CN115373515A - Login method and device of head-mounted device, electronic device and medium - Google Patents

Login method and device of head-mounted device, electronic device and medium Download PDF

Info

Publication number
CN115373515A
CN115373515A CN202211003545.9A CN202211003545A CN115373515A CN 115373515 A CN115373515 A CN 115373515A CN 202211003545 A CN202211003545 A CN 202211003545A CN 115373515 A CN115373515 A CN 115373515A
Authority
CN
China
Prior art keywords
character string
login
random number
verification result
head
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211003545.9A
Other languages
Chinese (zh)
Inventor
李峰
罗涛
尹勇
王宏杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202211003545.9A priority Critical patent/CN115373515A/en
Publication of CN115373515A publication Critical patent/CN115373515A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/011Arrangements for interaction with the human body, e.g. for user immersion in virtual reality
    • G06F3/012Head tracking input arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/02Banking, e.g. interest calculation or account maintenance
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Computer Hardware Design (AREA)
  • General Business, Economics & Management (AREA)
  • Technology Law (AREA)
  • Strategic Management (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Software Systems (AREA)
  • Development Economics (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Human Computer Interaction (AREA)
  • Document Processing Apparatus (AREA)

Abstract

The disclosure provides a login method of a head-mounted device, which can be used in the financial field or other fields. The method is applied to a head-mounted device and comprises the following steps: scanning a login two-dimensional code by using a transparent transmission mode, wherein the login two-dimensional code is generated by a mobile terminal; analyzing the login two-dimensional code to obtain an encrypted character string; sending the encrypted character string to a server; obtaining a verification result of the encrypted character string, wherein the verification result is obtained by the server through verifying the encrypted character string by using a database; and when the verification result is passed, executing login operation. The present disclosure also provides a login method of a head mounted device applied to a server, a login apparatus of a head mounted device, a storage medium, and a program product.

