WO2017097101A1 - 用于账号登录的方法和装置 - Google Patents

用于账号登录的方法和装置 Download PDF

Info

Publication number
WO2017097101A1
WO2017097101A1 PCT/CN2016/106345 CN2016106345W WO2017097101A1 WO 2017097101 A1 WO2017097101 A1 WO 2017097101A1 CN 2016106345 W CN2016106345 W CN 2016106345W WO 2017097101 A1 WO2017097101 A1 WO 2017097101A1
Authority
WO
WIPO (PCT)
Prior art keywords
dimensional code
account
login
client
information
Prior art date
Application number
PCT/CN2016/106345
Other languages
English (en)
French (fr)
Inventor
胡育辉
陈焕葵
胡境彬
曾岳锋
Original Assignee
腾讯科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 腾讯科技(深圳)有限公司 filed Critical 腾讯科技(深圳)有限公司
Publication of WO2017097101A1 publication Critical patent/WO2017097101A1/zh
Priority to US15/937,224 priority Critical patent/US10812483B2/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/14Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
    • G06K7/1404Methods for optical code recognition
    • G06K7/1408Methods for optical code recognition the method being specifically adapted for the type of code
    • G06K7/14172D bar codes
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09CCIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
    • G09C5/00Ciphering apparatus or methods not provided for in the preceding groups, e.g. involving the concealment or deformation of graphic data such as designs, written or printed messages
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/108Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/77Graphical identity

Definitions

  • the embodiments of the present application relate to the field of communications, and, more particularly, to a method and apparatus for account login.
  • the common master-slave account login scheme is generally based on the idea of rights management.
  • the master account can manage the slave account, for example, adding and deleting accounts, granting and reclaiming account rights.
  • the slave account and the master account are relatively independent, and the login from the account is not restricted by the master account. If the password is leaked from the account, other people can have the right to access the account; the number of accounts is larger, so the possibility of password leakage is relatively large. How to strengthen the security of the login of the master and slave accounts has become an urgent problem to be solved.
  • the embodiment of the present application provides a method and apparatus for account login. Can improve the security of account login.
  • a method for account login including:
  • a login request sent from an account client where the login request includes information from the account number and a two-dimensional code, the two-dimensional code including information of the primary account and time-dependent information of the two-dimensional code, and the time-effective information is used for Indicating an effective time of the two-dimensional code;
  • a method for account login including:
  • the main account client generates a two-dimensional code, where the two-dimensional code includes information of a primary account and time-in-time information of the two-dimensional code, and the time-effective information is used to indicate a valid time of the two-dimensional code;
  • the primary account client provides the two-dimensional code to the secondary account client, so that the secondary account client sends a login request including the two-dimensional code to the server.
  • a method for account login including:
  • Obtaining a two-dimensional code from an account client where the two-dimensional code includes information of a primary account and time-dependent information of the two-dimensional code, and the time-effective information is used to indicate a valid time of the two-dimensional code;
  • a login request is sent from the account client to the server, the login request including information from the account and the two-dimensional code.
  • an apparatus for account login including:
  • a receiving module configured to receive a login request sent from an account client, where the login request includes information of the slave account and the two-dimensional code, where the two-dimensional code includes information of the primary account and time information of the two-dimensional code, The aging information is used to indicate the effective time of the two-dimensional code;
  • the processing module is configured to allow the login of the slave account client when the master account and the slave account are determined to be master-slave relationship according to the login request, and the two-dimensional code is not invalid.
  • a device for account login where the device is a primary account client, including:
  • a generating module configured to generate a two-dimensional code, where the two-dimensional code includes information of a primary account and time-in-time information of the two-dimensional code, where the time-effective information is used to indicate an effective time of the two-dimensional code;
  • a module configured to provide the two-dimensional code to the slave account client, so that the slave account client sends a login request including the two-dimensional code to the server.
  • a device for account login is provided, the device being a slave account client, including:
  • An obtaining module configured to obtain a two-dimensional code, where the two-dimensional code includes information of a primary account and time-in-time information of the two-dimensional code, where the time-effective information is used to indicate an effective time of the two-dimensional code;
  • a sending module configured to send a login request to the server, where the login request includes information about the account and the two-dimensional code.
  • the login from the account is performed by using the two-dimensional code, and the security and convenience of the login can be enhanced, and the two-dimensional code information has an effective time, so that the slave account does not have the permanent login permission, and the slave account is prevented from being stolen. , used maliciously.
  • FIG. 1 is a schematic flowchart of a method for account login according to an embodiment of the present application.
  • FIG. 2 is a schematic flowchart of a method for account login according to another embodiment of the present application.
  • FIG. 3 is a schematic flowchart of a method for account login according to another embodiment of the present application.
  • FIG. 4 is a system framework diagram applied to a method for account login according to another embodiment of the present application.
  • FIG. 5 is a schematic flowchart of a method for account login according to another embodiment of the present application.
  • FIG. 6 is a schematic diagram of an apparatus for account login according to another embodiment of the present application. block diagram.
  • FIG. 7 is a schematic block diagram of an apparatus for account login according to another embodiment of the present application.
  • FIG. 8 is a schematic block diagram of an apparatus for account login according to another embodiment of the present application.
  • FIG. 9 is a schematic block diagram of an apparatus for account login according to another embodiment of the present application.
  • FIG. 10 is a schematic block diagram of an apparatus for account login according to another embodiment of the present application.
  • FIG. 11 is a schematic block diagram of an apparatus for account login according to another embodiment of the present application.
  • FIG. 12 is a schematic block diagram of an apparatus for account login according to another embodiment of the present application.
  • FIG. 13 is a schematic block diagram of an apparatus for account login according to another embodiment of the present application.
  • the embodiment of the present application includes two types of clients, namely a primary account client and a slave account client.
  • the primary account client can manage the secondary account of the primary account, for example, adding and deleting an account, granting and reclaiming the account rights.
  • the server in the embodiment of the present application is used for the primary account. No. Client and service from the account client.
  • FIG. 1 is a schematic flowchart of a method 100 for account login according to an embodiment of the present application. As shown in FIG. 1, the method 100 includes:
  • a login request sent from an account client where the login request includes information about a secondary account, where the two-dimensional code includes information of a primary account and time-dependent information of the two-dimensional code, and the time-effective information Used to indicate the effective time of the two-dimensional code;
  • the server may send a login request including the two-dimensional code to the server; after receiving the login request, the server may use the information of the primary account and the account from the login request.
  • the information determines whether the primary account and the secondary account are master-slave relationships, and determines whether the two-dimensional code is not invalid according to whether the sending time of the login request is within the valid time of the two-dimensional code. If the primary account and the secondary account are in a master-slave relationship, and the two-dimensional code does not expire, the login of the secondary account client may be accepted.
  • the embodiment of the present application can perform login from the account by using the two-dimensional code, and the security and convenience of the login can be enhanced, and the two-dimensional code information has an effective time, so that the slave account does not have the permanent login permission, and the slave account is avoided. After being stolen, it was used maliciously.
  • the login of the secondary account client is rejected.
  • the two-dimensional code may be an encrypted two-dimensional code, that is, the primary account client encrypts the two-dimensional code when generating the two-dimensional code; and obtains from the account client.
  • the encrypted two-dimensional code is directly sent to the server by the encrypted two-dimensional code, and the two-dimensional code is decrypted by the server to obtain the information of the primary account and the aging information.
  • the server may instruct the primary account client to periodically update the two-dimensional code.
  • the update period and the update rule may be sent to the primary account client, and the primary account client sets the two-dimensional code according to the update period and the update rule.
  • the effective time may be updated, or the primary account may be updated (eg, updated with an identity).
  • the primary account client may also actively update the two-dimensional code and notify the server of the updated two-dimensional code.
  • the server updates the two-dimensional code according to the update period and the update rule, thereby obtaining the updated two-dimensional code, and directly sending the two-dimensional code to the primary account client, and then being provided by the primary account client to the secondary account client.
  • FIG. 2 is a schematic flowchart of a method 200 for account login according to an embodiment of the present application. As shown in FIG. 2, the method 200 includes:
  • the master account client generates a two-dimensional code, where the two-dimensional code includes information of a primary account and time-in-time information of the two-dimensional code, where the time-effective information is used to indicate a valid time of the two-dimensional code;
  • the primary account client provides the two-dimensional code to the secondary account client, so that the secondary account client sends a login request including the two-dimensional code to the server.
  • the primary account client may generate a two-dimensional code and provide the two-dimensional code to the secondary account client; the account client may send a login request including the two-dimensional code to the server; the server receives the After the login request, when determining that the primary account and the secondary account are master-slave relationships, and the two-dimensional code has not expired, the login of the secondary account client may be accepted.
  • the embodiment of the present application can perform login from the account by using the two-dimensional code, and the security and convenience of the login can be enhanced, and the two-dimensional code information has an effective time, so that the slave account does not have the permanent login permission, and the slave account is avoided. After being stolen, it was used maliciously.
  • the two-dimensional code may be an encrypted two-dimensional code, that is, the primary account client encrypts the two-dimensional code when generating the two-dimensional code; and obtains from the account client.
  • the encrypted two-dimensional code is directly sent to the server by the encrypted two-dimensional code, and the two-dimensional code is decrypted by the server to obtain the information of the primary account and the aging information.
  • the primary account client generates a two-dimensional code, including:
  • the primary account client periodically updates the aging information according to the indication of the server.
  • FIG. 3 is a schematic flowchart of a method 300 for account login according to an embodiment of the present application. As shown in FIG. 3, the method 300 includes:
  • 310 Obtain a two-dimensional code from an account client, where the two-dimensional code includes information of a primary account and time-in-time information of the two-dimensional code, where the time-effective information is used to indicate a valid time of the two-dimensional code;
  • the primary account client may generate a two-dimensional code and provide the two-dimensional code to the secondary account client; the account client may send a login request including the two-dimensional code to the server; the server receives the After the login request, when determining that the primary account and the secondary account are master-slave relationships, and the two-dimensional code has not expired, the login of the secondary account client may be accepted.
  • the embodiment of the present application can perform login from the account by using the two-dimensional code, and the security and convenience of the login can be enhanced, and the two-dimensional code information has an effective time, so that the slave account does not have the permanent login permission, and the slave account is avoided. After being stolen, it was used maliciously.
  • the method for account login according to an embodiment of the present application is described above from the server side, the primary client side, and the client side in conjunction with FIGS. 1 through 3.
  • a method for account login according to an embodiment of the present application will be described below in conjunction with FIG. 4 and FIG.
  • the system includes a primary account client 510, a secondary account client 520, and a server 530.
  • the updated two-dimensional code can be exchanged between the primary account client 510 and the server 530.
  • the primary account client 510 can send the two-dimensional code to the secondary account client 520.
  • a login request carrying a two-dimensional code is sent from the account client 520 to the server.
  • the server 530 feeds back the processing result of the login request from the account client 520.
  • FIG. 5 is a schematic flowchart of a method 400 for account login according to an embodiment of the present application. As shown in FIG. 5, the method 400 includes:
  • the two-dimensional code is presented on the primary account client (eg, a web page) to facilitate scanning from the account client; or the two-dimensional code is sent to the secondary account client by means of information transmission.
  • Determining whether the data of the login request is legal for example, determining whether the protocol format is correct; whether the login request is from a secure communication channel;
  • Determining whether the login request is forged that is, whether the login request is directly constructed by the attacker; wherein, whether the login request is forged by determining whether the decryption is successful;
  • the login request sent from the account client is intercepted and tampered by the attacker; wherein the login request can be judged whether the login request is intercepted and tampered by the attacker.
  • the login request is invalid, or the login request is forged, or the login request is tampered with, the login is refused, and the feedback of rejecting the login is returned to the account client.
  • the user is successfully logged in.
  • the embodiment of the present application can perform login from the account by using the two-dimensional code, and the security and convenience of the login can be enhanced, and the two-dimensional code information has an effective time, so that the slave account does not have the permanent login permission, and the slave account is avoided. After being stolen, it was used maliciously. Further, the two-dimensional code can be encrypted to further improve the security of account login.
  • FIG. 6 is a schematic block diagram of an apparatus 500 for account login, in accordance with an embodiment. As shown in FIG. 6, the apparatus 500 includes:
  • the receiving module 510 is configured to receive a login request sent from an account client, where the login request includes information from the account and a two-dimensional code, where the two-dimensional code includes information of the primary account and the The aging information of the two-dimensional code, the aging information is used to indicate the effective time of the two-dimensional code;
  • the processing module 520 is configured to allow the login of the slave account client when the master account and the slave account are determined to be master-slave relationships according to the login request, and the two-dimensional code is not invalid.
  • processing module 520 is further configured to:
  • the two-dimensional code is an encrypted two-dimensional code.
  • the apparatus 500 further includes:
  • the decryption module 530 is configured to decrypt the two-dimensional code to obtain information about the primary account and the aging information.
  • the apparatus further includes an update module 540.
  • the update module 540 is configured to: instruct the primary account client to periodically update the two-dimensional code; or update the two-dimensional code, and send the updated two-dimensional code to the primary account client. or
  • the receiving module of the device is further configured to receive the two-dimensional code that is periodically updated by the primary account client, so as to process the login request sent by the account client.
  • the device 500 can correspond to the server mentioned in the foregoing description, and the corresponding functions of the server can be implemented. For brevity, no further details are provided herein.
  • the embodiment of the present application is based on the two-dimensional code login from the account, which can enhance the security and convenience of the login, and the two-dimensional code information has an effective time, so that the slave account does not have the permanent login right, and after the account is stolen, Used maliciously. Further, the two-dimensional code can be encrypted to further improve the security of account login.
  • FIG. 8 is a schematic block diagram of an apparatus 600 for account login. As shown in FIG. 8, the device 600 is a primary account client, and includes:
  • a generating module 610 configured to generate a two-dimensional code, where the two-dimensional code includes information of a primary account The aging information of the two-dimensional code, the aging information is used to indicate the effective time of the two-dimensional code;
  • the providing module 620 is configured to provide the two-dimensional code to the slave account client, so that the slave account client sends a login request including the two-dimensional code to the server.
  • the generating module 610 is specifically configured to:
  • An encrypted two-dimensional code is generated on the primary account client.
  • the apparatus 600 further includes an update module 630, configured to:
  • the apparatus 600 may correspond to the primary account client mentioned in the method embodiment in the foregoing description, and may implement the corresponding function of the primary account client. For brevity, no further details are provided herein.
  • the embodiment of the present application is based on the two-dimensional code login from the account, which can enhance the security and convenience of the login, and the two-dimensional code information has an effective time, so that the slave account does not have the permanent login right, and after the account is stolen, Used maliciously. Further, the two-dimensional code can be encrypted to further improve the security of account login.
  • FIG. 10 is a schematic block diagram of an apparatus 700 for account login according to an embodiment of the present application.
  • the device 700 is a slave account client, including:
  • the obtaining module 710 is configured to obtain a two-dimensional code, where the two-dimensional code includes information of a primary account and time-in-time information of the two-dimensional code, where the time-effective information is used to indicate an effective time of the two-dimensional code;
  • the sending module 720 is configured to send a login request to the server, where the login request includes information about the account and the two-dimensional code.
  • the device 700 can correspond to the slave account client mentioned in the method embodiment in the foregoing description, and the corresponding function of the slave account client can be implemented. For brevity, no further details are provided herein.
  • the embodiment of the present application is based on the two-dimensional code login from the account, which can enhance the security and convenience of the login, and the two-dimensional code information has an effective time, so that the slave account does not have the permanent login right, and after the account is stolen, Used maliciously. Further, the two-dimensional code can be encrypted to further improve the security of account login.
  • FIG. 11 is a schematic block diagram of an apparatus 800 for account login in accordance with an embodiment of the present application.
  • the apparatus 800 includes a processor 810, a memory 820, a network interface 830, and a bus 840 that interconnects the processor 810, the memory 820, and the network interface 830.
  • the memory 820 stores program code
  • the processor 810 calls the program code of the memory 820 to perform the following processing:
  • a login request sent from an account client where the login request includes information of the slave account and the two-dimensional code, the two-dimensional code including information of the primary account and time-of-date information of the two-dimensional code,
  • the aging information is used to indicate the effective time of the two-dimensional code
  • program code that the processor 810 calls the memory 820 further performs the following processing:
  • the two-dimensional code is an encrypted two-dimensional code
  • the program code that the processor 810 calls the memory 820 further performs the following processing:
  • the two-dimensional code is decrypted to obtain the information of the primary account and the aging information.
  • program code that the processor 810 calls the memory 820 further performs the following processing:
  • the device 800 can correspond to the server mentioned in the method embodiment in the foregoing description, and the corresponding functions of the server can be implemented. For brevity, no further details are provided herein.
  • the embodiment of the present application is based on the two-dimensional code login from the account, which can enhance the security and convenience of the login, and the two-dimensional code information has an effective time, so that the slave account does not have the permanent login right, and after the account is stolen, Used maliciously. Further, the two-dimensional code can be encrypted to further improve the security of account login.
  • FIG. 12 is a schematic block diagram of an apparatus 900 for account login in accordance with an embodiment of the present application.
  • the device 900 is a primary account client.
  • the apparatus 900 includes a processor 910, a memory 920, a network interface 930, and a bus 940 that interconnects the processor 910, the memory 920, and the network interface 930.
  • the memory 920 stores program code, and the processor 910 calls the program code of the memory 920 to perform the following processing:
  • the two-dimensional code includes information of a primary account and time-dependent information of the two-dimensional code, and the time-effective information is used to indicate an effective time of the two-dimensional code;
  • the two-dimensional code is provided to the slave account client, so that the slave account client sends a login request including the two-dimensional code to the server.
  • the processor 910 calls the program code of the memory 920 to specifically perform the following processing:
  • the program code that the processor 910 calls the memory 920 further performs the following processing:
  • the primary account client updates the two-dimensional code according to an instruction of the server.
  • the primary account client updates the two-dimensional code and sends the updated two-dimensional code to the server;
  • the primary account client receives the updated two-dimensional code sent by the server.
  • the apparatus 900 can correspond to the primary account client mentioned in the method embodiment of the foregoing description, and the corresponding function of the primary account client can be implemented. For brevity, no further details are provided herein.
  • the embodiment of the present application is based on the two-dimensional code login from the account, which can enhance the security and convenience of the login, and the two-dimensional code information has an effective time, so that the slave account does not have the permanent login right, and after the account is stolen, Used maliciously. Further, the two-dimensional code can be encrypted to further improve the security of account login.
  • FIG. 13 is a schematic block diagram of an apparatus 1000 for account login in accordance with an embodiment of the present application.
  • the device 1000 is a slave account client.
  • the apparatus 1000 includes a processor 1010, a memory 1020, a network interface 1030, and an interconnect processor 1010, a memory 1020, and a bus 1040 of the network interface 1030.
  • the memory 1020 stores program code
  • the processor 1010 calls the program code of the memory 1020 to perform the following processing:
  • the two-dimensional code includes information of a primary account and time-dependent information of the two-dimensional code, and the time-effective information is used to indicate an effective time of the two-dimensional code;
  • a login request is sent to the server through the network interface 1030, the login request including information from the account number and the two-dimensional code.
  • the device 1000 can correspond to the slave account client mentioned in the method embodiment in the foregoing description, and the corresponding function of the slave account client can be implemented. For brevity, no further details are provided herein.
  • the embodiment of the present application is based on the two-dimensional code login from the account, which can enhance the security and convenience of the login, and the two-dimensional code information has an effective time, so that the slave account does not have the permanent login right, and after the account is stolen, Used maliciously. Further, the two-dimensional code can be encrypted to further improve the security of account login.
  • each functional module in various embodiments of the present invention can be integrated into one processing list.
  • each module may exist physically separately, or two or more modules may be integrated into one unit.
  • the above integrated unit can be implemented in the form of hardware, in the form of a software functional unit, or in a combination of software and hardware.
  • the functional modules of the various embodiments may be located at one terminal or network node, or may be distributed to multiple terminals or network nodes.
  • each of the embodiments of the present invention can be implemented by a data processing program executed by a data processing device such as a computer.
  • the data processing program constitutes the present invention.
  • a data processing program that is usually stored in one storage medium is executed by directly reading the program out of the storage medium or by installing or copying the program to a storage device (such as a hard disk and/or a memory) of the data processing device. Therefore, such a storage medium also constitutes the present invention.
  • the storage medium can use any type of recording method, such as paper storage medium (such as paper tape, etc.), magnetic storage medium (such as floppy disk, hard disk, flash memory, etc.), optical storage medium (such as CD-ROM, etc.), magneto-optical storage medium (such as MO, etc.).
  • paper storage medium such as paper tape, etc.
  • magnetic storage medium such as floppy disk, hard disk, flash memory, etc.
  • optical storage medium such as CD-ROM, etc.
  • magneto-optical storage medium Such as MO, etc.
  • the present invention also provides a storage medium in which is stored a data processing program for performing any of the above embodiments of the present invention.
  • a person skilled in the art may understand that all or part of the steps of implementing the above embodiments may be completed by hardware, or may be instructed by a program to execute related hardware, and the program may be stored in a computer readable storage medium.
  • the storage medium mentioned may be a read only memory, a magnetic disk or an optical disk or the like.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Electromagnetism (AREA)
  • General Health & Medical Sciences (AREA)
  • Toxicology (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Information Transfer Between Computers (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

本申请实施例提供了一种用于账号登录的方法和装置。该方法包括:接收从账号客户端发送的登录请求,所述登录请求包括从账号的信息和二维码,所述二维码包括主账号的信息和所述二维码的时效信息,所述时效信息用于指示所述二维码的有效时间;在根据所述登录请求,确定所述主账号和所述从账号为主从关系,且所述二维码未失效时,允许所述从账号客户端的登录。

Description

用于账号登录的方法和装置
本申请要求于2015年12月8日提交中国专利局、申请号为201510898239.X、发明名称为“用于账号登录的方法和装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请实施例涉及通信领域,并且更具体地,涉及一种用于账号登录的方法和装置。
发明背景
目前常见的主从帐号登录方案一般基于权限管理的思想。主帐号可以对其从帐号进行管理,例如从帐号的新增、删除,从帐号权限的授予、回收。从帐号和主帐号是相对独立的,从帐号的登录不受主帐号限制。如果从帐号密码泄露,其他人就能拥有从帐号的权限;从帐号个数较多,因此密码泄露可能性相对较大。如何加强主从账号登录的安全性,成为一项亟待解决的问题。
发明内容
本申请实施例提供一种用于账号登录的方法和装置。可以提高账号登录的安全性。
一方面,提供了一种用于账号登录的方法,包括:
接收从账号客户端发送的登录请求,所述登录请求包括从账号的信息和二维码,所述二维码包括主账号的信息和所述二维码的时效信息,所述时效信息用于指示所述二维码的有效时间;
在根据所述登录请求,确定所述主账号和所述从账号为主从关系, 且所述二维码未失效时,允许所述从账号客户端的登录。
另一方面,提供了一种用于账号登录的方法,包括:
主账号客户端生成二维码,所述二维码包括主账号的信息和二维码的时效信息,所述时效信息用于指示所述二维码的有效时间;
所述主账号客户端向从账号客户端提供所述二维码,以便于所述从账号客户端向服务器发送包括所述二维码的登录请求。
另一方面,提供了一种用于账号登录的方法,包括:
从账号客户端获取二维码,所述二维码包括主账号的信息和所述二维码的时效信息,所述时效信息用于指示所述二维码的有效时间;
从账号客户端向服务器发送登录请求,所述登录请求包括从账号的信息和所述二维码。
另一方面,提供了一种用于账号登录的装置,包括:
接收模块,用于接收从账号客户端发送的登录请求,所述登录请求包括从账号的信息和二维码,所述二维码包括主账号的信息和所述二维码的时效信息,所述时效信息用于指示所述二维码的有效时间;
处理模块,用于在根据所述登录请求,确定所述主账号和所述从账号为主从关系,且所述二维码未失效时,允许所述从账号客户端的登录。
另一方面,提供了一种用于账号登录的装置,所述装置为主账号客户端,包括:
生成模块,用于生成二维码,所述二维码包括主账号的信息和二维码的时效信息,所述时效信息用于指示所述二维码的有效时间;
提供模块,用于向从账号客户端提供所述二维码,以便于所述从账号客户端向服务器发送包括所述二维码的登录请求。
另一方面,提供了一种用于账号登录的装置,所述装置为从账号客户端,包括:
获取模块,用于获取二维码,所述二维码包括主账号的信息和所述二维码的时效信息,所述时效信息用于指示所述二维码的有效时间;
发送模块,用于向服务器发送登录请求,所述登录请求包括从账号的信息和所述二维码。
本申请实施例通过二维码进行从账号的登录,可以增强登录的安全性和便利性,并且二维码信息具有有效时间,使得从账号不具备永久登录的权限,避免在从账号被盗后,被恶意使用。
附图简要说明
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。
图1是根据本申请实施例的一种用于账号登录的方法的示意性流程图。
图2是根据本申请另一实施例的一种用于账号登录的方法的示意性流程图。
图3是根据本申请另一实施例的一种用于账号登录的方法的示意性流程图。
图4是根据本申请另一实施例的用于账号登录的方法所应用的系统框架图。
图5是根据本申请另一实施例的一种用于账号登录的方法的示意性流程图。
图6是根据本申请另一实施例的一种用于账号登录的装置的示意性 框图。
图7是根据本申请另一实施例的一种用于账号登录的装置的示意性框图。
图8是根据本申请另一实施例的一种用于账号登录的装置的示意性框图。
图9是根据本申请另一实施例的一种用于账号登录的装置的示意性框图。
图10是根据本申请另一实施例的一种用于账号登录的装置的示意性框图。
图11是根据本申请另一实施例的一种用于账号登录的装置的示意性框图。
图12是根据本申请另一实施例的一种用于账号登录的装置的示意性框图。
图13是根据本申请另一实施例的一种用于账号登录的装置的示意性框图。
实施本发明的方式
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。
本申请实施例包括两种客户端,即主账号客户端和从账号客户端。主账号客户端可以对该主账号的从帐号进行管理,例如从帐号的新增、删除,从帐号权限的授予、回收。本申请实施例中的服务器用于对主账 号客户端和从账号客户端提供服务。
图1是根据本申请实施例的一种用于账号登录的方法100的示意性流程图。如图1所示,该方法100包括:
110,接收从账号客户端发送的登录请求,所述登录请求包括从账号的信息和二维码,所述二维码包括主账号的信息和所述二维码的时效信息,所述时效信息用于指示所述二维码的有效时间;
120,在根据所述登录请求,确定所述主账号和所述从账号为主从关系,且所述二维码未失效时,允许所述从账号客户端的登录。
在从账号客户端从主账号客户端获取二维码之后,可以向服务器发送包括该二维码的登录请求;服务器接收到该登录请求后,可以根据登录请求中主账号的信息和从账号的信息判断所述主账号和所述从账号是否为主从关系,以及根据登录请求的发送时间是否处于所述二维码的有效时间内,来确定所述二维码是否未失效。如果所述主账号和所述从账号为主从关系,且所述二维码未失效,则可以接受该从账号客户端的登录。
从而,本申请实施例通过二维码进行从账号的登录,可以增强登录的安全性和便利性,并且二维码信息具有有效时间,使得从账号不具备永久登录的权限,避免在从账号被盗后,被恶意使用。
可选地,在本申请实施例中,在确定所述主账号和所述从账号为非主从关系,或所述二维码已失效时,拒绝所述从账号客户端的登录。
可选地,在本申请实施例中,所述二维码可以为加密的二维码,也即主账号客户端在生成二维码时对该二维码进行加密;在从账号客户端获取该加密的二维码,并直接将该加密的二维码通过登录请求发送给服务器,由服务器对所述二维码进行解密,以获取所述主账号的信息和所述时效信息。
从而通过对二维码进行加密,可以避免二维码在传送过程中被恶意篡改。
可选地,在本申请实施例中,服务器可以指示所述主账号客户端定时更新所述二维码。具体地,可以将更新周期和更新规则发送给主账号客户端,由该主账号客户端根据该更新周期和更新规则设置二维码。例如,可以对有效时间进行更新,或者对主账号进行更新(例如更新标识)等。
当然,在本申请实施例中,主账号客户端也可以主动更新二维码,并将更新的二维码通知给服务器。或者,服务器根据更新周期和更新规则更新二维码,从而获取更新的二维码,将该二维码直接发送给主账号客户端,然后,由主账号客户端提供给从账号客户端。
图2是根据本申请实施例的一种用于账号登录的方法200的示意性流程图。如图2所示,该方法200包括:
210,主账号客户端生成二维码,所述二维码包括主账号的信息和二维码的时效信息,所述时效信息用于指示所述二维码的有效时间;
220,所述主账号客户端向从账号客户端提供所述二维码,以便于所述从账号客户端向服务器发送包括所述二维码的登录请求。
在本申请实施例中,主账号客户端可以生成二维码,并向从账号客户端提供该二维码;从账号客户端可以向服务器发送包括该二维码的登录请求;服务器接收到该登录请求后,在确定所述主账号和所述从账号为主从关系,且所述二维码未失效时,则可以接受该从账号客户端的登录。
从而,本申请实施例通过二维码进行从账号的登录,可以增强登录的安全性和便利性,并且二维码信息具有有效时间,使得从账号不具备永久登录的权限,避免在从账号被盗后,被恶意使用。
可选地,在本申请实施例中,所述二维码可以为加密的二维码,也即主账号客户端在生成二维码时对该二维码进行加密;在从账号客户端获取该加密的二维码,并直接将该加密的二维码通过登录请求发送给服务器,由服务器对所述二维码进行解密,以获取所述主账号的信息和所述时效信息。
可选地,在本申请实施例中,所述主账号客户端生成二维码,包括:
所述主账号客户端根据所述服务器的指示,定时更新所述时效信息。
图3是根据本申请实施例的一种用于账号登录的方法300的示意性流程图。如图3所示,该方法300包括:
310,从账号客户端获取二维码,所述二维码包括主账号的信息和所述二维码的时效信息,所述时效信息用于指示所述二维码的有效时间;
320,从账号客户端向服务器发送登录请求,所述登录请求包括从账号的信息和所述二维码。
在本申请实施例中,主账号客户端可以生成二维码,并向从账号客户端提供该二维码;从账号客户端可以向服务器发送包括该二维码的登录请求;服务器接收到该登录请求后,在确定所述主账号和所述从账号为主从关系,且所述二维码未失效时,则可以接受该从账号客户端的登录。
从而,本申请实施例通过二维码进行从账号的登录,可以增强登录的安全性和便利性,并且二维码信息具有有效时间,使得从账号不具备永久登录的权限,避免在从账号被盗后,被恶意使用。
以上结合图1至图3从服务器侧、主客户端侧和从客户端侧描述了根据本申请实施例的用于账号登录的方法。以下将结合图4和图5,以整体上描述根据本申请实施例的用于账号登录的方法。
图4是该用于账号登录的方法可以应用的系统的架构框架图。如图 4所示,该系统包括主账号客户端510、从账号客户端520和服务器530。在主账号客户端510和服务器530之间可以交互更新的二维码。主账号客户端510可以将二维码发送给从账号客户端520。从账号客户端520向服务器发送携带二维码的登录请求。服务器530向从账号客户端520反馈登录请求的处理结果。
图5是根据本申请实施例的用于账号登录的方法400的示意性流程图。如图5所示,该方法400包括:
(1)在主账号客户端510侧
401,确定二维码的时效时间和主账号。
402,根据该时效时间,以及主账号,生成加密的二维码。
403,将该二维码提供给从账号客户端。例如,在主账号客户端(例如,web页面)上呈现该二维码,以便于从账号客户端扫描;或者,通过信息发送的方式,将该二维码发送给从账号客户端。
(2)从账号客户端520侧
404,开始登录从账号。
405,扫描二维码。
406,将二维码、从账号信息携带到登录请求中,以发送给服务器,以请求登录。
(3)服务器530侧
406,接收从账号客户端发送的登录请求。
407,对登录请求进行解密,并进行以下判断:
判断登录请求的数据是否合法;例如,判断协议格式是否正确;登录请求是否来自安全的通信通道;
判断登录请求是否伪造,即该登录请求是否由攻击者直接构造出的;其中,可以通过解密是否成功的方式来判断登录请求是否伪造;
从账号客户端发送的登录请求是否被攻击者截获并篡改;其中,可以通过解密是否成功的方式来判断登录请求是否被攻击者截获并篡改。
如果登录请求的数据不合法,或判断登录请求是伪造的,或该登录请求被篡改,则拒绝登录,向从账号客户端返回拒绝登录的反馈。
如果登录请求的数据合法,且判断登录请求不是伪造的,且该登录请求未被篡改,则执行408。
408,判断主账号和从账号是否是主从关系。如果是,执行409;如果否,则拒绝登录(411),向从账号客户端返回拒绝登录的反馈。
409,判断登录请求的发送时间是否在二维码的有效时间内(或者仅仅判断当前时间是否在二维码的有效时间内);如果是,则接受登录,向从账号客户端返回接受登录的反馈;如果否,则拒绝登录,向从账号客户端返回拒绝登录的反馈。
(4)从账号客户端侧
410,接收服务器的反馈,判断是否登录成功。如果是,执行411,如果否,执行412。
411,呈现给用户登录成功。
412,呈现给用户登录失败。
从而,本申请实施例通过二维码进行从账号的登录,可以增强登录的安全性和便利性,并且二维码信息具有有效时间,使得从账号不具备永久登录的权限,避免在从账号被盗后,被恶意使用。进一步地可对二维码进行加密,进一步提升账号登录安全性。
图6是根据一种实施例的用于账号登录的装置500的示意性框图。如图6所示,该装置500包括:
接收模块510,用于接收从账号客户端发送的登录请求,所述登录请求包括从账号的信息和二维码,所述二维码包括主账号的信息和所述 二维码的时效信息,所述时效信息用于指示所述二维码的有效时间;
处理模块520,用于在根据所述登录请求,确定所述主账号和所述从账号为主从关系,且所述二维码未失效时,允许所述从账号客户端的登录。
可选地,所处理模块520进一步用于:
在确定所述主账号和所述从账号为非主从关系,或所述二维码已失效时,拒绝所述从账号客户端的登录。
可选地,所述二维码为加密的二维码,如图7所示,所述装置500还包括:
解密模块530,用于对所述二维码进行解密,以获取所述主账号的信息和所述时效信息。
可选地,如图7所示,所述装置还包括更新模块540。所示更新模块540用于:指示所述主账号客户端定时更新所述二维码;或更新所述二维码,并将所述更新的二维码发送给所述主账号客户端。或者
所述装置的所述接收模块,还用于接收所述主账号客户端定时更新的所述二维码,以便以处理所述从账号客户端发送的登录请求。
该装置500可以对应于以上说明书中提到的服务器,可以实现该服务器的相应功能,为了简洁,在此不再赘述。
本申请实施例基于二维码的从账号登录,可以增强登录的安全性和便利性,并且二维码信息具有有效时间,使得从账号不具备永久登录的权限,避免在从账号被盗后,被恶意使用。进一步地可对二维码进行加密,进一步提升账号登录安全性。
图8是一种用于账号登录的装置600的示意性框图。如图8所示,该装置600为主账号客户端,包括:
生成模块610,用于生成二维码,所述二维码包括主账号的信息和 二维码的时效信息,所述时效信息用于指示所述二维码的有效时间;
提供模块620,用于向从账号客户端提供所述二维码,以便于所述从账号客户端向服务器发送包括所述二维码的登录请求。
可选地,所述生成模块610具体用于:
在所述主账号客户端生成加密的二维码。
可选地,如图9所示,所述装置600进一步包括更新模块630,用于:
根据所述服务器的指示,更新所述二维码;或
更新所述二维码,向所述服务器发送更新的所述二维码;或
接收所述服务器发送的更新的所述二维码。
该装置600可以对应于以上说明书中方法实施例提到的主账号客户端,可以实现该主账号客户端的相应功能,为了简洁,在此不再赘述。
本申请实施例基于二维码的从账号登录,可以增强登录的安全性和便利性,并且二维码信息具有有效时间,使得从账号不具备永久登录的权限,避免在从账号被盗后,被恶意使用。进一步地可对二维码进行加密,进一步提升账号登录安全性。
图10是根据本申请实施例的一种用于账号登录的装置700的示意性框图。所述装置700为从账号客户端,包括:
获取模块710,用于获取二维码,所述二维码包括主账号的信息和所述二维码的时效信息,所述时效信息用于指示所述二维码的有效时间;
发送模块720,用于向服务器发送登录请求,所述登录请求包括从账号的信息和所述二维码。
该装置700可以对应于以上说明书中方法实施例提到的从账号客户端,可以实现该从账号客户端的相应功能,为了简洁,在此不再赘述。
本申请实施例基于二维码的从账号登录,可以增强登录的安全性和便利性,并且二维码信息具有有效时间,使得从账号不具备永久登录的权限,避免在从账号被盗后,被恶意使用。进一步地可对二维码进行加密,进一步提升账号登录安全性。
图11是根据本申请实施例的用于账号登录的装置800的示意性框图。如图11所示,该装置800包括处理器810、存储器820、网络接口830和互连处理器810、存储器820、网络接口830的总线,840。该存储器820中存储有程序代码,该处理器810调用该存储器820的程序代码执行以下处理:
通过网络接口830接收从账号客户端发送的登录请求,所述登录请求包括从账号的信息和二维码,所述二维码包括主账号的信息和所述二维码的时效信息,所述时效信息用于指示所述二维码的有效时间;
在根据所述登录请求,确定所述主账号和所述从账号为主从关系,且所述二维码未失效时,允许所述从账号客户端的登录。
可选地,该处理器810调用该存储器820的程序代码还执行以下处理:
在确定所述主账号和所述从账号为非主从关系,或所述二维码已失效时,拒绝所述从账号客户端的登录。
可选地,所述二维码为加密的二维码,该处理器810调用该存储器820的程序代码还执行以下处理:
在接收从账号客户端发送的登录请求之后,对所述二维码进行解密,以获取所述主账号的信息和所述时效信息。
可选地,该处理器810调用该存储器820的程序代码还执行以下处理:
指示所述主账号客户端定时更新所述二维码;或
接收所述主账号客户端定时更新的所述二维码,以便以处理所述从账号客户端发送的登录请求;或
更新所述二维码,并将更新的所述二维码发送给所述主账号客户端。
该装置800可以对应于以上说明书中方法实施例提到的服务器,可以实现该服务器的相应功能,为了简洁,在此不再赘述。
本申请实施例基于二维码的从账号登录,可以增强登录的安全性和便利性,并且二维码信息具有有效时间,使得从账号不具备永久登录的权限,避免在从账号被盗后,被恶意使用。进一步地可对二维码进行加密,进一步提升账号登录安全性。
图12是根据本申请实施例的用于账号登录的装置900的示意性框图。该装置900为主账号客户端。如图12所示,该装置900包括处理器910、存储器920、网络接口930和互连处理器910、存储器920、网络接口930的总线940。该存储器920中存储有程序代码,该处理器910调用该存储器920的程序代码执行以下处理:
生成二维码,所述二维码包括主账号的信息和二维码的时效信息,所述时效信息用于指示所述二维码的有效时间;
向从账号客户端提供所述二维码,以便于所述从账号客户端向服务器发送包括所述二维码的登录请求。
可选地,该处理器910调用该存储器920的程序代码具体执行以下处理:
生成加密的二维码。
可选地,该处理器910调用该存储器920的程序代码还执行以下处理:
生成加密的二维码。
所述主账号客户端根据所述服务器的指示,更新所述二维码;或
所述主账号客户端更新所述二维码,向所述服务器发送更新的所述二维码;或
所述主账号客户端接收所述服务器发送的更新的所述二维码。
该装置900可以对应于以上说明书中方法实施例提到的主账号客户端,可以实现该主账号客户端的相应功能,为了简洁,在此不再赘述。
本申请实施例基于二维码的从账号登录,可以增强登录的安全性和便利性,并且二维码信息具有有效时间,使得从账号不具备永久登录的权限,避免在从账号被盗后,被恶意使用。进一步地可对二维码进行加密,进一步提升账号登录安全性。
图13是根据本申请实施例的用于账号登录的装置1000的示意性框图。该装置1000为从账号客户端。如图13所示,该装置1000包括处理器1010、存储器1020、网络接口1030和互连处理器1010、存储器1020、网络接口1030的总线1040。该存储器1020中存储有程序代码,该处理器1010调用该存储器1020的程序代码执行以下处理:
获取二维码,所述二维码包括主账号的信息和所述二维码的时效信息,所述时效信息用于指示所述二维码的有效时间;
通过网络接口1030向服务器发送登录请求,所述登录请求包括从账号的信息和所述二维码。
该装置1000可以对应于以上说明书中方法实施例提到的从账号客户端,可以实现该从账号客户端的相应功能,为了简洁,在此不再赘述。
本申请实施例基于二维码的从账号登录,可以增强登录的安全性和便利性,并且二维码信息具有有效时间,使得从账号不具备永久登录的权限,避免在从账号被盗后,被恶意使用。进一步地可对二维码进行加密,进一步提升账号登录安全性。
另外,在本发明各个实施例中的各功能模块可以集成在一个处理单 元中,也可以是各个模块单独物理存在,也可以两个或两个以上模块集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现,或者采用软件和硬件结合的方式实现。所述各实施例的功能模块可以位于一个终端或网络节点,或者也可以分布到多个终端或网络节点上。
另外,本发明的每一个实施例可以通过由数据处理设备如计算机执行的数据处理程序来实现。显然,数据处理程序构成了本发明。此外,通常存储在一个存储介质中的数据处理程序通过直接将程序读取出存储介质或者通过将程序安装或复制到数据处理设备的存储设备(如硬盘和/或内存)中执行。因此,这样的存储介质也构成了本发明。存储介质可以使用任何类型的记录方式,例如纸张存储介质(如纸带等)、磁存储介质(如软盘、硬盘、闪存等)、光存储介质(如CD-ROM等)、磁光存储介质(如MO等)等。
因此本发明还提供了一种存储介质,其中存储有数据处理程序,该数据处理程序用于执行本发明上述方法的任何一种实施例。
本领域普通技术人员可以理解实现上述实施例的全部或部分步骤可以通过硬件来完成,也可以通过程序来指令相关的硬件完成,所述的程序可以存储于一种计算机可读存储介质中,上述提到的存储介质可以是只读存储器,磁盘或光盘等。
以上所述仅为本发明的较佳实施例而已,并不用以限制本发明,凡在本发明的精神和原则之内,所做的任何修改、等同替换、改进等,均应包含在本发明保护的范围之内。

Claims (16)

  1. 一种用于账号登录的方法,其特征在于,包括:
    接收从账号客户端发送的登录请求,所述登录请求包括从账号的信息和二维码,所述二维码包括主账号的信息和所述二维码的时效信息,所述时效信息用于指示所述二维码的有效时间;
    在根据所述登录请求,确定所述主账号和所述从账号为主从关系,且所述二维码未失效时,允许所述从账号客户端的登录。
  2. 根据权利要求1所述的方法,其特征在于,所述方法还包括:
    在确定所述主账号和所述从账号为非主从关系,或所述二维码已失效时,拒绝所述从账号客户端的登录。
  3. 根据权利要求1所述的方法,其特征在于,所述二维码为加密的二维码,在所述接收从账号客户端发送的登录请求之后,所述方法还包括:
    对所述二维码进行解密,以获取所述主账号的信息和所述时效信息。
  4. 根据权利要求1至3中任一项所述的方法,其特征在于,所述方法还包括:
    指示所述主账号客户端定时更新所述二维码;或
    接收所述主账号客户端定时更新的所述二维码,以便处理所述从账号客户端发送的登录请求;或
    更新所述二维码,并将更新的所述二维码发送给所述主账号客户端。
  5. 一种用于账号登录的方法,其特征在于,包括:
    主账号客户端生成二维码,所述二维码包括主账号的信息和二维码的时效信息,所述时效信息用于指示所述二维码的有效时间;
    所述主账号客户端向从账号客户端提供所述二维码,以便于所述从 账号客户端向服务器发送包括所述二维码的登录请求。
  6. 根据权利要求5所述的方法,其特征在于,所述主账号客户端生成二维码,包括:
    所述主账号客户端生成加密的二维码。
  7. 根据权利要求5或6所述的方法,其特征在于,所述方法进一步包括:
    所述主账号客户端根据所述服务器的指示,更新所述二维码;或
    所述主账号客户端更新所述二维码,向所述服务器发送更新的所述二维码;或
    所述主账号客户端接收所述服务器发送的更新的所述二维码。
  8. 一种用于账号登录的方法,其特征在于,包括:
    从账号客户端获取二维码,所述二维码包括主账号的信息和所述二维码的时效信息,所述时效信息用于指示所述二维码的有效时间;
    从账号客户端向服务器发送登录请求,所述登录请求包括从账号的信息和所述二维码。
  9. 一种用于账号登录的装置,其特征在于,包括:
    接收模块,用于接收从账号客户端发送的登录请求,所述登录请求包括从账号的信息和二维码,所述二维码包括主账号的信息和所述二维码的时效信息,所述时效信息用于指示所述二维码的有效时间;
    处理模块,用于在根据所述登录请求,确定所述主账号和所述从账号为主从关系,且所述二维码未失效时,允许所述从账号客户端的登录。
  10. 根据权利要求9所述的装置,其特征在于,所处理模块进一步用于:
    在确定所述主账号和所述从账号为非主从关系,或所述二维码已失效时,拒绝所述从账号客户端的登录。
  11. 根据权利要求9所述的装置,其特征在于,所述二维码为加密的二维码,所述装置还包括:
    解密模块,用于对所述二维码进行解密,以获取所述主账号的信息和所述时效信息。
  12. 根据权利要求9至11中任一项所述的装置,其特征在于,
    所述装置还包括更新模块;
    所述更新模块用于:指示所述主账号客户端定时更新所述二维码;或更新所述二维码,并将所述更新的二维码发送给所述主账号客户端;
    或者;
    所述装置的所述接收模块,还用于接收所述主账号客户端定时更新的所述二维码,以便处理所述从账号客户端发送的登录请求。
  13. 一种用于账号登录的装置,其特征在于,所述装置为主账号客户端,包括:
    生成模块,用于生成二维码,所述二维码包括主账号的信息和二维码的时效信息,所述时效信息用于指示所述二维码的有效时间;
    提供模块,用于向从账号客户端提供所述二维码,以便于所述从账号客户端向服务器发送包括所述二维码的登录请求。
  14. 根据权利要求13所述的装置,其特征在于,所述生成模块具体用于:
    在所述主账号客户端生成加密的二维码。
  15. 根据权利要求13或14所述的装置,其特征在于,所述装置进一步包括更新模块,用于:
    根据所述服务器的指示,更新所述二维码;或
    更新所述二维码,向所述服务器发送更新的所述二维码;或
    接收所述服务器发送的更新的所述二维码。
  16. 一种用于账号登录的装置,其特征在于,所述装置为从账号客户端,包括:
    获取模块,用于获取二维码,所述二维码包括主账号的信息和所述二维码的时效信息,所述时效信息用于指示所述二维码的有效时间;
    发送模块,用于向服务器发送登录请求,所述登录请求包括从账号的信息和所述二维码。
PCT/CN2016/106345 2015-12-08 2016-11-18 用于账号登录的方法和装置 WO2017097101A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US15/937,224 US10812483B2 (en) 2015-12-08 2018-03-27 Account login method and apparatus

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510898239.X 2015-12-08
CN201510898239.XA CN105516135B (zh) 2015-12-08 2015-12-08 用于账号登录的方法和装置

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US15/937,224 Continuation US10812483B2 (en) 2015-12-08 2018-03-27 Account login method and apparatus

Publications (1)

Publication Number Publication Date
WO2017097101A1 true WO2017097101A1 (zh) 2017-06-15

Family

ID=55723772

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/106345 WO2017097101A1 (zh) 2015-12-08 2016-11-18 用于账号登录的方法和装置

Country Status (3)

Country Link
US (1) US10812483B2 (zh)
CN (1) CN105516135B (zh)
WO (1) WO2017097101A1 (zh)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9779345B2 (en) * 2014-08-11 2017-10-03 Visa International Service Association Mobile device with scannable image including dynamic data
CN105516135B (zh) * 2015-12-08 2020-02-21 腾讯科技(深圳)有限公司 用于账号登录的方法和装置
CN108122151B (zh) * 2016-11-28 2021-05-14 腾讯科技(深圳)有限公司 图形码显示方法、图形码处理方法、装置及系统
CN108462691A (zh) * 2018-01-30 2018-08-28 上海康斐信息技术有限公司 一种基于安卓系统的多用户账号管理的方法及系统
CN108989441A (zh) * 2018-07-27 2018-12-11 京东方科技集团股份有限公司 一种信息交互系统及方法
CN110704776B (zh) * 2019-09-12 2022-05-10 北京百度网讯科技有限公司 账号类型的识别方法、装置和电子设备
CN110955910B (zh) * 2019-10-17 2022-02-25 北京博睿鑫娱科技有限公司 一种防打扰并以事物分类的账号管理方法
CN115733837A (zh) * 2021-08-30 2023-03-03 中移物联网有限公司 一种信息处理方法、网关、系统和存储介质
CN114826610A (zh) * 2022-04-14 2022-07-29 函谷数巢品牌管理(广州)有限公司 基于多媒体进行账号绑定演示的方法和装置

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103457951A (zh) * 2013-09-02 2013-12-18 小米科技有限责任公司 多终端登录服务器的方法及装置
CN103475476A (zh) * 2013-09-02 2013-12-25 小米科技有限责任公司 多终端登录服务器的方法及装置
CN104519197A (zh) * 2013-09-29 2015-04-15 腾讯科技(深圳)有限公司 用户登录的方法、装置及终端设备
CN105100009A (zh) * 2014-05-12 2015-11-25 阿里巴巴集团控股有限公司 登陆控制系统、方法和装置
US9203824B1 (en) * 2013-02-12 2015-12-01 Future Research Corporation System and method for authenticating a computer session on a mobile device using a two dimensional barcode
CN105516135A (zh) * 2015-12-08 2016-04-20 腾讯科技(深圳)有限公司 用于账号登录的方法和装置

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8327428B2 (en) * 2006-11-30 2012-12-04 Microsoft Corporation Authenticating linked accounts
US8776214B1 (en) * 2009-08-12 2014-07-08 Amazon Technologies, Inc. Authentication manager
US9544143B2 (en) * 2010-03-03 2017-01-10 Duo Security, Inc. System and method of notifying mobile devices to complete transactions
JP5843605B2 (ja) * 2011-06-29 2016-01-13 キヤノン株式会社 印刷制御装置、印刷制御方法、情報処理システム、情報処理装置、情報処理方法およびコンピュータプログラム
US8935777B2 (en) * 2012-02-17 2015-01-13 Ebay Inc. Login using QR code
CN102769628B (zh) * 2012-07-27 2014-03-26 腾讯科技(深圳)有限公司 页面登录方法及服务器
CN103685311B (zh) * 2013-12-27 2017-06-13 网易(杭州)网络有限公司 一种登录验证方法及设备
US9491155B1 (en) * 2014-08-13 2016-11-08 Amazon Technologies, Inc. Account generation based on external credentials
US20160066064A1 (en) * 2014-08-28 2016-03-03 Dozo LLP Clip Start Point
US9882862B2 (en) * 2015-05-01 2018-01-30 Facebook, Inc. Techniques for coordinating a messaging experience across platforms
CN105119931A (zh) * 2015-09-11 2015-12-02 深圳市亚略特生物识别科技有限公司 应用登录方法及系统
CN107359996B (zh) * 2016-05-09 2020-05-05 阿里巴巴集团控股有限公司 多网站间的自动登录方法及装置

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9203824B1 (en) * 2013-02-12 2015-12-01 Future Research Corporation System and method for authenticating a computer session on a mobile device using a two dimensional barcode
CN103457951A (zh) * 2013-09-02 2013-12-18 小米科技有限责任公司 多终端登录服务器的方法及装置
CN103475476A (zh) * 2013-09-02 2013-12-25 小米科技有限责任公司 多终端登录服务器的方法及装置
CN104519197A (zh) * 2013-09-29 2015-04-15 腾讯科技(深圳)有限公司 用户登录的方法、装置及终端设备
CN105100009A (zh) * 2014-05-12 2015-11-25 阿里巴巴集团控股有限公司 登陆控制系统、方法和装置
CN105516135A (zh) * 2015-12-08 2016-04-20 腾讯科技(深圳)有限公司 用于账号登录的方法和装置

Also Published As

Publication number Publication date
US10812483B2 (en) 2020-10-20
CN105516135B (zh) 2020-02-21
US20180219864A1 (en) 2018-08-02
CN105516135A (zh) 2016-04-20

Similar Documents

Publication Publication Date Title
WO2017097101A1 (zh) 用于账号登录的方法和装置
US10554420B2 (en) Wireless connections to a wireless access point
KR102424055B1 (ko) 두 개의 api 토큰을 이용한 api 인증 장치 및 방법
CN107579958B (zh) 数据管理方法、装置及系统
KR102018971B1 (ko) 네트워크 액세스 디바이스가 무선 네트워크 액세스 포인트를 액세스하게 하기 위한 방법, 네트워크 액세스 디바이스, 애플리케이션 서버 및 비휘발성 컴퓨터 판독가능 저장 매체
US9608814B2 (en) System and method for centralized key distribution
US9137017B2 (en) Key recovery mechanism
US8788811B2 (en) Server-side key generation for non-token clients
US8719956B2 (en) Method and apparatus for sharing licenses between secure removable media
US9762567B2 (en) Wireless communication of a user identifier and encrypted time-sensitive data
CN108432180A (zh) 用于基于pki的认证的方法和系统
US20110296171A1 (en) Key recovery mechanism
US11791990B2 (en) Apparatus and method for managing personal information
CN110225050B (zh) Jwt令牌的管理方法
JP6587029B2 (ja) 情報処理システム、情報処理装置、管理装置及びプログラム
KR101560246B1 (ko) 클라우드 프린팅 시스템 및 이를 이용한 클라우드 프린팅 서비스 방법
US20160285843A1 (en) System and method for scoping a user identity assertion to collaborative devices
CN114127764A (zh) 与分布式账本关联的目的地寻址
JP5012574B2 (ja) 共通鍵自動共有システム及び共通鍵自動共有方法
US10902139B2 (en) Method to track the dissemination of a data set
JP2007141230A (ja) 新たなセキュリティ認証情報を適格化するシステム、方法およびプログラム
EP3447992B1 (en) Message pushing method and terminal
CN110741371B (zh) 信息处理设备、保护处理设备和使用终端
JP2006023849A (ja) 情報処理装置、配信装置、情報の配信方法、配信プログラム及び記録媒体
CN115152258A (zh) 在内容分发网络中传输安全信息

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16872293

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 02.11.2018)

122 Ep: pct application non-entry in european phase

Ref document number: 16872293

Country of ref document: EP

Kind code of ref document: A1