CN104468581A - Method and device for logging into application program - Google Patents

Method and device for logging into application program Download PDF

Info

Publication number
CN104468581A
CN104468581A CN201410757919.5A CN201410757919A CN104468581A CN 104468581 A CN104468581 A CN 104468581A CN 201410757919 A CN201410757919 A CN 201410757919A CN 104468581 A CN104468581 A CN 104468581A
Authority
CN
China
Prior art keywords
password
data
intelligent worn
terminal equipment
worn device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410757919.5A
Other languages
Chinese (zh)
Other versions
CN104468581B (en
Inventor
宫天翔
吴廷彬
张军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Technology Co Ltd
Xiaomi Inc
Original Assignee
Xiaomi Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiaomi Inc filed Critical Xiaomi Inc
Priority to CN201410757919.5A priority Critical patent/CN104468581B/en
Publication of CN104468581A publication Critical patent/CN104468581A/en
Application granted granted Critical
Publication of CN104468581B publication Critical patent/CN104468581B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention relates to a method and device for logging into an application program. The method comprises the steps that when a user identity label and a password input by a user are received, a verification request for the user identity label and the password is sent to a server; when a verification passing result is received from the server, password request data are sent to an intelligent wearing device, the intelligent wearing device carries out identity verification on a terminal device according to the password request data, and when verification passes, login password data are generated; the login password data sent by the intelligent wearing device are received and include a password, the user identity label and identity recognition data of the intelligent wearing device; when the password input by the user is received, whether the password input by the user is consistent with the password of the login password data or not is judged; when the password input by the user is consistent with the password of the login password data, login of the application program is achieved. The method is used for achieving safety and convenience of login of the application program.