Description

Login method and device of head-mounted device, electronic device and medium
Technical Field
The present disclosure relates to the field of smart device technology, and may also be used in the financial field or other fields, and more particularly, to a login method, apparatus, device, medium, and program product for a head-mounted device.
Background
In the financial field, it is increasingly common to use a head-mounted device as an interactive tool to assist a user in using financial services, and the user wears the head-mounted device to browse and access a virtual business hall provided by a bank, converse with a virtual digital person, and consult and transact financial services.
In the process of implementing the disclosed concept, the inventor finds that the current head-mounted device needs to use a virtual keyboard to perform login operation, which not only takes a long time, but also is easy to input errors, so that the login operation is very inconvenient to perform.
Disclosure of Invention
In view of the above, the present disclosure provides a login method, apparatus, device, medium, and program product for a head mounted device.
According to a first aspect of the present disclosure, there is provided a login method for a head-mounted device, which is applied to the head-mounted device, the method including: scanning a login two-dimensional code by using a transparent transmission mode, wherein the login two-dimensional code is generated by a mobile terminal; analyzing the login two-dimensional code to obtain an encrypted character string; sending the encrypted character string to a server; obtaining a verification result of the encrypted character string, wherein the verification result is obtained by the server through verifying the encrypted character string by using a database; and when the verification result is passed, executing login operation.
According to an embodiment of the present disclosure, when the verification result is passed, the step of performing a login operation includes: when the verification result is passed, sending an account information binding request of the user to the server; and acquiring a binding success notice sent by the server and executing login operation.
According to the embodiment of the disclosure, the step of generating the login two-dimensional code by the mobile terminal comprises the following steps: randomly generating a first random number; sending the first random number to a server; acquiring a second character string generated by the server based on the first random number, wherein the second character string is generated by utilizing a hash technology; splicing the second character string with the first random number to generate an encrypted character string; and converting the encrypted character string into a login two-dimensional code by using a two-dimensional code generation specification.
According to a second aspect of the present disclosure, there is provided a login method for a head-mounted device, applied to a server, the method including: acquiring a first random number generated by a mobile terminal; generating the second character string based on the first random number; sending the second character string to the mobile terminal so that the mobile terminal generates a login two-dimensional code based on the second character string; acquiring an encrypted character string sent by the head-mounted device; verifying the encrypted character string to obtain a verification result; and sending the verification result to the head-mounted device, wherein the verification result is used for: and when the verification result is that the verification result passes, controlling the head-mounted equipment to execute login operation.
According to an embodiment of the present disclosure, when the verification result is passed, the step of performing a login operation includes: when the verification result is that the verification result is passed, receiving an account information binding request of the user, which is sent by the head-mounted device; binding account information of a user with the head-mounted device; and sending a binding success notification to the head-mounted device so as to enable the head-mounted device to execute a login operation.
According to an embodiment of the present disclosure, the step of generating the second string based on the first random number includes: randomly generating a second random number; splicing the first random number, the second random number, the user identification number and the first system timestamp to generate a first character string; and carrying out hash hashing on the first character string to generate a second character string.
According to an embodiment of the present disclosure, the step of sending the second character string to the mobile terminal includes: storing the first random number, the second random number, the user identification number and the mapping relation between the first system time stamp and the second character string in a database; and sending the second character string to the mobile terminal.
According to the embodiment of the disclosure, the step of generating the login two-dimensional code by the mobile terminal based on the second character string comprises the following steps: acquiring the second character string; splicing the second character string with the first random number to generate an encrypted character string; and converting the encrypted character string into a login two-dimensional code by using a two-dimensional code generation specification.
According to an embodiment of the present disclosure, the step of verifying the encrypted character string to obtain a verification result includes: analyzing the encrypted character string to obtain a second character string and a first random number, and searching the first random number, the second random number, the user identification number and a first system timestamp corresponding to the second character string by using a database; comparing the first system timestamp to a current system timestamp; when the interval between the first system timestamp and the current system timestamp is less than or equal to the preset time, comparing a first random number in a database with a first random number obtained by analysis; and when the first random number in the database is consistent with the first random number obtained by analysis, the verification result is passed.
According to an embodiment of the present disclosure, the method further comprises: and when the interval between the first system time stamp and the current system time stamp is greater than the preset time, the verification result is failure.
According to an embodiment of the present disclosure, the method further comprises: and when the interval between the first system timestamp and the current system timestamp is less than or equal to the preset time and the first random number in the database is inconsistent with the first random number obtained by analysis, the verification result is failure.
A third aspect of the present disclosure provides a login method of a head mounted device, the method including: the mobile terminal generates a first random number and sends the first random number to a server; the server generates a second character string based on the first random number and sends the second character string to the mobile terminal; the mobile terminal splices the second character string and the first random number to generate an encrypted character string, and converts the encrypted character string into a login two-dimensional code by using a two-dimensional code generation specification; the head-mounted equipment scans the login two-dimensional code by using a transparent transmission mode, analyzes the login two-dimensional code to obtain an encrypted character string, and sends the encrypted character string to a server; the server checks the encrypted character string to obtain a check result, and sends the check result to the head-mounted equipment; and when the verification result is that the verification is passed, the head-mounted equipment executes login operation.
According to an embodiment of the present disclosure, the step of the server generating the second character string based on the first random number includes: the server generates a second random number, and the server splices the first random number, the second random number, the user identification number and the first system timestamp to generate a first character string; and the server carries out hash hashing on the first character string to generate a second character string.
According to an embodiment of the present disclosure, the step of the server sending the second character string to the mobile terminal includes: the server stores the first random number, the second random number, the user identification number, the mapping relation between the first system time stamp and the second character string in a database; and the server sends the second character string to the mobile terminal.
According to the embodiment of the present disclosure, the step of verifying the encrypted character string by the server to obtain a verification result includes: the server analyzes the encrypted character string to obtain a second character string and a first random number, and searches the first random number, the second random number, the user identification number and a first system timestamp corresponding to the second character string by using a database; the server comparing the first system timestamp to a current system timestamp; when the interval between the first system timestamp and the current system timestamp is less than or equal to the preset time, comparing a first random number in a database with a first random number obtained by analysis; and when the first random number in the database is consistent with the first random number obtained by analysis, the verification result is passed.
A fourth aspect of the present disclosure provides a login apparatus for a head-mounted device, which is applied to the head-mounted device, and includes: the scanning module is used for scanning the login two-dimensional code by using a transparent transmission mode, wherein the login two-dimensional code is generated by the mobile terminal; the analysis module is used for analyzing the login two-dimensional code to obtain an encrypted character string; the first sending module is used for sending the encrypted character string to a server; the first obtaining module is used for obtaining a verification result of the encrypted character string, wherein the verification result is obtained by the server through verifying the encrypted character string by using a database; and the first login module is used for executing login operation when the verification result is passed.
According to an embodiment of the present disclosure, the first login module includes a first sending unit, configured to send an account information binding request of a user to the server when the verification result is passed; and the login unit is used for acquiring the binding success notice sent by the server and executing login operation.
A fifth aspect of the present disclosure provides a login apparatus for a head-mounted device, applied to a server, including: the second acquisition module is used for acquiring the first random number generated by the mobile terminal; a first generating module, configured to generate the second character string based on the first random number; the second sending module is used for sending the second character string to the mobile terminal so that the mobile terminal generates a login two-dimensional code based on the second character string; the third acquisition module is used for acquiring the encrypted character string sent by the head-mounted equipment; the verification module is used for verifying the encrypted character string to obtain a verification result; and a third sending module, configured to send the verification result to the head-mounted device, where the verification result is used to: and when the verification result is that the verification result is passed, controlling the head-mounted equipment to execute login operation.
According to an embodiment of the present disclosure, the first generating module includes a first random unit for randomly generating a second random number; the splicing unit is used for splicing the first random number, the second random number, the user identification number and the first system timestamp to generate a first character string; and the second generation unit is used for carrying out hash on the first character string to generate a second character string.
According to an embodiment of the present disclosure, the second sending module includes a storage unit, configured to store the first random number, the second random number, the user identification number, and a mapping relationship between the first system timestamp and the second character string in a database; and the first sending unit is used for sending the second character string to the mobile terminal.
According to an embodiment of the present disclosure, the verification module includes an analysis unit configured to analyze the encrypted character string to obtain a second character string and a first random number; the searching unit is used for searching a first random number, a second random number, a user identification number and a first system timestamp corresponding to the second character string by using a database; a first comparing unit, configured to compare the first system timestamp with a current system timestamp; the second comparison unit is used for comparing the first random number in the database with the first random number obtained by analysis when the interval between the first system timestamp and the current system timestamp is less than or equal to the preset time; and the checking unit is used for passing the checking result when the first random number in the database is consistent with the first random number obtained by analysis.
According to the embodiment of the present disclosure, the checking unit is further configured to determine that the checking result is a failure when an interval between the first system timestamp and the current system timestamp is greater than a preset time.
According to an embodiment of the present disclosure, the verifying unit is further configured to, when an interval between the first system timestamp and the current system timestamp is less than or equal to a preset time, and when the first random number in the database and the first random number obtained by the parsing are inconsistent, determine that the verification result is a failure.
A sixth aspect of the present disclosure provides a login apparatus of a head mounted device, including: the second generation module is used for controlling the mobile terminal to generate a first random number and sending the first random number to the server; a third generating module, configured to control the server to generate a second character string based on the first random number, and send the second character string to the mobile terminal; the splicing conversion module is used for controlling the mobile terminal to splice the second character string and the first random number to generate an encrypted character string, and converting the encrypted character string into a login two-dimensional code by using a two-dimensional code generation specification; the scanning and analyzing module is used for controlling the head-mounted equipment to scan the login two-dimensional code by using a transparent transmission mode, analyzing the login two-dimensional code to obtain an encrypted character string and sending the encrypted character string to the server; the verification sending module is used for controlling the server to verify the encrypted character string to obtain a verification result and sending the verification result to the head-mounted equipment; and the third login module is used for controlling the head-mounted equipment to execute login operation when the verification result is that the verification result passes.
A seventh aspect of the present disclosure provides an electronic device, including: one or more processors; memory for storing one or more programs, wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the above-described method.
An eighth aspect of the present disclosure also provides a computer-readable storage medium having stored thereon executable instructions that, when executed by a processor, cause the processor to perform the above-mentioned method.
A ninth aspect of the present disclosure also provides a computer program product comprising a computer program which, when executed by a processor, implements the above method.
Drawings
The foregoing and other objects, features and advantages of the disclosure will be apparent from the following description of embodiments of the disclosure, which proceeds with reference to the accompanying drawings, in which:
fig. 1 schematically illustrates an application scenario diagram of a login method, apparatus, device, medium, and program product for a head mounted device according to an embodiment of the present disclosure;
fig. 2 schematically shows a flow chart of a login method of a head mounted device applied to the head mounted device according to an embodiment of the present disclosure;
fig. 3 schematically shows a flow chart of a login method applied to a head mounted device of a server according to an embodiment of the present disclosure;
fig. 4 schematically shows a flow chart of a login method of a head mounted device according to an embodiment of the present disclosure;
fig. 5 schematically shows a system architecture diagram of a login method of a head mounted device according to an embodiment of the present disclosure;
fig. 6 schematically shows a block diagram of a login apparatus of a head mounted device applied to the head mounted device according to an embodiment of the present disclosure;
fig. 7 schematically shows a block diagram of a configuration of a login apparatus of a head mounted device applied to a server according to an embodiment of the present disclosure;
fig. 8 schematically shows a block diagram of a structure of a login means of a head mounted device according to an embodiment of the present disclosure; and
fig. 9 schematically shows a block diagram of an electronic device adapted to implement a login method of a head mounted device according to an embodiment of the present disclosure.
Detailed Description
Hereinafter, embodiments of the present disclosure will be described with reference to the accompanying drawings. It should be understood that these descriptions are illustrative only and are not intended to limit the scope of the present disclosure. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the disclosure. It may be evident, however, that one or more embodiments may be practiced without these specific details. Moreover, in the following description, descriptions of well-known structures and techniques are omitted so as to not unnecessarily obscure the concepts of the present disclosure.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. The terms "comprises," "comprising," and the like, as used herein, specify the presence of stated features, steps, operations, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, or components.
All terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art unless otherwise defined. It is noted that the terms used herein should be interpreted as having a meaning that is consistent with the context of this specification and should not be interpreted in an idealized or overly formal sense.
Where a convention analogous to "A, B and at least one of C, etc." is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., "a system having at least one of A, B and C" would include, but not be limited to, systems that have a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.). The terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, features defined as "first" and "second" may explicitly or implicitly include one or more of the described features.
Virtual Reality (VR) helmets: the head-mounted display is used for sealing the vision and the hearing of a person to the outside and guiding a user to generate the feeling of the person in a virtual environment, and is the earliest virtual reality display. The VR helmet is externally provided with a plurality of cameras to scan the surrounding environment of the user, and the actual position and the steering angle of the user in space positioning are calculated through an algorithm.
VR helmet pass through mode: what demonstrate in the VR helmet under the normal condition all is the virtual scene that the procedure generated, but general VR all supports the pass-through mode, is about to on real external environment passes through the inside screen of helmet after the camera is gathered direct projection, and the user can see external environment through the screen, but this mode is subject to restrictions such as camera collection effect, and the bandwagon effect is limited.
In the financial field, it is more and more common to use VR helmets as interactive tools to assist users in using financial services, for example, banks provide bank client apps of VR version, after the VR helmets are installed, users wear VR helmets, browse and visit virtual business halls provided by banks in apps therein, talk with virtual digital people, consult and transact financial services.
In the practical process of the VR helmet in a financial scene, a user is required to log in an existing bank system account (input an online banking account and a password) when the VR helmet is used. And because bank App security requirement is higher, still can include the process of carrying out the secondary authentication through cell-phone verification in the flow generally, main flow is: the user wears the VR helmet, finds out the bank App icon, clicks the App through the handle, opens the registration login interface, clicks the text box, the system pops up the virtual keyboard, the user clicks the corresponding virtual key through the handle, performs character input, sequentially inputs the user name and the password, and inputs the mobile phone number of the user. The user needs to click the button for acquiring the mobile phone verification code, and the server side of the bank App sends a verification code short message to the mobile phone of the user. At the moment, the user needs to take off the VR helmet, check the short message of the mobile phone, remember the verification code, then wear the helmet again, and finish the identity authentication of the user after inputting the verification code by using the handle and the virtual keyboard inside.
As can be seen from the above login process, the current head-mounted device needs to use a virtual keyboard to sequentially click to complete character input so as to perform login operation, which not only takes a long time, but also is prone to input errors, which causes inconvenience in performing login operation. Meanwhile, in the process of registering and logging in, a user needs to take off and wear the VR helmet for many times, the interaction flow is split, and the use experience is poor. In addition, based on considerations such as saving electric quantity, some VRs may turn off the screen after taking off the helmet, and need a certain time to recover after wearing again, if the recovery time is long, the short message verification code may have expired, and the user needs to acquire again, and repeatedly take off and wear the helmet again.
In view of the foregoing problems, an embodiment of the present disclosure provides a login method for a head-mounted device, which is applied to the head-mounted device, and the method includes: scanning a login two-dimensional code by using a transparent transmission mode, wherein the login two-dimensional code is generated by a mobile terminal; analyzing the login two-dimensional code to obtain an encrypted character string; sending the encrypted character string to a server; obtaining a verification result of the encrypted character string, wherein the verification result is obtained by the server through verifying the encrypted character string by using a database; and when the verification result is passed, executing login operation.
The embodiment of the present disclosure further provides a login method for a head-mounted device, which is applied to a server, and the method includes: acquiring a first random number generated by a mobile terminal; generating the second character string based on the first random number; sending the second character string to the mobile terminal so that the mobile terminal generates a login two-dimensional code based on the second character string; acquiring an encrypted character string sent by the head-mounted device; verifying the encrypted character string to obtain a verification result; and sending the verification result to the head-mounted device, wherein the verification result is used for: and when the verification result is that the verification result is passed, controlling the head-mounted equipment to execute login operation.
Embodiments of the present disclosure also provide a login method for a head-mounted device, where the method includes: the mobile terminal generates a first random number and sends the first random number to a server; the server generates a second character string based on the first random number and sends the second character string to the mobile terminal; the mobile terminal splices the second character string and the first random number to generate an encrypted character string, and converts the encrypted character string into a login two-dimensional code by using a two-dimensional code generation specification; the head-mounted equipment scans the login two-dimensional code by using a transparent transmission mode, analyzes the login two-dimensional code to obtain an encrypted character string, and sends the encrypted character string to a server; the server checks the encrypted character string to obtain a check result, and sends the check result to the head-mounted equipment; and when the verification result is that the verification is passed, the head-mounted equipment executes login operation.
The method and the apparatus determined by the present disclosure may be used for logging in a head-mounted device in the financial field, and may also be used for logging in a head-mounted device in any field other than the financial field.
In the technical scheme of the disclosure, the collection, storage, use, processing, transmission, provision, disclosure, application and other processing of the personal information of the related user are all in accordance with the regulations of related laws and regulations, necessary confidentiality measures are taken, and the customs of the public order is not violated.
In the technical scheme of the disclosure, before the personal information of the user is obtained or collected, the authorization or the consent of the user is obtained.
Fig. 1 schematically illustrates an application scenario diagram of a login method, apparatus, device, medium, and program product of a head mounted device according to an embodiment of the present disclosure.
As shown in fig. 1, the application scenario 100 according to this embodiment may include terminal devices 101, 102, 103, a network 104 and a server 105. The network 104 serves as a medium for providing communication links between the terminal devices 101, 102, 103 and the server 105. Network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few.
A user may use terminal devices 101, 102, 103 to interact with a server 105 over a network 104 to receive or send messages or the like. The terminal devices 101, 102, 103 may have installed thereon various communication client applications, such as shopping-like applications, web browser applications, search-like applications, instant messaging tools, mailbox clients, social platform software, etc. (by way of example only).
The terminal devices 101, 102, 103 may be various electronic devices having a display screen and supporting web browsing, including but not limited to smart phones, tablet computers, laptop portable computers, desktop computers, and the like.
The server 105 may be a server providing various services, such as a background management server (for example only) providing support for websites browsed by users using the terminal devices 101, 102, 103. The background management server may analyze and perform other processing on the received data such as the user request, and feed back a processing result (e.g., a webpage, information, or data obtained or generated according to the user request) to the terminal device.
It should be noted that the login method of the head mounted device provided by the embodiment of the present disclosure may be generally performed by the server 105. Accordingly, the login means of the head mounted device provided by the embodiments of the present disclosure may be generally disposed in the server 105. The login method of the head mounted device provided by the embodiment of the present disclosure may also be performed by a server or a server cluster different from the server 105 and capable of communicating with the terminal devices 101, 102, 103 and/or the server 105. Accordingly, the login apparatus of the head mounted device provided in the embodiment of the present disclosure may also be disposed in a server or a server cluster different from the server 105 and capable of communicating with the terminal devices 101, 102, 103 and/or the server 105.
It should be understood that the number of terminal devices, networks, and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
The login method of the head mounted device of the disclosed embodiment will be described in detail through fig. 2 to 5 based on the scenario described in fig. 1.
Fig. 2 schematically shows a flowchart of a login method of a head mounted device applied to the head mounted device according to an embodiment of the present disclosure.
As shown in fig. 2, the login method of the head mounted device applied to the head mounted device of the embodiment includes operations S210 to S250.
In operation S210, a login two-dimensional code is scanned using a transparent transmission mode, wherein the login two-dimensional code is generated by the mobile terminal.
According to the embodiment of the disclosure, the step of generating the login two-dimensional code by the mobile terminal comprises the following steps: randomly generating a first random number; sending the first random number to a server; acquiring a second character string generated by the server based on the first random number, wherein the second character string is generated by utilizing a hash technology; splicing the second character string with the first random number to generate an encrypted character string; and converting the encrypted character string into a login two-dimensional code by using a two-dimensional code generation specification. The mobile terminal can repeat the process of generating the login two-dimensional code every preset time to generate a new login two-dimensional code, so that the risk of tampering caused by too long time after the login two-dimensional code is generated is prevented.
In operation S220, the login two-dimensional code is analyzed to obtain an encrypted character string. Wherein the encrypted string is generated using a random number and a hash technique.
In operation S230, the encryption string is transmitted to the server.
In operation S240, a verification result of the encrypted string is obtained, where the verification result is obtained by the server verifying the encrypted string by using a database.
In operation S250, when the verification result is pass, a login operation is performed. And when the verification result does not pass, the login operation is failed to be executed.
According to an embodiment of the present disclosure, when the verification result is passed, the step of performing a login operation includes: when the verification result is that the user passes, sending an account information binding request of the user to the server; and acquiring a binding success notice sent by the server and executing login operation.
In embodiments of the present disclosure, consent or authorization of the user may be obtained prior to obtaining account information for the user. For example, a request for obtaining user account information may be issued to the user, and sending an account information binding request of the user to the server may be performed if the user agrees or authorizes that the user account information can be obtained.
The login method of the head-mounted device provided by the embodiment of the disclosure is applied to the head-mounted device, the head-mounted device performs verification by scanning the login two-dimensional code and performs login operation, the login operation is performed without using a virtual keyboard, the time consumption is short, the verification is fast, the login convenience of the head-mounted device is improved, in addition, the login two-dimensional code is analyzed to obtain an encrypted character string, and the encrypted character string is verified, so that the login operation security is further improved.
Fig. 3 schematically shows a flowchart of a login method applied to a headset of a server according to an embodiment of the present disclosure.
As shown in fig. 3, the login method of the head mounted device applied to the server of the embodiment includes operations S310 to S360.
In operation S310, a first random number generated by a mobile terminal is acquired.
In operation S320, the second character string is generated based on the first random number.
According to an embodiment of the present disclosure, the step of generating the second string based on the first random number includes: randomly generating a second random number; splicing the first random number, the second random number, the user identification number and the first system timestamp to generate a first character string; and carrying out hash hashing on the first character string to generate a second character string.
According to an embodiment of the present disclosure, the step of sending the second character string to the mobile terminal includes: storing the first random number, the second random number, the user identification number and the mapping relation between the first system time stamp and the second character string in a database; and sending the second character string to the mobile terminal.
In operation S330, the second character string is sent to the mobile terminal, so that the mobile terminal generates a login two-dimensional code based on the second character string.
According to the embodiment of the disclosure, the step of generating the login two-dimensional code by the mobile terminal based on the second character string comprises the following steps: acquiring the second character string; splicing the second character string with the first random number to generate an encrypted character string; and converting the encrypted character string into a login two-dimensional code by using a two-dimensional code generation specification. The mobile terminal can repeat the process of generating the login two-dimensional code every preset time to generate a new login two-dimensional code, so that the risk of tampering caused by too long time after the login two-dimensional code is generated is prevented.
In operation S340, an encrypted string transmitted by the head-mounted device is acquired.
In operation S350, the encrypted string is verified to obtain a verification result.
According to an embodiment of the present disclosure, the step of verifying the encrypted character string to obtain a verification result includes: analyzing the encrypted character string to obtain a second character string and a first random number, and searching the first random number, the second random number, the user identification number and a first system time stamp corresponding to the second character string by using a database; comparing the first system timestamp to a current system timestamp; when the interval between the first system timestamp and the current system timestamp is less than or equal to the preset time, comparing a first random number in a database with a first random number obtained by analysis; and when the first random number in the database is consistent with the first random number obtained by analysis, the verification result is passed. The preset time may be set according to an actual situation, for example, may be 1 minute, which is not limited in this embodiment of the disclosure. It should be noted that the mobile terminal generates a new login two-dimensional code every preset time, which is the same preset time as the preset time here, for example, 1 minute, so as to ensure that the verification process is performed smoothly.
According to an embodiment of the present disclosure, the method further comprises: and when the interval between the first system time stamp and the current system time stamp is greater than the preset time, the verification result is failure.
According to an embodiment of the present disclosure, the method further comprises: and when the interval between the first system timestamp and the current system timestamp is less than or equal to the preset time and the first random number in the database is inconsistent with the first random number obtained by analysis, the verification result is failure.
In operation S360, the verification result is sent to the head-mounted device, and the verification result is used to: and when the verification result is that the verification result is passed, controlling the head-mounted equipment to execute login operation.
According to an embodiment of the present disclosure, when the verification result is passed, the step of performing a login operation includes: when the verification result is that the verification result is passed, receiving an account information binding request of the user, which is sent by the head-mounted device; binding account information of a user with the head-mounted device; and sending a binding success notification to the head-mounted device to enable the head-mounted device to perform a login operation.
The login method of the head-mounted device provided by the embodiment of the disclosure is applied to a server, the server generates a login two-dimensional code by using a random number and a hash technology and matching with a mobile terminal, and verifies an encrypted character string obtained by analysis in a login process, so that the login convenience and the login safety are improved.
Fig. 4 schematically shows a flow chart of a login method of a head mounted device according to an embodiment of the present disclosure.
As shown in fig. 4, the login method of the head mounted device applied to the server of the embodiment includes operations S410 to S460.
In operation S410, the mobile terminal generates a first random number and transmits the first random number to the server.
In operation S420, the server generates a second character string based on the first random number and transmits the second character string to the mobile terminal.
According to an embodiment of the present disclosure, the step of the server generating the second character string based on the first random number includes: the server generates a second random number; the server splices the first random number, the second random number, the user identification number and the first system timestamp to generate a first character string; and the server carries out hash on the first character string to generate a second character string.
According to an embodiment of the present disclosure, the step of the server sending the second character string to the mobile terminal includes: the server stores the first random number, the second random number, the user identification number, the mapping relation between the first system time stamp and the second character string in a database; and the server sends the second character string to the mobile terminal.
In operation S430, the mobile terminal concatenates the second character string and the first random number to generate an encrypted character string, and converts the encrypted character string into a login two-dimensional code by using a two-dimensional code generation specification.
In operation S440, the head-mounted device scans the login two-dimensional code in a transparent transmission mode, analyzes the login two-dimensional code to obtain an encrypted character string, and sends the encrypted character string to the server.
In operation S450, the server verifies the encrypted character string to obtain a verification result, and sends the verification result to the head-mounted device.
According to the embodiment of the disclosure, the server checks the encrypted character string to obtain a check result, which includes: the server analyzes the encrypted character string to obtain a second character string and a first random number, and searches the first random number, the second random number, the user identification number and a first system timestamp corresponding to the second character string by using a database; the server comparing the first system timestamp to a current system timestamp; when the interval between the first system timestamp and the current system timestamp is less than or equal to the preset time, comparing a first random number in a database with a first random number obtained by analysis; and when the first random number in the database is consistent with the first random number obtained by analysis, the verification result is passed.
In operation S460, when the verification result is that the verification is passed, the head-mounted device performs a login operation.
Fig. 5 schematically shows a system architecture diagram of a login method of a head mounted device according to an embodiment of the present disclosure.
As shown in fig. 5, the login method of the head-mounted device involves 4 roles:
bank App in VR helmet: bank application programs of user account authentication and equipment are required to be carried out in the VR helmet, and the bank application programs are called VRApp;
the user: users who actually use VR helmets and cell phones;
mobile banking APP: the mobile phone bank application program is used for assisting in identity registration, login, binding and other operations, and is called as a mobile phone App, and the mobile phone App and the VRAPP belong to the same bank;
the mobile banking APP background server: and the background server corresponding to the mobile phone bank App is responsible for actual contents such as authentication and authorization, wherein the VRApp and the mobile phone App are connected with the background server.
Illustratively, the specific system interaction steps are:
step 1: and the user opens the mobile phone App, and clicks the two-dimension code binding function after the user successfully logs in by using the personal identity.
Step 2: the mobile phone App generates a random number X, communicates with the background server and uploads the X to the server background. The server background generates a random number Y for the binding function, and the random number Y is spliced with the account UID and the current UTC system timestamp to generate a character string: and the X _ Y _ UID _ timestamp hashes the character string in a sha256 hash mode to generate a character string H. And generating a corresponding relation of the X, the Y, the UID, the H and the timestamp, storing the corresponding relation into a background database, and then sending the character string H to the mobile phone App.
And step 3: and after receiving the H, the mobile phone APP is spliced with the random number X to generate X _ H. And (3) generating a two-dimensional code picture by using a standard two-dimensional code generation specification and the character string X _ H, displaying the two-dimensional code picture on an App interface of a mobile phone of the user, and repeating the processes 2 and 3 every 60 seconds to generate a new two-dimensional code.
And 4, step 4: the user wears the helmet, uses the handle to open VRAPP, gets into account registration and binds the function, and the user selects the function of binding of two-dimensional code authentication.
And 5: the VR helmet starts the pass-through mode, uses the camera to transmit the outside world to the eyes of the user, and the user watches the mobile phone two-dimensional code through the camera.
Step 6: after the VRApp identifies the two-dimensional code, X _ H is analyzed based on the two-dimensional code analysis specification, and then the X _ H, the equipment ID and other equipment information are uploaded to a background server.
And 7: after receiving the device ID and the character string X _ H, the background server analyzes X and H by using underlining separation. And querying the database by using the H to obtain the corresponding X, Y, UID and timestamp.
And 8: and comparing the queried time stamp with the current system time, and if the interval exceeds 1 minute, failing to check. And when the interval does not exceed 1 minute, comparing the X with the analyzed X, and if the X is not consistent, failing to check.
And step 9: step 8, after successful verification, the server inquires the basic information of the user, such as the registration name, the registration time and the like, through the UID, and then transmits the relevant information to the VRApp
Step 10: and the VRApp pops up a prompt box to display the basic information of the user and inquire whether the user confirms account binding. And after the user confirms, a confirmation request is sent to the server, and binding and registering of the background VR equipment are completed.
Step 11: the server sends a message to the VRAPP, and the VRAPP prompts that binding is completed.
Step 12: the server sends a message (including information such as equipment model and ID) to the mobile phone APP, and the mobile phone APP prompts that binding is completed and displays the bound equipment information.
Step 13: the user finishes the whole process after confirming the binding in the mobile phone APP, and the virtual world is recovered in the VR to start to perform functions.
According to the login method of the head-mounted device, authentication is completed in a code scanning mode, meanwhile, malicious attack, forgery and replay in the login process are prevented through technologies such as multiple random numbers and Hash hashing, convenience and safety of login are greatly improved, in addition, VR glasses do not need to be taken off in the login process, a handle does not need to be used for sequentially clicking a virtual keyboard in VR, and authentication experience is further improved.
Based on the login method of the head-mounted device, the disclosure also provides a login device of the head-mounted device. The apparatus will be described in detail below with reference to fig. 6-8.
Fig. 6 schematically shows a block diagram of a configuration of a login apparatus of a head mounted device applied to the head mounted device according to an embodiment of the present disclosure.
As shown in fig. 6, the login apparatus 600 of the head-mounted device applied to the head-mounted device of the embodiment includes a scanning module 610, a parsing module 620, a first sending module 630, a first obtaining module 640, and a first login module 650.
The scanning module 610 is configured to scan a login two-dimensional code by using a transparent transmission mode, where the login two-dimensional code is generated by the mobile terminal. In an embodiment, the scanning module 610 may be configured to perform the operation S210 described above, which is not described herein again.
And the analyzing module 620 is used for analyzing the login two-dimensional code to obtain an encrypted character string. In an embodiment, the parsing module 620 may be configured to perform the operation S220 described above, which is not described herein again.
A first sending module 630, configured to send the encrypted string to the server. In an embodiment, the first sending module 630 may be configured to perform the operation S230 described above, which is not described herein again.
The first obtaining module 640 is configured to obtain a verification result of the encrypted character string, where the verification result is obtained by the server verifying the encrypted character string by using a database. In an embodiment, the first obtaining module 640 may be configured to perform the operation S240 described above, which is not described herein again.
A first login module 650, configured to perform a login operation when the verification result is passed. In an embodiment, the first login module 650 may be configured to perform the operation S250 described above, which is not described herein again.
According to an embodiment of the present disclosure, the first login module includes a first sending unit, configured to send an account information binding request of a user to the server when the verification result is passed; and the login unit is used for acquiring the binding success notice sent by the server and executing login operation.
Fig. 7 schematically shows a block diagram of a configuration of a login apparatus of a headset applied to a server according to an embodiment of the present disclosure.
As shown in fig. 7, the login apparatus 700 of the headset applied to the server of this embodiment includes a second obtaining module 710, a first generating module 720, a second sending module 730, a third obtaining module 740, a verifying module 750, and a third sending module 760.
The second obtaining module 710 is configured to obtain the first random number generated by the mobile terminal. In an embodiment, the second obtaining module 710 may be configured to perform the operation S310 described above, which is not described herein again.
A first generating module 720, configured to generate the second character string based on the first random number. In an embodiment, the first generating module 720 may be configured to perform the operation S320 described above, which is not described herein again.
A second sending module 730, configured to send the second character string to the mobile terminal, so that the mobile terminal generates a login two-dimensional code based on the second character string. In an embodiment, the second sending module 730 may be configured to perform the operation S330 described above, which is not described herein again.
A third obtaining module 740, configured to obtain the encrypted character string sent by the head-mounted device. In an embodiment, the third obtaining module 740 may be configured to perform the operation S340 described above, which is not described herein again.
And the checking module 750 is configured to check the encrypted character string to obtain a checking result. In an embodiment, the checking module 750 may be configured to perform the operation S350 described above, which is not described herein again.
A third sending module 760, configured to send the verification result to the head-mounted device, where the verification result is used to: and when the verification result is that the verification result passes, controlling the head-mounted equipment to execute login operation. In an embodiment, the third sending module 760 may be configured to perform the operation S360 described above, which is not described herein again.
According to an embodiment of the present disclosure, the first generating module includes a first random unit for randomly generating a second random number; the splicing unit is used for splicing the first random number, the second random number, the user identification number and the first system timestamp to generate a first character string; and the second generation unit is used for carrying out hash on the first character string to generate a second character string.
According to an embodiment of the present disclosure, the second sending module includes a storage unit, configured to store the first random number, the second random number, the user identification number, and a mapping relationship between the first system timestamp and the second character string in a database; and a first sending unit, configured to send the second character string to the mobile terminal.
According to an embodiment of the present disclosure, the verification module includes an analysis unit configured to analyze the encrypted character string to obtain a second character string and a first random number; the searching unit is used for searching a first random number, a second random number, a user identification number and a first system timestamp corresponding to the second character string by using a database; a first comparing unit, configured to compare the first system timestamp with a current system timestamp; the second comparison unit is used for comparing the first random number in the database with the first random number obtained by analysis when the interval between the first system timestamp and the current system timestamp is less than or equal to the preset time; and the checking unit is used for passing the checking result when the first random number in the database is consistent with the first random number obtained by analysis.
According to the embodiment of the present disclosure, the checking unit is further configured to determine that the checking result is a failure when an interval between the first system timestamp and the current system timestamp is greater than a preset time.
According to an embodiment of the present disclosure, the checking unit is further configured to, when an interval between the first system timestamp and the current system timestamp is less than or equal to a preset time, and when the first random number in the database and the first random number obtained by the analysis are inconsistent, determine that a checking result is a failure.
Fig. 8 schematically shows a block diagram of a login apparatus of a head mounted device according to an embodiment of the present disclosure.
As shown in fig. 8, the login apparatus 800 of the head-mounted device of this embodiment includes a second generation module 810, a third generation module 820, a splicing conversion module 830, a scan analysis module 840, a verification sending module 850, and a third login module 860.
The second generating module 810 is configured to control the mobile terminal to generate a first random number, and send the first random number to the server. In an embodiment, the second generating module 810 may be configured to perform the operation S410 described above, which is not described herein again.
A third generating module 820, configured to control the server to generate a second character string based on the first random number, and send the second character string to the mobile terminal. In an embodiment, the third generating module 820 may be configured to perform the operation S420 described above, which is not described herein again.
And the splicing conversion module 830 is configured to control the mobile terminal to splice the second character string with the first random number, generate an encrypted character string, and convert the encrypted character string into a login two-dimensional code by using a two-dimensional code generation specification. In an embodiment, the splicing conversion module 830 may be configured to perform the operation S430 described above, and is not described herein again.
And the scanning and analyzing module 840 is used for controlling the head-mounted device to scan the login two-dimensional code by using a transparent transmission mode, analyze the login two-dimensional code to obtain an encrypted character string, and send the encrypted character string to the server. In an embodiment, the scan analysis module 840 may be configured to perform the operation S440 described above, which is not described herein again.
And the verification sending module 850 is configured to control the server to verify the encrypted character string to obtain a verification result, and send the verification result to the head-mounted device. In an embodiment, the check transmitting module 850 may be configured to perform the operation S450 described above, which is not described herein again.
And a third login module 860, configured to control the head-mounted device to perform a login operation when the verification result is that the verification result is passed. In an embodiment, the third login module 860 may be configured to perform the operation S460 described above, which is not described herein again.
According to an embodiment of the present disclosure, the third generating module includes a second random unit for controlling the server to randomly generate a second random number; the second splicing unit is used for controlling the server to splice the first random number, the second random number, the user identification number and the first system timestamp to generate a first character string; and the third generation unit is used for controlling the server to carry out hash on the first character string to generate a second character string.
According to an embodiment of the present disclosure, the third generating module further includes a second storage unit, configured to control the server to store the first random number, the second random number, the user identification number, and the mapping relationship between the first system timestamp and the second character string in a database; and the second sending unit is used for controlling the server to send the second character string to the mobile terminal.
According to an embodiment of the present disclosure, the verification sending module includes a first parsing unit, configured to control the server to parse the encrypted character string to obtain a second character string and a first random number; the second searching unit is used for controlling the server to search the first random number, the second random number, the user identification number and the first system timestamp corresponding to the second character string by using a database; a third comparing unit, configured to control the server to compare the first system timestamp with a current system timestamp; the fourth comparison unit is used for controlling the server to compare the first random number in the database with the first random number obtained by analysis when the interval between the first system timestamp and the current system timestamp is less than or equal to the preset time; and the second checking unit is used for passing the checking result when the first random number in the database is consistent with the first random number obtained by analysis.
According to the embodiment of the present disclosure, any plurality of modules among the scanning module 610, the parsing module 620, the first sending module 630, the first obtaining module 640, the first logging module 650, the second obtaining module 710, the first generating module 720, the second sending module 730, the third obtaining module 740, the checking module 750, the third sending module 760, the second generating module 810, the third generating module 820, the splicing conversion module 830, the scanning parsing module 840, the checking sending module 850, and the third logging module 860 may be combined into one module to be implemented, or any one of them may be split into a plurality of modules. Alternatively, at least part of the functionality of one or more of these modules may be combined with at least part of the functionality of the other modules and implemented in one module. According to an embodiment of the present disclosure, at least one of the scanning module 610, the parsing module 620, the first sending module 630, the first obtaining module 640, the first logging module 650, the second obtaining module 710, the first generating module 720, the second sending module 730, the third obtaining module 740, the verifying module 750, the third sending module 760, the second generating module 810, the third generating module 820, the stitching converting module 830, the scanning parsing module 840, the verifying sending module 850, and the third logging module 860 may be at least partially implemented as a hardware circuit, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system on a chip, a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or any other reasonable manner that may integrate or package a circuit, or be implemented in any one of or a suitable combination of any of software, hardware, and firmware. Alternatively, at least one of the scanning module 610, the parsing module 620, the first sending module 630, the first obtaining module 640, the first logging module 650, the second obtaining module 710, the first generating module 720, the second sending module 730, the third obtaining module 740, the checking module 750, the third sending module 760, the second generating module 810, the third generating module 820, the concatenation conversion module 830, the scan parsing module 840, the checking sending module 850, and the third logging module 860 may be at least partially implemented as a computer program module, which when executed, may perform corresponding functions.
Fig. 9 schematically shows a block diagram of an electronic device adapted to implement a login method of a head mounted device according to an embodiment of the present disclosure.
As shown in fig. 9, an electronic apparatus 900 according to an embodiment of the present disclosure includes a processor 901 which can perform various appropriate actions and processes in accordance with a program stored in a Read Only Memory (ROM) 902 or a program loaded from a storage portion 908 into a Random Access Memory (RAM) 903. Processor 901 may comprise, for example, a general purpose microprocessor (e.g., a CPU), an instruction set processor and/or associated chipset, and/or a special purpose microprocessor (e.g., an Application Specific Integrated Circuit (ASIC)), among others. The processor 901 may also include on-board memory for caching purposes. The processor 901 may comprise a single processing unit or a plurality of processing units for performing the different actions of the method flows according to embodiments of the present disclosure.
In the RAM 903, various programs and data necessary for the operation of the electronic apparatus 900 are stored. The processor 901, ROM 902, and RAM 903 are connected to each other by a bus 904. The processor 901 performs various operations of the method flows according to the embodiments of the present disclosure by executing programs in the ROM 902 and/or the RAM 903. Note that the programs may also be stored in one or more memories other than the ROM 902 and the RAM 903. The processor 901 may also perform various operations of the method flows according to embodiments of the present disclosure by executing programs stored in the one or more memories.
Electronic device 900 may also include input/output (I/O) interface 905, input/output (I/O) interface 905 also connected to bus 904, according to an embodiment of the present disclosure. The electronic device 900 may also include one or more of the following components connected to the I/O interface 905: an input portion 906 including a keyboard, a mouse, and the like; an output portion 907 including a display such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage portion 908 including a hard disk and the like; and a communication section 909 including a network interface card such as a LAN card, a modem, or the like. The communication section 909 performs communication processing via a network such as the internet. The drive 910 is also connected to the I/O interface 905 as necessary. A removable medium 911 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 910 as necessary, so that a computer program read out therefrom is mounted into the storage section 908 as necessary.
The present disclosure also provides a computer-readable storage medium, which may be contained in the apparatus/device/system described in the above embodiments; or may exist separately and not be assembled into the device/apparatus/system. The computer-readable storage medium carries one or more programs which, when executed, implement the method according to an embodiment of the disclosure.
According to embodiments of the present disclosure, the computer-readable storage medium may be a non-volatile computer-readable storage medium, which may include, for example but is not limited to: a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. For example, according to embodiments of the present disclosure, a computer-readable storage medium may include the ROM 902 and/or RAM 903 described above and/or one or more memories other than the ROM 902 and RAM 903.
Embodiments of the present disclosure also include a computer program product comprising a computer program containing program code for performing the method illustrated in the flow chart. The program code is for causing a computer system to perform the methods of the embodiments of the disclosure when the computer program product is run on the computer system.
The computer program performs the above-described functions defined in the system/apparatus of the embodiments of the present disclosure when executed by the processor 901. The systems, apparatuses, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the present disclosure.
In one embodiment, the computer program may be hosted on a tangible storage medium such as an optical storage device, a magnetic storage device, and the like. In another embodiment, the computer program may also be transmitted, distributed in the form of a signal on a network medium, and downloaded and installed through the communication section 909 and/or installed from the removable medium 911. The computer program containing program code may be transmitted using any suitable network medium, including but not limited to: wireless, wired, etc., or any suitable combination of the foregoing.
In such an embodiment, the computer program may be downloaded and installed from a network via the communication section 909 and/or installed from the removable medium 911. The computer program, when executed by the processor 901, performs the above-described functions defined in the system of the embodiment of the present disclosure. The systems, devices, apparatuses, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the present disclosure.
In accordance with embodiments of the present disclosure, program code for executing computer programs provided by embodiments of the present disclosure may be written in any combination of one or more programming languages, and in particular, these computer programs may be implemented using high level procedural and/or object oriented programming languages, and/or assembly/machine languages. The programming language includes, but is not limited to, programming languages such as Java, C + +, python, the "C" language, or the like. The program code may execute entirely on the user computing device, partly on the user device, partly on a remote computing device, or entirely on the remote computing device or server. In the case of a remote computing device, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., through the internet using an internet service provider).
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems that perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
Those skilled in the art will appreciate that various combinations and/or combinations of features recited in the various embodiments and/or claims of the present disclosure can be made, even if such combinations or combinations are not expressly recited in the present disclosure. In particular, various combinations and/or combinations of the features recited in the various embodiments and/or claims of the present disclosure may be made without departing from the spirit or teaching of the present disclosure. All such combinations and/or associations are within the scope of the present disclosure.
The embodiments of the present disclosure have been described above. However, these examples are for illustrative purposes only and are not intended to limit the scope of the present disclosure. Although the embodiments are described separately above, this does not mean that the measures in the embodiments cannot be used in advantageous combination. The scope of the disclosure is defined by the appended claims and equivalents thereof. Various alternatives and modifications can be devised by those skilled in the art without departing from the scope of the present disclosure, and such alternatives and modifications are intended to be within the scope of the present disclosure.

Claims (18)

1. A login method of a head-mounted device is applied to the head-mounted device, and is characterized by comprising the following steps:
scanning a login two-dimensional code by using a transparent transmission mode, wherein the login two-dimensional code is generated by a mobile terminal;
analyzing the login two-dimensional code to obtain an encrypted character string;
sending the encrypted character string to a server;
obtaining a verification result of the encrypted character string, wherein the verification result is obtained by the server through verifying the encrypted character string by using a database; and
and when the verification result is passed, executing login operation.
2. The method of claim 1, wherein the step of performing a login operation when the verification result is passed comprises:
when the verification result is that the user passes, sending an account information binding request of the user to the server; and
and acquiring a binding success notice sent by the server, and executing login operation.
3. The method according to any one of claims 1-2, wherein the step of generating the login two-dimensional code by the mobile terminal comprises:
randomly generating a first random number;
sending the first random number to a server;
acquiring a second character string generated by the server based on the first random number, wherein the second character string is generated by utilizing a hash technology;
splicing the second character string with the first random number to generate an encrypted character string; and
and converting the encrypted character string into a login two-dimensional code by using a two-dimensional code generation specification.
4. A login method of a head-mounted device is applied to a server, and is characterized by comprising the following steps:
acquiring a first random number generated by a mobile terminal;
generating the second character string based on the first random number;
sending the second character string to the mobile terminal so that the mobile terminal generates a login two-dimensional code based on the second character string;
acquiring an encrypted character string sent by the head-mounted device;
verifying the encrypted character string to obtain a verification result; and
sending the verification result to the head-mounted device, wherein the verification result is used for: and when the verification result is that the verification result is passed, controlling the head-mounted equipment to execute login operation.
5. The method of claim 4, wherein the step of performing a login operation when the verification result is passed comprises:
when the verification result is that the verification result is passed, receiving an account information binding request of the user, which is sent by the head-mounted device;
binding account information of a user with the head-mounted device; and
and sending a binding success notice to the head-mounted device so as to enable the head-mounted device to execute login operation.
6. The method of claim 4, wherein the step of generating the second string based on the first random number comprises:
randomly generating a second random number;
splicing the first random number, the second random number, the user identification number and the first system timestamp to generate a first character string; and
and carrying out hash hashing on the first character string to generate a second character string.
7. The method according to claim 6, wherein the step of transmitting the second character string to the mobile terminal comprises:
storing the first random number, the second random number, the user identification number and the mapping relation between the first system time stamp and the second character string in a database; and
and sending the second character string to the mobile terminal.
8. The method according to any one of claims 4-7, wherein the step of the mobile terminal generating a login two-dimensional code based on the second character string comprises:
acquiring the second character string;
splicing the second character string with the first random number to generate an encrypted character string; and
and converting the encrypted character string into a login two-dimensional code by using a two-dimensional code generation specification.
9. The method of claim 8, wherein the step of verifying the encrypted string to obtain a verification result comprises:
analyzing the encrypted character string to obtain a second character string and a first random number;
searching a first random number, a second random number, a user identification number and a first system timestamp corresponding to the second character string by using a database;
comparing the first system timestamp to a current system timestamp;
when the interval between the first system timestamp and the current system timestamp is less than or equal to the preset time, comparing a first random number in a database with a first random number obtained by analysis; and
and when the first random number in the database is consistent with the first random number obtained by analysis, the verification result is passed.
10. The method of claim 9, further comprising:
and when the interval between the first system time stamp and the current system time stamp is greater than the preset time, the verification result is failure.
11. The method of claim 9, further comprising:
and when the interval between the first system timestamp and the current system timestamp is less than or equal to the preset time and the first random number in the database is inconsistent with the first random number obtained by analysis, the verification result is failure.
12. A method of logging on a head-mounted device, the method comprising:
the mobile terminal generates a first random number and sends the first random number to a server;
the server generates a second character string based on the first random number and sends the second character string to the mobile terminal;
the mobile terminal splices the second character string and the first random number to generate an encrypted character string, and converts the encrypted character string into a login two-dimensional code by using a two-dimensional code generation specification;
the head-mounted equipment scans the login two-dimensional code by using a transparent transmission mode, analyzes the login two-dimensional code to obtain an encrypted character string, and sends the encrypted character string to a server;
the server checks the encrypted character string to obtain a check result, and sends the check result to the head-mounted equipment; and
and when the verification result is that the verification is passed, the head-mounted equipment executes login operation.
13. A login device of a head-mounted device is applied to the head-mounted device and comprises:
the scanning module is used for scanning the login two-dimensional code by using a transparent transmission mode, wherein the login two-dimensional code is generated by the mobile terminal;
the analysis module is used for analyzing the login two-dimensional code to obtain an encrypted character string;
the first sending module is used for sending the encrypted character string to a server;
the first obtaining module is used for obtaining a verification result of the encrypted character string, wherein the verification result is obtained by the server through verifying the encrypted character string by using a database; and
and the first login module is used for executing login operation when the verification result is passed.
14. A login device of a head-mounted device is applied to a server and comprises:
the second acquisition module is used for acquiring the first random number generated by the mobile terminal;
a first generating module, configured to generate the second character string based on the first random number;
the second sending module is used for sending the second character string to the mobile terminal so that the mobile terminal generates a login two-dimensional code based on the second character string;
the third acquisition module is used for acquiring the encrypted character string sent by the head-mounted equipment;
the verification module is used for verifying the encrypted character string to obtain a verification result; and
a third sending module, configured to send the verification result to the head-mounted device, where the verification result is used to: and when the verification result is that the verification result passes, controlling the head-mounted equipment to execute login operation.
15. A login apparatus of a head-mounted device, comprising:
the second generation module is used for controlling the mobile terminal to generate a first random number and sending the first random number to the server;
a third generating module, configured to control the server to generate a second character string based on the first random number, and send the second character string to the mobile terminal;
the splicing conversion module is used for controlling the mobile terminal to splice the second character string and the first random number to generate an encrypted character string, and converting the encrypted character string into a login two-dimensional code by using a two-dimensional code generation specification;
the scanning and analyzing module is used for controlling the head-mounted equipment to scan the login two-dimensional code by using a transparent transmission mode, analyzing the login two-dimensional code to obtain an encrypted character string and sending the encrypted character string to the server;
the verification sending module is used for controlling the server to verify the encrypted character string to obtain a verification result and sending the verification result to the head-mounted equipment; and
and the third login module is used for controlling the head-mounted equipment to execute login operation when the verification result is that the verification result passes.
16. An electronic device, comprising:
one or more processors;
a storage device for storing one or more programs,
wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the method of any of claims 1-12.
17. A computer readable storage medium having stored thereon executable instructions which, when executed by a processor, cause the processor to perform the method according to any one of claims 1 to 12.
18. A computer program product comprising a computer program which, when executed by a processor, implements the method according to any one of claims 1 to 12.
CN202211003545.9A 2022-08-19 2022-08-19 Login method and device of head-mounted device, electronic device and medium Pending CN115373515A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211003545.9A CN115373515A (en) 2022-08-19 2022-08-19 Login method and device of head-mounted device, electronic device and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211003545.9A CN115373515A (en) 2022-08-19 2022-08-19 Login method and device of head-mounted device, electronic device and medium

Publications (1)

Publication Number Publication Date
CN115373515A true CN115373515A (en) 2022-11-22

Family

ID=84065881

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211003545.9A Pending CN115373515A (en) 2022-08-19 2022-08-19 Login method and device of head-mounted device, electronic device and medium

Country Status (1)

Country Link
CN (1) CN115373515A (en)

Similar Documents

Publication Publication Date Title
US10721336B2 (en) Transaction analyzer using graph-oriented data structures
US10755217B2 (en) Systems and methods for digital workflow and communication
US9378345B2 (en) Authentication using device ID
CN110879903A (en) Evidence storage method, evidence verification method, evidence storage device, evidence verification device, evidence storage equipment and evidence verification medium
US10922677B2 (en) Service implementation using a graphic code including a biometric identifier
US11120433B2 (en) Method and device for linking to account and providing service process
WO2015175797A1 (en) Integrated learning system
JP2019504384A (en) Biometric information authentication system and method using financial card information stored in mobile communication terminal
US20230120160A1 (en) Authentication aggregator
US20210397682A1 (en) Secure Service Interaction
CN113034118B (en) Business auditing method, system, readable storage medium and computer program product
CN114816499A (en) Electronic resource sharing method and device and storage medium
CN114500093A (en) Safe interaction method and system for message information
US10270771B1 (en) Mid-session live user authentication
CN113162770A (en) Online signature method and system
CN112598810A (en) Exhibition entrance processing method and device
CN108601064B (en) Method for providing and acquiring related information of wireless access point
CN115373515A (en) Login method and device of head-mounted device, electronic device and medium
CN104394230A (en) Method, device and system for presenting information
CN113656782A (en) Method for aggregating identification codes, device for aggregating identification codes and electronic equipment
CN113297557A (en) Account data authorization method, device, equipment and computer readable storage medium
CN113420133A (en) Session processing method, device, equipment and storage medium
US10853789B2 (en) Dynamic digital consent
CN112367314A (en) Identity authentication method, device, computing equipment and medium
CN113645239B (en) Application login method and device, user terminal and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination