CN103428159A - Method for logging in to program and server - Google Patents
Method for logging in to program and server Download PDFInfo
- Publication number
- CN103428159A CN103428159A CN2012101491374A CN201210149137A CN103428159A CN 103428159 A CN103428159 A CN 103428159A CN 2012101491374 A CN2012101491374 A CN 2012101491374A CN 201210149137 A CN201210149137 A CN 201210149137A CN 103428159 A CN103428159 A CN 103428159A
- Authority
- CN
- China
- Prior art keywords
- application program
- interim password
- password
- electronic equipment
- server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 42
- 238000012360 testing method Methods 0.000 claims description 18
- 238000004458 analytical method Methods 0.000 claims description 9
- 238000012795 verification Methods 0.000 claims description 8
- 238000012546 transfer Methods 0.000 claims description 6
- 238000001514 detection method Methods 0.000 claims description 5
- 230000010365 information processing Effects 0.000 claims description 4
- 238000013475 authorization Methods 0.000 claims description 2
- 230000008569 process Effects 0.000 abstract description 5
- 238000010586 diagram Methods 0.000 description 5
- 230000004044 response Effects 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 4
- 239000000284 extract Substances 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000003672 processing method Methods 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
Images
Landscapes
- Information Transfer Between Computers (AREA)
Abstract
The invention provides a method for logging in to a program and a server. The method comprises the steps that whether a user exits from a logged application program in an electronic device or not is detected; when the user exits from the application program, a temporary password is generated and sent to the electronic device; logging information through which the user logs in to the application program is obtained from the electronic device and analyzed; if an analyzing result shows that the logging information contains the temporary password, the temporary password is verified, and whether the application program is logged in again or not is determined according to a verifying result. Therefore, the user corresponding to a client side can automatically log in to the application server again without inputting a user name and a password again and the process of logging in to the application program again is simple and convenient, so that a large amount of time of the user is saved, the work load of the server is lightened, the work efficiency of a server side is improved, and the safety of information is improved.
Description
Technical field
The application relates to field of computer technology, relates in particular to a kind of method and server of logging program.
Background technology
Development along with electronic technology, electronic equipment also function is more abundant, thereby the user can login various application programs by client on electronic equipment, and then meet the many-sided demand of user, but the user need to be registered as the member in corresponding website before login application program in the prior art, the user is after succeeding in registration, and the username and password during according to registration could login application program.
After but the user logins an application program on electronic equipment in the prior art, the user is after closing this application program, the user needs again in the login interface of this application program, to input username and password and could again sign in in server corresponding to this application program, make like this process complexity of user's login application program, loaded down with trivial details, and re-enter username and password and wasted a large amount of time of user, and server need to be verified again to the username and password of input again, increased the workload of server, cause the operating efficiency of server to reduce.
Summary of the invention
The application provides a kind of method and server of logging program, in order to solve in the prior art the user after closing application program, need again in the login interface of this application program, to input username and password and could again login the problem in server corresponding to this application program, specific as follows:
A kind of method of logging program, in the server that is applied to be connected with an electronic equipment, described method comprises:
Detect user in described electronic equipment and whether exit from the application program that has logined, and generate a testing result;
When if described testing result means that described user exits from described application program, generate an interim password, and described interim password is sent to described electronic equipment, wherein, described interim password is again to login the authentication password of described application program for described electronic equipment;
Obtain from described electronic equipment the log-on message that described user logins described application program, and described log-on message is resolved;
When if analysis result means that described log-on message comprises described interim password, described interim password is verified, determine whether successfully again to login described application program according to the result.
Optionally, in described interim password, also comprise a timestamp information, wherein, described timestamp information is for identifying described interim password effective time.
Optionally, described described interim password is verified, being comprised:
Legitimacy to the described interim password that obtains is verified, and is generated the first the result;
If described the first the result is interim password while being the legitimacy password, obtains the described timestamp information in described interim password, and determine that according to described timestamp information and current system time described interim password is whether within effective time.
Optionally, described according to described testing result generation one interim password, comprising:
When detecting described electronic equipment and exiting described application program, obtain the user's who exits user totem information from described application program, wherein, described user totem information is logined the authorization information of described application program for the user;
Generate described interim password according to described user totem information.
Optionally, described described interim password is verified before, comprising:
Described interim password is resolved, and obtained the described user totem information in described interim password;
Determine the user of the described application program of login according to described user totem information.
Optionally, describedly according to the result, determine whether again to login described application program, comprising:
If be verified the effective time of described timestamp information, obtain the application authentication solicited message of described electronic equipment;
Determine described application program is logined automatically according to described application authentication solicited message;
If the effective time of described timestamp information, checking was not passed through, described interim password is abandoned.
A kind of method of information processing, in the electronic equipment that is applied to be connected with server, described electronic equipment comprises at least one application program, described method comprises:
Obtain the interim password that described server end sends;
Receive the enabled instruction of described application program, and transfer described interim password according to described enabled instruction, and described interim password is sent to described server;
Receive the result information that described server sends, if described the result information means that described interim password, by checking, determines whether successfully to login described application program according to described the result information.
Optionally, described interim password comprises a timestamp information, and wherein, described timestamp information is the described interim password of the sign information of effective time.
Optionally, described electronic equipment comprises the first system and second system, when described electronic equipment is switched to described second system from described the first system, the application program of moving in the first system is exited, the interim password of each application program of correspondence that reception server sends, and determine whether automatically again to login described application program according to described interim password.
A kind of server, described server comprises:
Whether detecting unit, exit for detection of user in described electronic equipment from the application program that has logined, and generate a testing result;
Interim password generation unit, if while for described testing result, meaning that described user exits from described application program, generate an interim password, and described interim password is sent to described electronic equipment, wherein, described interim password is again to login the authentication password of described application program for described electronic equipment;
Resolution unit, for from described electronic equipment, obtaining the log-on message that described user logins described application program, and resolved described log-on message;
Determining unit, if while for analysis result, meaning that described log-on message comprises described interim password, verified described interim password, according to the result, determines whether again to login described application program.
Optionally, determining unit also comprises:
The legitimate verification module, verified for the legitimacy of the described interim password to obtaining, and generate the first the result;
Effective time, authentication module, if be interim password while being the legitimacy password for described the first the result, obtained the described timestamp information in described interim password, and to being verified the described effective time of described timestamp information.
A kind of electronic equipment, described electronic equipment comprises:
Acquiring unit, the interim password sent for obtaining described server end;
The command reception unit, for receiving the enabled instruction of described application program, and transfer described interim password according to described enabled instruction, and described interim password sent to described server;
The authentication verification unit, the result information sent for receiving described server, if described the result information means that described interim password is by checking, the authentication information of described application program is sent to described server, to determine whether again to login described application program according to described authentication information.
The application provides a kind of method and server of logging program, whether the method comprises: detect user in described electronic equipment and exit from the application program that has logined, when the user exits from application program, generate an interim password, and interim password is sent to electronic equipment, obtain from this electronic equipment the log-on message that the user logins this application program, log-on message is resolved, when if analysis result means that log-on message comprises described interim password, described interim password is verified, determine whether again to login this application program according to the result.Thereby make user that user side is corresponding not need to re-enter username and password and just can realize automatically again logining application server, and the process that makes again login application program is simple, convenient, saved user's plenty of time, reduced the workload of server, improved the operating efficiency of server end, and comprised user profile in interim password, improved the fail safe of information.
The accompanying drawing explanation
The method flow diagram that Fig. 1 is a kind of logging program of the present invention;
Fig. 2 is the flow chart that a kind of information of the present invention goes out path method;
The structural representation that Fig. 3 is a kind of server of the present invention;
The concrete structure schematic diagram that Fig. 4 is determining unit of the present invention;
The structural representation that Fig. 5 is a kind of electronic equipment of the present invention.
Embodiment
At first, generally in electronic equipment, include a plurality of application programs, and the corresponding server of each application program, and this electronic equipment can pass through this application program server corresponding with this application program and connect, thereby user name and password that server could be inputted the user in this application program are verified.
The application provides a kind of method and server of logging program, whether the method comprises: detect user in described electronic equipment and exit from the application program that has logined, and generate a testing result, when if described testing result means that described user exits from described application program, generate an interim password, and described interim password is sent to described electronic equipment, wherein, described interim password is again to login the authentication password of described application program for described electronic equipment, obtain from described electronic equipment the log-on message that described user logins described application program, and described log-on message is resolved, when if analysis result means that described log-on message comprises described interim password, described interim password is verified, determine whether again to login described application program according to the result.
Technical scheme below by accompanying drawing and specific embodiment to the application is described further.
Be illustrated in figure 1 the method flow diagram of a kind of logging program of the application, the method specifically comprises:
Step 101, in detected electrons equipment, whether the user exits from the application program that has logined, and generates a testing result.
At first, in the situation that electronic equipment is connected with server end, the user can pass through the data message of this application program access services device end, and this server end is by real-time detected electrons equipment end and the connection status of self, its concrete Detection of content is exactly to exit the application program whether logined from this of the user in detected electrons equipment, certainly the server that completes this detection is server corresponding to this application program, this server generates a testing result according to the state detected, and sends to corresponding device to be processed this testing result.
Step 102, if when testing result means that the user exits from application program, generate an interim password.
When server end has detected the user and has exited from this application program, server will detect the user's who exits from this application program user name, this user name is the identification information of user in this application program namely, and this user name is well-determined in this application program, in this application program, this user name can only be for a user.
After determining the user name quit a program, this server will generate an interim password that comprises this user name, and server will add a timestamp information in this interim password, this timestamp information is that the user determines this interim password validity in time, namely this timestamp information is an effective time, such as 40
S, 50
SEqual time, can be adjusted at server end certainly.This interim password is logined the authentication password of this application program again for electronic equipment.
After generating this interim password, server end sends to the electronic equipment end by this interim password, certainly can also be that the electronic equipment end initiatively obtains this interim password to server, specifically can be set according to actual conditions, adopt in the embodiment of the present application server that this interim password is sent to the electronic equipment end.
This electronic equipment is preserved a period of time by this interim password, when the user again logins this application program on this electronic equipment, enters following step.
Step 103, server obtains the user from this electronic equipment and logins the log-on message of this application program, and this log-on message is resolved.
Because user corresponding to electronic equipment end logins this application program again, at first this server will obtain this electronic equipment end one log-on message, this log-on message be exactly the user when this electronic equipment end is logined this application program again, the information that server end need to be verified.
Step 104, if when analysis result means that log-on message comprises interim password, verified interim password, according to the result, determines whether successfully login application program again.
Specifically, after server end receives log-on message, at first server end is to resolve whether to have interim password in this log-on message.
If server parses includes an interim password in this log-on message, at first server end extracts this interim password in this log-on message, and this interim password is resolved, at first, comprise a user totem information at this interim password, just can determine the user of this application program of login by obtaining this user totem information server end, and then make login correct.
After identification information in having determined interim password, server end will advance checking to the interim password in log-on message, and concrete proof procedure is as follows:
At first server end is the legitimacy of the interim password of checking, be exactly to verify whether this character string is the interim password that server end generates specifically, such as, it is 123ABC that server end sends to the interim password of electronic equipment end, if then be resolved to the interim password 123ABC in this log-on message, this interim password is legal, and carry out following step, if the interim password in this log-on message is not 123ABC, this interim password is illegal, and server end abandons this interim password.
Certainly, a kind of verification method of interim password also is provided in the embodiment of the present application, be that server end and electronic equipment end prestore a proof rule, after server end generates this interim password, this interim password is sent to the electronic equipment end, the electronic equipment end carries out rule transformation according to this rule by the interim password received, that is to say according to this rule and convert the interim password received to the authentication password not identical with the interim password received, and when the user logins this application program again, this authentication password is sent to server end, server end is verified the authentication password of receiving according to this rule under this rule, finally according to this authentication password, determine whether automatically to login this application program, such as, the password generated at server end is ABCDEF, and server end sends to the electronic equipment end by this interim password ABCDEF, because electronic equipment end and server end prestore a proof rule, in the embodiment of the present application for alphabetical sequence is generated to authentication password, so after the electronic equipment termination is received this interim password ABCDEF, the electronic equipment end will generate authentication password 123456 according to this rule, and this interim password is preserved, certainly timestamp information is not made change.
As the user when the electronic equipment end is logined this application program again, this sends to server end by authentication password the electronic equipment end, server end is changed this authentication password again according to proof rule, be converted to ABCDEF by 123456 exactly specifically, then according to the password after conversion, determine the legitimacy of this interim password.
After the interim password of checking is legal, server end will get the timestamp information in this interim password, and this timestamp information is carried out to the checking of available time, specifically, server end is when sending interim password to server end, this server will be stored this transmitting time, and then while getting this interim password, the acquisition time of this interim password and transmitting time are determined to interval time, then this interval time and default interim password are compared effective time, be exactly the 40S in timestamp information this effective time, 50S equal time section, this interval time is within this effective time, this interim password time is effective, and server end will send the authentication request information of this application program to the electronic equipment end, if this interval time, server end directly abandoned this interim password outside this effective time.
After electronic equipment receives the authentication request information of server end transmission, the direct response authentication of electronic equipment end is given this server end by information, wherein this authentication information is the fail safe for login application program, that is to say the safety verification that server end is logined this authentication information again as application programs, and then server end is directly logined this application program again.
Apply this server and carry out the login again of application program, the user that user side is corresponding does not need to re-enter username and password just can realize automatically again logining application server, thereby the process that makes again login application program is simple, convenient, saved user's plenty of time, and server end does not need the user to logining this application program to carry out reaffirming of username and password, reduced the workload of server, improved the operating efficiency of server end, and comprised user profile in interim password, improved the fail safe of information.
In addition, also provide a kind of method of information processing in the application's embodiment, in the electronic equipment that is applied to be connected with server, this electronic equipment comprises at least one application program, and concrete method is as follows:
Be illustrated in figure 2 the flow chart of a kind of information processing method of the application, specifically comprise step:
Step 201, obtain the interim password that server end sends.
Step 202, receive the enabled instruction of application program, and transfer interim password according to this enabled instruction, and this interim password is sent to server.
Step 203, receive the result information that described server sends, if described the result information means that described interim password, by checking, determines whether successfully to login described application program according to described the result information.
After this electronic equipment receives interim password, the electronic equipment end is kept at default position by this interim password, certainly can be set up on their own according to demand, then when this electronic equipment is restarted this application program, this electronic equipment will extract this interim password from predeterminated position, and send to server end to be verified in this interim password.
Then the response message that electronic equipment reception server end returns, this response message means that this interim password is by checking, now server end has confirmed that this application program can login again, but the electronic equipment end also will extract an authentication request information in this response message before this, and this authentication request information is the solicited message that server end will obtain the authentication information of electronic equipment end.
Electronic equipment, after receiving this response message, sends an authentication information to server end, in order to the login again of confirming this application program, completes.
Further, one embodiment also is provided in the embodiment of the present application, specifically, comprise two application systems at this electronic equipment: the first system and second system, when the user need to be switched to second system from the first system by electronic equipment, application software under the first system operation just must be closed, then could safe being switched in second system.
At first, when switched system, the electronic equipment end will obtain an interim password, this interim password is the interim password that electronic equipment generates when carrying out the system switching, and the identification information that includes the application program of moving in this interim password in the first system, simply can determine when the first system is closed exactly the application program of directly not closing in electronic equipment in this interim password.Such as, when the first system is switched to second system, chat software and the IE browser of user's login are not initiatively closed, and when now the first system is closed, have just comprised the identification information of chat software and IE browser in this interim password.
When electronic equipment is switched in second system, electronic equipment will be transferred this interim password, and this interim password is resolved, obtain the identification information in this interim password, determine and need the application program of login automatically in second system by this identification information, and server end has added a timestamp information and user totem information in this interim password, this timestamp is in order to determine the available time of this interim password, and this user totem information is in order to determine the user of this application program of login.Finally this interim password is sent to server end.
After having determined this identification information, the interim password that server end will comprise identification information to this verified, concrete proof procedure has been done corresponding description in the method for logging program, at this, does not do and repeats.
Mainly to determine when the first system is switched to second system by identification information in this embodiment, the application program that to automatically login in second system, such as, comprised the identification information of chat software and browser at this interim password, electronic equipment when being switched to second system, electronic equipment will be in second system application program corresponding to login banner information automatically.Certainly, this operation of automatically logining is opened or is closed by hapalonychia.Specifically, be exactly that the user starts application program can whether be open at according to the demand of self electronic equipment and be switched to another system from a system time automatically.
By the above embodiments, the electronic equipment end can complete the login again of application program in can the setting-up time section after closing application program automatically, has improved the operating efficiency of electronic equipment, and has saved Internet resources.
Be illustrated in figure 3 the structural representation of a kind of electronic equipment in the application, this server comprises:
Whether detecting unit 301, exit for detection of user in described electronic equipment from the application program that has logined, and generate a testing result.
Interim password generation unit 302, if while for described testing result, meaning that described user exits from described application program, generate an interim password, and described interim password is sent to described electronic equipment, wherein, described interim password is again to login the authentication password of described application program for described electronic equipment.
Determining unit 304, if while for analysis result, meaning that described log-on message comprises described interim password, verified described interim password, according to the result, determines whether again to login described application program.
Be illustrated in figure 4 the concrete structure schematic diagram of determining unit, this determining unit 304 comprises:
Legitimate verification module 401, verified for the legitimacy of the described interim password to obtaining, and generate the first the result.
Effective time, authentication module 402, if be interim password while being the legitimacy password for described the first the result, obtained the described timestamp information in described interim password, and to being verified the described effective time of described timestamp information.
Be illustrated in figure 5 the concrete structure schematic diagram of a kind of electronic equipment of the application, this electronic equipment comprises:
Acquiring unit 501, the interim password sent for obtaining described server end;
Command reception unit 502, for receiving the enabled instruction of described application program, and transfer described interim password according to described enabled instruction, and described interim password sent to described server;
Authentication verification unit 503, the result information sent for receiving described server, if described the result information means that described interim password is by checking, the authentication information of described application program is sent to described server, to determine whether again to login described application program according to described authentication information.
The application provides a kind of method and server of logging program, whether the method comprises: detect user in described electronic equipment and exit from the application program that has logined, when the user exits from application program, generate an interim password, and interim password is sent to electronic equipment, obtain from this electronic equipment the log-on message that the user logins this application program, log-on message is resolved, when if analysis result means that log-on message comprises described interim password, described interim password is verified, determine whether again to login this application program according to the result.Thereby make user that user side is corresponding not need to re-enter username and password and just can realize automatically again logining application server, and the process that makes again login application program is simple, convenient, saved user's plenty of time, reduced the workload of server, improved the operating efficiency of server end, and comprised user profile in interim password, improved the fail safe of information.
Obviously, those skilled in the art can carry out various changes and modification and the spirit and scope that do not break away from the application to the application.Like this, if within these of the application are revised and modification belongs to the scope of the application's claim and equivalent technologies thereof, the application also is intended to comprise these changes and modification interior.
Claims (12)
1. the method for a logging program, in the server that is applied to be connected with an electronic equipment, is characterized in that, described method comprises:
Detect user in described electronic equipment and whether exit from the application program that has logined, and generate a testing result;
When if described testing result means that described user exits from described application program, generate an interim password, and described interim password is sent to described electronic equipment, wherein, described interim password is again to login the authentication password of described application program for described electronic equipment;
Obtain from described electronic equipment the log-on message that described user logins described application program, and described log-on message is resolved;
When if analysis result means that described log-on message comprises described interim password, described interim password is verified, determine whether successfully again to login described application program according to the result.
2. the method for claim 1, is characterized in that, in described interim password, also comprises a timestamp information, and wherein, described timestamp information is for identifying described interim password effective time.
3. method as claimed in claim 2, is characterized in that, described described interim password verified, comprising:
Legitimacy to the described interim password that obtains is verified, and is generated the first the result;
If described the first the result is interim password while being the legitimacy password, obtains the described timestamp information in described interim password, and determine that according to described timestamp information and current system time described interim password is whether within effective time.
4. the method for claim 1, is characterized in that, described according to described testing result generation one interim password, comprising:
When detecting described electronic equipment and exiting described application program, obtain the user's who exits user totem information from described application program, wherein, described user totem information is logined the authorization information of described application program for the user;
Generate described interim password according to described user totem information.
5. method as claimed in claim 4, is characterized in that, described described interim password is verified before, comprising:
Described interim password is resolved, and obtained the described user totem information in described interim password;
Determine the user of the described application program of login according to described user totem information.
6. method as claimed in claim 5, is characterized in that, describedly according to the result, determines whether again to login described application program, comprising:
If be verified the effective time of described timestamp information, obtain the application authentication solicited message of described electronic equipment;
Determine described application program is logined automatically according to described application authentication solicited message;
If the effective time of described timestamp information, checking was not passed through, described interim password is abandoned.
7. the method for an information processing, in the electronic equipment that is applied to be connected with server, described electronic equipment comprises at least one application program, it is characterized in that, described method comprises:
Obtain the interim password that described server end sends;
Receive the enabled instruction of described application program, and transfer described interim password according to described enabled instruction, and described interim password is sent to described server;
Receive the result information that described server sends, if described the result information means that described interim password, by checking, determines whether successfully to login described application program according to described the result information.
8. method as claimed in claim 7, is characterized in that, described interim password comprises a timestamp information, and wherein, described timestamp information is the described interim password of the sign information of effective time.
9. method as claimed in claim 7, it is characterized in that, described electronic equipment comprises the first system and second system, when described electronic equipment is switched to described second system from described the first system, the application program of moving in the first system is exited, the interim password of each application program of correspondence that reception server sends, and determine whether automatically again to login described application program according to described interim password.
10. a server, is characterized in that, described server comprises:
Whether detecting unit, exit for detection of user in described electronic equipment from the application program that has logined, and generate a testing result;
Interim password generation unit, if while for described testing result, meaning that described user exits from described application program, generate an interim password, and described interim password is sent to described electronic equipment, wherein, described interim password is again to login the authentication password of described application program for described electronic equipment;
Resolution unit, for from described electronic equipment, obtaining the log-on message that described user logins described application program, and resolved described log-on message;
Determining unit, if while for analysis result, meaning that described log-on message comprises described interim password, verified described interim password, according to the result, determines whether again to login described application program.
11. server as claimed in claim 10, is characterized in that, determining unit also comprises:
The legitimate verification module, verified for the legitimacy of the described interim password to obtaining, and generate the first the result;
Effective time, authentication module, if be interim password while being the legitimacy password for described the first the result, obtained the described timestamp information in described interim password, and to being verified the described effective time of described timestamp information.
12. an electronic equipment, is characterized in that, described electronic equipment comprises:
Acquiring unit, the interim password sent for obtaining described server end;
The command reception unit, for receiving the enabled instruction of described application program, and transfer described interim password according to described enabled instruction, and described interim password sent to described server;
The authentication verification unit, the result information sent for receiving described server, if described the result information means that described interim password is by checking, the authentication information of described application program is sent to described server, to determine whether again to login described application program according to described authentication information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2012101491374A CN103428159A (en) | 2012-05-14 | 2012-05-14 | Method for logging in to program and server |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2012101491374A CN103428159A (en) | 2012-05-14 | 2012-05-14 | Method for logging in to program and server |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103428159A true CN103428159A (en) | 2013-12-04 |
Family
ID=49652342
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2012101491374A Pending CN103428159A (en) | 2012-05-14 | 2012-05-14 | Method for logging in to program and server |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103428159A (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104954383A (en) * | 2015-06-24 | 2015-09-30 | 深圳市兰丁科技有限公司 | Application program login method and system |
CN105119722A (en) * | 2015-08-07 | 2015-12-02 | 杭州朗和科技有限公司 | Identity verification method, equipment and system |
CN105847058A (en) * | 2016-03-31 | 2016-08-10 | 乐视控股(北京)有限公司 | Wireless password setting method and device |
CN106130964A (en) * | 2016-06-17 | 2016-11-16 | 北京奇虎科技有限公司 | The automatic logging method of micro-end and device |
CN106161429A (en) * | 2016-06-17 | 2016-11-23 | 北京奇虎科技有限公司 | The automatic logging method of micro-end and device |
CN107018029A (en) * | 2017-05-31 | 2017-08-04 | 郑州云海信息技术有限公司 | The method and system that a kind of WEB management softwares automatically switch |
CN107092843A (en) * | 2017-04-18 | 2017-08-25 | 惠州Tcl移动通信有限公司 | It is a kind of to prevent the unlocking screen method and system of individual subscriber privacy leakage |
CN108390893A (en) * | 2018-04-02 | 2018-08-10 | 广东欧珀移动通信有限公司 | Login method, mobile terminal and computer readable storage medium |
CN112291188A (en) * | 2019-09-23 | 2021-01-29 | 中建材信息技术股份有限公司 | Registration verification method and system, registration verification server and cloud server |
CN117540433A (en) * | 2024-01-09 | 2024-02-09 | 北京清众神州大数据有限公司 | User privacy protection method, server, user terminal and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070169181A1 (en) * | 2002-02-26 | 2007-07-19 | James Roskind | Simple, secure login with multiple authentication providers |
CN101047504A (en) * | 2006-03-29 | 2007-10-03 | 腾讯科技(深圳)有限公司 | Network log-in authorization method and authorization system |
CN101662364A (en) * | 2009-09-17 | 2010-03-03 | 北京飞天诚信科技有限公司 | Method and system for safe login |
CN102231716A (en) * | 2011-06-30 | 2011-11-02 | 重庆新媒农信科技有限公司 | Instant communication service login method |
CN102238155A (en) * | 2010-04-30 | 2011-11-09 | 上海博泰悦臻电子设备制造有限公司 | On-vehicle-equipment-based user management method and system |
-
2012
- 2012-05-14 CN CN2012101491374A patent/CN103428159A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070169181A1 (en) * | 2002-02-26 | 2007-07-19 | James Roskind | Simple, secure login with multiple authentication providers |
CN101047504A (en) * | 2006-03-29 | 2007-10-03 | 腾讯科技(深圳)有限公司 | Network log-in authorization method and authorization system |
CN101662364A (en) * | 2009-09-17 | 2010-03-03 | 北京飞天诚信科技有限公司 | Method and system for safe login |
CN102238155A (en) * | 2010-04-30 | 2011-11-09 | 上海博泰悦臻电子设备制造有限公司 | On-vehicle-equipment-based user management method and system |
CN102231716A (en) * | 2011-06-30 | 2011-11-02 | 重庆新媒农信科技有限公司 | Instant communication service login method |
Non-Patent Citations (1)
Title |
---|
何为: "基于cookie票据的单一认证模型及实现", 《科技情报开发与经济》 * |
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104954383A (en) * | 2015-06-24 | 2015-09-30 | 深圳市兰丁科技有限公司 | Application program login method and system |
CN105119722A (en) * | 2015-08-07 | 2015-12-02 | 杭州朗和科技有限公司 | Identity verification method, equipment and system |
CN105119722B (en) * | 2015-08-07 | 2018-05-01 | 杭州朗和科技有限公司 | A kind of auth method, equipment and system |
CN105847058A (en) * | 2016-03-31 | 2016-08-10 | 乐视控股(北京)有限公司 | Wireless password setting method and device |
CN106130964A (en) * | 2016-06-17 | 2016-11-16 | 北京奇虎科技有限公司 | The automatic logging method of micro-end and device |
CN106161429A (en) * | 2016-06-17 | 2016-11-23 | 北京奇虎科技有限公司 | The automatic logging method of micro-end and device |
CN106130964B (en) * | 2016-06-17 | 2019-06-21 | 北京奇虎科技有限公司 | Micro-terminal automatic login method and device |
CN106161429B (en) * | 2016-06-17 | 2019-06-21 | 北京奇虎科技有限公司 | Micro-terminal automatic login method and device |
CN107092843A (en) * | 2017-04-18 | 2017-08-25 | 惠州Tcl移动通信有限公司 | It is a kind of to prevent the unlocking screen method and system of individual subscriber privacy leakage |
CN107018029B (en) * | 2017-05-31 | 2021-01-22 | 苏州浪潮智能科技有限公司 | A method and system for automatic switching of WEB management software |
CN107018029A (en) * | 2017-05-31 | 2017-08-04 | 郑州云海信息技术有限公司 | The method and system that a kind of WEB management softwares automatically switch |
CN108390893A (en) * | 2018-04-02 | 2018-08-10 | 广东欧珀移动通信有限公司 | Login method, mobile terminal and computer readable storage medium |
CN112291188A (en) * | 2019-09-23 | 2021-01-29 | 中建材信息技术股份有限公司 | Registration verification method and system, registration verification server and cloud server |
CN112291188B (en) * | 2019-09-23 | 2023-02-10 | 中建材信息技术股份有限公司 | Registration verification method and system, registration verification server and cloud server |
CN117540433A (en) * | 2024-01-09 | 2024-02-09 | 北京清众神州大数据有限公司 | User privacy protection method, server, user terminal and storage medium |
CN117540433B (en) * | 2024-01-09 | 2024-04-26 | 山西清众科技股份有限公司 | User privacy protection method, server, user terminal and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103428159A (en) | Method for logging in to program and server | |
CN101075875B (en) | Method and system for realizing monopoint login between gate and system | |
CN102594914B (en) | Remote debugging method based on cloud platform | |
CN102457507B (en) | Cloud computing resources secure sharing method, Apparatus and system | |
CN111062023B (en) | Method and device for realizing single sign-on of multi-application system | |
CN104348777A (en) | Method and system for controlling access of mobile terminal to third party server | |
CN101193027A (en) | A single-point login system and method for integrated isomerous system | |
CN103347020B (en) | A kind of system and method across application authorization access | |
CN105337949A (en) | SSO (Single Sign On) authentication method, web server, authentication center and token check center | |
CN107241306B (en) | Man-machine identification method, server, client and man-machine identification system | |
CN103139200A (en) | Single sign-on method of web service | |
CN115022047B (en) | Account login method and device based on multi-cloud gateway, computer equipment and medium | |
CN105897652A (en) | Standard protocol based heterogeneous terminal dynamic access method | |
CN104753960B (en) | A kind of system configuration management method based on single-sign-on | |
CN112838951A (en) | Operation and maintenance method, device and system of terminal equipment and storage medium | |
US9832198B2 (en) | Service-based message access layer frame and implementation method thereof | |
CN102739678B (en) | Single-sign-on treatment system and single-sign-on processing method | |
CN108540491B (en) | Semi-automatic penetration testing system and method based on passive scanning | |
CN106375348A (en) | Portal authentication method and Portal authentication device | |
CN101902329A (en) | Method and device for single sign on | |
CN105991518A (en) | Network access authentication method and device | |
CN104796408A (en) | Single-point live login method and single-point live login device | |
CN105162774A (en) | Virtual machine login method, virtual machine login method and device for terminal | |
CN101286981A (en) | Data transmission system, mobile terminal and server | |
CN104038474A (en) | Internet access detection method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20131204 |
|
RJ01 | Rejection of invention patent application after publication |