CN117150475A - Application starting method and device, electronic equipment and storage medium - Google Patents

Application starting method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN117150475A
CN117150475A CN202311132869.7A CN202311132869A CN117150475A CN 117150475 A CN117150475 A CN 117150475A CN 202311132869 A CN202311132869 A CN 202311132869A CN 117150475 A CN117150475 A CN 117150475A
Authority
CN
China
Prior art keywords
verification code
random number
application
vehicle
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311132869.7A
Other languages
Chinese (zh)
Inventor
孔江南
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ecarx Hubei Tech Co Ltd
Original Assignee
Ecarx Hubei Tech Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ecarx Hubei Tech Co Ltd filed Critical Ecarx Hubei Tech Co Ltd
Priority to CN202311132869.7A priority Critical patent/CN117150475A/en
Publication of CN117150475A publication Critical patent/CN117150475A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/58Random or pseudo-random number generators
    • G06F7/588Random number generators, i.e. based on natural stochastic processes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44505Configuring for program initiating, e.g. using registry, configuration files
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
    • G06K17/0025Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device the arrangement consisting of a wireless interrogation device in combination with a device for optically marking the record carrier
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06037Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2211/00Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
    • G06F2211/007Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
    • G06F2211/008Public Key, Asymmetric Key, Asymmetric Encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2133Verifying human interaction, e.g., Captcha

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computational Mathematics (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Pure & Applied Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The application provides an application starting method, an application starting device, electronic equipment and a storage medium. The method comprises the following steps: responding to a starting operation aiming at a target application, processing a random number generated by the target application, and generating a two-dimensional code; acquiring a first verification code generated by a target terminal based on the random number, the current first system time and the effective duration information of the target terminal; the random number is obtained by the target terminal through scanning and analyzing the two-dimensional code by an application management program; generating a second verification code based on the random number, the current second system time of the vehicle-mounted terminal and the effective duration information; and starting the target application under the condition that the first verification is consistent with the second verification code. The application can achieve the purpose of improving the safety of application starting and carrying out identity authentication on the user.

Description

Application starting method and device, electronic equipment and storage medium
Technical Field
The present application relates to the field of vehicle security technologies, and in particular, to an application starting method, an application starting device, an electronic device, and a storage medium.
Background
Each operating system has many debugging means and hidden development functions, such as application programs of a developer mode, an engineering mode and the like of the mobile phone. These applications may provide specialized debugging functions and hidden system information and capture some exception information. Engineering mode application programs exist in the vehicle-mounted system, and the engineering mode application programs are subjected to links such as development, debugging, production, offline, after-sales and the like along with the whole vehicle. In order to avoid unnecessary misunderstanding caused by the debugging function, the user is limited to professionals such as developers, manufacturers, 4S shop staff and the like, the engineering mode is also required to be started by a hidden means, and a common opening mode is to start the engineering mode application by inputting a hidden password (such as: # 12345# #) through telephone dialing.
The starting method of the engineering mode application has the risk of leakage because of fixed password rules, and reduces the safety of starting the engineering mode application. Meanwhile, the telephone dialing mode cannot verify the identity of the user, and cannot limit the user of the engineering mode application.
Disclosure of Invention
The embodiment of the application provides an application starting method, an application starting device, electronic equipment and a storage medium, which are used for solving the problems that the risk of leakage exists in the related technology, the safety of starting engineering mode application is reduced, the identity of a user cannot be checked, and the user of the engineering mode application cannot be limited.
In order to solve the technical problems, the embodiment of the application is realized as follows: :
in a first aspect, an embodiment of the present application provides an application starting method, applied to a vehicle-mounted terminal, where the method includes:
responding to a starting operation aiming at a target application, processing a random number generated by the target application, and generating a two-dimensional code;
acquiring a first verification code generated by a target terminal based on the random number, the current first system time and the effective duration information of the target terminal; the random number is obtained by the target terminal through scanning and analyzing the two-dimensional code by an application management program;
generating a second verification code based on the random number, the current second system time of the vehicle-mounted terminal and the effective duration information;
and starting the target application under the condition that the first verification is consistent with the second verification code.
Optionally, the processing the random number generated by the target application in response to the starting operation for the target application, to generate the two-dimensional code includes:
responding to a starting operation aiming at the target application, and acquiring a random number generated by the target application;
encrypting the random number based on an asymmetric encryption algorithm to generate an encrypted ciphertext;
And performing conversion processing on the encrypted ciphertext to generate the two-dimensional code.
Optionally, the obtaining the first verification code generated by the target terminal based on the random number, the current first system time of the target terminal and the valid duration information includes:
displaying a verification code input box on the vehicle-mounted screen;
and acquiring the first verification code input by the user in the verification code input box.
Optionally, the generating a second verification code based on the random number, the current second system time of the vehicle-mounted terminal and the valid duration information includes:
generating the second verification code with a specific bit number based on an HmacSHA1 algorithm by taking the random number as a secret key and the second system time and the effective duration information as messages;
the first verification code and the second verification code have the same length.
Optionally, the target application is an engineering mode application.
In a second aspect, an embodiment of the present application provides an application starting method, applied to a target terminal, where the method includes:
scanning and analyzing a two-dimensional code on a vehicle-mounted screen of the vehicle-mounted terminal to obtain a random number;
generating a first verification code based on the random number, the current first system time of the target terminal and the effective duration information;
The first verification code is sent to the vehicle-mounted terminal, the vehicle-mounted terminal compares the first verification code with a second verification code, and when the first verification code is consistent with the second verification code, the target application is started, and the second verification code is generated by the vehicle-mounted terminal based on the random number, the current second system time of the vehicle-mounted terminal and the effective duration information.
Optionally, the scanning and analyzing the two-dimensional code on the vehicle-mounted screen of the vehicle-mounted terminal to obtain the random number includes:
after a user logs in an application management program, acquiring the two-dimensional code scanned by a scanning function based on the application management program;
and analyzing the two-dimensional code to obtain the random number.
Optionally, the generating a first verification code based on the random number, the current first system time of the target terminal and the valid duration information includes:
generating the first verification code with a specific bit number by taking the random number as a secret key and the first system time and the effective duration information as messages based on an HmacSHA1 algorithm;
the first verification code and the second verification code have the same length.
In a third aspect, an embodiment of the present application provides an application starting apparatus, applied to a vehicle-mounted terminal, where the apparatus includes:
the two-dimensional code generation module is used for responding to the starting operation of the target application, processing the random number generated by the target application and generating a two-dimensional code;
the first verification code acquisition module is used for acquiring a first verification code generated by the target terminal based on the random number, the current first system time of the target terminal and the effective duration information; the method comprises the steps of carrying out a first treatment on the surface of the The random number is obtained by the target terminal through scanning and analyzing the two-dimensional code by an application management program;
the second verification code generation module is used for generating a second verification code based on the random number, the current second system time of the vehicle-mounted terminal and the effective duration information;
and the target application starting module is used for starting the target application under the condition that the first verification code is consistent with the second verification code.
Optionally, the two-dimensional code generating module includes:
a random number acquisition unit, configured to acquire a random number generated by the target application in response to a start operation for the target application;
the encrypted ciphertext generating unit is used for encrypting the random number based on an asymmetric encryption algorithm to generate an encrypted ciphertext;
And the two-dimensional code generating unit is used for converting the encrypted ciphertext to generate the two-dimensional code.
Optionally, the first verification code obtaining module includes:
an input frame display unit for displaying a verification code input frame on the vehicle-mounted screen;
the first verification code acquisition unit is used for acquiring the first verification code input by the user in the verification code input box.
Optionally, the second verification code generating module includes:
the second verification code generating unit is used for generating the second verification code with a specific bit number based on an HmacSHA1 algorithm by taking the random number as a secret key and the second system time and the effective duration information as messages;
the first verification code and the second verification code have the same length.
Optionally, the target application is an engineering mode application.
In a fourth aspect, an embodiment of the present application provides an application starting apparatus, applied to a target terminal, where the apparatus includes:
the random number acquisition module is used for scanning and analyzing the two-dimensional code on the vehicle-mounted screen of the vehicle-mounted terminal to obtain a random number;
the first verification code generation module is used for generating a first verification code based on the random number, the current first system time of the target terminal and the effective duration information;
The target application starting module is used for sending the first verification code to the vehicle-mounted terminal, comparing the first verification code with the second verification code by the vehicle-mounted terminal, and starting the target application when the first verification code is consistent with the second verification code, wherein the second verification code is generated by the vehicle-mounted terminal based on the random number, the current second system time of the vehicle-mounted terminal and the effective duration information.
Optionally, the random number acquisition module includes:
the two-dimensional code scanning unit is used for acquiring the two-dimensional code scanned by the scanning function based on the application management program after a user logs in the application management program;
and the random number acquisition unit is used for analyzing the two-dimensional code to obtain the random number.
Optionally, the first verification code generating module includes:
the first verification code generation unit is used for generating the first verification code with a specific bit number based on an HmacSHA1 algorithm by taking the random number as a secret key and the first system time and the effective duration information as messages;
the first verification code and the second verification code have the same length.
In a fifth aspect, an embodiment of the present application provides an electronic device, including: :
A memory, a processor, and a computer program stored on the memory and executable on the processor, which when executed by the processor implements the application launch method of any one of the above.
In a sixth aspect, an embodiment of the present application provides a readable storage medium, which when executed by a processor of an electronic device, enables the electronic device to perform the application starting method described in any one of the above.
In the embodiment of the application, in response to starting operation aiming at a target application, a random number generated by the target application is processed to generate a two-dimensional code, a first verification code generated by a target terminal based on the random number, the current first system time and effective duration information of the target terminal is obtained by scanning and analyzing the two-dimensional code through an application management program by the target terminal, a second verification code is generated based on the random number, the current second system time and the effective duration information of the vehicle-mounted terminal, and the target application is started under the condition that the first verification code is consistent with the second verification code. According to the embodiment of the application, the random number is used as the generation standard of the verification code, the one-time dynamic verification code is performed on the opening mode, the verification code has timeliness, and the safety of starting the engineering mode application can be improved. Meanwhile, the target terminal side can start the engineering mode application only by logging in the application management program, so that the user can be authenticated, and the user can be limited.
The foregoing description is only an overview of the present application, and is intended to be implemented in accordance with the teachings of the present application in order that the same may be more clearly understood and to make the same and other objects, features and advantages of the present application more readily apparent.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the description of the embodiments of the present application will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flowchart illustrating steps of an application starting method according to an embodiment of the present application;
FIG. 2 is a flow chart of steps of a two-dimensional code generating method according to an embodiment of the present application;
FIG. 3 is a flowchart illustrating steps of a method for obtaining a first verification code according to an embodiment of the present application;
FIG. 4 is a flowchart illustrating steps of a second verification code generating method according to an embodiment of the present application;
FIG. 5 is a flowchart illustrating steps of another method for starting an application according to an embodiment of the present application;
FIG. 6 is a flowchart illustrating steps of a method for obtaining a random number according to an embodiment of the present application;
FIG. 7 is a flowchart illustrating steps of a method for generating a first verification code according to an embodiment of the present application;
fig. 8 is a schematic structural diagram of an application starting device according to an embodiment of the present application;
FIG. 9 is a schematic structural diagram of another application starting apparatus according to an embodiment of the present application;
fig. 10 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are some, but not all embodiments of the application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
Referring to fig. 1, a flowchart of steps of an application starting method provided by an embodiment of the present application is shown, where the method may be applied to a vehicle-mounted terminal. As shown in fig. 1, the application starting method may include: step 101, step 102, step 103 and step 104.
Step 101: and responding to the starting operation of the target application, processing the random number generated by the target application, and generating the two-dimensional code.
The embodiment of the application can be applied to a scene of starting the target application (such as engineering mode application and the like) by adopting a one-time dynamic verification mode.
The embodiment of the application can be applied to the vehicle-mounted terminal, namely, the execution main body is the vehicle-mounted terminal.
In this example, the target application may be, but is not limited to, an engineering mode application. Engineering mode (EngineerMode) is a tool mode used by engineers to debug various configurations of hardware, and to complete the setting of relevant parameters.
After receiving the start operation of the target application, a random number may be generated by the target application in response to the start operation for the target application. The vehicle-mounted terminal can process the random number generated by the target application to generate a two-dimensional code. Specifically, the random number may be converted into the encrypted ciphertext, and then the encrypted ciphertext may be converted into the two-dimensional code. This implementation may be described in detail below in conjunction with fig. 2.
Referring to fig. 2, a step flowchart of a two-dimensional code generating method provided by an embodiment of the present application is shown. As shown in fig. 2, the two-dimensional code generation method may include: step 201, step 202 and step 203.
Step 201: and responding to the starting operation aiming at the target application, and acquiring the random number generated by the target application.
In the embodiment of the application, after receiving the starting operation of the target application, the vehicle-mounted terminal can respond to the starting operation of the target application to generate a random number by the target application, and can acquire the random number generated by the target application.
After the random number generated by the target application is obtained, step 202 is performed.
Step 202: and encrypting the random number based on an asymmetric encryption algorithm to generate an encrypted ciphertext.
The asymmetric encryption algorithm is a secret method of a key. The asymmetric encryption algorithm requires two keys: public keys (public keys) and private keys (private keys). The public key and the private key are a pair, and if the data is encrypted by the public key, the data can be decrypted only by the corresponding private key. Because two different keys are used for encryption and decryption, this algorithm is called an asymmetric encryption algorithm.
In this embodiment, the asymmetric encryption algorithm may be, but is not limited to, an RSA asymmetric encryption algorithm.
After the random number generated by the target application is obtained, the random number may be encrypted based on an asymmetric encryption algorithm to generate an encrypted ciphertext. Specifically, the random number may be encrypted using a public key, resulting in an encrypted ciphertext.
After encrypting the random number based on the asymmetric encryption algorithm to generate an encrypted ciphertext, step 203 is performed.
Step 203: and performing conversion processing on the encrypted ciphertext to generate the two-dimensional code.
After encrypting the random number based on the asymmetric encryption algorithm to generate an encrypted ciphertext, the encrypted ciphertext may be converted to generate the two-dimensional code.
After the two-dimensional code is generated, the two-dimensional code can be displayed on a screen of the vehicle-mounted terminal, so that a subsequent user can conveniently use other equipment to perform scanning analysis.
According to the embodiment of the application, the two-dimensional code is generated by adopting the random number and the asymmetric encryption algorithm, so that the uniqueness and timeliness of the verification code generated subsequently can be ensured, and the safety of starting the engineering mode application can be improved.
After processing the random number generated by the target application to generate the two-dimensional code, step 102 is performed.
Step 102: acquiring a first verification code generated by a target terminal based on the random number, the current first system time and the effective duration information of the target terminal; the random number is obtained by scanning and analyzing the two-dimensional code through an application management program by the target terminal.
After the random number generated by the target application is processed to generate the two-dimensional code, the user can scan the two-dimensional code through an application management program of the target terminal (such as a mobile phone and the like). Specifically, a user may first log in an application management program in a target terminal, and start a code scanning function to scan a two-dimensional code on a screen of the vehicle-mounted terminal.
According to the embodiment of the application, the login account of the application management program is limited, so that a user of the engineering mode application can be limited to use the appointed mobile phone program and obtain authentication, and the starting security of the engineering mode application is further improved.
After the target terminal scans the two-dimensional code, the two-dimensional code can be analyzed to obtain the encrypted ciphertext. Then, the encrypted password can be decrypted by adopting an asymmetric encryption algorithm, and then a random number can be obtained. In particular, the encrypted password may be decrypted using a private key of an asymmetric encryption algorithm.
After the target terminal acquires the random number, a first verification code can be generated based on the random number, the current first system time of the target terminal and the effective duration information. The specific value of the effective duration may be determined according to the service requirement, which is not limited in this embodiment.
In a specific implementation, the target terminal may use the HmacSHA1 algorithm to process a random number as a key, the first system time and the effective duration information as a message, and the key and the message as inputs to obtain a verification code with a specific bit number. The valid duration information may indicate the valid duration of the verification code.
After the target terminal side generates the first verification code, the user can input the first verification code into an input box on a screen of the vehicle-mounted terminal, so that the transmission of the first verification code to the vehicle-mounted terminal is realized. This implementation may be described in detail below in conjunction with fig. 3.
Referring to fig. 3, a flowchart of steps of a first verification code obtaining method according to an embodiment of the present application is shown. As shown in fig. 3, the first verification code obtaining method may include: step 301 and step 302.
Step 301: and displaying a verification code input box on the vehicle-mounted screen.
In the embodiment of the application, the verification code input box can be displayed on the vehicle-mounted screen in advance. It is understood that an authentication code input box may be displayed in advance on the in-vehicle screen while the two-dimensional code is generated and displayed on the in-vehicle screen.
After the verification code input box is displayed on the in-vehicle screen, step 302 is performed.
Step 302: and acquiring the first verification code input by the user in the verification code input box.
After the verification code input box is displayed on the vehicle-mounted screen, the first verification code input by the user in the verification code input box can be completed, namely, the user can complete filling of the first verification code, and the vehicle-mounted terminal can acquire the first verification code.
According to the embodiment of the application, the verification code generated by the target terminal side is acquired in the mode of user input, so that the verification process does not need to depend on a network, and the vehicle-mounted terminal does not need to depend on the network.
After acquiring the first verification code generated by the target terminal based on the random number, the current first system time and the valid duration information of the target terminal, step 103 is executed.
Step 103: and generating a second verification code based on the random number, the current second system time of the vehicle-mounted terminal and the effective duration information.
After the first verification code generated by the target terminal based on the random number, the current first system time and the effective duration information of the target terminal is obtained, a second verification code can be generated by the vehicle-mounted terminal according to the random number, the current second system time and the effective duration information of the vehicle-mounted terminal. In this example, the length of the second verification code is the same as the length of the first verification code, for example, when the length of the first verification code is 6 digits, then the length of the second verification code is also 6 digits, and so on.
In this example, the second verification code may be generated based on the HmacSHA1 algorithm. This implementation may be described in detail below in conjunction with fig. 4.
Referring to fig. 4, a flowchart of steps of a second verification code generating method according to an embodiment of the present application is shown. As shown in fig. 4, the second verification code generation method may include: step 401.
Step 401: and generating the second verification code with a specific bit number by taking the random number as a secret key and the second system time and the effective duration information as messages based on an HmacSHA1 algorithm.
In the embodiment of the application, hmacSHA1 algorithm: HMAC is a hashed message authentication code (Hash-based Message Authentication Code), which uses a Hash algorithm to generate a message digest as output with a key and a message as input. The HMAC-SHA1 signature algorithm is a commonly used signature algorithm for generating a signature digest for a piece of information.
In this example, the random number may be used as a key, the second system time and the valid duration information may be used as a message, and the key and the message may be processed using a hash algorithm, so that a second verification code of a specific number of bits may be generated.
In the embodiment of the application, the same key is held by the vehicle machine side and the target terminal and the same Hash algorithm is adopted to generate the verification code with the same length based on the same time base, so that one-time dynamic verification can be realized, and the safety of starting the engineering mode application is improved.
After generating the second verification code based on the random number, the current second system time of the vehicle-mounted terminal, and the valid duration information, step 104 is performed.
Step 104: and starting the target application under the condition that the first verification is consistent with the second verification code.
After the second verification code is generated based on the random number, the current second system time of the vehicle-mounted terminal and the effective duration information, the first verification code and the second verification code can be compared, and therefore verification code comparison results can be obtained.
And when the verification code comparison result indicates that the first verification code is inconsistent with the second verification code, the verification fails, and the target application is not allowed to be started.
And when the verification code comparison result indicates that the first verification code is consistent with the second verification code, the verification is passed, and the target application is allowed to be started. At this time, the target application may be started and a functional interface of the target application is entered.
Compared with the password starting mode in the prior art, the embodiment of the application adopts the dynamic verification code, and the verification code rule is not fixed, so that the safety of starting the target application can be improved.
According to the application starting method provided by the embodiment of the application, the random number generated by the target application is processed in response to the starting operation aiming at the target application, the two-dimensional code is generated, the first verification code generated by the target terminal based on the random number, the current first system time and the effective duration information of the target terminal is obtained, the random number is obtained by scanning and analyzing the two-dimensional code through the application management program by the target terminal, the second verification code is generated based on the random number, the current second system time and the effective duration information of the vehicle-mounted terminal, and the target application is started under the condition that the first verification code is consistent with the second verification code. According to the embodiment of the application, the random number is used as the generation standard of the verification code, the one-time dynamic verification code is performed on the opening mode, the verification code has timeliness, and the safety of starting the engineering mode application can be improved. Meanwhile, the target terminal side can start the engineering mode application only by logging in the application management program, so that the user can be authenticated, and the user can be limited.
Referring to fig. 5, a flowchart of steps of another method for starting an application provided in an embodiment of the present application is shown, where the method may be applied to a target terminal. As shown in fig. 5, the application starting method may include: step 501, step 502 and step 503.
Step 501: and scanning and analyzing the two-dimensional code on the vehicle-mounted screen of the vehicle-mounted terminal to obtain the random number.
The embodiment of the application can be applied to the target terminal, namely, the execution subject is the target terminal.
In this example, the target terminal may be an electronic device such as a mobile phone, a tablet computer, or the like, and specifically, the specific type of the target terminal may be determined according to the service requirement, which is not limited in this embodiment.
On the vehicle terminal side, when a user starts a target application, a random number can be generated by the target application. The vehicle-mounted terminal can process the random number generated by the target application to generate a two-dimensional code, and the two-dimensional code is displayed on the vehicle-mounted screen.
Then, a user can log in an application management program installed in the target terminal, scan a two-dimensional code on the vehicle-mounted screen, and analyze the two-dimensional code to obtain a random number. This implementation may be described in detail below in conjunction with fig. 6.
Referring to fig. 6, a flowchart of steps of a method for obtaining a random number according to an embodiment of the present application is shown. As shown in fig. 6, the random number acquisition method may include: step 601 and step 602.
Step 601: and after the user logs in the application management program, acquiring the two-dimensional code scanned by the scanning function of the application management program.
In the embodiment of the application, when a user needs to scan the two-dimensional code on the vehicle-mounted screen, the user needs to log in the application management program firstly, namely, the user name and the password are input.
After the user logs in the application management program, the two-dimensional code on the vehicle-mounted screen can be scanned based on the scanning function of the application management program.
After the two-dimensional code scanned by the scanning function based on the application management program is acquired, step 602 is performed.
Step 602: and analyzing the two-dimensional code to obtain the random number.
After the two-dimensional code scanned by the scanning function based on the application management program is acquired, the two-dimensional code can be analyzed, and then the random number can be obtained.
After scanning and analyzing the two-dimensional code on the vehicle-mounted screen of the vehicle-mounted terminal to obtain the random number, step 502 is executed.
Step 502: and generating a first verification code based on the random number, the current first system time of the target terminal and the effective duration information.
After the two-dimensional code on the vehicle-mounted screen of the vehicle-mounted terminal is scanned and analyzed to obtain the random number, a first verification code can be generated based on the random number, the current first system time of the target terminal and the effective duration information. Wherein the validity duration may be used to indicate the validity time of the generated verification code. The first verification code and the second verification code are generated in the effective duration, and if the effective duration is exceeded, verification failure results can occur.
In a specific implementation, the first verification code may be generated based on the HmacSHA1 algorithm. This implementation may be described in detail below in conjunction with fig. 7.
Step 701: and generating the first verification code with a specific bit number by taking the random number as a secret key and the first system time and the effective duration information as messages based on an HmacSHA1 algorithm.
In the embodiment of the application, hmacSHA1 algorithm: HMAC is a hashed message authentication code, and HMAC uses a hash algorithm to generate a message digest as output, with a key and a message as inputs. The HMAC-SHA1 signature algorithm is a commonly used signature algorithm for generating a signature digest for a piece of information.
In this example, a random number may be used as a key, and the first system time and the valid duration information may be used as a message, and the key and the message may be processed using a hash algorithm, so that a first verification code with a specific number of bits may be generated.
In the embodiment of the application, the same key is held by the vehicle machine side and the target terminal and the same Hash algorithm is adopted to generate the verification code with the same length based on the same time base, so that one-time dynamic verification can be realized, and the safety of starting the engineering mode application is improved.
After generating the first verification code based on the random number, the current first system time of the target terminal, and the validity duration information, step 503 is performed.
Step 503: the first verification code is sent to the vehicle-mounted terminal, the vehicle-mounted terminal compares the first verification code with a second verification code, and when the first verification code is consistent with the second verification code, the target application is started, and the second verification code is generated by the vehicle-mounted terminal based on the random number, the current second system time of the vehicle-mounted terminal and the effective duration information.
After the first verification code is generated based on the random number, the current first system time of the target terminal and the effective duration information, the first verification code can be sent to the vehicle-mounted terminal, so that the vehicle-mounted terminal compares the first verification code with the second verification code, and when the first verification code is consistent with the second verification code, the target application is started and enters a functional interface of the target application. The second verification code is generated by the vehicle-mounted terminal based on the random number, the current second system time of the vehicle-mounted terminal and the effective duration information. The specific process can be as follows: after the vehicle-mounted terminal obtains the first verification code generated by the target terminal based on the random number, the current first system time and the effective duration information of the target terminal, the vehicle-mounted terminal can generate a second verification code according to the random number, the current second system time and the effective duration information of the vehicle-mounted terminal. The first verification code and the second verification code are then compared. And if the first verification code is consistent with the second verification code, the verification is passed, and the target application is allowed to be started. At this time, the target application may be started and a functional interface of the target application is entered.
According to the application starting method provided by the embodiment of the application, the random number is obtained by scanning and analyzing the two-dimensional code on the vehicle-mounted screen of the vehicle-mounted terminal. And generating a first verification code based on the random number, the current first system time of the target terminal and the effective duration information. The first verification code is sent to the vehicle-mounted terminal, the vehicle-mounted terminal compares the first verification code with the second verification code, and when the first verification code is consistent with the second verification code, the target application is started, and the second verification code is generated by the vehicle-mounted terminal based on the random number, the current second system time of the vehicle-mounted terminal and the effective duration information. According to the embodiment of the application, the random number is used as the generation standard of the verification code, the one-time dynamic verification code is performed on the opening mode, the verification code has timeliness, and the safety of starting the engineering mode application can be improved.
Referring to fig. 8, a schematic structural diagram of an application starting apparatus according to an embodiment of the present application is shown, where the apparatus may be applied to a vehicle-mounted terminal. As shown in fig. 8, the application starting apparatus 800 may include the following modules:
the two-dimensional code generating module 810 is configured to process a random number generated by a target application in response to a start operation for the target application, and generate a two-dimensional code;
A first verification code acquisition module 820, configured to acquire a first verification code generated by a target terminal based on the random number, a current first system time of the target terminal, and valid duration information; the random number is obtained by the target terminal through scanning and analyzing the two-dimensional code by an application management program;
a second verification code generating module 830, configured to generate a second verification code based on the random number, the current second system time of the vehicle-mounted terminal, and the valid duration information;
and the target application starting module 840 is configured to start the target application if the first verification code is consistent with the second verification code.
Optionally, the two-dimensional code generating module 810 includes:
a random number acquisition unit, configured to acquire a random number generated by the target application in response to a start operation for the target application;
the encrypted ciphertext generating unit is used for encrypting the random number based on an asymmetric encryption algorithm to generate an encrypted ciphertext;
and the two-dimensional code generating unit is used for converting the encrypted ciphertext to generate the two-dimensional code.
Optionally, the first verification code obtaining module 820 includes:
an input frame display unit for displaying a verification code input frame on the vehicle-mounted screen;
The first verification code acquisition unit is used for acquiring the first verification code input by the user in the verification code input box.
Optionally, the second verification code generating module 830 includes:
the second verification code generating unit is used for generating the second verification code with a specific bit number based on an HmacSHA1 algorithm by taking the random number as a secret key and the second system time and the effective duration information as messages;
the first verification code and the second verification code have the same length.
Optionally, the target application is an engineering mode application.
According to the application starting device provided by the embodiment of the application, the random number generated by the target application is processed in response to the starting operation aiming at the target application, the two-dimensional code is generated, the first verification code generated by the target terminal based on the random number, the current first system time and the effective duration information of the target terminal is obtained by scanning and analyzing the two-dimensional code through the application management program by the target terminal, the second verification code is generated based on the random number, the current second system time and the effective duration information of the vehicle-mounted terminal, and the target application is started under the condition that the first verification code is consistent with the second verification code. According to the embodiment of the application, the random number is used as the generation standard of the verification code, the one-time dynamic verification code is performed on the opening mode, the verification code has timeliness, and the safety of starting the engineering mode application can be improved. Meanwhile, the target terminal side can start the engineering mode application only by logging in the application management program, so that the user can be authenticated, and the user can be limited.
Referring to fig. 9, a schematic structural diagram of another application starting apparatus provided in an embodiment of the present application is shown, where the apparatus may be applied to a target terminal. As shown in fig. 9, the application starting apparatus 900 may include the following modules:
the random number acquisition module 910 is configured to scan and parse a two-dimensional code on a vehicle-mounted screen of the vehicle-mounted terminal to obtain a random number;
a first verification code generating module 920, configured to generate a first verification code based on the random number, the current first system time of the target terminal, and valid duration information;
the target application starting module 930 is configured to send the first verification code to the vehicle-mounted terminal, compare the first verification code with a second verification code by the vehicle-mounted terminal, and start the target application when the first verification code is consistent with the second verification code, where the second verification code is a verification code generated by the vehicle-mounted terminal based on the random number, the current second system time of the vehicle-mounted terminal, and the valid duration information.
Optionally, the random number acquisition module 910 includes:
the two-dimensional code scanning unit is used for acquiring the two-dimensional code scanned by the scanning function based on the application management program after a user logs in the application management program;
And the random number acquisition unit is used for analyzing the two-dimensional code to obtain the random number.
Optionally, the first verification code generating module 920 includes:
the first verification code generation unit is used for generating the first verification code with a specific bit number based on an HmacSHA1 algorithm by taking the random number as a secret key and the first system time and the effective duration information as messages;
the first verification code and the second verification code have the same length.
The application starting device provided by the embodiment of the application obtains the random number by scanning and analyzing the two-dimensional code on the vehicle-mounted screen of the vehicle-mounted terminal. And generating a first verification code based on the random number, the current first system time of the target terminal and the effective duration information. The first verification code is sent to the vehicle-mounted terminal, the vehicle-mounted terminal compares the first verification code with the second verification code, and when the first verification code is consistent with the second verification code, the target application is started, and the second verification code is generated by the vehicle-mounted terminal based on the random number, the current second system time of the vehicle-mounted terminal and the effective duration information. According to the embodiment of the application, the random number is used as the generation standard of the verification code, the one-time dynamic verification code is performed on the opening mode, the verification code has timeliness, and the safety of starting the engineering mode application can be improved.
Additionally, the embodiment of the application also provides electronic equipment, which comprises: : the system comprises a memory, a processor and a computer program stored in the memory and capable of running on the processor, wherein the computer program is executed by the processor to realize the application starting method.
Fig. 10 shows a schematic structural diagram of an electronic device 1000 according to an embodiment of the present application. As shown in fig. 10, the electronic device 1000 includes a Central Processing Unit (CPU) 1001 that can perform various appropriate actions and processes according to computer program instructions stored in a Read Only Memory (ROM) 1002 or computer program instructions loaded from a storage unit 1008 into a Random Access Memory (RAM) 1003. In the RAM1003, various programs and data required for the operation of the electronic apparatus 1000 can also be stored. The CPU1001, ROM1002, and RAM1003 are connected to each other by a bus 1004. An input/output (I/O) interface 1005 is also connected to bus 1004.
Various components in the electronic device 1000 are connected to the I/O interface 1005, including: an input unit 1006 such as a keyboard, mouse, microphone, etc.; an output unit 1007 such as various types of displays, speakers, and the like; a storage unit 1008 such as a magnetic disk, an optical disk, or the like; and communication unit 1009 such as a network card, modem, wireless communication transceiver, etc. Communication unit 1009 allows electronic device 1000 to exchange information/data with other devices via a computer network, such as the internet, and/or various telecommunications networks.
The various procedures and processes described above may be performed by the processing unit 1001. For example, the methods of any of the embodiments described above may be implemented as a computer software program tangibly embodied on a computer-readable medium, such as the storage unit 1008. In some embodiments, part or all of the computer program may be loaded and/or installed onto the electronic device 1000 via the ROM1002 and/or the communication unit 1009. When the computer program is loaded into RAM1003 and executed by CPU1001, one or more actions in the method described above may be performed.
The embodiment of the application also provides a computer readable storage medium, on which a computer program is stored, which when executed by a processor, realizes the processes of the above application starting method embodiment, and can achieve the same technical effects, and in order to avoid repetition, the description is omitted here. Wherein the computer readable storage medium is selected from Read-Only Memory (ROM), random access Memory (Random Access Memory, RAM), magnetic disk or optical disk.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (e.g. ROM/RAM, magnetic disk, optical disk) comprising instructions for causing a terminal (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to perform the method according to the embodiments of the present application.
The embodiments of the present application have been described above with reference to the accompanying drawings, but the present application is not limited to the above-described embodiments, which are merely illustrative and not restrictive, and many forms may be made by those having ordinary skill in the art without departing from the spirit of the present application and the scope of the claims, which are to be protected by the present application.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described systems, apparatuses and units may refer to corresponding procedures in the foregoing method embodiments, and are not repeated herein.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other manners. For example, the apparatus embodiments described above are merely illustrative, e.g., the division of the units is merely a logical function division, and there may be additional divisions when actually implemented, e.g., multiple units or components may be combined or integrated into another system, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other form.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer-readable storage medium. Based on this understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art or in a part of the technical solution, in the form of a software product stored in a storage medium, comprising several instructions for causing a computer device (which may be a personal computer, a server, a network device, etc.) to perform all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a usb disk, a removable hard disk, a ROM, a RAM, a magnetic disk, or an optical disk, etc.
The foregoing is merely illustrative of the present application, and the present application is not limited thereto, and any person skilled in the art will readily recognize that variations or substitutions are within the scope of the present application. Therefore, the protection scope of the application is subject to the protection scope of the claims.

Claims (12)

1. An application starting method applied to a vehicle-mounted terminal, the method comprising:
responding to a starting operation aiming at a target application, processing a random number generated by the target application, and generating a two-dimensional code;
acquiring a first verification code generated by a target terminal based on the random number, the current first system time and the effective duration information of the target terminal; the random number is obtained by the target terminal through scanning and analyzing the two-dimensional code by an application management program;
generating a second verification code based on the random number, the current second system time of the vehicle-mounted terminal and the effective duration information;
and starting the target application under the condition that the first verification is consistent with the second verification code.
2. The method of claim 1, wherein the processing the random number generated by the target application in response to the start operation for the target application to generate the two-dimensional code comprises:
Responding to a starting operation aiming at the target application, and acquiring a random number generated by the target application;
encrypting the random number based on an asymmetric encryption algorithm to generate an encrypted ciphertext;
and performing conversion processing on the encrypted ciphertext to generate the two-dimensional code.
3. The method of claim 1, wherein the obtaining the first verification code generated by the target terminal based on the random number, the current first system time of the target terminal, and the valid duration information, comprises:
displaying a verification code input box on the vehicle-mounted screen;
and acquiring the first verification code input by the user in the verification code input box.
4. The method of claim 1, wherein the generating a second verification code based on the random number, the current second system time of the vehicle-mounted terminal, and the valid duration information comprises:
generating the second verification code with a specific bit number based on an HmacSHA1 algorithm by taking the random number as a secret key and the second system time and the effective duration information as messages;
the first verification code and the second verification code have the same length.
5. The method according to any one of claims 1 to 4, wherein the target application is an engineering mode application.
6. An application starting method applied to a target terminal, the method comprising:
scanning and analyzing a two-dimensional code on a vehicle-mounted screen of the vehicle-mounted terminal to obtain a random number;
generating a first verification code based on the random number, the current first system time of the target terminal and the effective duration information;
the first verification code is sent to the vehicle-mounted terminal, the vehicle-mounted terminal compares the first verification code with a second verification code, and when the first verification code is consistent with the second verification code, the target application is started, and the second verification code is generated by the vehicle-mounted terminal based on the random number, the current second system time of the vehicle-mounted terminal and the effective duration information.
7. The method according to claim 6, wherein the scanning and analyzing the two-dimensional code on the vehicle-mounted screen of the vehicle-mounted terminal to obtain the random number includes:
after a user logs in an application management program, acquiring the two-dimensional code scanned by a scanning function based on the application management program;
and analyzing the two-dimensional code to obtain the random number.
8. The method of claim 6, wherein the generating a first verification code based on the random number, the current first system time of the target terminal, and the validity duration information comprises:
Generating the first verification code with a specific bit number by taking the random number as a secret key and the first system time and the effective duration information as messages based on an HmacSHA1 algorithm;
the first verification code and the second verification code have the same length.
9. An application starting apparatus applied to a vehicle-mounted terminal, the apparatus comprising:
the two-dimensional code generation module is used for responding to the starting operation of the target application, processing the random number generated by the target application and generating a two-dimensional code;
the first verification code acquisition module is used for acquiring a first verification code generated by the target terminal based on the random number, the current first system time of the target terminal and the effective duration information; the method comprises the steps of carrying out a first treatment on the surface of the The random number is obtained by the target terminal through scanning and analyzing the two-dimensional code by an application management program;
the second verification code generation module is used for generating a second verification code based on the random number, the current second system time of the vehicle-mounted terminal and the effective duration information;
and the target application starting module is used for starting the target application under the condition that the first verification code is consistent with the second verification code.
10. An application starting apparatus applied to a target terminal, the apparatus comprising:
the random number acquisition module is used for scanning and analyzing the two-dimensional code on the vehicle-mounted screen of the vehicle-mounted terminal to obtain a random number;
the first verification code generation module is used for generating a first verification code based on the random number, the current first system time of the target terminal and the effective duration information;
the target application starting module is used for sending the first verification code to the vehicle-mounted terminal, comparing the first verification code with the second verification code by the vehicle-mounted terminal, and starting the target application when the first verification code is consistent with the second verification code, wherein the second verification code is generated by the vehicle-mounted terminal based on the random number, the current second system time of the vehicle-mounted terminal and the effective duration information.
11. An electronic device, comprising:
memory, a processor and a computer program stored on the memory and executable on the processor, which when executed by the processor implements the application launch method of any one of claims 1 to 5 or claims 6 to 8.
12. A readable storage medium, characterized in that instructions in the storage medium, when executed by a processor of an electronic device, enable the electronic device to perform the application launch method of any one of claims 1 to 5, or claims 6 to 8.
CN202311132869.7A 2023-09-01 2023-09-01 Application starting method and device, electronic equipment and storage medium Pending CN117150475A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311132869.7A CN117150475A (en) 2023-09-01 2023-09-01 Application starting method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311132869.7A CN117150475A (en) 2023-09-01 2023-09-01 Application starting method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN117150475A true CN117150475A (en) 2023-12-01

Family

ID=88900397

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311132869.7A Pending CN117150475A (en) 2023-09-01 2023-09-01 Application starting method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN117150475A (en)

Similar Documents

Publication Publication Date Title
CN106487511B (en) Identity authentication method and device
US9197420B2 (en) Using information in a digital certificate to authenticate a network of a wireless access point
CN109005155B (en) Identity authentication method and device
US20100332841A1 (en) Authentication Method and System
CN108322416B (en) Security authentication implementation method, device and system
CN111431719A (en) Mobile terminal password protection module, mobile terminal and password protection method
WO2020018182A1 (en) Public-private key pair protected password manager
CN110659467A (en) Remote user identity authentication method, device, system, terminal and server
CN110690956B (en) Bidirectional authentication method and system, server and terminal
KR20130072790A (en) User authentication system and method thereof
CN104426659A (en) Dynamic password generating method, authentication method, authentication system and corresponding equipment
CN105447715A (en) Method and apparatus for anti-theft electronic coupon sweeping by cooperating with third party
CN104767617A (en) Message processing method, system and related device
CN111031539A (en) Method and system for enhancing login security of Windows operating system based on mobile terminal
CN112559991A (en) System secure login method, device, equipment and storage medium
CN109451504B (en) Internet of things module authentication method and system
CN113726766A (en) Offline identity authentication method, system and medium
CN115150109A (en) Authentication method, device and related equipment
CN112749182A (en) Method, audit terminal, device and storage medium for agent access to Oracle database
CN116170759A (en) Local area network access method and system based on WeChat
CN117150475A (en) Application starting method and device, electronic equipment and storage medium
CN110971511B (en) Instant messaging processing method, device, equipment and computer readable storage medium
CN114070571A (en) Method, device, terminal and storage medium for establishing connection
Guo et al. Extending registration and authentication processes of FIDO2 external authenticator with qr codes
CN115174181B (en) Method, device, equipment and storage medium for realizing single sign-on

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination