[go: up one dir, main page]

CN113360868A - Application program login method and device, computer equipment and storage medium - Google Patents

Application program login method and device, computer equipment and storage medium Download PDF

Info

Publication number
CN113360868A
CN113360868A CN202110732785.1A CN202110732785A CN113360868A CN 113360868 A CN113360868 A CN 113360868A CN 202110732785 A CN202110732785 A CN 202110732785A CN 113360868 A CN113360868 A CN 113360868A
Authority
CN
China
Prior art keywords
login
identification code
client
information
authority
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110732785.1A
Other languages
Chinese (zh)
Inventor
赵程
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Puhui Enterprise Management Co Ltd
Original Assignee
Ping An Puhui Enterprise Management Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Puhui Enterprise Management Co Ltd filed Critical Ping An Puhui Enterprise Management Co Ltd
Priority to CN202110732785.1A priority Critical patent/CN113360868A/en
Publication of CN113360868A publication Critical patent/CN113360868A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The application relates to the field of process optimization, login permission information is automatically generated according to equipment information and login verification is carried out when a login account and/or a login password of an application program are not detected, login-free of the application program is achieved, a user does not need to input the login account and the login password, and convenience of logging in the application program is improved. An application program login method, device, computer equipment and medium are provided, the method comprises: when an application program login request message sent by a client is received, if a login account and/or a login password are not detected, acquiring equipment information of the client; acquiring an equipment identification code corresponding to the client according to the equipment information; determining login authority information corresponding to the client according to the equipment identification code; and executing login authentication operation according to the login authority information, and authorizing to login the application program at the client after the authentication is successful. In addition, the present application also relates to a block chain technique, and the device information can be stored in the block chain.

Description

Application program login method and device, computer equipment and storage medium
Technical Field
The present application relates to the field of process optimization, and in particular, to a method and an apparatus for logging in an application program, a computer device, and a storage medium.
Background
With the continuous development of mobile internet technology and the increasingly powerful functions of application programs, the application programs become an indispensable part of people's life, and great convenience is brought to people's life.
Most applications require login when the application is started. When the application program is opened for the first time after being installed or the application program does not store the login account and the login password, the user is required to manually input the login account and the login password, which is very inconvenient. If the user forgets the login password, short message authentication is required to be carried out through the mobile phone; if the mobile phone signal is not good or the short message service is delayed, the user often cannot receive the short message verification code through the mobile phone at the first time, so that the user cannot log in the application program to perform service processing in time, which is very inconvenient.
Therefore, how to improve the convenience of the user to log in the application program becomes an urgent problem to be solved.
Disclosure of Invention
The application program login method and device, the computer equipment and the storage medium are used for automatically generating login authority information according to the equipment information and performing login verification when a login account and/or a login password of the application program are not detected, so that login-free of the application program is realized, a user does not need to input the login account and the login password, and convenience of the user in logging in the application program is improved.
In a first aspect, the present application provides an application program login method, including:
when an application program login request message sent by a client is received, if a login account and/or a login password are not detected, acquiring equipment information of the client;
acquiring an equipment identification code corresponding to the client according to the equipment information;
determining login authority information corresponding to the client according to the equipment identification code;
and executing login authentication operation according to the login authority information, and authorizing the client to log in the application program after the authentication is successful.
In a second aspect, the present application further provides an application login apparatus, including:
the device information acquisition module is used for acquiring the device information of the client if a login account and/or a login password are not detected when an application program login request message sent by the client is received;
the identification code acquisition module is used for acquiring the equipment identification code corresponding to the client according to the equipment information;
the authority information determining module is used for determining login authority information corresponding to the client according to the equipment identification code;
and the login authentication module is used for executing login authentication operation according to the login authority information and authorizing the client to log in the application program after the login authentication is successful.
In a third aspect, the present application further provides a computer device comprising a memory and a processor;
the memory for storing a computer program;
the processor is configured to execute the computer program and implement the application login method as described above when executing the computer program.
In a fourth aspect, the present application also provides a computer-readable storage medium storing a computer program, which when executed by a processor causes the processor to implement the application login method as described above.
The application discloses an application program login method, an application program login device, computer equipment and a storage medium, wherein the application program login request message sent by a client is received, so that the equipment information of the client can be obtained when a login account and/or a login password are determined not to be detected, and subsequently, the login-free application program can be realized according to the equipment information; the device identification code corresponding to the client is obtained according to the device information, so that login authority information corresponding to the client can be automatically generated according to the device identification code; according to the login authority information, login authentication operation is executed, the client is authorized to login the application program after the login authentication is successful, login-free of the application program is achieved, a user does not need to input a login account and a login password, and convenience of the user in logging in the application program is improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic flowchart of an application login method provided in an embodiment of the present application;
FIG. 2 is a schematic flow chart of a sub-step of obtaining login right information according to an embodiment of the present application;
FIG. 3 is a schematic diagram of a method for sending token information to a client according to an embodiment of the present disclosure;
fig. 4 is a schematic block diagram of an application login apparatus according to an embodiment of the present application;
fig. 5 is a schematic block diagram of a structure of a computer device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all, embodiments of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The flow diagrams depicted in the figures are merely illustrative and do not necessarily include all of the elements and operations/steps, nor do they necessarily have to be performed in the order depicted. For example, some operations/steps may be decomposed, combined or partially combined, so that the actual execution sequence may be changed according to the actual situation.
It is to be understood that the terminology used in the description of the present application herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in the specification of the present application and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should also be understood that the term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items.
The embodiment of the application provides an application program login method, an application program login device, computer equipment and a storage medium. The application program login method can be applied to a login authentication server, login permission information is automatically generated according to equipment information and login authentication is carried out when a login account and/or a login password of the application program are not detected, login-free of the application program is achieved, a user does not need to input the login account and the login password, and convenience of the user in logging in the application program is improved.
The login authentication server may be an independent server or a server cluster.
Some embodiments of the present application will be described in detail below with reference to the accompanying drawings. The embodiments described below and the features of the embodiments can be combined with each other without conflict.
As shown in fig. 1, the application login method includes steps S10 through S40.
Step S10, when receiving the application login request message sent by the client, if the login account and/or the login password are not detected, acquiring the device information of the client.
It should be noted that the application program login method provided in the embodiment of the present application may be applied to a scenario in which a user logs in an application program for the first time. For example, after a user downloads and installs an application program at a client, when the application program is opened for the first time, the client does not store a login account and a login password; the client can send a login request message to a login authentication server, the login authentication server acquires the equipment information of the client, login authority information is automatically generated according to the equipment information, login authentication is carried out, and the client is authorized to log in an application program after the authentication is successful; therefore, automatic login of the application program is realized, and convenience of logging in the application program by a user is improved.
The client may be an electronic device such as a smart phone, a tablet computer, a notebook computer, and a desktop computer. The application program may be various software applications on a browser webpage of the client, or various apps (applications) of the client.
For example, when a user opens an application program for the first time, the client may detect whether the application program is cached with a login account and a login password; if the login account and the login password are not detected to be cached in the application program, the client side can send a login request message to the login authentication server. Wherein the login request message does not include a login account and/or a login password.
In some embodiments, when the login authentication server receives an application login request message sent by the client, the login authentication server may detect whether the login request message contains a login account and/or a login password. If the login authentication server does not detect that the login request message contains the login account and/or the login password, the device information of the client can be acquired.
In other embodiments, when the login authentication server does not detect that the login request message contains a login account and/or a login password, the login authentication server may further request the login account and the login password of the corresponding application program from the client. And when the login account and the login password sent by the client are not received within the preset time or a query failure message returned by the client is received, acquiring the equipment information of the client. The preset time can be set according to actual conditions, and specific numerical values are not limited herein.
For example, the device information may be sent to the login authentication server by the client in the sent application login request message. The device information may also be requested from the client by the login authentication server when the login account and/or the login password are not detected. For example, the login authentication server may send a device information request message to the client to acquire device information of the client.
Illustratively, the device information may include, but is not limited to, a mobile phone number corresponding to the SIM card, an operating system version number, bluetooth address information, and the like.
To further ensure the privacy and security of the device information, the device information may be stored in a node of a blockchain.
By receiving the application program login request message sent by the client, the device information of the client can be obtained when the login account and/or the login password are determined not to be detected, subsequently, the login-free application program can be realized according to the device information, and a user does not need to input a login account and a login password.
It should be noted that the login-free here means that the user does not need to input a login account and a login password, that is, the user does not need to log in manually.
And step S20, acquiring the equipment identification code corresponding to the client according to the equipment information.
In the embodiment of the application, after the login authentication server obtains the device information of the client, the device identification code corresponding to the client can be generated according to the device information.
In some embodiments, obtaining the device identification code corresponding to the client according to the device information may include: performing character string calculation on the equipment information based on a preset character string generation algorithm to obtain a target character string; and carrying out format conversion on the target character string to obtain the equipment identification code.
The predetermined string generation algorithm may include an advanced encryption standard algorithm, a digest generation algorithm, and a hash algorithm, but may be other types of algorithms, which is not limited herein.
For example, when the format of the target character string is converted, the target character string may be converted into a 16-ary format or an 8-ary format, which is not limited herein. After the target character string after format conversion is obtained, the length of the target character string after format conversion can be standardized based on a preset character length threshold; and determining the target character string with the standardized length as the equipment identification code. It should be noted that, by normalizing the length of the format-converted target character string based on the preset character length threshold, the device identification codes with the same length can be obtained.
The preset character length threshold may be set according to actual conditions, and specific numerical values are not limited herein. For example, if the string length of the target string after format conversion is greater than the string length threshold N, N-bit characters before the target string may be reserved; if the string length of the format-converted target string is smaller than the string length threshold N, random characters may be added to the format-converted target string until the string length is equal to the string length threshold N.
The device identification code corresponding to the client can be obtained by performing character string calculation on the device information based on a preset character string generation algorithm. By converting the format of the target character string, the device identification codes with consistent formats can be obtained.
And step S30, determining login authority information corresponding to the client according to the equipment identification code.
In the embodiment of the application, after the login authentication server obtains the device identification code corresponding to the client according to the device information, the login authority information corresponding to the client can be determined according to the device identification code.
In some embodiments, determining login authority information corresponding to the client according to the device identification code may include: performing identification code matching on the equipment identification code and a preset identification code database to obtain an identification code matching result corresponding to the equipment identification code; and acquiring login authority information according to the identification code matching result.
It should be noted that the preset identification code database includes at least one identification code corresponding to the client. For example, the login authentication server may determine an identification code corresponding to the client when the application program in the client is logged in historically and store the identification code in the identification code database. Wherein the identification code can be determined according to the device information of the client.
For example, the login authentication server may perform identifier matching on the device identifier corresponding to the client and a preset identifier database to obtain an identifier matching result corresponding to the device identifier. The identification code matching result may include that an identification code matching the device identification code exists in the identification code database, and an identification code matching the device identification code does not exist in the identification code database. It will be appreciated that once the user logs in to the application at the client and then uninstalls the application, the identity database stored by the login authentication server may have an identity matching the device identity.
The device identification code is matched with the preset identification code database, so that an identification code matching result corresponding to the device identification code can be obtained, and the login authority information can be obtained according to the identification code matching result.
For example, after obtaining the identification code matching result corresponding to the device identification code, the login authority information may be obtained according to the identification code matching result. In the embodiment of the present application, how to obtain login authority information will be described in detail.
Referring to fig. 2, fig. 2 is a schematic flowchart of a sub-step of obtaining login authority information according to an embodiment of the present application, and specifically includes the following steps S301 to S303.
Step S301, determining a target authority obtaining mode corresponding to the obtained identification code matching result according to the identification code matching result corresponding to the equipment identification code based on the corresponding relation between the preset identification code matching result and the authority obtaining mode, wherein the authority obtaining mode comprises a first authority obtaining mode and a second authority obtaining mode.
It should be noted that, in the embodiment of the present application, a corresponding relationship between the identification code matching result and the authority obtaining manner may be predefined. For example, when the identification code matching result is that an identification code matched with the equipment identification code exists in the identification code database, the corresponding authority acquisition mode is a first authority acquisition mode; and when the identification code matching result is that the identification code matched with the equipment identification code does not exist in the identification code database, the corresponding permission acquisition mode is a second permission acquisition mode.
For example, the target permission obtaining manner corresponding to the obtained identification code matching result may be determined according to the identification code matching result corresponding to the device identification code.
For example, when an identification code matching result corresponding to the device identification code has an identification code matching the device identification code in the identification code database, it may be determined that the target permission acquisition manner corresponding to the obtained identification code matching result is the first permission acquisition manner.
For example, when the identification code matching result corresponding to the device identification code does not have the identification code matching the device identification code in the identification code database, it may be determined that the target permission acquisition manner corresponding to the obtained identification code matching result is the second permission acquisition manner.
According to the corresponding relation between the preset identification code matching result and the authority obtaining mode, the target authority obtaining mode corresponding to the obtained identification code matching result can be determined according to the identification code matching result corresponding to the equipment identification code, and then the login authority information can be flexibly obtained according to different target authority obtaining modes.
Step S302, if the target authority obtaining mode is a first authority obtaining mode, obtaining the login authority information based on the first authority obtaining mode.
For example, if it is determined that the target permission obtaining manner is the first permission obtaining manner, the login permission information may be obtained based on the first permission obtaining manner. The login authority information may include a target login account and a target login password.
In some embodiments, obtaining the login right information based on the first right obtaining manner may include: if the identification code database has the identification code matched with the equipment identification code, determining the login account corresponding to the matched identification code as a target login account based on the corresponding relation between the preset identification code and the login account; and determining a target login password according to the equipment identification code.
It should be noted that, in the embodiment of the present application, the identification code database may further include a correspondence between the identification code and the login account.
For example, for the device identification code a, if there is an identification code a1 matching with the device identification code a in the identification code database, the login account corresponding to the matching identification code a1 may be determined as the target login account based on the correspondence between the identification codes and the login accounts.
For example, a login account query can be performed in the identification code database, and a login account corresponding to the matched identification code a1 is queried; for example, if the login account corresponding to the inquiry acquisition identification code a1 is B, the login account B may be determined as the target login account.
For example, the device identification code may be determined as the target login password. For example, for the device identification code a, the device identification code a may be determined as the target login password. It should be noted that, because the device identification code is generated by the device information of the client and can be used to identify the uniqueness of the client, the device identification code is used as the target login password, which not only can ensure the security of the client, but also can avoid generating additional login passwords, thereby improving the login efficiency.
The login account corresponding to the matched identification code is determined as the target login account based on the corresponding relation between the preset identification code and the login account, so that the target login account can be accurately and quickly obtained. The equipment identification code is determined to be the target login password, so that the safety of the client can be ensured, the additional generation of the login password can be avoided, and the login efficiency is improved.
Step S303, if the target permission obtaining mode is a second permission obtaining mode, obtaining the login permission information based on the second permission obtaining mode.
For example, if it is determined that the target permission obtaining manner is the second permission obtaining manner, the login permission information may be obtained based on the second permission obtaining manner. The login authority information may include a target login account and a target login password.
In some embodiments, obtaining the login right information based on the second right obtaining manner may include: if the identification code database does not have an identification code matched with the equipment identification code, executing login account registration operation to obtain a target login account; and determining a target login password according to the equipment identification code.
For example, the login authentication server may perform a login account registration operation to register a new login account, so that the target login account may be obtained. For example, if the registered new login account is C, the login account C may be determined as the target login account.
For example, the device identification code may be determined as the target login password. For example, for the device identification code a, the device identification code a may be determined as the target login password.
By executing the login account registration operation, a new login account can be registered as a target login account under the condition that an identification code matched with the equipment identification code does not exist in the identification code database, so that the login efficiency is improved.
In some embodiments, after obtaining the login right information based on the second right obtaining manner, the method further includes: and performing association storage on the target login account and the target login password.
For example, for the target login account C and the target login password a, the target login account C and the target login password a may be associated and stored in the identification code database.
To further ensure the privacy and security of the id database, the id database may be stored in a node of a block chain.
By storing the target login account and the target login password in the identification code database in a correlation manner, when the application program in the client is reinstalled and logged in, the target login account and the target login password can be determined according to the equipment identification code, the login account does not need to be registered again, and the login efficiency is improved.
And step S40, executing login authentication operation according to the login authority information, and authorizing the client to log in the application program after the authentication is successful.
For example, the login authentication server may perform a login authentication operation based on the login authority information. For example, the validity of the login right information, whether or not there is a login right, and the like are verified. The specific login authentication operation is not limited herein.
For example, after authentication is successful, the login authentication server may authorize the login of the application at the client.
The login authentication operation is executed according to the login authority information, and the login of the application program is authorized at the client after the authentication is successful, so that the login-free application program is realized, a user does not need to input a login account and a login password, and the convenience of the user for logging in the application program is improved.
In some embodiments, after authorizing to log in to the application program at the client after the authentication is successful, the embodiments of the present application may further include: generating token information; and sending the token information to the client so that the client stores the token information into a cache corresponding to the application program, and the token information is used as a login credential of the application program. Referring to fig. 3, fig. 3 is a schematic diagram illustrating token information being sent to a client according to an embodiment of the present disclosure.
The token information is generated after the application successfully logs in. For example, after authorizing login of the application at the client, the login authentication server may generate token information based on the target login account and the target login password. For another example, when the application stores the login account and the login password, the client may generate the token information according to the login account and the login password after the application successfully logs in.
Illustratively, the token information may be generated based on the login authority information. For example, the message digest calculation may be performed on the target login account and the target login password based on a message digest algorithm, and the obtained message digest may be determined as the token information. The message digest algorithm may include, but is not limited to, the MD2 algorithm, the MD4 algorithm, and the MD5 algorithm. For another example, a hash value calculation may be performed on the target login account and the target login password based on a hash algorithm, and the obtained hash value may be determined as the token information. The hash algorithm may include, but is not limited to, the SHA-1 algorithm, the SHA-2 algorithm, the SHA-256 algorithm, and so on.
For example, the token information may be sent to the client, so that the client stores the token information in a cache corresponding to the application, and the token information is used as a login credential of the application.
It should be noted that by generating the token information and sending the token information to the client, the application program in the client can directly perform login authentication according to the token information when logging in next time, and the user does not need to input the login account and the login password again, so that the convenience of logging in the application program by the user is improved.
For example, upon authorizing the login of the application at the client, the application may enter the application home page. In addition, the application program can also carry out data transmission with the login authentication server through the token information.
In some embodiments, when the user opens the application program in the client again, the client may determine whether token information is stored in the cache corresponding to the application program. If the token information is stored, the application program can be directly logged in the client; if the token information is not stored, the client can send a login request message to the login authentication server, the login authentication server acquires the device information of the client, login authority information is automatically generated according to the device information, login authentication is carried out, and the client is authorized to login the application program after the authentication is successful. It is understood that, when the application program does not store the token information, since the token information is generated according to the login account and the login password, it may be determined that the application program does not cache the login account and the login password. Therefore, the client can send a login request message to the login authentication server, and the login authentication server realizes the login of the application program at the client.
According to the application program login method provided by the embodiment, the application program login request message sent by the client is received, the equipment information of the client can be obtained when the login account and/or the login password are determined not to be detected, subsequently, the login-free application program can be realized according to the equipment information, and a user does not need to input the login account and the login password; the device identification code is matched with a preset identification code database, so that an identification code matching result corresponding to the device identification code can be obtained, and the login authority information can be further obtained according to the identification code matching result; based on the corresponding relation between the preset identification code matching result and the authority obtaining mode, the target authority obtaining mode corresponding to the obtained identification code matching result can be determined according to the identification code matching result corresponding to the equipment identification code, and then the login authority information can be flexibly obtained according to different target authority obtaining modes; the login account corresponding to the matched identification code is determined as the target login account based on the corresponding relation between the preset identification code and the login account, so that the target login account can be accurately and quickly obtained; the equipment identification code is determined as the target login password, so that the safety of the client can be ensured, the additional generation of the login password can be avoided, and the login efficiency is improved; by executing the login account registration operation, a new login account is registered as a target login account under the condition that an identification code matched with the equipment identification code does not exist in the identification code database, so that the login efficiency is improved; the login authentication operation is executed according to the login authority information, and the login of the application program is authorized at the client after the authentication is successful, so that the login-free application program is realized, a user does not need to input a login account and a login password, and the convenience of the user for logging in the application program is improved; by generating the token information and sending the token information to the client, the login authentication can be directly carried out according to the token information when the application program in the client logs in next time, the user does not need to input the login account and the login password again, and the convenience of logging in the application program by the user is improved.
Referring to fig. 4, fig. 4 is a schematic block diagram of an application login apparatus 1000 according to an embodiment of the present application, which is used for executing the foregoing application login method. The application program registration device may be configured in a server or a terminal.
As shown in fig. 4, the application registration apparatus 1000 includes: a device information acquisition module 1001, an identification code acquisition module 1002, a right information determination module 1003, and a login authentication module 1004.
The device information obtaining module 1001 is configured to, when receiving an application login request message sent by a client, obtain device information of the client if a login account and/or a login password are not detected.
An identification code obtaining module 1002, configured to obtain, according to the device information, a device identification code corresponding to the client.
And an authority information determining module 1003, configured to determine, according to the device identification code, login authority information corresponding to the client.
And the login authentication module 1004 is configured to execute a login authentication operation according to the login permission information, and authorize the client to log in the application program after the login authentication is successful.
It should be noted that, as will be clear to those skilled in the art, for convenience and brevity of description, the specific working processes of the apparatus and the modules described above may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
The apparatus described above may be implemented in the form of a computer program which is executable on a computer device as shown in fig. 5.
Referring to fig. 5, fig. 5 is a schematic block diagram of a computer device according to an embodiment of the present disclosure.
Referring to fig. 5, the computer device includes a processor and a memory connected by a system bus, wherein the memory may include a nonvolatile storage medium and an internal memory.
The processor is used for providing calculation and control capability and supporting the operation of the whole computer equipment.
The internal memory provides an environment for running a computer program in the non-volatile storage medium, which when executed by the processor causes the processor to perform any one of the application login methods.
It should be understood that the Processor may be a Central Processing Unit (CPU), and the Processor may be other general purpose processors, Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components, etc. Wherein a general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
Wherein, in one embodiment, the processor is configured to execute a computer program stored in the memory to implement the steps of:
when an application program login request message sent by a client is received, if a login account and/or a login password are not detected, acquiring equipment information of the client; acquiring an equipment identification code corresponding to the client according to the equipment information; determining login authority information corresponding to the client according to the equipment identification code; and executing login authentication operation according to the login authority information, and authorizing the client to log in the application program after the authentication is successful.
In one embodiment, when determining the login authority information corresponding to the client according to the device identification code, the processor is configured to implement:
performing identification code matching on the equipment identification code and a preset identification code database to obtain an identification code matching result corresponding to the equipment identification code; and acquiring the login authority information according to the identification code matching result.
In one embodiment, when the processor obtains the login right information according to the identification code matching result, the processor is configured to:
determining a target authority acquisition mode corresponding to the obtained identification code matching result according to the identification code matching result corresponding to the equipment identification code based on the corresponding relation between the preset identification code matching result and the authority acquisition mode, wherein the authority acquisition mode comprises a first authority acquisition mode and a second authority acquisition mode; if the target authority obtaining mode is a first authority obtaining mode, obtaining the login authority information based on the first authority obtaining mode; and if the target authority obtaining mode is a second authority obtaining mode, obtaining the login authority information based on the second authority obtaining mode.
In one embodiment, the login authority information comprises a target login account and a target login password; when the processor acquires the login authority information based on the first authority acquisition mode, the processor is used for realizing that:
if the identification code database has an identification code matched with the equipment identification code, determining a login account corresponding to the matched identification code as the target login account based on the corresponding relationship between a preset identification code and the login account; and determining the target login password according to the equipment identification code.
In one embodiment, the login authority information comprises a target login account and a target login password; when the processor acquires the login authority information based on the second authority acquisition mode, the processor is used for realizing that:
if the identification code database does not have an identification code matched with the equipment identification code, executing login account registration operation to obtain the target login account; and determining the target login password according to the equipment identification code.
In one embodiment, after the processor obtains the login right information based on the second right obtaining manner, the processor is further configured to:
and performing association storage on the target login account and the target login password.
In one embodiment, the processor, after enabling authorization to log in to the application at the client after successful authentication, is further configured to enable:
generating token information; and sending the token information to the client so that the client stores the token information into a cache corresponding to the application program, wherein the token information is used as a login credential of the application program.
The embodiment of the application further provides a computer-readable storage medium, wherein a computer program is stored in the computer-readable storage medium, the computer program comprises program instructions, and the processor executes the program instructions to realize the application program login method provided by the embodiment of the application.
The computer-readable storage medium may be an internal storage unit of the computer device described in the foregoing embodiment, for example, a hard disk or a memory of the computer device. The computer readable storage medium may also be an external storage device of the computer device, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital Card (SD Card), a Flash memory Card (Flash Card), and the like provided on the computer device.
Further, the computer-readable storage medium may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function, and the like; the storage data area may store data created according to the use of the blockchain node, and the like.
The block chain referred by the application is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism, an encryption algorithm and the like. A block chain (Blockchain), which is essentially a decentralized database, is a series of data blocks associated by using a cryptographic method, and each data block contains information of a batch of network transactions, so as to verify the validity (anti-counterfeiting) of the information and generate a next block. The blockchain may include a blockchain underlying platform, a platform product service layer, an application service layer, and the like.
While the invention has been described with reference to specific embodiments, the scope of the invention is not limited thereto, and those skilled in the art can easily conceive various equivalent modifications or substitutions within the technical scope of the invention. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (10)

1. An application login method, comprising:
when an application program login request message sent by a client is received, if a login account and/or a login password are not detected, acquiring equipment information of the client;
acquiring an equipment identification code corresponding to the client according to the equipment information;
determining login authority information corresponding to the client according to the equipment identification code;
and executing login authentication operation according to the login authority information, and authorizing the client to log in the application program after the authentication is successful.
2. The method for logging in an application program according to claim 1, wherein the determining login authority information corresponding to the client according to the device identification code includes:
performing identification code matching on the equipment identification code and a preset identification code database to obtain an identification code matching result corresponding to the equipment identification code;
and acquiring the login authority information according to the identification code matching result.
3. The method for logging in an application program according to claim 2, wherein the obtaining the login authority information according to the identification code matching result includes:
determining a target authority acquisition mode corresponding to the obtained identification code matching result according to the identification code matching result corresponding to the equipment identification code based on the corresponding relation between the preset identification code matching result and the authority acquisition mode, wherein the authority acquisition mode comprises a first authority acquisition mode and a second authority acquisition mode;
if the target authority obtaining mode is a first authority obtaining mode, obtaining the login authority information based on the first authority obtaining mode;
and if the target authority obtaining mode is a second authority obtaining mode, obtaining the login authority information based on the second authority obtaining mode.
4. The application login method of claim 3, wherein the login authority information comprises a target login account and a target login password; the acquiring the login authority information based on the first authority acquisition mode comprises:
if the identification code database has an identification code matched with the equipment identification code, determining a login account corresponding to the matched identification code as the target login account based on the corresponding relationship between a preset identification code and the login account;
and determining the target login password according to the equipment identification code.
5. The application login method of claim 3, wherein the login authority information comprises a target login account and a target login password; the obtaining the login authority information based on the second authority obtaining mode comprises:
if the identification code database does not have an identification code matched with the equipment identification code, executing login account registration operation to obtain the target login account;
and determining the target login password according to the equipment identification code.
6. The method for logging in an application program according to claim 5, wherein after acquiring the login right information based on the second right acquisition mode, the method further comprises:
and performing association storage on the target login account and the target login password.
7. The application login method according to any one of claims 1 to 6, wherein after the client is authorized to login to the application after the authentication is successful, the method comprises:
generating token information;
and sending the token information to the client so that the client stores the token information into a cache corresponding to the application program, wherein the token information is used as a login credential of the application program.
8. An application login apparatus, comprising:
the device information acquisition module is used for acquiring the device information of the client if a login account and/or a login password are not detected when an application program login request message sent by the client is received;
the identification code acquisition module is used for acquiring the equipment identification code corresponding to the client according to the equipment information;
the authority information determining module is used for determining login authority information corresponding to the client according to the equipment identification code;
and the login authentication module is used for executing login authentication operation according to the login authority information and authorizing the client to log in the application program after the login authentication is successful.
9. A computer device, wherein the computer device comprises a memory and a processor;
the memory for storing a computer program;
the processor for executing the computer program and implementing the application login method of any one of claims 1 to 7 when executing the computer program.
10. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer program which, when executed by a processor, causes the processor to implement the application login method according to any one of claims 1 to 7.
CN202110732785.1A 2021-06-29 2021-06-29 Application program login method and device, computer equipment and storage medium Pending CN113360868A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110732785.1A CN113360868A (en) 2021-06-29 2021-06-29 Application program login method and device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110732785.1A CN113360868A (en) 2021-06-29 2021-06-29 Application program login method and device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN113360868A true CN113360868A (en) 2021-09-07

Family

ID=77537260

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110732785.1A Pending CN113360868A (en) 2021-06-29 2021-06-29 Application program login method and device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN113360868A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113961542A (en) * 2021-10-19 2022-01-21 平安普惠企业管理有限公司 A database operation method, device, equipment and storage medium
CN114091075A (en) * 2021-11-25 2022-02-25 北京字节跳动网络技术有限公司 Password input method, device, storage medium and electronic equipment
CN114329590A (en) * 2021-12-28 2022-04-12 上海勤联物联网有限公司 Database access method and system
CN114401121A (en) * 2021-12-27 2022-04-26 北京百度网讯科技有限公司 Application program login method and device, electronic equipment and readable storage medium
CN115809451A (en) * 2021-09-13 2023-03-17 腾讯科技(深圳)有限公司 Account synchronization method, device, electronic device and storage medium
CN116016402A (en) * 2022-12-07 2023-04-25 深圳渊联技术有限公司 Message interaction method and communication system for communication application
CN116455666A (en) * 2023-05-08 2023-07-18 深圳市星卡科技股份有限公司 Automatic registration activation method and device for electronic equipment
CN117908929A (en) * 2024-03-19 2024-04-19 深圳市华磊迅拓科技有限公司 Method, device, equipment and storage medium for automatically generating client

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106850503A (en) * 2015-12-04 2017-06-13 阿里巴巴集团控股有限公司 One kind is exempted to log in identity identifying method and device
CN109089264A (en) * 2018-08-02 2018-12-25 江苏满运软件科技有限公司 A kind of mobile terminal exempts from the method and system of close login
CN110298162A (en) * 2019-05-22 2019-10-01 深圳壹账通智能科技有限公司 Application client login method, device, computer equipment and storage medium
CN111181977A (en) * 2019-12-31 2020-05-19 瑞庭网络技术(上海)有限公司 Login method, device, electronic equipment and medium
CN112199652A (en) * 2020-10-23 2021-01-08 网易(杭州)网络有限公司 Login method, terminal, server, system, medium and equipment of application program

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106850503A (en) * 2015-12-04 2017-06-13 阿里巴巴集团控股有限公司 One kind is exempted to log in identity identifying method and device
CN109089264A (en) * 2018-08-02 2018-12-25 江苏满运软件科技有限公司 A kind of mobile terminal exempts from the method and system of close login
CN110298162A (en) * 2019-05-22 2019-10-01 深圳壹账通智能科技有限公司 Application client login method, device, computer equipment and storage medium
CN111181977A (en) * 2019-12-31 2020-05-19 瑞庭网络技术(上海)有限公司 Login method, device, electronic equipment and medium
CN112199652A (en) * 2020-10-23 2021-01-08 网易(杭州)网络有限公司 Login method, terminal, server, system, medium and equipment of application program

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115809451A (en) * 2021-09-13 2023-03-17 腾讯科技(深圳)有限公司 Account synchronization method, device, electronic device and storage medium
CN113961542A (en) * 2021-10-19 2022-01-21 平安普惠企业管理有限公司 A database operation method, device, equipment and storage medium
CN114091075A (en) * 2021-11-25 2022-02-25 北京字节跳动网络技术有限公司 Password input method, device, storage medium and electronic equipment
CN114401121A (en) * 2021-12-27 2022-04-26 北京百度网讯科技有限公司 Application program login method and device, electronic equipment and readable storage medium
CN114329590A (en) * 2021-12-28 2022-04-12 上海勤联物联网有限公司 Database access method and system
CN116016402A (en) * 2022-12-07 2023-04-25 深圳渊联技术有限公司 Message interaction method and communication system for communication application
CN116455666A (en) * 2023-05-08 2023-07-18 深圳市星卡科技股份有限公司 Automatic registration activation method and device for electronic equipment
CN117908929A (en) * 2024-03-19 2024-04-19 深圳市华磊迅拓科技有限公司 Method, device, equipment and storage medium for automatically generating client
CN117908929B (en) * 2024-03-19 2024-06-07 深圳市华磊迅拓科技有限公司 Method, device, equipment and storage medium for automatically generating client

Similar Documents

Publication Publication Date Title
CN113360868A (en) Application program login method and device, computer equipment and storage medium
US11637707B2 (en) System and method for managing installation of an application package requiring high-risk permission access
CN111917773B (en) Service data processing method and device and server
US12074990B2 (en) Database multi-authentication method and system, terminal, and storage medium
CN108777675B (en) Electronic device, block chain-based identity authentication method, and computer storage medium
CN110784450A (en) Single sign-on method and device based on browser
WO2020181809A1 (en) Data processing method and system based on interface checking, and computer device
CN111565179B (en) Identity verification method and device, electronic equipment and storage medium
CN110661779B (en) Block chain network-based electronic certificate management method, system, device and medium
CN113259429B (en) Session maintenance management and control method, device, computer equipment and medium
US20210406866A1 (en) Method for Processing a Transaction, Corresponding Device, System and Program
CN113395249A (en) Client login authentication method, system and computer equipment
CN113726774A (en) Client login authentication method, system and computer equipment
CN108965335B (en) Method for preventing malicious access to login interface, electronic device and computer medium
CN109241728B (en) Method and device for acquiring password information, computer equipment and storage medium
CN112632573A (en) Intelligent contract execution method, device and system, storage medium and electronic equipment
CN115086090A (en) Network login authentication method and device based on UKey
CN111143817A (en) Device attestation techniques
CN108121904A (en) Unlocking method, device, electronic equipment and server
CN115525677A (en) Data caching method and device, computer equipment and storage medium
CN116707758A (en) Authentication method, equipment and server of trusted computing equipment
CN112417393A (en) Identity verification method and device, computer equipment and computer readable storage medium
CN102694776A (en) Authentication system and method based on dependable computing
CN115567271A (en) Authentication method and device, page skip method and device, electronic equipment and medium
CN114765552B (en) Data processing method, medium system, storage medium and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20210907

WD01 Invention patent application deemed withdrawn after publication