Description

The method of login application program and device
Technical field
The disclosure relates to Internet technical field, particularly relates to a kind of method and device of login application program.
Background technology
Along with the development of the Internet, the rise of especially cloud service, personal data store on the internet by increasing user, when user needs check or download personal data, first need to log in corresponding application program, then operate accordingly.
In correlation technique; the mode that login application program adopts user to input username and password usually logs in; but; because individual privacy data store on the internet by increasing user; therefore; simple user name, password can not meet the requirement that user protects private data, need the one safety login application program of identification mode easily again more.
Summary of the invention
For overcoming Problems existing in correlation technique, the disclosure provides a kind of method and device of login application program.
According to the first aspect of disclosure embodiment, a kind of method of login application program is provided, is applied to terminal equipment, comprising:
When receiving User Identity and the password of user's input, send the check request to described User Identity and password to server;
When receiving verification from described server by result, password request data are sent to Intelligent worn device, described Intelligent worn device is used for carrying out authentication according to described password request data to described terminal equipment, when being verified, generates entry password data;
Receive the entry password data that described Intelligent worn device sends, described entry password data comprise the identification data of password, described User Identity and described Intelligent worn device;
When receiving the password of user's input, judge that whether the password that described user inputs is consistent with the password in described entry password data;
When the password that described user inputs is consistent with the password in described entry password data, log in described application program.
The technical scheme that embodiment of the present disclosure provides can comprise following beneficial effect: produce entry password by Intelligent worn device and the mutual mode of terminal equipment, and according to password logon application program, thus provide a kind of mode utilizing Intelligent worn device to assist login application program for user, make login application program safe and convenient more.
Optionally, described password request data comprise the identification data of the time sending described password request data, described User Identity and described terminal equipment.
Optionally, described when receiving User Identity and the password of user's input, before sending the check request to described User Identity and password to server, described method also comprises:
Wireless connections are set up with Intelligent worn device.
In possibility, terminal equipment and Intelligent worn device set up wireless connections in advance, thus when making user's login application program, the password that can generate according to the Intelligent worn device of binding logs in, thus enhances fail safe and the convenience of login application program.
According to the second aspect of disclosure embodiment, a kind of method of login application program is provided, is applied to Intelligent worn device, comprising:
Wireless connections are set up with terminal equipment;
Receive the password request data that described terminal equipment sends;
According to described password request data, authentication is carried out to described terminal equipment;
When being verified, generate entry password data, described entry password data comprise the identification data of password, described User Identity and described Intelligent worn device;
Described password request data are sent to described terminal equipment.
The technical scheme that embodiment of the present disclosure provides can comprise following beneficial effect: produce entry password by Intelligent worn device and the mutual mode of terminal equipment, and according to password logon application program, thus provide a kind of mode utilizing Intelligent worn device to assist login application program for user, make login application program safe and convenient more.
According to the third aspect of disclosure embodiment, a kind of device of login application program is provided, comprises:
First sending module, for when receiving User Identity and the password of user's input, sends the check request to described User Identity and password to server;
Second sending module, for when receiving verification from described server by result, password request data are sent to Intelligent worn device, described Intelligent worn device is used for carrying out authentication according to described password request data to described terminal equipment, when being verified, generate entry password data;
First receiver module, for receiving the entry password data that described Intelligent worn device sends, described entry password data comprise the identification data of password, described User Identity and described Intelligent worn device;
Judge module, for when receiving the password of user's input, judges that whether the password that described user inputs is consistent with the password in described entry password data;
Login module, for when the password of described user's input is consistent with the password in described entry password data, logs in described application program.
Optionally, described device also comprises:
First connects module, for send the check request to described User Identity and password to server before, sets up wireless connections with Intelligent worn device.
According to the fourth aspect of disclosure embodiment, a kind of device of login application program is provided, comprises:
Second connects module, for setting up wireless connections with terminal equipment;
Second receiver module, for receiving the password request data that described terminal equipment sends;
Authentication module, for carrying out authentication according to described password request data to described terminal equipment;
Generation module, for when being verified, generate entry password data, described entry password data comprise the identification data of password, described User Identity and described Intelligent worn device;
3rd sending module, for sending described password request data to described terminal equipment.
According to the 5th aspect of disclosure embodiment, a kind of device of login application program is provided, comprises:
Processor;
For the memory of storage of processor executable instruction;
Wherein, described processor is configured to:
When receiving User Identity and the password of user's input, send the check request to described User Identity and password to server;
When receiving verification from described server by result, password request data are sent to Intelligent worn device, described Intelligent worn device is used for carrying out authentication according to described password request data to described terminal equipment, when being verified, generates entry password data;
Receive the entry password data that described Intelligent worn device sends, described entry password data comprise the identification data of password, described User Identity and described Intelligent worn device;
When receiving the password of user's input, judge that whether the password that described user inputs is consistent with the password in described entry password data;
When the password that described user inputs is consistent with the password in described entry password data, log in described application program.
According to the 6th aspect of disclosure embodiment, a kind of device of login application program is provided, comprises:
Processor;
For the memory of storage of processor executable instruction;
Wherein, described processor is configured to:
Wireless connections are set up with terminal equipment;
Receive the password request data that described terminal equipment sends;
According to described password request data, authentication is carried out to described terminal equipment;
When being verified, generate entry password data, described entry password data comprise the identification data of password, described User Identity and described Intelligent worn device;
Described password request data are sent to described terminal equipment.
Should be understood that, it is only exemplary and explanatory that above general description and details hereinafter describe, and can not limit the disclosure.
Accompanying drawing explanation
Accompanying drawing to be herein merged in specification and to form the part of this specification, shows and meets embodiment of the present disclosure, and is used from specification one and explains principle of the present disclosure.
Fig. 1 is the flow chart of the method for a kind of login application program according to an exemplary embodiment;
Fig. 2 is the flow chart of the method for a kind of login application program according to another exemplary embodiment;
Fig. 3 is the flow chart of the method for a kind of login application program according to a specific embodiment;
Fig. 4 is the block diagram of the device of a kind of login application program according to an exemplary embodiment;
Fig. 5 is the block diagram of the device of a kind of login application program according to another exemplary embodiment;
Fig. 6 is the block diagram of the system of a kind of login application program according to an exemplary embodiment;
Fig. 7 is the block diagram of a kind of device for login application program according to an exemplary embodiment.
Embodiment
Here will be described exemplary embodiment in detail, its sample table shows in the accompanying drawings.When description below relates to accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawing represents same or analogous key element.Execution mode described in following exemplary embodiment does not represent all execution modes consistent with the disclosure.On the contrary, they only with as in appended claims describe in detail, the example of apparatus and method that aspects more of the present disclosure are consistent.
Fig. 1 is the flow chart of the method for a kind of login application program according to an exemplary embodiment, and as shown in Figure 1, a kind of method of login application program is used for, in terminal equipment, comprising the following steps S11-S15:
Step S11, when receiving User Identity and the password of user's input, sends the check request to User Identity and password to server;
Step S12, when receiving verification from server by result, send password request data to Intelligent worn device, Intelligent worn device is used for carrying out authentication according to described password request data to terminal equipment, when being verified, generate entry password data;
Step S13, receive the entry password data that Intelligent worn device sends, entry password data comprise the identification data of password, User Identity and Intelligent worn device;
Step S14, when receiving the password of user's input, judges that whether the password that user inputs is consistent with the password in entry password data;
Step S15, when the password of user's input is consistent with the password in entry password data, login application program.
The technical scheme that the present embodiment provides can comprise following beneficial effect: produce entry password by Intelligent worn device and the mutual mode of terminal equipment, and according to password logon application program, thus provide a kind of mode utilizing Intelligent worn device to assist login application program for user, make login application program safe and convenient more.
Said method, in step S12, password request data comprise send password request data time, User Identity and terminal equipment identification data.According to the time and the User Identity that send password request data in password request data, Intelligent worn device can provide entry password data accurately for user, obscuring of the password request data avoiding different time to receive; The identification data of the terminal equipment in password request data can be the form of encryption string, according to the identification data of terminal equipment, Intelligent worn device can carry out authentication to terminal equipment, when being verified, illustrate that terminal equipment is the equipment matched in advance with Intelligent worn device, then generate entry password Data Concurrent further and send.
After server receives the check request to User Identity and password, according to the corresponding relation of the User Identity prestored and password, judge whether the User Identity that user inputs and password mate; When User Identity and the password coupling of user's input, send verification by result to terminal equipment;
Optionally, before enforcement S11, said method also comprises: set up wireless connections with Intelligent worn device.When user uses terminal equipment to start application program, first terminal equipment sets up wireless connections with Intelligent worn device, and bluetooth can be adopted to set up wireless connections.
Fig. 2 is the flow chart of the method for a kind of login application program according to an exemplary embodiment, and as shown in Figure 2, in this embodiment, a kind of method of login application program is used for, in Intelligent worn device, comprising the following steps S21-S25:
Step S21, sets up wireless connections with terminal equipment;
Step S22, the password request data that receiving terminal apparatus sends;
Wherein, password request data comprise the identification data that terminal equipment sends time of password request data, User Identity and terminal equipment;
Step S23, carries out authentication according to password request data to terminal equipment;
Step S24, when being verified, generate entry password data, entry password data comprise the identification data of password, User Identity and Intelligent worn device;
Wherein, password, by Intelligent worn device stochastic generation, for sending to terminal equipment, reading for user and inputting, and then is undertaken verifying and logging in application program by terminal equipment; The identification data of Intelligent worn device can be the form of encryption string;
Step S25, sends password request data to terminal equipment.
The technical scheme that the present embodiment provides can comprise following beneficial effect: produce entry password by Intelligent worn device and the mutual mode of terminal equipment, and according to password logon application program, thus provide a kind of mode utilizing Intelligent worn device to assist login application program for user, make login application program safe and convenient more.
The method of a kind of login application program that the disclosure provides is described below by specific embodiment.
Fig. 3 is the flow chart of the method for a kind of login application program according to a specific embodiment, in this embodiment, terminal equipment and Intelligent worn device (as Intelligent bracelet) are carried out alternately, the application program on Intelligent worn device assisted user registration terminal equipment.As shown in Figure 3, S301-S313 is comprised the following steps:
Step S301, terminal and Intelligent bracelet set up wireless connections by bluetooth;
Step S302, user starts the application program in terminal;
Step S303, the application program access Intelligent bracelet in terminal;
Step S304, user inputs User Identity and the password of application program in terminal;
Step S305, terminal receives User Identity and the password of user's input, and sends to server by the check request of User Identity and password;
Step S306, server verifies User Identity and password; When verifying correct, perform step S307; When check errors, return step S304;
Step S307, server sends verification by result to terminal;
Step S308, terminal sends password request data to Intelligent worn device; Password request data comprise send password request data time, User Identity and terminal identification data;
Step S309, Intelligent worn device, according to password request data, carries out authentication to terminal;
Step S310, when passing through the authentication of terminal, Intelligent worn device generates entry password data, and entry password data are sent to terminal; Entry password data comprise the identification data of password, User Identity and Intelligent worn device;
Step S311, the password in the entry password data that user's reading terminals receives, and input password;
Step S312, whether the password of terminal judges user input is consistent with the password in entry password data; If the password of user's input is consistent with the password in entry password data, perform step S313; If user input password and entry password data in password inconsistent, return step S311;
Step S313, terminal login application program.
In the above-described embodiments, terminal sets up wireless connections with Intelligent bracelet in advance, when user's login application program, Intelligent bracelet and terminal are carried out alternately, and the password generated for user's login application program, user inputs correct password, gets final product login application program, thus achieve as user provides a kind of mode utilizing Intelligent worn device to assist login application program, make login application program safe and convenient more.
Fig. 4 is the device block diagram of a kind of login application program according to an exemplary embodiment.With reference to Fig. 4, this device comprises:
First sending module 41, for when receiving User Identity and the password of user's input, sends the check request to User Identity and password to server;
Second sending module 42, for when receiving verification from server by result, send password request data to Intelligent worn device, Intelligent worn device is used for carrying out authentication according to password request data to terminal equipment, when being verified, generate entry password data;
First receiver module 43, for receiving the entry password data that Intelligent worn device sends, entry password data comprise the identification data of password, User Identity and Intelligent worn device;
Judge module 44, for when receiving the password of user's input, judges that whether the password that user inputs is consistent with the password in entry password data;
Login module 45, for when the password that user inputs is consistent with the password in entry password data, login application program.
Optionally, said apparatus also comprises:
First connects module, for send the check request to User Identity and password to server before, sets up wireless connections with Intelligent worn device.
The technical scheme that the present embodiment provides can comprise following beneficial effect: produce entry password by Intelligent worn device and the mutual mode of terminal equipment, and according to password logon application program, thus provide a kind of mode utilizing Intelligent worn device to assist login application program for user, make login application program safe and convenient more.
Fig. 5 is the device block diagram of a kind of login application program according to another exemplary embodiment.With reference to Fig. 5, this device comprises:
Second connects module 51, for setting up wireless connections with terminal equipment;
Second receiver module 52, for the password request data that receiving terminal apparatus sends;
Authentication module 53, for carrying out authentication according to password request data to terminal equipment;
Generation module 54, for when being verified, generate entry password data, entry password data comprise the identification data of password, User Identity and Intelligent worn device;
3rd sending module 55, for sending password request data to terminal equipment.
The technical scheme that the present embodiment provides can comprise following beneficial effect: produce entry password by Intelligent worn device and the mutual mode of terminal equipment, and according to password logon application program, thus provide a kind of mode utilizing Intelligent worn device to assist login application program for user, make login application program safe and convenient more.
For the method for the login application program described in above-described embodiment, the disclosure also provides a kind of system of login application program, and as shown in Figure 6, a kind of system of login application program comprises: terminal equipment 61, server 62 and Intelligent worn device 63;
Wherein, terminal equipment 61, for when receiving User Identity and the password of user's input, sends the check request to User Identity and password to server 62; When receiving verification from server 62 by result, send password request data to Intelligent worn device 63, Intelligent worn device 63, for carrying out authentication according to password request data to terminal equipment 61, when being verified, generates entry password data; Receive the entry password data that Intelligent worn device 63 sends, entry password data comprise the identification data of password, User Identity and Intelligent worn device 63; When receiving the password of user's input, judge that whether the password that user inputs is consistent with the password in entry password data; When the password of user's input is consistent with the password in entry password data, login application program;
Server 62, for the check request to User Identity and password that receiving terminal apparatus 61 sends, check request comprises User Identity and the password of user's input; According to the corresponding relation of the User Identity prestored and password, judge whether the User Identity that user inputs and password mate; When User Identity and the password coupling of user's input, send verification by result to terminal equipment 61;
Intelligent worn device 63, for setting up wireless connections with terminal equipment 61; The password request data that receiving terminal apparatus 61 sends; According to password request data, authentication is carried out to terminal equipment 61; When being verified, generate entry password data, entry password data comprise the identification data of password, User Identity and Intelligent worn device 63; Password request data are sent to terminal equipment 61.
Optionally, terminal equipment 61 is also for setting up wireless connections with Intelligent worn device 63.
In the exemplary embodiment, the disclosure additionally provides a kind of device of login application program, comprising:
Processor;
For the memory of storage of processor executable instruction;
Wherein, described processor is configured to:
When receiving User Identity and the password of user's input, send the check request to described User Identity and password to server;
When receiving verification from described server by result, password request data are sent to Intelligent worn device, described Intelligent worn device is used for carrying out authentication according to described password request data to described terminal equipment, when being verified, generates entry password data;
Receive the entry password data that described Intelligent worn device sends, described entry password data comprise the identification data of password, described User Identity and described Intelligent worn device;
When receiving the password of user's input, judge that whether the password that described user inputs is consistent with the password in described entry password data;
When the password that described user inputs is consistent with the password in described entry password data, log in described application program.
In the exemplary embodiment, the disclosure additionally provides a kind of device of login application program, comprising:
Processor;
For the memory of storage of processor executable instruction;
Wherein, described processor is configured to:
Wireless connections are set up with terminal equipment;
Receive the password request data that described terminal equipment sends;
According to described password request data, authentication is carried out to described terminal equipment;
When being verified, generate entry password data, described entry password data comprise the identification data of password, described User Identity and described Intelligent worn device;
Described password request data are sent to described terminal equipment.
About the device in above-described embodiment, wherein the concrete mode of modules executable operations has been described in detail in about the embodiment of the method, will not elaborate explanation herein.
Fig. 7 is the block diagram of a kind of device 700 for login application program according to an exemplary embodiment.Such as, device 700 can be mobile phone, computer, digital broadcast terminal, messaging devices, game console, flat-panel devices, Medical Devices, body-building equipment, personal digital assistant etc.
With reference to Fig. 7, device 700 can comprise following one or more assembly: processing components 702, memory 704, power supply module 706, multimedia groupware 708, audio-frequency assembly 710, the interface 712 of I/O (I/O), sensor cluster 714, and communications component 716.
The integrated operation of the usual control device 700 of processing components 702, such as with display, call, data communication, camera operation and record operate the operation be associated.Treatment element 702 can comprise one or more processor 720 to perform instruction, to complete all or part of step of above-mentioned method.In addition, processing components 702 can comprise one or more module, and what be convenient between processing components 702 and other assemblies is mutual.Such as, processing unit 702 can comprise multi-media module, mutual with what facilitate between multimedia groupware 708 and processing components 702.
Memory 704 is configured to store various types of data to be supported in the operation of equipment 700.The example of these data comprises for any application program of operation on device 700 or the instruction of method, contact data, telephone book data, message, picture, video etc.Memory 704 can be realized by the volatibility of any type or non-volatile memory device or their combination, as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM), Erasable Programmable Read Only Memory EPROM (EPROM), programmable read only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, disk or CD.
The various assemblies that electric power assembly 706 is device 700 provide electric power.Electric power assembly 706 can comprise power-supply management system, one or more power supply, and other and the assembly generating, manage and distribute electric power for device 700 and be associated.
Multimedia groupware 708 is included in the screen providing an output interface between described device 700 and user.In certain embodiments, screen can comprise liquid crystal display (LCD) and touch panel (TP).If screen comprises touch panel, screen may be implemented as touch-screen, to receive the input signal from user.Touch panel comprises one or more touch sensor with the gesture on sensing touch, slip and touch panel.Described touch sensor can the border of not only sensing touch or sliding action, but also detects the duration relevant to described touch or slide and pressure.In certain embodiments, multimedia groupware 708 comprises a front-facing camera and/or post-positioned pick-up head.When equipment 700 is in operator scheme, during as screening-mode or video mode, front-facing camera and/or post-positioned pick-up head can receive outside multi-medium data.Each front-facing camera and post-positioned pick-up head can be fixing optical lens systems or have focal length and optical zoom ability.
Audio-frequency assembly 710 is configured to export and/or input audio signal.Such as, audio-frequency assembly 710 comprises a microphone (MIC), and when device 700 is in operator scheme, during as call model, logging mode and speech recognition mode, microphone is configured to receive external audio signal.The audio signal received can be stored in memory 704 further or be sent via communications component 716.In certain embodiments, audio-frequency assembly 710 also comprises a loud speaker, for output audio signal.
I/O interface 712 is for providing interface between processing components 702 and peripheral interface module, and above-mentioned peripheral interface module can be keyboard, some striking wheel, button etc.These buttons can include but not limited to: home button, volume button, start button and locking press button.
Sensor cluster 714 comprises one or more transducer, for providing the state estimation of various aspects for device 700.Such as, sensor cluster 714 can detect the opening/closing state of equipment 700, the relative positioning of assembly, such as described assembly is display and the keypad of device 700, the position of all right checkout gear 700 of sensor cluster 714 or device 700 1 assemblies changes, the presence or absence that user contacts with device 700, the variations in temperature of device 700 orientation or acceleration/deceleration and device 700.Sensor cluster 714 can comprise proximity transducer, be configured to without any physical contact time detect near the existence of object.Sensor cluster 714 can also comprise optical sensor, as CMOS or ccd image sensor, for using in imaging applications.In certain embodiments, this sensor cluster 714 can also comprise acceleration transducer, gyro sensor, Magnetic Sensor, pressure sensor or temperature sensor.
Communications component 716 is configured to the communication being convenient to wired or wireless mode between device 700 and other equipment.Device 700 can access the wireless network based on communication standard, as WiFi, 2G or 3G, or their combination.In one exemplary embodiment, communication component 716 receives from the broadcast singal of external broadcasting management system or broadcast related information via broadcast channel.In one exemplary embodiment, described communication component 716 also comprises near-field communication (NFC) module, to promote junction service.Such as, can based on radio-frequency (RF) identification (RFID) technology in NFC module, Infrared Data Association (IrDA) technology, ultra broadband (UWB) technology, bluetooth (BT) technology and other technologies realize.
In the exemplary embodiment, device 700 can be realized, for performing said method by one or more application specific integrated circuit (ASIC), digital signal processor (DSP), digital signal processing appts (DSPD), programmable logic device (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components.
In the exemplary embodiment, additionally provide a kind of non-transitory computer-readable recording medium comprising instruction, such as, comprise the memory 704 of instruction, above-mentioned instruction can perform said method by the processor 720 of device 700.Such as, described non-transitory computer-readable recording medium can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk and optical data storage devices etc.
A kind of non-transitory computer-readable recording medium, when the instruction in described storage medium is performed by the processor of mobile terminal, make mobile terminal can perform a kind of method of login application program, described method comprises:
When receiving User Identity and the password of user's input, send the check request to described User Identity and password to server;
When receiving verification from described server by result, password request data are sent to Intelligent worn device, described Intelligent worn device is used for carrying out authentication according to described password request data to described terminal equipment, when being verified, generates entry password data;
Receive the entry password data that described Intelligent worn device sends, described entry password data comprise the identification data of password, described User Identity and described Intelligent worn device;
When receiving the password of user's input, judge that whether the password that described user inputs is consistent with the password in described entry password data;
When the password that described user inputs is consistent with the password in described entry password data, log in described application program.
Described password request data comprise the identification data of the time sending described password request data, described User Identity and described terminal equipment.
Described when receiving User Identity and the password of user's input, before sending the check request to described User Identity and password to server, described method also comprises:
Wireless connections are set up with Intelligent worn device.
A kind of non-transitory computer-readable recording medium, when the instruction in described storage medium is performed by the processor of Intelligent worn device, make Intelligent worn device can perform a kind of method of login application program, described method comprises:
Wireless connections are set up with terminal equipment;
Receive the password request data that described terminal equipment sends;
According to described password request data, authentication is carried out to described terminal equipment;
When being verified, generate entry password data, described entry password data comprise the identification data of password, described User Identity and described Intelligent worn device;
Described password request data are sent to described terminal equipment.
Those skilled in the art, at consideration specification and after putting into practice disclosure herein, will easily expect other embodiment of the present disclosure.The application is intended to contain any modification of the present disclosure, purposes or adaptations, and these modification, purposes or adaptations are followed general principle of the present disclosure and comprised the undocumented common practise in the art of the disclosure or conventional techniques means.Specification and embodiment are only regarded as exemplary, and true scope of the present disclosure and spirit are pointed out by claim below.
Should be understood that, the disclosure is not limited to precision architecture described above and illustrated in the accompanying drawings, and can carry out various amendment and change not departing from its scope.The scope of the present disclosure is only limited by appended claim.

Claims (9)

1. a method for login application program, is characterized in that, is applied to terminal equipment, comprising:
When receiving User Identity and the password of user's input, send the check request to described User Identity and password to server;
When receiving verification from described server by result, password request data are sent to Intelligent worn device, described Intelligent worn device is used for carrying out authentication according to described password request data to described terminal equipment, when being verified, generates entry password data;
Receive the entry password data that described Intelligent worn device sends, described entry password data comprise the identification data of password, described User Identity and described Intelligent worn device;
When receiving the password of user's input, judge that whether the password that described user inputs is consistent with the password in described entry password data;
When the password that described user inputs is consistent with the password in described entry password data, log in described application program.
2. method according to claim 1, is characterized in that, described password request data comprise the identification data of the time sending described password request data, described User Identity and described terminal equipment.
3. method according to claim 1, is characterized in that, described when receiving User Identity and the password of user's input, before sending the check request to described User Identity and password to server, described method also comprises:
Wireless connections are set up with Intelligent worn device.
4. a method for login application program, is characterized in that, is applied to Intelligent worn device, comprising:
Wireless connections are set up with terminal equipment;
Receive the password request data that described terminal equipment sends;
According to described password request data, authentication is carried out to described terminal equipment;
When being verified, generate entry password data, described entry password data comprise the identification data of password, described User Identity and described Intelligent worn device;
Described password request data are sent to described terminal equipment.
5. a device for login application program, is characterized in that, comprising:
First sending module, for when receiving User Identity and the password of user's input, sends the check request to described User Identity and password to server;
Second sending module, for when receiving verification from described server by result, password request data are sent to Intelligent worn device, described Intelligent worn device is used for carrying out authentication according to described password request data to described terminal equipment, when being verified, generate entry password data;
First receiver module, for receiving the entry password data that described Intelligent worn device sends, described entry password data comprise the identification data of password, described User Identity and described Intelligent worn device;
Judge module, for when receiving the password of user's input, judges that whether the password that described user inputs is consistent with the password in described entry password data;
Login module, for when the password of described user's input is consistent with the password in described entry password data, logs in described application program.
6. device according to claim 5, is characterized in that, described device also comprises:
First connects module, for send the check request to described User Identity and password to server before, sets up wireless connections with Intelligent worn device.
7. a device for login application program, is characterized in that, comprising:
Second connects module, for setting up wireless connections with terminal equipment;
Second receiver module, for receiving the password request data that described terminal equipment sends;
Authentication module, for carrying out authentication according to described password request data to described terminal equipment;
Generation module, for when being verified, generate entry password data, described entry password data comprise the identification data of password, described User Identity and described Intelligent worn device;
3rd sending module, for sending described password request data to described terminal equipment.
8. a device for login application program, is characterized in that, comprising:
Processor;
For the memory of storage of processor executable instruction;
Wherein, described processor is configured to:
When receiving User Identity and the password of user's input, send the check request to described User Identity and password to server;
When receiving verification from described server by result, password request data are sent to Intelligent worn device, described Intelligent worn device is used for carrying out authentication according to described password request data to described terminal equipment, when being verified, generates entry password data;
Receive the entry password data that described Intelligent worn device sends, described entry password data comprise the identification data of password, described User Identity and described Intelligent worn device;
When receiving the password of user's input, judge that whether the password that described user inputs is consistent with the password in described entry password data;
When the password that described user inputs is consistent with the password in described entry password data, log in described application program.
9. a device for login application program, is characterized in that, comprising:
Processor;
For the memory of storage of processor executable instruction;
Wherein, described processor is configured to:
Wireless connections are set up with terminal equipment;
Receive the password request data that described terminal equipment sends;
According to described password request data, authentication is carried out to described terminal equipment;
When being verified, generate entry password data, described entry password data comprise the identification data of password, described User Identity and described Intelligent worn device;
Described password request data are sent to described terminal equipment.
CN201410757919.5A 2014-12-10 2014-12-10 The method and device of login application program Active CN104468581B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410757919.5A CN104468581B (en) 2014-12-10 2014-12-10 The method and device of login application program

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410757919.5A CN104468581B (en) 2014-12-10 2014-12-10 The method and device of login application program

Publications (2)

Publication Number Publication Date
CN104468581A true CN104468581A (en) 2015-03-25
CN104468581B CN104468581B (en) 2018-03-02

Family

ID=52913953

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410757919.5A Active CN104468581B (en) 2014-12-10 2014-12-10 The method and device of login application program

Country Status (1)

Country Link
CN (1) CN104468581B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105072132A (en) * 2015-08-27 2015-11-18 宇龙计算机通信科技(深圳)有限公司 Validation method, validation system and communication device
CN105187382A (en) * 2015-08-05 2015-12-23 西安电子科技大学 Multi-factor identity authentication method for preventing library collision attacks
CN106341379A (en) * 2015-07-17 2017-01-18 中兴通讯股份有限公司 Information processing method, device and system
CN106911666A (en) * 2017-01-04 2017-06-30 青岛海信移动通信技术股份有限公司 A kind of wearable smart machine and its message treatment method, system
CN107026736A (en) * 2016-01-29 2017-08-08 李明 A kind of wearable device and the method that Password Input number of times is reduced by it
CN108377563A (en) * 2016-11-08 2018-08-07 北京京东尚科信息技术有限公司 Manage method, server-side and the client of wearable device

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1427609A (en) * 2001-12-20 2003-07-02 西北工业大学 Nonrecurring countersign and business confirmation method
CN102123033A (en) * 2011-03-23 2011-07-13 北京恒光数码科技有限公司 Identity authentication method and system of dynamic password token as well as mobile terminal of dynamic password token
CN102164141A (en) * 2011-04-24 2011-08-24 陈珂 Method for protecting security of account
WO2014083335A2 (en) * 2012-11-28 2014-06-05 Hoverkey Ltd A method and system of providing authentication of user access to a computer resource via a mobile device using multiple separate security factors
CN103905191A (en) * 2012-12-26 2014-07-02 阿里巴巴集团控股有限公司 Verification method applied to mobile terminal, mobile terminal and system
CN104168329A (en) * 2014-08-28 2014-11-26 尚春明 User secondary authentication method, device and system in cloud computing and Internet

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1427609A (en) * 2001-12-20 2003-07-02 西北工业大学 Nonrecurring countersign and business confirmation method
CN102123033A (en) * 2011-03-23 2011-07-13 北京恒光数码科技有限公司 Identity authentication method and system of dynamic password token as well as mobile terminal of dynamic password token
CN102164141A (en) * 2011-04-24 2011-08-24 陈珂 Method for protecting security of account
WO2014083335A2 (en) * 2012-11-28 2014-06-05 Hoverkey Ltd A method and system of providing authentication of user access to a computer resource via a mobile device using multiple separate security factors
CN103905191A (en) * 2012-12-26 2014-07-02 阿里巴巴集团控股有限公司 Verification method applied to mobile terminal, mobile terminal and system
CN104168329A (en) * 2014-08-28 2014-11-26 尚春明 User secondary authentication method, device and system in cloud computing and Internet

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106341379A (en) * 2015-07-17 2017-01-18 中兴通讯股份有限公司 Information processing method, device and system
WO2017012212A1 (en) * 2015-07-17 2017-01-26 中兴通讯股份有限公司 Information processing method, device, system and computer storage medium
CN106341379B (en) * 2015-07-17 2020-01-24 中兴通讯股份有限公司 Information processing method, device and system
CN105187382A (en) * 2015-08-05 2015-12-23 西安电子科技大学 Multi-factor identity authentication method for preventing library collision attacks
CN105187382B (en) * 2015-08-05 2018-03-06 西安电子科技大学 Prevent from hitting the multiple-factor identity identifying method of storehouse attack
CN105072132A (en) * 2015-08-27 2015-11-18 宇龙计算机通信科技(深圳)有限公司 Validation method, validation system and communication device
CN105072132B (en) * 2015-08-27 2019-05-14 宇龙计算机通信科技(深圳)有限公司 Verification method, verifying system and communication equipment
CN107026736A (en) * 2016-01-29 2017-08-08 李明 A kind of wearable device and the method that Password Input number of times is reduced by it
CN108377563A (en) * 2016-11-08 2018-08-07 北京京东尚科信息技术有限公司 Manage method, server-side and the client of wearable device
CN108377563B (en) * 2016-11-08 2021-08-20 北京京东尚科信息技术有限公司 Method for managing wearable equipment, server and client
CN106911666A (en) * 2017-01-04 2017-06-30 青岛海信移动通信技术股份有限公司 A kind of wearable smart machine and its message treatment method, system

Also Published As

Publication number Publication date
CN104468581B (en) 2018-03-02

Similar Documents

Publication Publication Date Title
CN104159218B (en) Internetwork connection establishing method and device
CN104125067B (en) Account and token secret key binding method and device
CN104283876A (en) Operation authorization method and device
CN104703295A (en) Network access method and network access device
CN104219058A (en) Identity authentication and authorization method and device
CN105652672A (en) Method and apparatus for controlling intelligent device
CN104318741A (en) Bluetooth device control method and device
CN103957103A (en) Safety authentication method and device and mobile terminal
CN104468581A (en) Method and device for logging into application program
CN104468329A (en) Member adding method and device based on instant messaging
CN105407070A (en) Logging-in authorization method and device
CN105472771A (en) Wireless connection method and device
CN105468767A (en) Method and device for acquiring calling card information
CN104735670A (en) Network access method and device
CN104950838A (en) Network account binding method and device
CN104391712A (en) Shutdown method and device
CN105471890A (en) Unlocking method based on wearable device, apparatus and system
CN104093119A (en) Unlocking method and device
CN104484593A (en) Terminal verification method and terminal verification device
CN104158665A (en) Method and device of verification
CN105450662A (en) Encryption method and device
CN104217328A (en) Multi-verification payment method and multi-verification payment device
CN104125267A (en) Account protection method, device and terminal equipment
CN104640062A (en) Method and device for transmitting information
CN105681261A (en) Security authentication method and apparatus

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant