CN106790269B - Recovery method and device for overtime login of application program - Google Patents

Recovery method and device for overtime login of application program Download PDF

Info

Publication number
CN106790269B
CN106790269B CN201710081923.8A CN201710081923A CN106790269B CN 106790269 B CN106790269 B CN 106790269B CN 201710081923 A CN201710081923 A CN 201710081923A CN 106790269 B CN106790269 B CN 106790269B
Authority
CN
China
Prior art keywords
login
application program
personal information
server
login account
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710081923.8A
Other languages
Chinese (zh)
Other versions
CN106790269A (en
Inventor
王立藩
乔立君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Neusoft Corp
Original Assignee
Neusoft Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Neusoft Corp filed Critical Neusoft Corp
Priority to CN201710081923.8A priority Critical patent/CN106790269B/en
Publication of CN106790269A publication Critical patent/CN106790269A/en
Application granted granted Critical
Publication of CN106790269B publication Critical patent/CN106790269B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses a method and a device for recovering overtime login of an application program, relates to the technical field of information processing, and mainly aims to solve the problems that in the prior art, in the process of recovering the login of the application program, the application program analyzes response information after obtaining the response information of a server, corresponding user information is obtained, the user information is re-analyzed, and the time for recovering the login of the application program is prolonged. The technical scheme of the invention comprises the following steps: when an overtime login request of an application program is received, judging whether personal information corresponding to a login account of the application program exists or not; if the personal information corresponding to the login account of the application program is determined to exist, a first authentication request is sent to the server; and after the server responds to the first authentication request, receiving first response information of the first authentication request returned by the server so as to realize the login of the application program.

Description

Recovery method and device for overtime login of application program
Technical Field
The present invention relates to the field of information processing technologies, and in particular, to a method and an apparatus for recovering an application from an overtime login.
Background
With the rapid development of terminals, more and more applications are being collected on terminals. In order to identify the user identity, the application program usually requires the user to register an account number and record user information under the respective account number, so that the user can use the application program when logging in.
At present, in the process of realizing application program login by a user through a terminal for the first time, the user needs a user name and a login password to realize application program login, and in the login process, an automatic login password of the application program can be set, namely, when the application program is started next time, the automatic login of the application program can be realized without inputting the login password by the user. In practical application, when a user executes automatic login of an application program once, logging out of the application program; if the time interval between the last login time and the current login time of the application program is too long, the user is required to input the login password again to ensure the account security of the user, namely, the automatic login is overtime. In the process of logging in the application program again, the application program sends a connection establishing request to the server, the server responds to the connection request, all user information of the application program is sent to the application program, the application program receives all user information returned by the server and analyzes the user information again, and the login recovery duration of the application program is prolonged.
Disclosure of Invention
In view of this, the present invention provides a method and an apparatus for recovering an application overtime login, and mainly aims to solve the problem in the prior art that in the process of recovering an application re-login, after an application obtains response information of a server, the application analyzes the response information to obtain corresponding user information, and the user information is re-analyzed, so that the time for recovering the login of the application is prolonged.
According to one aspect of the present invention, the present invention provides a method for recovering an application timeout login, including:
when an overtime login request of an application program is received, judging whether personal information corresponding to a login account of the application program exists or not;
if the personal information corresponding to the login account of the application program is determined to exist, a first authentication request is sent to the server, wherein the first authentication request comprises a set identifier used for marking the personal information corresponding to the login account which is not required to be requested;
and after the server responds to the first authentication request, receiving first response information of the first authentication request returned by the server so as to realize login of an application program.
According to another aspect of the present invention, the present invention provides a device for recovering an application timeout login, comprising:
the judging unit is used for judging whether personal information corresponding to a login account of the application program exists or not when the overtime login request of the application program exists;
the first sending unit is used for sending a first authentication request to the server when the judging unit determines that the personal information corresponding to the login account of the application program exists, wherein the first authentication request comprises a set identifier used for indicating the personal information corresponding to the login account which is not required to be requested;
and the receiving unit is used for receiving first response information to the first authentication request returned by the server after the server responds to the first authentication request so as to realize the login of the application program.
By means of the technical scheme, the recovery method and the recovery device for the overtime login of the application program provided by the invention have the advantages that when the overtime login request of the application program is received, whether personal information corresponding to the login account of the application program exists or not is judged; if the personal information corresponding to the login account of the application program is determined to exist, a first authentication request is sent to the server, wherein the first authentication request comprises a set identifier used for marking the personal information corresponding to the login account which is not required to be requested; after the server responds to the first authentication request, receiving first response information of the first authentication request returned by the server so as to realize login of an application program; compared with the prior art, when the overtime login of the application program is recovered, the connection request sent to the server contains the setting identification for marking the personal information corresponding to the account which does not need to be requested to be logged in, so that the network transmission time and the time for the local data analysis of the application program are reduced, the login speed is improved, and the login time of the application program is saved.
The foregoing description is only an overview of the technical solutions of the present invention, and the embodiments of the present invention are described below in order to make the technical means of the present invention more clearly understood and to make the above and other objects, features, and advantages of the present invention more clearly understandable.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the invention. Also, like reference numerals are used to refer to like parts throughout the drawings. In the drawings:
fig. 1 is a flowchart illustrating a recovery method for timeout login of an application according to an embodiment of the present invention;
FIG. 2 is a schematic diagram illustrating an interface for logging in an application according to an embodiment of the present invention;
FIG. 3 is a block diagram illustrating an apparatus for recovering an application timeout login according to an embodiment of the present invention;
fig. 4 is a block diagram illustrating another recovery apparatus for logging in an application program overtime according to an embodiment of the present invention.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
The embodiment of the invention provides a method for recovering overtime login of an application program, which is applied to the application program and comprises the following steps:
101. and when receiving a timeout login request of the application program, judging whether personal information corresponding to a login account of the application program exists or not.
It should be noted that the application timeout login according to the embodiment of the present invention is: in the login process of the application program, an automatic login password of the application program can be set, namely, when the application program is started next time, the automatic login of the application program can be realized without inputting the login password by a user, when the login time interval is longer than the last automatic login time interval, in order to ensure the data security of the user, the user needs to manually input the login password to realize the login of the application program, and the process is the overtime login of the application program. Rather than logging on for application timeout due to network failure, etc.
For ease of understanding, the application timeout entry is described below in the form of an example. Exemplarily, as shown in fig. 2, fig. 2 shows an interface schematic diagram of application login provided by an embodiment of the present invention, and assuming that an XX application is installed in a terminal of an android system, a user performs the first login of the XX application in 2016, 10, and 10 months, and selects an automatic login function as shown in fig. 2, and after the user successfully logs in based on a login account of the XX application, the user can send a data request to a server according to actual needs of the user. Assuming that the validity period of the automatic login of the XX application is 5 days, after the successful login, the XX application is closed by the user, and the XX application is logged in for the second time in 2016, 10, and 17 days, the login interface shown in fig. 2 still appears during the login for the second time, instead of automatically executing the user login after the XX application is started, that is, the XX application login is overtime. Fig. 2 is an exemplary illustration only, and the specific type of XX application and the effective duration of automatic login are not limited in the embodiment of the present invention.
As shown in fig. 2, after the login of the application user is overtime in the prior art, the user needs to input a password again, so that the server performs authentication according to the input password, and when the server responds to the login request, all user information corresponding to the login account needs to be returned to the application, so that the application logs in according to the response information returned by the server, and analyzes and displays the user information returned by the server, thereby completing the login process, i.e., whether the application logs in for the first time or the application logs in for the non-first time, the login time is the same (in this case, it is assumed that the network conditions are completely the same).
In the invention, when an application program receives a login operation instruction, whether personal information corresponding to a login account of the application program exists is judged, and the purpose is that if the fact that the personal information corresponding to the login account of the application program does not exist in a terminal for installing the application program is determined, the personal information of a user needs to be acquired from a server so as to be convenient for the user to check; if the fact that the personal information corresponding to the login account of the application does not exist in the terminal for installing the application is determined, the user personal information does not need to be requested from the server, and the transmission time of network data and the analysis time consumption of the application on the personal information are reduced.
In the actual application process, personal information corresponding to an application program login account is not stored in a terminal for installing the application program, and the first condition is that the login account of the application program is firstly logged in the terminal, so the personal information corresponding to the login account is not stored in the terminal; secondly, although the login account of the application program is not the first login in the terminal, the personal information corresponding to the login account which is cached previously is manually deleted by the user, so that the personal information corresponding to the login account is not stored in the terminal.
102. If the personal information corresponding to the login account of the application program is determined to exist, the application program sends a first authentication request to the server, wherein the first authentication request comprises a set identifier used for indicating the personal information corresponding to the login account which is not required to be requested.
After the personal information corresponding to the login account of the application program is determined to exist, the personal information corresponding to the login account of the application program is cached in the local application program, so that the personal information corresponding to the login account does not need to be requested when the connection is established with the server, and the transmission time of network data and the time for the local application program to analyze the personal information are reduced. The method specifically comprises the following steps: if it is determined that the personal information corresponding to the login account of the application program exists, the application program sends a first authentication request to the server, where the first authentication request includes a setting identifier for indicating the personal information corresponding to the login-unnecessary account, and the setting identifier may be used only for explaining the personal information corresponding to the login-unnecessary account, and theoretically, the setting identifier may be set arbitrarily, as long as the agreement between the application program and the server is good, and specifically, the setting identifier is not limited in the embodiment of the present invention.
103. After the server responds to the first authentication request, the application program receives first response information of the first authentication request returned by the server so as to realize login of the application program.
After receiving a first authentication request sent by an application program, a server responds to the first authentication request and returns first response information of the first authentication request to the application program, wherein the first response information carries an authentication return value, and the application program performs user login according to the authentication return value. In practical application, the authentication return value may be 1 when the connection relationship between the server and the application program is successfully established, and the authentication return value may be 0 when the connection relationship between the server and the application program is failed.
According to the recovery method for the overtime login of the application program, when an overtime login request of the application program is received, whether personal information corresponding to a login account of the application program exists is judged; if the personal information corresponding to the login account of the application program is determined to exist, a first authentication request is sent to the server, wherein the first authentication request comprises a set identifier used for marking the personal information corresponding to the login account which is not required to be requested; after the server responds to the first authentication request, receiving first response information of the first authentication request returned by the server so as to realize login of an application program; compared with the prior art, when the overtime login of the application program is recovered, the connection request sent to the server contains the setting identification for marking the personal information corresponding to the account which does not need to be requested to be logged in, so that the network transmission time and the time for the local data analysis of the application program are reduced, the login speed is improved, and the login time of the application program is saved.
As a refinement to the above embodiment, when determining whether there is personal information corresponding to the login account of the application program in step 101, the following ways may be included, but not limited to: acquiring a login account of the application program, and determining whether the login account of the application program is stored in a preset directory file; if the login account of the application program is determined to be stored in a preset directory file, determining that personal information corresponding to the login account exists; and if the login account of the application program is determined not to be stored in a preset directory file, determining that the personal information corresponding to the login account does not exist. In practical applications, the application login account may include, but is not limited to, the following, for example: the embodiment of the present invention provides a method for managing a login account of an application, including, but not limited to, a mailbox address, a mobile phone number, an application name, an application ID, and the like.
In the embodiment of the present invention, an application program can be executed only when it is installed in a terminal, and when the application program is installed in the terminal, a memory space in the terminal needs to be occupied, and the preset directory file storage described in the embodiment of the present invention is stored in the memory space, as shown in table 1, table 1 shows the preset directory file provided in the embodiment of the present invention, it should be noted that table 1 is only an exemplary example, and the embodiment of the present invention does not limit the manner in which the login account number of the application program and the corresponding personal information are stored in the application program.
TABLE 1
Login account Personal information
Login Account number 1 Personal information 1
Login Account 2 Personal information 2
…… ……
When judging whether the personal information corresponding to the login account of the application program exists, traversing the login account list in the table 1, matching the login account of the application program with all the login accounts recorded in the table 1, and successfully matching the login account of the application program with the personal information corresponding to the login account of the application program.
As an extension of the above embodiment, in the process of performing determination by the application program based on table 1, a case that the application program login account cannot be matched in table 1 may also be stored, that is, there is no personal information corresponding to the application program login account, so that when the application program sends a second authentication request to the server, a request identifier for identifying the personal information corresponding to the login account is required to be added to the second authentication request, so that when the server responds to the second authentication request, the personal information corresponding to the login account is returned to the application program, so that the application program displays the personal information; after response information of the server to the second authentication request is received, the personal information corresponding to the login account is stored, so that when the application program executes login for the second time and the third time, the personal information does not need to be acquired from the server, and login time is saved.
It should be noted that, in the first authentication request and the second authentication request according to the embodiment of the present invention, there is no login priority between the two requests, and the naming is performed for the convenience of distinguishing the two types of authentication requests, and does not represent the number or priority of the authentication requests or response messages.
The above embodiment is described by taking an application as an example, when the application is different, the corresponding login manner or the personal information may be different, for example, when the application is a reader, the personal information corresponding to the login account may include, but is not limited to, the following, for example: the information processing method includes the steps of obtaining user identity information, user head portraits, user subscription information, user payment information and the like, and specifically, the embodiment of the invention does not limit the specific types and personal information of application programs.
In the actual application process, after the application program successfully logs in, the corresponding personal information is directly cached, and when the application program logs in again, the personal information does not need to be acquired from the server again, so that the login speed is improved; however, when the user changes part of the personal information (for example, modifies the user's avatar) during the application program usage, if the terminal stores the previous personal information, the personal information displayed by the application program is the personal information that is not updated. In order to solve the problems, after the application program is successfully logged in, the personal information is sent to the server, after the server receives the personal information sent by the application program, the personal information sent by the application program is compared with the personal information stored by the server, whether the personal information corresponding to the application program is the latest personal information is confirmed, if the personal information corresponding to the application program is confirmed by the server to be the latest personal information, the personal information corresponding to the application program does not need to be updated, prompt information which does not need to be updated is sent to the application program, and if the personal information corresponding to the application program is confirmed by the server to be not the latest personal information, the personal information corresponding to the application program needs to be updated, the latest personal information is sent to the application program; and the application program receives the latest personal information returned by the server and updates the personal information by using the latest personal information so as to ensure the consistency of the personal information of the application program segment and the personal information of the server side.
As an optional mode of the embodiment of the present invention, after the application program receives first response information to the first authentication request returned by the server, other application programs having an association relationship with the login account are acquired; and if the other application programs which have the association relation with the login account are in the current running state, executing synchronous automatic login on the other application programs. After the login account of the application program is logged in overtime, other application programs related to the application program are also in an offline state, that is, in the embodiment of the present invention, the login states of the application program and the other application programs are in a synchronous state, where the synchronous state is a synchronous state when the application program and the other application programs run simultaneously, and if the application program is currently in the login state and the other application programs are in an inactivated state, the other application programs are also currently in the offline state. The other application programs are different from the application program described in the embodiment of the present invention, and the embodiment of the present invention is not limited specifically to the number of the other application programs.
For example, it is assumed that the application described in the embodiment of the present invention is a reader, 2 applications associated with the reader are provided, one is a game application and the other is a social application, and the reader is currently in a failure state of account login, the reader and the social application operate simultaneously, when the reader logs in successfully, the associated social application also logs in automatically, and the user does not need to input an account and a password to log in, because the game application is currently in a non-operating state, the game application does not log in automatically after the reader logs in successfully; however, when the reader is still in the login state and the game application is started, the automatic login of the game application is performed, and the association relationship between the application and other applications described above in the embodiment of the present invention is not intended to limit the number of associations associated with the application and the specific type of the application.
As an implementation of the method shown in fig. 1, another embodiment of the present invention further provides a device for recovering an application timeout login. The embodiment of the apparatus corresponds to the embodiment of the method, and for convenience of reading, details in the embodiment of the apparatus are not repeated one by one, but it should be clear that the apparatus in the embodiment can correspondingly implement all the contents in the embodiment of the method.
An embodiment of the present invention provides a device for recovering an application overtime login, and as shown in fig. 3, the device includes:
the judging unit 21 is configured to, when an overtime login request of an application is received, judge whether personal information corresponding to a login account of the application exists;
a first sending unit 22, configured to send, when the determining unit 21 determines that there is personal information corresponding to an application login account, a first authentication request to the server, where the first authentication request includes a setting identifier for indicating that there is no need to request the personal information corresponding to the login account;
the receiving unit 23 is configured to receive, after the server responds to the first authentication request, first response information to the first authentication request, where the first response information is returned by the server, so as to implement login of an application program.
Further, as shown in fig. 4, the judging unit 21 includes:
an obtaining module 211, configured to obtain a login account of the application;
a first determining module 212, configured to determine whether the login account of the application acquired by the acquiring module 211 is stored in a preset directory file;
a second determining module 213, configured to determine that there is personal information corresponding to the login account when the first determining module 212 determines that the login account of the application is stored in a preset directory file;
a third determining module 214, configured to determine that there is no personal information corresponding to the login account when the first determining module 212 determines that the login account of the application is not stored in a preset directory file.
Further, as shown in fig. 4, the apparatus further includes:
a second sending unit 24, configured to send a second authentication request to the server when the determining unit 21 determines that there is no personal information corresponding to the login account, where the second authentication request includes a request identifier for indicating that the personal information corresponding to the login account is requested;
and the storage unit 25 is configured to store the personal information corresponding to the login account after receiving second response information of the server to the second authentication request.
Further, to ensure consistency between the personal information of the application program side and the personal information of the server side, as shown in fig. 4, the apparatus further includes:
a third sending unit 26, configured to send the personal information to the server after the application program is successfully logged in, so that the server determines whether the personal information is the latest personal information;
an updating unit 27, configured to update the personal information with the latest personal information when receiving the latest personal information returned by the server.
Further, as shown in fig. 4, the apparatus further includes:
an obtaining unit 28, configured to obtain, after the receiving unit 23 receives first response information, which is returned by the server, to the first authentication request, other application programs that have an association relationship with the login account;
and the synchronizing unit 29 is configured to, when other application programs that have an association relationship with the login account are in a current running state, perform synchronous automatic login on the other application programs acquired by the acquiring unit.
Further, if the application program is a reader, the personal information corresponding to the login account includes: user identity information, user head portrait, user subscription information and user payment information.
According to the recovery device for the overtime login of the application program, when an overtime login request of the application program is received, whether personal information corresponding to a login account of the application program exists is judged; if the personal information corresponding to the login account of the application program is determined to exist, a first authentication request is sent to the server, wherein the first authentication request comprises a set identifier used for marking the personal information corresponding to the login account which is not required to be requested; after the server responds to the first authentication request, receiving first response information of the first authentication request returned by the server so as to realize login of an application program; compared with the prior art, when the overtime login of the application program is recovered, the connection request sent to the server contains the setting identification for marking the personal information corresponding to the account which does not need to be requested to be logged in, so that the network transmission time and the time for the local data analysis of the application program are reduced, the login speed is improved, and the login time of the application program is saved.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
It will be appreciated that the relevant features of the method and apparatus described above are referred to one another. In addition, "first", "second", and the like in the above embodiments are for distinguishing the embodiments, and do not represent merits of the embodiments.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
The algorithms and displays presented herein are not inherently related to any particular computer, virtual machine, or other apparatus. Various general purpose systems may also be used with the teachings herein. The required structure for constructing such a system will be apparent from the description above. Moreover, the present invention is not directed to any particular programming language. It is appreciated that a variety of programming languages may be used to implement the teachings of the present invention as described herein, and any descriptions of specific languages are provided above to disclose the best mode of the invention.
In the description provided herein, numerous specific details are set forth. It is understood, however, that embodiments of the invention may be practiced without these specific details. In some instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure an understanding of this description.
Similarly, it should be appreciated that in the foregoing description of exemplary embodiments of the invention, various features of the invention are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure and aiding in the understanding of one or more of the various inventive aspects. However, the disclosed method should not be interpreted as reflecting an intention that: that the invention as claimed requires more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed embodiment. Thus, the claims following the detailed description are hereby expressly incorporated into this detailed description, with each claim standing on its own as a separate embodiment of this invention.
Those skilled in the art will appreciate that the modules in the device in an embodiment may be adaptively changed and disposed in one or more devices different from the embodiment. The modules or units or components of the embodiments may be combined into one module or unit or component, and furthermore they may be divided into a plurality of sub-modules or sub-units or sub-components. All of the features disclosed in this specification (including any accompanying claims, abstract and drawings), and all of the processes or elements of any method or apparatus so disclosed, may be combined in any combination, except combinations where at least some of such features and/or processes or elements are mutually exclusive. Each feature disclosed in this specification (including any accompanying claims, abstract and drawings) may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise.
Furthermore, those skilled in the art will appreciate that while some embodiments described herein include some features included in other embodiments, rather than other features, combinations of features of different embodiments are meant to be within the scope of the invention and form different embodiments. For example, in the following claims, any of the claimed embodiments may be used in any combination.
The various component embodiments of the invention may be implemented in hardware, or in software modules running on one or more processors, or in a combination thereof. Those skilled in the art will appreciate that a microprocessor or Digital Signal Processor (DSP) may be used in practice to implement some or all of the functionality of some or all of the components in the title of the invention (e.g., means for determining the level of links within a web site) in accordance with embodiments of the invention. The present invention may also be embodied as apparatus or device programs (e.g., computer programs and computer program products) for performing a portion or all of the methods described herein. Such programs implementing the present invention may be stored on computer-readable media or may be in the form of one or more signals. Such a signal may be downloaded from an internet website or provided on a carrier signal or in any other form.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and that those skilled in the art will be able to design alternative embodiments without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The invention may be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In the unit claims enumerating several means, several of these means may be embodied by one and the same item of hardware. The usage of the words first, second and third, etcetera do not indicate any ordering. These words may be interpreted as names.

Claims (10)

1. A method for recovering an application timeout login, comprising:
when receiving a timeout login request of an application program, judging whether personal information corresponding to a login account of the application program exists, wherein the timeout login request of the application program refers to: the time interval between the current login and the last automatic login is longer than the threshold duration, and the user needs to manually input a login password to realize the login process of the application program;
if the personal information corresponding to the login account of the application program is determined to exist, a first authentication request is sent to the server, wherein the first authentication request comprises a set identifier used for marking the personal information corresponding to the login account which is not required to be requested;
and after the server responds to the first authentication request, receiving first response information of the first authentication request returned by the server so as to realize login of an application program.
2. The method of claim 1, wherein determining whether the personal information corresponding to the login account of the application program exists comprises:
acquiring a login account of the application program, and determining whether the login account of the application program is stored in a preset directory file;
if the login account of the application program is determined to be stored in a preset directory file, determining that personal information corresponding to the login account exists;
and if the login account of the application program is determined not to be stored in a preset directory file, determining that the personal information corresponding to the login account does not exist.
3. The method of claim 2, further comprising:
if the personal information corresponding to the login account does not exist, sending a second authentication request to the server, wherein the second authentication request comprises a request identifier for marking the personal information corresponding to the login account;
and after receiving second response information of the server to the second authentication request, storing the personal information corresponding to the login account.
4. The method according to any one of claims 1-3, further comprising:
after the application program is successfully logged in, sending the personal information to the server so that the server can confirm whether the personal information is the latest personal information;
and if the latest personal information returned by the server is received, updating the personal information by using the latest personal information.
5. The method according to claim 4, wherein after receiving the first response information returned by the server to the first authentication request, the method further comprises:
acquiring other application programs which have an association relation with the login account;
and if the other application programs which have the association relation with the login account are in the current running state, executing synchronous automatic login on the other application programs.
6. An apparatus for recovering an application timeout log-in, comprising:
a determining unit, configured to determine whether there is personal information corresponding to a login account of an application program when a timeout login request of the application program is received, where the timeout login request of the application program is: the time interval between the current login and the last automatic login is longer than the threshold duration, and the user needs to manually input a login password to realize the login process of the application program;
the first sending unit is used for sending a first authentication request to the server when the judging unit determines that the personal information corresponding to the login account of the application program exists, wherein the first authentication request comprises a set identifier used for indicating the personal information corresponding to the login account which is not required to be requested;
and the receiving unit is used for receiving first response information to the first authentication request returned by the server after the server responds to the first authentication request so as to realize the login of the application program.
7. The apparatus according to claim 6, wherein the judging unit includes:
the acquisition module is used for acquiring a login account of the application program;
the first determining module is used for determining whether the login account of the application program acquired by the acquiring module is stored in a preset directory file;
the second determining module is used for determining that personal information corresponding to the login account exists when the first determining module determines that the login account of the application program is stored in a preset directory file;
and the third determining module is used for determining that the personal information corresponding to the login account does not exist when the first determining module determines that the login account of the application program is not stored in a preset directory file.
8. The apparatus of claim 7, further comprising:
a second sending unit, configured to send a second authentication request to the server when the determining unit determines that the personal information corresponding to the login account does not exist, where the second authentication request includes a request identifier for indicating the personal information corresponding to the login account;
and the storage unit is used for storing the personal information corresponding to the login account after receiving second response information of the server to the second authentication request.
9. The apparatus according to any one of claims 6-8, further comprising:
a third sending unit, configured to send the personal information to the server after the application program is successfully logged in, so that the server determines whether the personal information is the latest personal information;
and the updating unit is used for updating the personal information by using the latest individual when receiving the latest personal information returned by the server.
10. The apparatus of claim 9, further comprising:
an obtaining unit, configured to obtain, after the receiving unit receives first response information to the first authentication request returned by the server, another application program having an association relationship with the login account;
and the synchronization unit is used for executing synchronous automatic login on the other application programs acquired by the acquisition unit when the other application programs which have the association relation with the login account are in the current running state.
CN201710081923.8A 2017-02-15 2017-02-15 Recovery method and device for overtime login of application program Active CN106790269B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710081923.8A CN106790269B (en) 2017-02-15 2017-02-15 Recovery method and device for overtime login of application program

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710081923.8A CN106790269B (en) 2017-02-15 2017-02-15 Recovery method and device for overtime login of application program

Publications (2)

Publication Number Publication Date
CN106790269A CN106790269A (en) 2017-05-31
CN106790269B true CN106790269B (en) 2020-09-29

Family

ID=58957389

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710081923.8A Active CN106790269B (en) 2017-02-15 2017-02-15 Recovery method and device for overtime login of application program

Country Status (1)

Country Link
CN (1) CN106790269B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110855658B (en) * 2019-11-07 2020-12-01 苏州亿歌网络科技有限公司 Service login method, device, equipment and storage medium
CN111935710B (en) * 2020-09-24 2021-02-05 广州市玄武无线科技股份有限公司 Application program login method and device of mobile terminal and electronic equipment

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW567427B (en) * 2002-06-28 2003-12-21 Via Tech Inc System and method for managing the sign-in data of web site
CN100586112C (en) * 2006-05-31 2010-01-27 阿里巴巴集团控股有限公司 Method for establishing contact list and managing contact information in instant communication
CN101087262A (en) * 2006-06-07 2007-12-12 阿里巴巴公司 An instant communication processing method and system
CN102833253B (en) * 2012-08-29 2015-09-16 五八同城信息技术有限公司 Set up method and server that client is connected with server security
CN104580406B (en) * 2014-12-23 2019-11-26 北京百度网讯科技有限公司 A kind of method and apparatus of synchronous logging state
CN105827658A (en) * 2016-05-30 2016-08-03 无锡天脉聚源传媒科技有限公司 Method and device for multi-application synchronization login

Also Published As

Publication number Publication date
CN106790269A (en) 2017-05-31

Similar Documents

Publication Publication Date Title
CN108234505B (en) Account login method and system
CN108494799B (en) Data sharing method and system
CN109361525B (en) Method, device, control terminal and medium for restarting distributed deployment of multiple services
CN108418787B (en) Method for acquiring enterprise resource planning data, terminal device and medium
CN108023881B (en) Application login method, device, medium and electronic equipment
CN106790269B (en) Recovery method and device for overtime login of application program
CN104125303A (en) Data read-and-write requesting method, client end and data read-and-write requesting system
CN104424352A (en) System and method for providing agent service to user terminal
CN106934272B (en) Application information verification method and device
JP7008636B2 (en) How to check for phone number changes, devices, and systems
CN107220818B (en) Online payment method and device
CN115065510B (en) Login method, device, system, electronic equipment and readable storage medium
CN108647139B (en) System test method, device, storage medium and electronic device
CN111767481A (en) Access processing method, device, equipment and storage medium
CN107203915B (en) Data storage method and device
CN107548088B (en) Mobile equipment identity identification method and service server
EP2981148A1 (en) Device management method, apparatus and system
CN112764818B (en) Device management method, device, electronic device and readable storage medium
CN110533432B (en) Service processing method, device, server and client
CN110321251B (en) Data backup method, device, equipment and storage medium based on network block equipment
CN113852610A (en) Message processing method and device, computer equipment and storage medium
CN111200579B (en) User login method, client and system
CN110858201B (en) Data processing method and system, processor and storage medium
CN102307349A (en) Access method of wireless network, terminal and server
CN110837454A (en) Interface monitoring processing method and server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant