CN116488869A - Terminal device, server, authentication method and medium - Google Patents
Terminal device, server, authentication method and medium Download PDFInfo
- Publication number
- CN116488869A CN116488869A CN202310345444.8A CN202310345444A CN116488869A CN 116488869 A CN116488869 A CN 116488869A CN 202310345444 A CN202310345444 A CN 202310345444A CN 116488869 A CN116488869 A CN 116488869A
- Authority
- CN
- China
- Prior art keywords
- user account
- login
- user
- interface
- verification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 47
- 238000012795 verification Methods 0.000 claims abstract description 148
- 230000008859 change Effects 0.000 claims abstract description 55
- 230000004048 modification Effects 0.000 claims description 36
- 238000012986 modification Methods 0.000 claims description 36
- 230000004044 response Effects 0.000 claims description 13
- 238000004590 computer program Methods 0.000 claims description 5
- 238000010586 diagram Methods 0.000 description 13
- 238000012545 processing Methods 0.000 description 13
- 238000004891 communication Methods 0.000 description 8
- 230000008569 process Effects 0.000 description 8
- 230000006870 function Effects 0.000 description 3
- 230000003993 interaction Effects 0.000 description 3
- 102220077574 rs201561286 Human genes 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 102220139511 rs144140226 Human genes 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/107—Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/082—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying multi-factor authentication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
The disclosure relates to a terminal device, a server, a verification method and a medium, comprising: responding to the input of a user on a login interface, acquiring login information, generating a verification request based on the login information and sending the verification request to a server, wherein the verification request carries the login information and a first position of a terminal device, and the verification request is used for requesting first verification of a user account and a user password and carrying out second verification of consistency of the first position of the terminal device and a pre-stored second position of the user account after the first verification passes; and responding to a failure message sent by the server for the second verification, and displaying a target information changing control on the login interface, wherein the target information changing control is used for indicating to change target information on the target information changing interface, and the target information comprises at least one of a first position and a second position so that a user enters the target information changing interface to change the first position or the second position.
Description
Technical Field
The disclosure relates to the technical field of computer processing, and in particular relates to a terminal device, a server, a verification method and a medium.
Background
At present, terminal devices such as smart televisions and smart phones are widely applied to daily life and work of people, when a user uses the terminal device, user account verification is often required, in the process of verifying the user account, after the user account and a user password are confirmed to pass verification, the consistency of the registered position of the user account and the position of the current terminal device is required to be further verified, so that the user can normally use the terminal device when logging in the terminal device by using the user account.
However, in the prior art, when it is determined that the registered position of the user account is inconsistent with the position of the current terminal device, the display interface of the terminal device only displays prompt information for prompting that the current position of the terminal device of the user is inconsistent with the registered position of the user account, so that a solution for solving the inconsistent position of the terminal device and the registered position of the user account cannot be provided for the user, and user experience is affected.
Disclosure of Invention
In order to solve the above technical problems or at least partially solve the above technical problems, the present disclosure provides a terminal device, a server, a verification method, and a medium, where after receiving a failure message for a second verification sent by the server, a first controller of the terminal device determines that a first location of a current terminal device is inconsistent with a second location of a user account, and can provide a target information change control for changing the first location or the second location to a user at a login interface, so that the user can trigger the target information change control, and the user can quickly enter the target information change interface to implement change processing for the first location or the second location, so that the first location and the second location remain consistent, and experience of the user is improved.
In a first aspect, the present disclosure provides a terminal device, including:
a first controller configured to:
responding to the input of a user on a login interface, acquiring login information, generating a verification request based on the login information and sending the verification request to a server, wherein the verification request carries the login information and a first position of terminal equipment, and the login information comprises: the authentication request is used for requesting first authentication of the user account and the user password, and after the first authentication is passed, second authentication is carried out on consistency of a first position of the terminal equipment and a pre-stored second position of the user account;
and responding to a failure message sent by the server for the second verification, and displaying a target information changing control on the login interface, wherein the target information changing control is used for indicating to change target information on the target information changing interface, and the target information comprises at least one of a first position and a second position.
As an optional implementation of the embodiments of the present disclosure, the first controller is further configured to:
After determining that the login interface is not the login interface corresponding to the startup navigation of the terminal equipment, displaying the target information change control on the login interface;
the target information changing control comprises a user account information changing sub-control and a terminal equipment information changing sub-control, and the target information changing interface is a user account information changing interface corresponding to the user account information changing sub-control or a terminal equipment information changing interface corresponding to the terminal equipment information changing sub-control.
As an optional implementation manner of the embodiment of the disclosure, the first controller is specifically configured to:
responding to the triggering operation of the user account information changing sub-control, and displaying the user account information changing interface, wherein the user account information changing interface at least comprises: a second position setting item corresponding to the user account;
the second position is changed to the first position in response to a setting operation of the second position setting item.
As an optional implementation manner of the embodiment of the disclosure, the user account information modification sub-control is associated with a target link, where the target link is used to open a target login web page, and the target login web page is used to login the user account information modification interface;
The first controller is specifically further configured to:
responding to the triggering operation of the user account information changing sub-control, and displaying the target login webpage according to the target link;
and logging in the user account information modification interface according to the user account and the user password based on the target login webpage.
As an optional implementation manner of the embodiment of the disclosure, the first controller is specifically further configured to:
responding to the triggering operation of the terminal equipment information changing sub-control, and displaying the terminal equipment information changing interface, wherein the terminal equipment information changing interface at least comprises: a first position setting item corresponding to the terminal equipment;
the first position is changed to the second position in response to a setting operation of the first position setting item.
As an optional implementation of the embodiments of the present disclosure, the first controller is further configured to:
and after determining that the login interface is the login interface corresponding to the startup navigation of the terminal equipment, displaying terminal equipment information modification child control on the login interface.
In a second aspect, the present disclosure provides a server comprising:
A second controller configured to:
responding to a verification request sent by a terminal device, performing first verification on a user account and a user password, and performing second verification on consistency of a first position of the terminal device and a pre-stored second position of the user account after the first verification is determined to pass, wherein the verification request carries login information and the first position of the terminal device, and the login information comprises: a user account and a user password;
and after the second verification fails according to the consistency of the first position of the terminal equipment and the second position of the user account, sending a failure message aiming at the second verification to the terminal equipment.
In a third aspect, the present disclosure provides an authentication method, applied to a terminal device, including:
responding to the input of a user on a login interface, acquiring login information, generating a verification request based on the login information and sending the verification request to a server, wherein the verification request carries the login information and a first position of terminal equipment, and the login information comprises: the authentication request is used for requesting first authentication of the user account and the user password, and after the first authentication is passed, second authentication is carried out on consistency of a first position of the terminal equipment and a pre-stored second position of the user account;
And responding to a failure message sent by the server for the second verification, and displaying a target information changing control on the login interface, wherein the target information changing control is used for indicating to change target information on the target information changing interface, and the target information comprises at least one of a first position and a second position.
In a fourth aspect, the present disclosure provides an authentication method, applied to a server, including:
responding to a verification request sent by a terminal device, performing first verification on a user account and a user password, and performing second verification on consistency of a first position of the terminal device and a pre-stored second position of the user account after the first verification is determined to pass, wherein the verification request carries login information and the first position of the terminal device, and the login information comprises: a user account and a user password;
and after the second verification fails according to the consistency of the first position of the terminal equipment and the second position of the user account, sending a failure message aiming at the second verification to the terminal equipment.
In a fifth aspect, the present disclosure provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the authentication method according to the third and fourth aspects.
Compared with the prior art, the technical scheme provided by the embodiment of the disclosure has the following advantages:
in the technical scheme provided by the embodiment of the disclosure, a first controller of a terminal device responds to input of a user on a login interface, acquires login information, generates a verification request based on the login information and sends the verification request to a server, wherein the verification request carries the login information and a first position of the terminal device, and the login information comprises: the authentication request is used for requesting first authentication of the user account and the user password, and after the first authentication passes, second authentication is performed on consistency of a first position of the terminal equipment and a pre-stored second position of the user account; and responding to a failure message sent by the server for the second verification, and displaying a target information changing control on the login interface, wherein the target information changing control is used for indicating to change target information on the target information changing interface, and the target information comprises at least one of a first position and a second position. According to the technical scheme, after the first controller of the terminal equipment receives the failure message for the second verification sent by the server, the first position of the current terminal equipment is determined to be inconsistent with the second position of the user account, the target information change control for changing the first position or the second position can be provided for the user at the login interface, the user can conveniently trigger the target information change control, the user can quickly enter the target information change interface, the change processing of the first position or the second position is realized, the first position and the second position are kept consistent, and the user experience is improved.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the disclosure and together with the description, serve to explain the principles of the disclosure.
In order to more clearly illustrate the embodiments of the present disclosure or the solutions in the prior art, the drawings that are required for the description of the embodiments or the prior art will be briefly described below, and it will be obvious to those skilled in the art that other drawings can be obtained from these drawings without inventive effort.
Fig. 1 is a schematic view of a scenario architecture of a verification method provided in an embodiment of the present disclosure;
FIG. 2 is a schematic diagram of a user prompt interface provided by an embodiment of the present disclosure;
FIG. 3 is a schematic diagram of another user prompt interface provided by an embodiment of the present disclosure;
fig. 4 is a hardware configuration block diagram of a terminal device 200 according to one or more embodiments of the present disclosure;
fig. 5 is a schematic diagram of a software configuration in a terminal device 200 according to one or more embodiments of the present disclosure;
FIG. 6 is a schematic flow chart of a verification method according to an embodiment of the disclosure;
FIG. 7 is an interactive schematic diagram of a verification method provided in an embodiment of the disclosure;
FIG. 8 is an interface diagram of a login interface according to an embodiment of the present disclosure;
FIG. 9 is a schematic diagram of an interface for displaying a target information modification control according to an embodiment of the present disclosure;
FIG. 10 is a schematic diagram of yet another user prompt interface provided by an embodiment of the present disclosure;
FIG. 11 is a flow chart of another verification method provided by an embodiment of the present disclosure;
fig. 12 is an interface schematic diagram of displaying a user account information modification sub-control and a terminal device information modification sub-control according to an embodiment of the present disclosure;
FIG. 13 is a flow chart of a further verification method according to an embodiment of the disclosure;
fig. 14 is a schematic diagram of a user account information modification interface provided in an embodiment of the present disclosure;
fig. 15 is a schematic diagram of a terminal device information modification interface according to an embodiment of the present disclosure;
FIG. 16 is a flow chart of yet another verification method provided by an embodiment of the present disclosure;
fig. 17 is a flowchart of yet another verification method according to an embodiment of the disclosure.
Detailed Description
In order that the above objects, features and advantages of the present disclosure may be more clearly understood, a further description of aspects of the present disclosure will be provided below. It should be noted that, without conflict, the embodiments of the present disclosure and features in the embodiments may be combined with each other.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present disclosure, but the present disclosure may be practiced otherwise than as described herein; it will be apparent that the embodiments in the specification are only some, but not all, embodiments of the disclosure.
The terms "first" and "second" and the like in this disclosure are used to distinguish between different objects and are not used to describe a particular order of objects. For example, the first processing result and the second processing result, etc., are used to distinguish between different processing results, not to describe a particular order of processing results.
When a user uses a terminal device, user account verification is often required, and in the process of verifying the user, after the user account and a user password pass, the consistency of the registered position of the user account and the position of the current terminal device is further required to be verified, so that the user can normally use the terminal device when logging in the terminal device by using the user account. However, when it is determined that the registered position of the user account is inconsistent with the position of the current terminal device, the display interface of the terminal device only displays prompt information for prompting the user that the position of the current terminal device is inconsistent with the registered position of the user account.
Exemplary, fig. 1 is a schematic view of a scenario architecture of a verification method provided by an embodiment of the present disclosure, where the scenario architecture provided by the embodiment of the present disclosure includes: the server 100 and the terminal device 200, the terminal device 200 may have various embodiments, and for example, may be a smart tv, a smart phone, a personal computer, a display, and the like. When a user inputs login information, such as a user account and a user password, on a login interface of a terminal device 200, a verification request is generated according to the login information, the verification request is sent to a server 100, when the server 100 receives the verification request, the first verification is performed for the user account and the user password carried by the verification request, after the first verification passes, a second verification needs to be further performed for consistency of a registered position of the user account and a position where the current terminal device is located, so as to ensure that the user can normally use the terminal device 200 when logging in the terminal device 200 by using the user account.
Still another exemplary, as shown in fig. 3, after the terminal device 200 receives the failure message, a user prompt interface 203 is displayed on the display interface 201 of the terminal device 200, and the user prompt interface 203 may also prompt the user for a relevant web page for changing location information, such as a prompt message "may change location information on an xxx.xxx.com web page" displayed on the user prompt interface 202.
Based on the above, in the prior art, a scheme for solving the problem that the registration position of the user account is inconsistent with the position of the terminal equipment cannot be provided for the user, so that the user experience is affected.
In order to solve the above-mentioned problems, an embodiment of the present disclosure proposes an authentication method, applied to a terminal device, including: the first controller of the terminal equipment responds to the input of a user on a login interface, acquires login information, generates a verification request based on the login information and sends the verification request to the server, wherein the verification request carries the login information and a first position of the terminal equipment, and the login information comprises: the authentication request is used for requesting first authentication of the user account and the user password, and after the first authentication passes, second authentication is performed on consistency of a first position of the terminal equipment and a pre-stored second position of the user account; and responding to a failure message sent by the server for the second verification, and displaying a target information changing control on the login interface, wherein the target information changing control is used for indicating to change target information on the target information changing interface, and the target information comprises at least one of a first position and a second position. According to the technical scheme, after the first controller of the terminal equipment receives the failure message for the second verification sent by the server, the first position of the current terminal equipment is determined to be inconsistent with the second position of the user account, the target information change control for changing the first position or the second position can be provided for the user at the login interface, the user can conveniently trigger the target information change control, the user can quickly enter the target information change interface, the change processing of the first position or the second position is realized, the first position and the second position are kept consistent, and the user experience is improved.
In some embodiments, the terminal device 200 may be in data communication with the server 100 upon receiving a voice command from a user. The terminal device 200 may be allowed to make a communication connection with the server 100 through a Local Area Network (LAN), a Wireless Local Area Network (WLAN).
The server 100 may be a server providing various services, such as a server providing support for audio data collected by the terminal device 200. The server may perform analysis and other processing on the received data such as audio, and feed back the processing result (e.g., endpoint information) to the terminal device. The server 100 may be a server cluster, or may be a plurality of server clusters, and may include one or more types of servers.
The verification method provided by the embodiment of the present disclosure may be performed by the server 100, may be performed by the terminal device 200, or may be performed by both the server 100 and the terminal device 200, which is not limited in this disclosure.
In some embodiments, the terminal device 200 may also be controlled by a control device. The control device may be a remote controller, and the communication between the remote controller and the terminal device 200 may include infrared protocol communication, bluetooth protocol communication, wireless or other wired mode, etc., by which the terminal device 200 can be controlled. The user can control the terminal device 200 by inputting user instructions through keys on a remote controller, voice input, control panel input, and the like. Such as: the user can input corresponding control instructions through volume up-down keys, menu keys, on-off keys and the like on the remote controller to realize the function of controlling the terminal device 200.
Fig. 4 is a hardware configuration block diagram of a terminal device 200 according to one or more embodiments of the present disclosure. The terminal apparatus 200 as shown in fig. 4 includes at least one of a modem 210, a communicator 220, a detector 230, an external device interface 240, a first controller 250, a display 260, an audio output interface 270, a memory, a power supply, and a user interface (i.e., a user input interface) 280. The first controller 250 includes a central processor, a video processor, an audio processor, a graphic processor, a RAM, a ROM, and first to nth interfaces for input/output. The display 260 may be at least one of a liquid crystal display, an OLED display, a touch display, and a projection display, and may also be a projection device and a projection screen. The modem 210 receives broadcast television signals through a wired or wireless reception manner, and demodulates audio and video signals, such as EPG data signals, from a plurality of wireless or wired broadcast television signals. The communicator 220 is a component for communicating with external devices or servers according to various communication protocol types. For example: the communicator may include at least one of a Wifi module, a bluetooth module, a wired ethernet module, or other network communication protocol chip or a near field communication protocol chip, and an infrared receiver. The terminal device 200 may establish transmission and reception of control signals and data signals with an external control device or the server 100 through the communicator 220. The detector 230 is used to collect signals of the external environment or interaction with the outside. The first controller 250 and the modem 210 may be located in different separate devices, i.e., the modem 210 may also be located in an external device of the main device where the first controller 250 is located, such as an external set-top box. The user interface 280 may be used to receive control signals for a control device, such as an infrared remote control or the like.
In some embodiments, the first controller 250 controls the operation of the terminal device and responds to the user's operations through various software control programs stored on the memory. The first controller 250 controls the overall operation of the terminal device 200. The user may input a user command through a Graphical User Interface (GUI) displayed on the display 260, and the user input interface receives the user input command through the Graphical User Interface (GUI). Alternatively, the user may input the user command by inputting a specific sound or gesture, and the user input interface recognizes the sound or gesture through the sensor to receive the user input command.
In some embodiments, a "user interface" is a media interface for interaction and exchange of information between an application or operating system and a user that enables conversion between an internal form of information and a form acceptable to the user. A commonly used presentation form of the user interface is a graphical user interface (Graphic User Interface, GUI for short), which refers to a user interface related to computer operations that is displayed in a graphical manner. It may be an interface element such as an icon, a window, and a control displayed in a display screen of the electronic device, where the control may include at least one of a visual interface element such as an icon, a button, a menu, a tab, a text box, a dialog box, a status bar, a navigation bar, a Widget, and the like.
Fig. 5 is a schematic view of software configuration in a terminal device 200 according to one or more embodiments of the present disclosure, as shown in fig. 5, the system is divided into four layers, namely, an application layer (application layer), an application framework layer (Application Framework layer), an Android run layer and a system library layer (system runtime layer), and a kernel layer from top to bottom.
In some embodiments, at least one application program is running in the application program layer, and these application programs may be a Window (Window) program of an operating system, a system setting program, a clock program, or the like; or may be an application developed by a third party developer. In particular implementations, applications in the application layer include, but are not limited to, the examples above.
In some embodiments, the system runtime layer provides support for the upper layer, the framework layer, and when the framework layer is in use, the android operating system runs the C/C++ libraries contained in the system runtime layer to implement the functions to be implemented by the framework layer.
In some embodiments, the kernel layer is a layer between hardware and software, containing at least one of the following drivers: audio drive, display drive, bluetooth drive, camera drive, WIFI drive, USB drive, HDMI drive, sensor drive (e.g., fingerprint sensor, temperature sensor, pressure sensor, etc.), and power supply drive, etc.
In some embodiments, the terminal device is a device with a display function, such as a smart tv, a mobile phone, a computer, a learning machine, and the like. The terminal equipment comprises:
a first controller 250 configured to: responding to the input of a user on a login interface, acquiring login information, generating a verification request based on the login information and sending the verification request to a server, wherein the verification request carries the login information and a first position of terminal equipment, and the login information comprises: the authentication request is used for requesting first authentication of the user account and the user password, and after the first authentication is passed, second authentication is carried out on consistency of a first position of the terminal equipment and a pre-stored second position of the user account;
and responding to a failure message sent by the server for the second verification, and displaying a target information changing control on the login interface, wherein the target information changing control is used for indicating to change target information on the target information changing interface, and the target information comprises at least one of a first position and a second position.
In some embodiments, the first controller 250 is further configured to: after determining that the login interface is not the login interface corresponding to the startup navigation of the terminal equipment, displaying the target information change control on the login interface;
the target information changing control comprises a user account information changing sub-control and a terminal equipment information changing sub-control, and the target information changing interface is a user account information changing interface corresponding to the user account information changing sub-control or a terminal equipment information changing interface corresponding to the terminal equipment information changing sub-control.
In some embodiments, the first controller 250 is specifically configured to:
responding to the triggering operation of the user account information changing sub-control, and displaying the user account information changing interface, wherein the user account information changing interface at least comprises: a second position setting item corresponding to the user account;
the second position is changed to the first position in response to a setting operation of the second position setting item.
In some embodiments, the user account information modification sub-control is associated with a target link for opening a target login web page for logging into the user account information modification interface;
The first controller 250 is specifically further configured to:
responding to the triggering operation of the user account information changing sub-control, and displaying the target login webpage according to the target link;
and logging in the user account information modification interface according to the user account and the user password based on the target login webpage.
In some embodiments, the first controller 250 is specifically further configured to:
responding to the triggering operation of the terminal equipment information changing sub-control, and displaying the terminal equipment information changing interface, wherein the terminal equipment information changing interface at least comprises: a first position setting item corresponding to the terminal equipment;
the first position is changed to the second position in response to a setting operation of the first position setting item.
In some embodiments, the first controller 250 is further configured to:
and after determining that the login interface is the login interface corresponding to the startup navigation of the terminal equipment, displaying terminal equipment information modification child control on the login interface.
In summary, the present disclosure includes, by executing the above verification method on a terminal device, the method includes: the first controller of the terminal equipment responds to the input of a user on a login interface, acquires login information, generates a verification request based on the login information and sends the verification request to the server, wherein the verification request carries the login information and a first position of the terminal equipment, and the login information comprises: the authentication request is used for requesting first authentication of the user account and the user password, and after the first authentication passes, second authentication is performed on consistency of a first position of the terminal equipment and a pre-stored second position of the user account; and responding to a failure message sent by the server for the second verification, and displaying a target information changing control on the login interface, wherein the target information changing control is used for indicating to change target information on the target information changing interface, and the target information comprises at least one of a first position and a second position. According to the technical scheme, after the first controller of the terminal equipment receives the failure message for the second verification sent by the server, the first position of the current terminal equipment is determined to be inconsistent with the second position of the user account, the target information change control for changing the first position or the second position can be provided for the user at the login interface, the user can conveniently trigger the target information change control, the user can quickly enter the target information change interface, the change processing of the first position or the second position is realized, the first position and the second position are kept consistent, and the user experience is improved.
For a more detailed description of the present solution, the following description will be given by way of example with reference to fig. 6, and it will be understood that the steps involved in fig. 6 may include more steps or fewer steps when actually implemented, and the order between these steps may also be different, so long as the verification method provided in the embodiments of the present disclosure can be implemented, and the embodiments of the present disclosure are not limited.
Fig. 6 is a flowchart of a verification method according to an embodiment of the disclosure. Fig. 7 is an interaction schematic diagram of a verification method provided in an embodiment of the present disclosure, where the embodiment is applied to a terminal device side. As shown in fig. 6, the verification method specifically includes the following steps:
s61, responding to the input of the user on the login interface, acquiring login information, generating a verification request based on the login information and sending the verification request to the server.
The verification request carries login information and a first position of the terminal device, wherein the login information comprises: the user account and the user password, the user account refers to identification information for representing the user identity, and the user account may be, for example, a user identification card number, a mobile phone number, a user-defined user name, an email box, etc., and referring to fig. 8, the user inputs login information such as the user account on the login interface 800: XXXXXXX and user password: * *********. But not limited thereto, the present disclosure is not particularly limited, and those skilled in the art can set it according to actual circumstances.
The first position of the terminal device refers to a position where the current terminal device is located, and the first position may be a country position where the current terminal device is located or a region position where the current terminal device is located, but is not limited thereto, and the present disclosure is not particularly limited thereto, and may be set by those skilled in the art according to actual situations.
The authentication request is used for requesting the server to perform first authentication on the user account and the user password, and performing second authentication on the consistency of the first position of the terminal equipment and the second position of the pre-stored user account after the first authentication passes. The second location of the user account specifically refers to a location where the user first registers the user account, and when the user registers the user account for the first time, the second location is reported to the server and stored in the server, which may be, for example, a country location where the user first registers the user account, or may be a region location where the user first registers the user account, but is not limited thereto, and the present disclosure is not specifically limited thereto, and a person skilled in the art may set according to actual situations.
Specifically, a first controller of the terminal equipment responds to input of a user on a login interface, acquires login information such as a user account number and a user password input by the user on the login interface, generates a verification request based on the login information, and sends the verification request to a server after generating the verification request for the first position of the terminal equipment, and correspondingly, the server performs first verification on the user account number and the user password after receiving the verification request sent by the terminal equipment, and performs second verification on consistency of the first position of the terminal equipment and a pre-stored second position of the user account number after the first verification on the user account number and the user password passes.
It should be noted that, in the process of generating the verification request based on the login information, the terminal device encrypts the login information, such as the user account and the user password, so as to avoid leakage of the user information in the process of sending the verification request to the server, where the encryption of the login information, such as the user account and the user password, may refer to the prior art, and will not be described in detail herein.
And S62, in response to a failure message for the second verification sent by the server, displaying a target information change control on the login interface.
The target information changing control is used for indicating to change target information in a target information changing interface, and the target information comprises at least one of a first position and a second position.
Specifically, after the server fails to verify the consistency of the first location of the terminal device and the second location of the pre-stored user account, a failure message for the second verification is sent to the terminal device, and the first controller of the terminal device responds to the failure message for the second verification sent by the server, and displays a target information change control on the login interface, so that the first controller of the terminal device displays a target information change interface after the user triggers the target information change control, and changes the target information, such as the first location of the terminal device or the second location of the user account, on the target information change interface.
For example, in the foregoing embodiment, referring to fig. 9, the first controller of the terminal device responds to the failure message sent by the server for the second verification, pops up a prompt window on the login interface 800 of the terminal device, and displays the target information change control 801 on the prompt window, so that the user can trigger the target information change control 801 to implement change processing on the target information, such as the first location of the terminal device or the second location of the user account, so that the first location of the terminal device or the second location of the user account is consistent. But not limited thereto, the present disclosure is not particularly limited, and those skilled in the art can set it according to actual circumstances.
Optionally, in some embodiments of the present disclosure, after the first controller of the terminal device receives the failure message, a user prompt interface may pop up on the login interface, where the user prompt interface prompts the user to present the first location of the terminal device and the second location of the user account, as shown in fig. 10, and the user prompt interface prompts "the first location of the terminal device is a and the second location of the user account is B", which is not limited thereto, and may be set by those skilled in the art according to practical situations.
In the technical scheme provided by the embodiment of the disclosure, a first controller of a terminal device responds to input of a user on a login interface, acquires login information, generates a verification request based on the login information and sends the verification request to a server, wherein the verification request carries the login information and a first position of the terminal device, and the login information comprises: the authentication request is used for requesting first authentication of the user account and the user password, and after the first authentication passes, second authentication is performed on consistency of a first position of the terminal equipment and a pre-stored second position of the user account; and responding to a failure message sent by the server for the second verification, and displaying a target information changing control on the login interface, wherein the target information changing control is used for indicating to change target information on the target information changing interface, and the target information comprises at least one of a first position and a second position. According to the technical scheme, after the first controller of the terminal equipment receives the failure message for the second verification sent by the server, the first position of the current terminal equipment is determined to be inconsistent with the second position of the user account, the target information change control for changing the first position or the second position can be provided for the user at the login interface, the user can conveniently trigger the target information change control, the user can quickly enter the target information change interface, the change processing of the first position or the second position is realized, the first position and the second position are kept consistent, and the user experience is improved.
Fig. 11 is a flowchart of another verification method provided in the embodiment of the present disclosure, and fig. 11 is a flowchart of another verification method provided in the embodiment of the present disclosure, further, when a user inputs login information on a login interface of a terminal device, if the login interface is a login interface corresponding to a power-on navigation of the terminal device, modification of user account information cannot be performed, based on which, after a first controller of the terminal device responds to a failure message sent by a server for the second verification, it needs to determine whether the login interface is a login interface corresponding to the power-on navigation of the terminal device, as shown in fig. 11, and further includes:
s622, after determining that the login interface is not the login interface corresponding to the startup navigation of the terminal equipment, displaying a target information change control on the login interface.
The target information changing control comprises a user account information changing sub-control and a terminal equipment information changing sub-control, and the target information changing interface is a user account information changing interface corresponding to the user account information changing sub-control or a terminal equipment information changing interface corresponding to the terminal equipment information changing sub-control.
Specifically, after detecting that the login interface of the login information input by the user is not the login interface corresponding to the startup navigation, the first controller of the terminal device displays a target information changing control on the login interface, namely, displays a user account information changing sub-control and a terminal device information changing sub-control on the login interface.
For example, referring to fig. 12, a user account information modification sub-control 8011 and a terminal device information modification sub-control 8012 are displayed on the login interface 800, but the present disclosure is not limited thereto, and those skilled in the art may set the present disclosure according to practical situations.
In the technical scheme provided by the embodiment of the disclosure, after receiving the failure message sent by the server, the first controller of the terminal device determines that the first position of the terminal device is inconsistent with the second position of the user account, the user account information changing sub-control and the terminal device information changing sub-control can be provided for the user at the same time, so that the user can selectively change the first position of the terminal device or the second position of the user account according to the requirement of the user, and the user experience is improved.
Fig. 13 is a flowchart of still another verification method according to an embodiment of the present disclosure, and fig. 13 is a flowchart of a verification method according to an embodiment of the present disclosure, where further, since the target information modification control includes: based on the user account information changing sub-control and the terminal device information changing sub-control, when the user needs to change the second position of the user account according to the user requirement, as shown in fig. 13, after executing S622, the method further includes:
And S71A, responding to the triggering operation of the user account information changing sub-control, and displaying a user account information changing interface.
The user account information changing interface at least comprises: and a second position setting item corresponding to the user account. The second position setting item is used for realizing the change of a second position corresponding to the user account. Optionally, the user account information modification interface may further include a setting item corresponding to a user language or a setting item corresponding to a name of a user account, but is not limited thereto, and a person skilled in the art may set the user account information modification interface according to actual situations.
Specifically, a first controller of the terminal equipment responds to triggering operation of a user account information changing sub-control displayed on a login interface by a user, and displays a user account information changing interface to the user, wherein the user account information changing interface comprises a second position setting item for changing a second position corresponding to a user account.
For example, referring to fig. 14, the first controller of the terminal device displays the user account information modification interface 140 in response to the triggering operation of the user account information modification sub-control by the user, where the user account information modification interface 140 includes a second location setting item corresponding to the user account, and the disclosure is not limited thereto, and those skilled in the art may set the second location setting item according to practical situations.
Optionally, on the basis of the foregoing embodiments, in some embodiments of the present disclosure, the user account information modification sub-control is associated with a target link, where the target link is used to open a target login web page, and the target login web page is used to login to the user account information modification interface, based on this, an implementation manner of executing S71A may be:
and responding to the triggering operation of changing the child control on the user account information, and displaying a target login webpage according to the target link.
Based on the target login webpage, the user account information is logged in to change the interface according to the user account and the user password.
Specifically, because the user account information changing sub-control is associated with the target link of the target login webpage of the login user account information changing interface, when the first controller of the terminal device responds to the triggering operation of the user account information changing sub-control, the target login webpage corresponding to the target link associated with the user account information changing sub-control is opened, on the target login webpage, the first controller of the terminal device automatically acquires the user account and the user password, logs in the user account information changing interface, and displays the user account information changing interface to the user.
It should be noted that the above triggering operation may be implemented by a user through a key on a control device, such as a remote controller, may be implemented by a user through a display screen of a touch terminal device, or may be implemented by a user through a control keyboard and a mouse, but the present disclosure is not limited thereto, and those skilled in the art may set according to practical situations.
S72A of changing the second position to the first position in response to the setting operation of the second position setting item.
Specifically, the first controller of the terminal device responds to the setting operation of the user on the second position setting item, and changes the second position of the user account to the first position where the current terminal device is located.
Optionally, on the basis of the foregoing embodiments, in some embodiments of the present disclosure, with continued reference to fig. 13, when the user needs to modify the first location of the terminal device according to the user requirement, after executing S62, the method further includes:
and S71B, responding to the triggering operation of the terminal equipment information changing sub-control, and displaying a terminal equipment information changing interface.
The terminal equipment information changing interface at least comprises: and setting a first position item corresponding to the terminal equipment. The first position setting item is used for realizing the change of the first position corresponding to the terminal equipment. Optionally, the terminal device information modification interface may further include: the setting items corresponding to the language used by the terminal device are not limited thereto, the disclosure is not particularly limited, and those skilled in the art may set according to actual situations.
Specifically, a first controller of the terminal equipment responds to triggering operation of a terminal equipment information changing sub-control displayed on a login interface by a user, and displays the terminal equipment information changing interface to the user, wherein the terminal equipment information changing interface comprises a first position setting item for changing a first position corresponding to the terminal equipment.
For example, referring to fig. 15, the first controller of the terminal device displays the terminal device information modification interface 150 in response to the triggering operation of the terminal device information modification sub-control by the user, where the terminal device information modification interface 150 includes the first location setting item corresponding to the terminal device, but the disclosure is not limited thereto, and those skilled in the art may set according to practical situations.
S72B, in response to the setting operation of the first position setting item, the first position is changed to the second position.
Specifically, the first controller of the terminal equipment responds to the setting operation of the user on the first position setting item, and changes the first position corresponding to the terminal equipment into the second position corresponding to the user account.
In the technical scheme provided by the embodiment of the disclosure, in the above process, the first controller of the terminal device responds to the triggering operation of the user account information changing sub-control by the user, or the triggering operation of the user on the terminal device information changing sub-control, so that the user account information changing interface or the terminal device information changing interface can be quickly accessed, the user can trigger the first position setting item for changing the first position or the second position setting item for changing the second position, thereby realizing the changing process of the first position or the second position and improving the user experience.
Fig. 16 is a flowchart of another verification method provided by an embodiment of the present disclosure, and fig. 16 is a flowchart of a further embodiment of the present disclosure, where after the first controller of the terminal device responds to a failure message for the second verification sent by the server, it is determined whether the login interface is a login interface corresponding to the power-on navigation of the terminal device, as shown in fig. 11, and further includes:
s623, after determining that the login interface is a login interface corresponding to the startup navigation of the terminal device, displaying a terminal device information modification sub-control on the login interface.
Specifically, after detecting that a login interface of login information input by a user is a login interface corresponding to startup navigation, the first controller of the terminal device displays a terminal device information modification sub-control on the login interface.
Optionally, on the basis of the foregoing embodiments, in some embodiments of the present disclosure, when it is determined that the login interface for inputting login information by the user is a login interface corresponding to the startup navigation, the login interface may also be a login control for displaying a replacement account to the user or a new account control, so as to provide more choices for the user, thereby meeting different requirements of the user. But not limited thereto, the present disclosure is not particularly limited, and those skilled in the art can set it according to actual circumstances.
In the technical scheme provided by the embodiment of the disclosure, in the above process, because the user account information cannot be changed when the terminal device is in the power-on navigation state, after the first controller of the terminal device determines that the login interface is the login interface corresponding to the power-on navigation of the terminal device, the terminal device information change sub-control is displayed on the login interface, so that errors caused when the user changes the position are avoided.
Fig. 17 is a flowchart of yet another verification method according to an embodiment of the disclosure. The embodiment is applied to a server side. As shown in fig. 17, the method specifically includes the steps of:
s171, in response to the verification request sent by the terminal equipment, the user account and the user password are verified for the first time, and after the first verification is confirmed to pass, the consistency of the first position of the terminal equipment and the second position of the pre-stored user account is verified for the second time.
The verification request carries login information and a first position of the terminal device, wherein the login information comprises: user account and user password.
S172, after the second verification failure is carried out on the consistency of the first position of the terminal equipment and the second position of the user account, a failure message aiming at the second verification is sent to the terminal equipment.
Specifically, the second controller of the server responds to an authentication request sent by the terminal device, wherein the authentication request carries login information and a first position of the terminal device, and the login information comprises: the method comprises the steps that a second controller of a server verifies a user account and a user password for the first time, after the fact that the user account and the user password pass through the first verification is determined, whether the first position of the terminal equipment is consistent with a second position of a pre-stored user account or not is verified for the second time, when the first position of the terminal equipment is inconsistent with the second position of the pre-stored user account, the second controller of the server determines that the second verification fails, and at the moment, the second controller of the server sends a failure message aiming at the second verification to the terminal equipment to inform the terminal equipment that the first position of the terminal equipment is inconsistent with the second position of the pre-stored user account.
In the technical solution provided in the embodiments of the present disclosure, a first verification is performed on a user account and a user password by a second controller of a server in response to a verification request sent by a terminal device, after determining that the first verification passes, a second verification is performed on consistency of a first location of the terminal device and a second location of a pre-stored user account, where the verification request carries the login information and the first location of the terminal device, and the login information includes: a user account and a user password; and after the second verification fails according to the consistency of the first position of the terminal equipment and the second position of the user account, sending a failure message aiming at the second verification to the terminal equipment. In the technical scheme, after the second verification fails on the consistency of the first position where the terminal equipment is located and the second position of the pre-stored user account, the second controller of the server sends a failure message for the second verification to the terminal equipment, so that the terminal equipment determines that the first position of the current terminal equipment is inconsistent with the second position of the user account after receiving the failure message for the second verification sent by the server, a target information change control for changing the first position or the second position can be provided for the user at a login interface, the user can conveniently trigger the target information change control, directly enter the target information change interface, and change of the first position or the second position is realized, so that the first position and the second position are consistent, and the user experience is improved.
The embodiments of the present disclosure provide a computer readable storage medium, on which a computer program is stored, which when executed by a processor, implements each process executed by the verification method described above, and can achieve the same technical effects, and in order to avoid repetition, a detailed description is omitted here.
The computer readable storage medium may be a Read-Only Memory (ROM), a random access Memory (Random Access Memory, RAM), a magnetic disk, an optical disk, or the like.
The present disclosure provides a computer program product comprising: the computer program product, when run on a computer, causes the computer to implement the verification method described above.
The foregoing description, for purposes of explanation, has been presented in conjunction with specific embodiments. However, the above discussion in some examples is not intended to be exhaustive or to limit the embodiments to the precise forms disclosed above. Many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles and the practical application, to thereby enable others skilled in the art to best utilize the embodiments and various embodiments with various modifications as are suited to the particular use contemplated.
Claims (10)
1. A terminal device, comprising:
a first controller configured to:
responding to the input of a user on a login interface, acquiring login information, generating a verification request based on the login information and sending the verification request to a server, wherein the verification request carries the login information and a first position of terminal equipment, and the login information comprises: the authentication request is used for requesting first authentication of the user account and the user password, and after the first authentication is passed, second authentication is carried out on consistency of a first position of the terminal equipment and a pre-stored second position of the user account;
and responding to a failure message sent by the server for the second verification, and displaying a target information changing control on the login interface, wherein the target information changing control is used for indicating to change target information on the target information changing interface, and the target information comprises at least one of a first position and a second position.
2. The terminal device of claim 1, wherein the first controller is further configured to:
After determining that the login interface is not the login interface corresponding to the startup navigation of the terminal equipment, displaying the target information change control on the login interface;
the target information changing control comprises a user account information changing sub-control and a terminal equipment information changing sub-control, and the target information changing interface is a user account information changing interface corresponding to the user account information changing sub-control or a terminal equipment information changing interface corresponding to the terminal equipment information changing sub-control.
3. The terminal device according to claim 2, wherein the first controller is specifically configured to:
responding to the triggering operation of the user account information changing sub-control, and displaying the user account information changing interface, wherein the user account information changing interface at least comprises: a second position setting item corresponding to the user account;
the second position is changed to the first position in response to a setting operation of the second position setting item.
4. A terminal device according to claim 3, wherein the user account information modification sub-control is associated with a target link for opening a target login web page for logging into the user account information modification interface;
The first controller is specifically further configured to:
responding to the triggering operation of the user account information changing sub-control, and displaying the target login webpage according to the target link;
and logging in the user account information modification interface according to the user account and the user password based on the target login webpage.
5. The terminal device according to claim 2, wherein the first controller is specifically further configured to:
responding to the triggering operation of the terminal equipment information changing sub-control, and displaying the terminal equipment information changing interface, wherein the terminal equipment information changing interface at least comprises: a first position setting item corresponding to the terminal equipment;
the first position is changed to the second position in response to a setting operation of the first position setting item.
6. The terminal device of claim 1, wherein the first controller is further configured to:
and after determining that the login interface is the login interface corresponding to the startup navigation of the terminal equipment, displaying terminal equipment information modification child control on the login interface.
7. A server, comprising:
A second controller configured to:
responding to a verification request sent by a terminal device, performing first verification on a user account and a user password, and performing second verification on consistency of a first position of the terminal device and a pre-stored second position of the user account after the first verification is determined to pass, wherein the verification request carries login information and the first position of the terminal device, and the login information comprises: a user account and a user password;
and after the second verification fails according to the consistency of the first position of the terminal equipment and the second position of the user account, sending a failure message aiming at the second verification to the terminal equipment.
8. An authentication method, applied to a terminal device, comprising:
responding to the input of a user on a login interface, acquiring login information, generating a verification request based on the login information and sending the verification request to a server, wherein the verification request carries the login information and a first position of terminal equipment, and the login information comprises: the authentication request is used for requesting first authentication of the user account and the user password, and after the first authentication is passed, second authentication is carried out on consistency of a first position of the terminal equipment and a pre-stored second position of the user account;
And responding to a failure message sent by the server for the second verification, and displaying a target information changing control on the login interface, wherein the target information changing control is used for indicating to change target information on the target information changing interface, and the target information comprises at least one of a first position and a second position.
9. A method of authentication, applied to a server, comprising:
responding to a verification request sent by a terminal device, performing first verification on a user account and a user password, and performing second verification on consistency of a first position of the terminal device and a pre-stored second position of the user account after the first verification is determined to pass, wherein the verification request carries login information and the first position of the terminal device, and the login information comprises: a user account and a user password;
and after the second verification fails according to the consistency of the first position of the terminal equipment and the second position of the user account, sending a failure message aiming at the second verification to the terminal equipment.
10. A computer readable storage medium, on which a computer program is stored, characterized in that the program, when being executed by a processor, implements the steps of the method according to any of claims 8-9.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310345444.8A CN116488869A (en) | 2023-04-03 | 2023-04-03 | Terminal device, server, authentication method and medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310345444.8A CN116488869A (en) | 2023-04-03 | 2023-04-03 | Terminal device, server, authentication method and medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN116488869A true CN116488869A (en) | 2023-07-25 |
Family
ID=87222361
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310345444.8A Pending CN116488869A (en) | 2023-04-03 | 2023-04-03 | Terminal device, server, authentication method and medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116488869A (en) |
-
2023
- 2023-04-03 CN CN202310345444.8A patent/CN116488869A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108028960B (en) | Electronic device and control method thereof | |
US20150029089A1 (en) | Display apparatus and method for providing personalized service thereof | |
US20140223321A1 (en) | Portable device and method for controlling external device thereof | |
EP2963935A1 (en) | Multi screen display controlled by a plurality of remote controls | |
CN113784200B (en) | Communication terminal, display device and screen projection connection method | |
CN112632160A (en) | Intelligent device and intelligent device login method | |
US11402812B1 (en) | Apparatus and method for controlling a device | |
CN113821184A (en) | Pairing method of control device and display equipment | |
CN115150645B (en) | Display equipment and display method of screen throwing function page | |
CN112256449A (en) | Interface calling method of webpage application program, display equipment and server | |
CN116488869A (en) | Terminal device, server, authentication method and medium | |
CN113794919B (en) | Display device and setting method of sounding device | |
CN111818368B (en) | Method for managing display device authority, mobile terminal and server | |
CN109672941B (en) | Information input method, television and computer readable storage medium | |
CN115914353B (en) | Server, display equipment and combined information display method | |
CN114785913B (en) | Display device and device information processing method | |
CN115185414B (en) | Display device and cursor control method | |
CN116774956A (en) | Display device, screen projection method and medium | |
CN118264841A (en) | Display equipment and log acquisition method | |
CN117812401A (en) | Display device, signal source channel acquisition method and medium | |
CN116304444A (en) | Display device and control method for accessing tag page | |
CN117651088A (en) | Control device, display device and account login method | |
CN118283333A (en) | Display device and video playing method | |
CN115167793A (en) | Display device and page updating method | |
CN113975813A (en) | Real-name authentication method, server and display device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |