 5G message on a target chat robot page.
S506, detecting the operation of clicking a login key by the user.
Optionally, after the user clicks the login key, the user may send a login approval message to the login apparatus directly according to the intention of the user (i.e., the user approves the login of the target account on the Web system), and step S507 is directly performed without verifying the login operation of the target account.
And S507, responding to the operation that the user clicks the login key, and sending a message that the user agrees to login to the login device by the terminal equipment.
And S508, the login device receives a login approval message sent by the terminal equipment, and configures a first prompt message according to the login approval message.
The first prompt message is used for prompting the Web system to display a login success page.
S509, the login device transmits the first prompt message to the Web system.
Correspondingly, the Web system receives the first prompt message and displays a login success page to prompt the user that the target account number is successfully logged in the Web system.
Optionally, as shown in fig. 9, after step S506, the method further includes: and verifying whether the login operation of the target account is abnormal or not. Specifically, the following steps S601 to S609 can be implemented:
s601, responding to the operation that the user clicks a login key, and sending login verification information to a login device by the terminal equipment.
The login verification information is used for verifying whether the login operation of the target account is abnormal or not.
S602, the login device receives login authentication information sent by the terminal equipment, and performs login authentication according to the login authentication information to obtain an authentication result.
In some embodiments, in the case that the verification result is that the verification is passed, the login device sends login success prompt information to the terminal device, where the login success prompt information is used to prompt that the user target account is successfully logged in the Web system. And simultaneously, the login device sends a first prompt message to the Web system, wherein the first prompt message is used for prompting the Web system to display a login success page.
And S603, configuring a second 5G message by the login device when the verification result is that the verification is not passed.
The second 5G message is a message card carrying abnormal prompt information and operable keys; the abnormity prompting information is used for prompting the abnormity of the target account of the user in the login process; the operable key is used for selecting whether to continuously log in the target account by the user; the operable key includes: and continuing to log in the key.
And S604, the login device sends the second 5G message to the terminal equipment.
And S605, the terminal equipment receives the second 5G message, and displays the second 5G message on the page of the target chat robot.
And S606, detecting the operation of clicking the continuous login key by the user.
And S607, responding to the operation that the user clicks the login continuation key, and sending a message that the user agrees to continue login to the login device by the terminal equipment.
And S608, the login device receives the information that the user agrees to continue login, and configures a continuous login prompt message according to the information that the user agrees to continue login.
And the continuous login prompt message is used for prompting the Web system to display a login success page.
And S609, the login device sends a login continuing prompt message to the Web system.
Correspondingly, the Web system receives the continuous login prompt message and displays a login success page to prompt the user that the target account number is successfully logged in the Web system.
It can be seen that the foregoing describes the solution provided by the embodiments of the present application primarily from a methodological perspective. In order to implement the functions, the embodiments of the present application provide corresponding hardware structures and/or software modules for performing the respective functions. Those of skill in the art will readily appreciate that the various illustrative modules and algorithm steps described in connection with the embodiments disclosed herein may be implemented as hardware or combinations of hardware and computer software. Whether a function is performed as hardware or computer software drives hardware depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
In the embodiment of the present application, functional modules may be divided according to the above method example, for example, each functional module may be divided corresponding to each function, or two or more functions may be integrated into one processing module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. Optionally, the division of the modules in the embodiment of the present application is schematic, and is only a logic function division, and there may be another division manner in actual implementation.
Fig. 10 is a schematic structural diagram of a login apparatus according to an embodiment of the present application. The login device can be used for executing the login method provided by the method embodiment. The login apparatus 700 includes: a receiving module 701 and a transmitting module 702. In other embodiments, the logging apparatus 700 further comprises: an authentication module 703 and a message configuration module 704.
A receiving module 701, configured to receive a first request sent by a terminal device; the first request is used for indicating that the Web system requests to log in a target account of the target application.
A sending module 702, configured to send a first 5G message to a terminal device based on a first request, so that the terminal device displays the first 5G message on a target chat robot page, where the target chat robot page is a chat robot page corresponding to a target application in the 5G message; the first 5G message is a message card carrying a login key, and the login key is used for triggering a login target account by a user.
The receiving module 701 is further configured to receive a message sent by the terminal device that the user agrees to login.
The sending module 702 is further configured to send a first prompt message to the Web system according to the login agreement message of the user, where the first prompt message is used to prompt the Web system to display a login success page.
In some embodiments, the receiving module 701 is further configured to receive login authentication information sent by the terminal device; the login verification information is used for verifying whether the login operation of the target account is abnormal or not; the verification module 703 is configured to perform login verification according to the login verification information to obtain a verification result; the sending module 702 is further configured to send a first prompt message to the Web system when the verification result is that the verification is passed, where the first prompt message is used to prompt the Web system to display a login success page.
In some embodiments, the authentication module 703 is specifically configured to, when the login authentication information includes: when the identification of the terminal equipment and the address information of the Web system exist, determining a historical login address base of a target account according to the identification of the terminal equipment; the historical login address base comprises at least one historical login address of a target account; performing login verification on address information of the Web system according to the historical login address library to obtain a verification result; or, when the login authentication information includes: and when the face characteristic information is obtained, verifying the face characteristic information according to the identity information of the user to obtain a verification result.
In some embodiments, the message configuration module 704 is configured to configure a second 5G message if the verification result is that the verification is not passed; the second 5G message is a message card carrying abnormal prompt information and operable keys; the abnormity prompting information is used for prompting the abnormity of the target account of the user in the login process; the operable key is used for selecting whether to continuously log in the target account by the user; the operable key includes: continuing to log in the key; the sending module 702 is further configured to send the second 5G message to the terminal device, so that the terminal device displays the second 5G message on the page of the target chat robot.
In some embodiments, the receiving module 701 is further configured to receive a message sent by the terminal device that the user agrees to continue logging on; the sending module 702 is further configured to send a login continuation prompting message to the Web system according to a message that the user agrees to continue login, where the login continuation prompting message is used to prompt the Web system to display a login success page.
In some embodiments, the authentication module 703 is further configured to determine at least one login authentication manner; wherein at least one login authentication mode is related to the security level of the target chat robot; and performing login verification based on at least one login verification mode and login verification information corresponding to each login verification mode to obtain a verification result.
Fig. 11 is a schematic structural diagram of a login apparatus according to an embodiment of the present application. The login device can be used for executing the login method provided by the method embodiment. The login apparatus 800 includes: a sending module 801 and a receiving module 802.
A sending module 801, configured to send a first request to a login device in response to a login trigger operation of a target account to be logged in; the first request is used for indicating that the Web system requests to log in a target account of a target application; the login triggering operation is an operation that the terminal device scans a two-dimensional code displayed on an account login page of a target application in the Web system.
The receiving module 802 is configured to receive a first 5G message sent by a login device, and display the first 5G message on a target chat robot page, where the target chat robot page is a chat robot page corresponding to a target application in the 5G message; the first 5G message is a message card carrying a login key, and the login key is used for triggering a login target account by a user.
The sending module 801 is further configured to send a message that the user agrees to login to the login device in response to an operation of clicking a login key by the user.
The receiving module 802 is further configured to receive login success prompt information sent by the login apparatus, where the login success prompt information is used to prompt that the user target account logs in the Web system successfully.
In some embodiments, the sending module 801 is further configured to send login authentication information to the login apparatus, so that the login apparatus performs login authentication according to the login authentication information to obtain an authentication result; the login verification information is used for verifying whether the login operation of the target account is abnormal or not; the receiving module 802 is further configured to receive login success prompt information sent by the login apparatus when the verification result is that the verification is passed, where the login success prompt information is used to prompt the user that the target account logs in the Web system successfully.
In some embodiments, the receiving module 802 is further configured to receive a second 5G message sent by the login device and display the second 5G message on the target chat robot page if the verification result is that the verification is not passed; the second 5G message is a message card carrying abnormal prompt information and operable keys; the abnormity prompting information is used for prompting the abnormity of the target account of the user in the login process; the operable key is used for selecting whether to continuously log in the target account by the user; the operable key includes: continuing to log in the key; the sending module 801 is further configured to send, in response to an operation of clicking a login continuation button by the user, a message that the login device agrees to continue login, so that the login device sends a login continuation prompt message to the Web system according to the message that the login device agrees to continue login, where the login continuation prompt message is used to prompt the Web system to display a login success page.
In the case of implementing the functions of the integrated module in the form of hardware, the embodiment of the present invention provides another possible structural schematic diagram of the login apparatus in the above embodiment. As shown in fig. 12, the registration device includes: a processor 902, a communication interface 903, and a bus 904. Optionally, the login apparatus may further include a memory 901.
The processor 902 may be any means that can implement or execute the various illustrative logical blocks, modules, and circuits described in connection with the disclosure herein. The processor 902 may be a central processing unit, general purpose processor, digital signal processor, application specific integrated circuit, field programmable gate array or other programmable logic device, transistor logic device, hardware component, or any combination thereof. Which may implement or perform the various illustrative logical blocks, modules, and circuits described in connection with the disclosure. The processor 902 may also be a combination of computing functions, e.g., comprising one or more microprocessors, a combination of DSPs and microprocessors, and the like.
A communication interface 903 for connecting with other devices through a communication network. The communication network may be an ethernet network, a radio access network, a Wireless Local Area Network (WLAN), etc.
The memory 901 may be, but is not limited to, a read-only memory (ROM) or other type of static storage device that can store static information and instructions, a Random Access Memory (RAM) or other type of dynamic storage device that can store information and instructions, an electrically erasable programmable read-only memory (EEPROM), a magnetic disk storage medium or other magnetic storage device, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer.
As a possible implementation, the memory 901 may exist separately from the processor 902, and the memory 901 may be connected to the processor 902 through the bus 904 for storing instructions or program code. The processor 902, when calling and executing the instructions or program codes stored in the memory 901, can implement the login method provided by the embodiment of the present invention.
In another possible implementation, the memory 901 may also be integrated with the processor 902.
The bus 904 may be an Extended Industry Standard Architecture (EISA) bus or the like. The bus 904 may be divided into an address bus, a data bus, a control bus, and the like. For ease of illustration, only one thick line is shown in FIG. 12, but this is not intended to represent only one bus or type of bus.
Through the description of the above embodiments, it is clear to those skilled in the art that, for convenience and simplicity of description, the foregoing division of the functional modules is merely used as an example, and in practical applications, the above function distribution may be completed by different functional modules according to needs, that is, the internal structure of the login device is divided into different functional modules to complete all or part of the above described functions.
The embodiment of the application also provides a computer readable storage medium. All or part of the processes in the above method embodiments may be performed by computer instructions to instruct related hardware, and the program may be stored in the above computer-readable storage medium, and when executed, may include the processes in the above method embodiments. The computer readable storage medium may be of any of the embodiments described above or a memory. The computer readable storage medium may also be an external storage device of the login apparatus, such as a plug-in hard disk, a Smart Memory Card (SMC), a Secure Digital (SD) card, a flash card (flash card), and the like provided on the login apparatus. Further, the computer-readable storage medium may include both an internal storage unit and an external storage device of the login apparatus. The computer-readable storage medium stores the computer program and other programs and data necessary for the login device. The above-described computer-readable storage medium may also be used to temporarily store data that has been output or is to be output.
Embodiments of the present application further provide a computer program product, which contains a computer program, and when the computer program product runs on a computer, the computer is caused to execute any one of the login methods provided in the above embodiments.
The above description is only an embodiment of the present application, but the scope of the present application is not limited thereto, and any changes or substitutions within the technical scope of the present disclosure should be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (12)

1. A method of logging in, the method comprising:
receiving a first request sent by terminal equipment; the first request is used for indicating that the Web system requests to log in a target account of a target application;
based on the first request, sending a first 5G message to the terminal device, so that the terminal device displays the first 5G message on a target chat robot page of the 5G message, wherein the target chat robot page is a chat robot page corresponding to the target application in the 5G message; the first 5G message is a message card carrying a login key, and the login key is used for triggering a user to log in the target account;
receiving a message which is sent by the terminal equipment and used for the user to approve login;
and sending a first prompt message to the Web system according to the login approval message of the user, wherein the first prompt message is used for prompting the Web system to display a login success page.
2. The method of claim 1, wherein after sending the first 5G message to the terminal device based on the first request, the method further comprises:
receiving login verification information sent by the terminal equipment; the login verification information is used for verifying whether the login operation of the target account is abnormal or not;
performing login verification according to the login verification information to obtain a verification result;
the sending a first prompt message to the Web system according to the message that the user agrees to login further comprises:
and sending the first prompt message to the Web system under the condition that the verification result is that the verification is passed.
3. The method of claim 2, wherein performing login authentication according to the login authentication information to obtain an authentication result comprises:
when the login verification information comprises the identification of the terminal equipment and the address information of the Web system, determining a historical login address base of the target account according to the identification of the terminal equipment; the historical login address base comprises at least one historical login address of the target account;
performing login verification on the address information of the Web system according to the historical login address library to obtain a verification result; alternatively, the first and second liquid crystal display panels may be,
and when the login verification information comprises the face feature information, verifying the face feature information according to the identity information of the user to obtain the verification result.
4. The method according to claim 2, wherein in case that the verification result is non-verified, the method further comprises:
configuring a second 5G message; the second 5G message is a message card carrying abnormal prompt information and operable keys; the abnormity prompting information is used for prompting the abnormity of the target account of the user in the login process; the operable key is used for selecting whether to continuously log in the target account or not by the user; the operable key includes: continuing to log in the key;
and sending the second 5G message to the terminal equipment, so that the terminal equipment displays the second 5G message on the page of the target chat robot.
5. The method of claim 4, wherein after sending the second 5G message to the terminal device, the method further comprises:
receiving a message which is sent by the terminal equipment and used for the user to approve to continue logging in;
and sending a continuous login prompt message to the Web system according to the message that the user agrees to continue login, wherein the continuous login prompt message is used for prompting the Web system to display a login success page.
6. The method according to claim 2, wherein the performing login authentication according to the login authentication information to obtain an authentication result further comprises:
determining at least one login authentication mode; wherein the at least one login authentication manner is associated with a security level of the target chat robot;
and performing login verification based on the at least one login verification mode and login verification information corresponding to each login verification mode to obtain a verification result.
7. A method of logging in, the method comprising:
responding to a login trigger operation of a target account to be logged in, and sending a first request to a login device; the first request is used for indicating that the Web system requests to log in a target account of a target application; the login triggering operation is an operation that the terminal equipment scans a two-dimensional code displayed on an account login page of the target application in the Web system;
receiving a first 5G message sent by the login device, and displaying the first 5G message on a target chat robot page, wherein the target chat robot page is a chat robot page corresponding to the target application in the 5G message; the first 5G message is a message card carrying a login key, and the login key is used for triggering a user to log in the target account;
responding to the operation of clicking the login key by the user, and sending a message that the user agrees to login to the login device;
and receiving login success prompt information sent by the login device, wherein the login success prompt information is used for prompting the user that the target account is successfully logged in the Web system.
8. The method of claim 7, wherein after receiving the first 5G message sent by the login device and presenting the first 5G message on the target chat robot page, the method further comprises:
sending login verification information to the login device, so that the login device performs login verification according to the login verification information to obtain a verification result; the login verification information is used for verifying whether the login operation of the target account is abnormal or not;
the receiving of the login success prompt message sent by the login device further includes:
and receiving login success prompt information sent by the login device under the condition that the verification result is that the verification is passed, wherein the login success prompt information is used for prompting the user that the target account is successfully logged in the Web system.
9. The method according to claim 8, wherein in case that the verification result is non-verified, the method further comprises:
receiving a second 5G message sent by the login device, and displaying the second 5G message on the page of the target chat robot; the second 5G message is a message card carrying abnormal prompt information and operable keys; the abnormity prompting information is used for prompting the abnormity of the target account of the user in the login process; the operable key is used for the user to select whether to continuously log in the target account; the operable key includes: continuing to log in the key;
and responding to the operation of clicking the login continuation key by the user, and sending a message of allowing the user to continue login to the login device, so that the login device sends a login continuation prompt message to the Web system according to the message of allowing the user to continue login, wherein the login continuation prompt message is used for prompting the Web system to display a login success page.
10. A login apparatus, comprising:
the receiving module is used for receiving a first request sent by the terminal equipment; the first request is used for indicating that the Web system requests to log in a target account of a target application;
a sending module, configured to send a first 5G message to the terminal device based on the first request, so that the terminal device displays the first 5G message on a target chat robot page of the 5G message, where the target chat robot page is a chat robot page corresponding to the target application in the 5G message; the first 5G message is a message card carrying a login key, and the login key is used for triggering a user to log in the target account;
the receiving module is further configured to receive a login consent message of the user sent by the terminal device;
the sending module is further configured to send a first prompt message to the Web system according to the login consent message of the user, where the first prompt message is used to prompt the Web system to display a login success page.
11. A login apparatus, comprising:
the sending module is used for responding to login triggering operation of a target account to be logged in and sending a first request to the login device; the first request is used for indicating that the Web system requests to log in a target account of a target application; the login triggering operation is an operation that the terminal equipment scans a two-dimensional code displayed on an account login page of the target application in the Web system;
a receiving module, configured to receive a first 5G message sent by the login device, and display the first 5G message on the target chat robot page, where the target chat robot page is a chat robot page corresponding to the target application in the 5G message; the first 5G message is a message card carrying a login key, and the login key is used for triggering a user to log in the target account;
the sending module is also used for responding to the operation of clicking the login key by the user and sending a message that the user agrees to login to the login device;
the receiving module is further configured to receive login success prompt information sent by the login device, where the login success prompt information is used to prompt the user that the target account is successfully logged in the Web system.
12. A computer-readable storage medium comprising computer-executable instructions that, when executed on a computer, cause the computer to perform the method of any of claims 1 to 9.
CN202210390512.8A 2022-04-14 2022-04-14 Login method, login device and computer readable storage medium Active CN114828000B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210390512.8A CN114828000B (en) 2022-04-14 2022-04-14 Login method, login device and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210390512.8A CN114828000B (en) 2022-04-14 2022-04-14 Login method, login device and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN114828000A true CN114828000A (en) 2022-07-29
CN114828000B CN114828000B (en) 2023-07-28

Family

ID=82536143

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210390512.8A Active CN114828000B (en) 2022-04-14 2022-04-14 Login method, login device and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN114828000B (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110392054A (en) * 2019-07-23 2019-10-29 网易(杭州)网络有限公司 Log in method of calibration, device, system, equipment and readable storage medium storing program for executing
CN110505245A (en) * 2019-09-24 2019-11-26 北京百度网讯科技有限公司 Login method, device and the equipment of application
CN112199652A (en) * 2020-10-23 2021-01-08 网易(杭州)网络有限公司 Login method, terminal, server, system, medium and equipment of application program
CN112291271A (en) * 2020-12-22 2021-01-29 畅捷通信息技术股份有限公司 Method, system and medium for automatically logging in server by mobile equipment
CN113453175A (en) * 2021-06-18 2021-09-28 金蝶软件(中国)有限公司 5G message processing method and device, computer equipment and storage medium
CN113709082A (en) * 2020-05-20 2021-11-26 腾讯科技(深圳)有限公司 Application login method and device and account login mode setting method
CN113747375A (en) * 2021-09-06 2021-12-03 重庆华龙网集团股份有限公司 One-key acquisition system and method for third-party application user sensitive information in 5G message
CN113765898A (en) * 2021-08-20 2021-12-07 北京来也网络科技有限公司 Login method, device, equipment and medium based on AI and RPA
CN114169885A (en) * 2021-11-17 2022-03-11 深圳市梦网科技发展有限公司 Digital currency payment method, device, terminal and computer readable storage medium
CN114268461A (en) * 2021-11-26 2022-04-01 中国联合网络通信集团有限公司 User identity authentication method, device, server, terminal and storage medium

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110392054A (en) * 2019-07-23 2019-10-29 网易(杭州)网络有限公司 Log in method of calibration, device, system, equipment and readable storage medium storing program for executing
CN110505245A (en) * 2019-09-24 2019-11-26 北京百度网讯科技有限公司 Login method, device and the equipment of application
CN113709082A (en) * 2020-05-20 2021-11-26 腾讯科技(深圳)有限公司 Application login method and device and account login mode setting method
CN112199652A (en) * 2020-10-23 2021-01-08 网易(杭州)网络有限公司 Login method, terminal, server, system, medium and equipment of application program
CN112291271A (en) * 2020-12-22 2021-01-29 畅捷通信息技术股份有限公司 Method, system and medium for automatically logging in server by mobile equipment
CN113453175A (en) * 2021-06-18 2021-09-28 金蝶软件(中国)有限公司 5G message processing method and device, computer equipment and storage medium
CN113765898A (en) * 2021-08-20 2021-12-07 北京来也网络科技有限公司 Login method, device, equipment and medium based on AI and RPA
CN113747375A (en) * 2021-09-06 2021-12-03 重庆华龙网集团股份有限公司 One-key acquisition system and method for third-party application user sensitive information in 5G message
CN114169885A (en) * 2021-11-17 2022-03-11 深圳市梦网科技发展有限公司 Digital currency payment method, device, terminal and computer readable storage medium
CN114268461A (en) * 2021-11-26 2022-04-01 中国联合网络通信集团有限公司 User identity authentication method, device, server, terminal and storage medium

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
MD. SAIFUL ISLAM BHUIYAN ET AL.: "BONIK: A Blockchain Empowered Chatbot for Financial Transactions", 2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM) *
UXUEPAI5G: "5G消息白皮书", 《HTTPS://BLOG.CSDN.NET/UXUEPAI5G/ARTICLE/DETAILS/105384025》 *
中兴通讯: "5G消息技术白皮书", 《HTTPS://RES-WWW.ZTE.COM.CN/MEDIARES/ZTE/FILES/PDF/WHITE_BOOK/202012021007.PDF》 *
李京京: "基于业务架构的5G消息应用方案研究", 中国金融电脑, no. 10 *

Also Published As

Publication number Publication date
CN114828000B (en) 2023-07-28

Similar Documents

Publication Publication Date Title
US10063547B2 (en) Authorization authentication method and apparatus
US10244105B2 (en) Methods and systems for real time display of caller location, profile, and trust relationship
US8577334B1 (en) Restricted testing access for electronic device
CN113645612B (en) Communication method and device
CN112073289B (en) Instant messaging control method and device
WO2021016275A1 (en) Systems and methods of gesture triggered automatic erasure on a private network
CN104346560A (en) Security authentication method and security authentication device
CN113067859B (en) Communication method and device based on cloud mobile phone
CN104092596A (en) Music user group management method, device and system
CN113746783B (en) Group chat authority control method, team instant messaging application and background server
US9877190B1 (en) System and method for authentication and sharing of subscriber data
KR101409790B1 (en) Remote control method between mobile telephone using program in mobile telephone
CN111666590A (en) Distributed file secure transmission method, device and system
CN111542033A (en) Near-field data transmission method and device and computer readable storage medium
EP4131908A1 (en) Interface display method and electronic device
CN114828000B (en) Login method, login device and computer readable storage medium
US11503456B1 (en) Maintaining electronic subscriber identity module (eSIM) profiles across multiple mobile network operators (MNOs)
CN112887191B (en) Information display control method and related device
CN111447236B (en) Block chain-based communication authentication method and device, terminal equipment and storage medium
CN104378395A (en) Methods and devices for OTT application accessing and server information pushing
CN115543646A (en) Contact processing method and device, computer equipment and storage medium
CN106302553A (en) The method and system of pushed information service
CN112306596A (en) Information interaction method and device and electronic equipment
CN112804403B (en) Information interaction method, electronic equipment and readable storage medium
CN114039754B (en) Security verification method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant