WO2017215650A1 - Procédé et dispositif de connexion automatique pour client de microjeu, programme, et support - Google Patents

Procédé et dispositif de connexion automatique pour client de microjeu, programme, et support Download PDF

Info

Publication number
WO2017215650A1
WO2017215650A1 PCT/CN2017/088692 CN2017088692W WO2017215650A1 WO 2017215650 A1 WO2017215650 A1 WO 2017215650A1 CN 2017088692 W CN2017088692 W CN 2017088692W WO 2017215650 A1 WO2017215650 A1 WO 2017215650A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
check code
login
micro
verification
Prior art date
Application number
PCT/CN2017/088692
Other languages
English (en)
Chinese (zh)
Inventor
李辉
Original Assignee
北京奇虎科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from CN201610440213.5A external-priority patent/CN106130964B/zh
Priority claimed from CN201610440211.6A external-priority patent/CN105871927B/zh
Priority claimed from CN201610440215.4A external-priority patent/CN106161429B/zh
Application filed by 北京奇虎科技有限公司 filed Critical 北京奇虎科技有限公司
Publication of WO2017215650A1 publication Critical patent/WO2017215650A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/40Support for services or applications

Definitions

  • the present invention relates to the field of network communication technologies, and in particular, to a micro-end automatic login method, a micro-end automatic login device, a computer program, and a computer-readable medium.
  • micro-ends are often only a few megabytes in size, and users can complete the download process in an instant and quickly enter the game.
  • the micro-end can quickly provide users with basic game functions, and can download other required resources during the game, which significantly reduces the user's waiting time and is highly praised by a large number of users.
  • the inventor has found that the existing micro-end has at least the following defects: after the user downloads the micro-end, the user needs to manually input the user information and manually log in to the micro-end, and the manual login process is not only cumbersome to operate. And it takes time, which brings inconvenience to the user, and some users are lost invisibly.
  • the present invention has been made in order to provide an automatic login method, apparatus, computer program and computer readable medium for overcoming the above problems or at least partially solving the above problems.
  • a micro-end automatic login method including: sending a download request to a server, where the server obtains a micro-end login file to be downloaded and user information according to the download request; When the micro-end login file is obtained, the user verification code generated by the server according to the user information is obtained; after the download is completed, the user verification code is verified according to a preset verification rule, and when the verification is successful, Send a login request message to the server; automatically log in to the micro-end according to the login response message returned by the server.
  • a micro-end automatic login method including: receiving a download request sent by a user terminal, acquiring a micro-end login file to be downloaded and user information according to the download request; Generating a user check code, renaming the micro-end login file to be downloaded according to the user check code, and providing the renamed micro-end login file to the user terminal for downloading, so that the user terminal downloads After the completion, the verification is performed according to the user check code; after receiving the login request message sent by the user terminal, the login request message is returned to the user terminal according to the login request message, for the user terminal.
  • the micro-end is automatically logged according to the login response message.
  • a micro-end automatic login method including: receiving a download request sent by a user terminal, acquiring a micro-end login file to be downloaded and user information according to the download request; Generating a user check code, and redirecting the download address of the micro-end login file to be downloaded according to the user check code, so that the user-check code is included in the redirected download address for the After the user terminal is downloaded Performing verification according to the user check code; receiving a login request message sent after the user terminal successfully checks, and returning a login response message to the user terminal according to the login request message, for the user terminal to perform according to the The login response message is automatically logged into the micro-end.
  • the present invention further provides a micro-end automatic login device, comprising: a sending module, configured to send a download request to the server, where the server obtains the micro-end login file to be downloaded and the user information according to the download request. And an obtaining module, configured to: when downloading the micro-end login file, obtain a user verification code generated by the server according to the user information; and a verification module, configured to follow a preset verification rule after the download is completed The user check code is verified, and when the verification is successful, the login request message is sent to the server; the login module is adapted to automatically log in to the micro-end according to the login response message returned by the server.
  • a sending module configured to send a download request to the server, where the server obtains the micro-end login file to be downloaded and the user information according to the download request.
  • an obtaining module configured to: when downloading the micro-end login file, obtain a user verification code generated by the server according to the user information; and a verification module, configured to follow a preset verification rule after the download
  • the present invention further provides another micro-end automatic login device, comprising: a receiving module, configured to receive a download request sent by the user terminal, obtain a micro-end login file to be downloaded and user information according to the download request; and generate a check code
  • the module is configured to generate a user check code according to the user information, rename the micro-end login file to be downloaded according to the user check code, and provide the renamed micro-end login file to the user terminal for downloading.
  • the login response module is adapted to receive a login request message sent after the user terminal successfully checks, according to the login request message. The user terminal returns a login response message, so that the user terminal automatically logs in to the microend according to the login response message.
  • the present invention further provides a micro-end automatic login device, comprising: a receiving module, configured to receive a download request sent by the user terminal, obtain a micro-end login file to be downloaded and user information according to the download request; and generate a check code a module, configured to generate a user check code according to the user information, and redirect the download address of the micro-end login file to be downloaded according to the user check code, so that the redirected download address includes the a user check code for the user terminal to perform verification according to the user check code after the download is completed; the login response module is adapted to receive a login request message sent after the user terminal successfully checks, according to the The login request message returns a login response message to the user terminal, so that the user terminal automatically logs in to the microend according to the login response message.
  • a receiving module configured to receive a download request sent by the user terminal, obtain a micro-end login file to be downloaded and user information according to the download request
  • generate a check code a module, configured to generate a user check code according to
  • a computer program comprising computer readable code, when the readable code is run on a computing device, causing the computing device to perform the method of any of the embodiments of the present invention Micro-end automatic login method.
  • the embodiment of the invention further provides a computer readable medium, wherein the program according to the embodiment of the invention is stored.
  • the user terminal can send a download request to the server, so that the server acquires the user information according to the download request and generates a user check code according to the download, and then the user terminal can The user verification code is obtained during the process of downloading the micro-end login file, so that the user information is verified according to the user verification code, and after the verification is successful, the login request message is automatically sent to the server to log in. Therefore, in the present invention, the user check code generated by the server according to the user information is sent to the user terminal for verification, so that the user terminal can automatically send the user information corresponding to the user check code to the server after the verification succeeds.
  • the login request message is further automatically logged in, thereby avoiding the cumbersome operation in the prior art that the user needs to manually input the user information and manually log in, which saves user time.
  • FIG. 1 is a flowchart of a micro-end automatic login method according to an embodiment of the present invention
  • FIG. 2 is a flowchart of a micro-end automatic login method according to another embodiment of the present invention.
  • FIG. 3 is a flow chart showing an automatic login method of a microend provided by an example of the present invention.
  • FIG. 4 is a flowchart of a micro-end automatic login method according to still another embodiment of the present invention.
  • FIG. 5 is a flowchart showing an automatic login method of a microend provided by another example of the present invention.
  • FIG. 6 is a structural diagram of an automatic login device for a micro-end according to an embodiment of the present invention.
  • FIG. 7 is a structural diagram of an automatic login device for a micro-end according to another embodiment of the present invention.
  • FIG. 8 is a structural diagram of a micro-end automatic login device according to still another embodiment of the present invention.
  • Figure 9 shows a block diagram of a computing device for performing an automatic login method for a micro-end according to the present invention.
  • Fig. 10 shows a storage unit for holding or carrying program code implementing the automatic login method of the microend according to the present invention.
  • the embodiment of the invention provides a micro-end automatic login method and device, which can at least solve the technical problem that the traditional micro-end login mode requires complicated operation and is time-consuming.
  • FIG. 1 is a flowchart of a method for automatically logging in a micro-end according to an embodiment of the present invention. As shown in FIG. 1, the method specifically includes the following steps:
  • Step S110 Send a download request to the server, so that the server obtains the micro-end login file to be downloaded and the user information according to the download request.
  • the download request is used to download the micro-end login file, and the server can obtain the micro-end login file to be downloaded according to the download request, and the user information can be implemented in various manners.
  • the download request may be directly The identification information of the micro-end login file to be downloaded and the user information are included, so that the micro-end login file to be downloaded and the user information can be obtained by parsing the download request.
  • the identifier information of the micro-end login file to be downloaded may be included in the download request, and the server reads the user information at the user terminal that sends the download request by an agreement. For example, the server determines the user terminal address that sends the download request by using the source port number included in the download request, and determines information about the game account that is running on the user terminal according to the user terminal address.
  • Step S120 When downloading the micro-end login file, obtain a user verification code generated by the server according to the user information.
  • the process of generating the user check code according to the user information may be implemented in various manners.
  • the user information may be encrypted by using the md5 algorithm to obtain a user check code.
  • the function of the user check code is to provide the user terminal for the user terminal to verify the user information.
  • the user terminal may obtain the file name of the micro-end login file, or may be downloaded through the redirected micro-end login file. The address is obtained, and the present invention does not limit the specific acquisition manner.
  • Step S130 After the download is completed, the user verification code is verified according to a preset verification rule. When the verification is successful, the login request message is sent to the server.
  • the purpose of the verification mainly has two aspects. On one hand, it is used to confirm the validity of the user check code, and on the other hand, it is used to confirm whether the user check code matches the locally stored user information. Those skilled in the art can flexibly set various verification rules to achieve the above objectives.
  • Step S140 Automatically log in to the micro-end according to the login response message returned by the server.
  • the micro-end automatic login can be realized by the login request message and the login response message. Therefore, in the present invention, the user check code generated by the server according to the user information is sent to the user terminal for verification, so that the user terminal can automatically send the user information corresponding to the user check code to the server after the verification succeeds.
  • the login request message is further automatically logged in, thereby avoiding the cumbersome operation in the prior art that the user needs to manually input the user information and manually log in, which saves user time.
  • the server can obtain the user information according to the download request sent by the user terminal, and generate a user check code according to the user terminal, and can provide the user check code to the user terminal in the process of downloading the micro-end login file by the user terminal, so that The user terminal checks the user information according to the user check code, and can automatically send a login request message to the server after the verification succeeds to log in.
  • the specific implementation details of the micro-end automatic login method provided by the present invention are described in detail below with reference to examples:
  • FIG. 2 is a flowchart of a method for automatically logging in a micro-end according to another embodiment of the present invention. As shown in FIG. 2, the method specifically includes the following steps:
  • Step S210 Receive a download request sent by the user terminal, and obtain a micro-end login file to be downloaded and user information according to the download request.
  • Step S220 Generate a user check code according to the user information, rename the micro-end login file to be downloaded according to the user check code, and provide the renamed micro-end login file to the user terminal for downloading, for The user terminal performs verification according to the user check code after the download is completed.
  • the purpose of this step is to provide the user check code to the user terminal when the user terminal downloads the micro-end login file, and other ways of providing the user check code to the user terminal can also be applied to the present invention.
  • Step S230 Receive a login request message sent after the user terminal successfully checks, and return a login response message to the user terminal according to the login request message, so that the user terminal automatically logs in to the microend according to the login response message.
  • FIG. 3 shows a flow chart of a micro-end automatic login method provided by an example of the present invention. As shown in FIG. 3, the method specifically includes the following steps:
  • Step S310 The user terminal sends a download request to the server.
  • the user terminal includes various types of fixed terminals or mobile terminals, wherein the fixed terminal includes a personal computer or the like, and the mobile terminal includes a PAD, a mobile phone, and the like.
  • Various types of applications can be run on the user terminal, such as browser applications, game applications, and the like.
  • game applications include platform games, web games, and micro-end games.
  • the front-end client and the back-end server are included, wherein the front-end client is used to provide an intuitive operation of the interface class, and the back-end server is used to provide background service support for the front-end client, and Make the necessary communication with the server.
  • a download request can be sent for a certain game on the homepage to download the micro-end game corresponding to the game.
  • Step S320 The server receives the foregoing download request sent by the user terminal, and obtains the micro-end login file to be downloaded and the user information according to the download request.
  • the server mainly refers to the WEB server.
  • the server parses the download request and obtains the micro-end login file and user information to be downloaded according to the analysis result.
  • the specific acquisition manner can be flexibly set by a person skilled in the art.
  • the identifier information of the micro-end login file to be downloaded and the user information may be directly included in the download request, and the server may directly obtain the identification information of the micro-end login file and the user information by parsing.
  • the identifier information of the micro-end login file to be downloaded may be included in the download request, and the server obtains the address information of the user terminal that sends the download request according to the source address of the download request, and according to the The address information queries and acquires information about the running game application on the user terminal, and extracts the required user information therefrom.
  • the server can obtain user information through the Lua language.
  • the Lua language not only has a simple statement and high performance, but also can significantly improve the query efficiency through the Lua language.
  • those skilled in the art can also flexibly select various languages such as PHP and JAVA to obtain user information.
  • Step S330 The server generates a user check code according to the user information.
  • the user information may include various information.
  • the user information includes at least one of the following information: current system time, gaming platform, gaming area service, user identification, and user cookie.
  • the user check code is generated, the user information may be calculated according to a preset operation rule, and the user check code is generated according to the operation result.
  • the operation rules can be flexibly implemented by various algorithms, for example, md5 algorithm, SHA algorithm, hash algorithm, RSA algorithm and DES algorithm.
  • the md5 algorithm is taken as an example for description.
  • the user information is encrypted by the md5 algorithm to obtain the first operation result.
  • the preset bit number is intercepted from the first operation result as the second operation result, and the first The result of the second operation is used as a user check code.
  • 7 bits are randomly intercepted from 32 bits as a user check code.
  • the method of intercepting the preset number of bits can significantly shorten the subsequent transmission delay and improve the processing speed.
  • the first operation result may be directly used as the user verification code, or by other means.
  • To intercept the preset number of bits for example, in addition to continuously intercepting digits, you can also intercept one bit every few bits.
  • this step it may also be determined whether the second operation result is overlapped with the existing user verification code; if the determination result is no The second operation result is used as the user verification code; if the determination result is yes, the preset number of bits is re-intercepted from the first operation result until the re-intercepted preset number is not duplicated with the existing user verification code. The preset number of bits to be re-intercepted is used as the user check code.
  • the effective time and/or the effective number of the user verification code may be preset, and correspondingly, After the user check code is generated, the generation time and/or the number of times of the user check code may be recorded, and the state of the user check code whose generation time exceeds the valid time and/or the number of uses exceeds the effective number is set to an invalid state.
  • the valid time of the user check code can be set to one minute. After one minute, the user check code is in an invalid state and cannot be used normally; the effective number of the user check code can also be set to one time when it is used. After one time, it will automatically expire and cannot be reused. This makes it possible to avoid duplication between user check codes.
  • Step S340 The server renames the micro-end login file to be downloaded according to the user check code, and provides the renamed micro-end login file to the user terminal for downloading.
  • the micro-end login file usually refers to the micro-client software that can be used to run the specified game.
  • the file identifier of the micro-end login file included in the download request is DZZ
  • the file identifier can be used to determine that the corresponding micro-end login file is the micro-client software corresponding to the big-master game.
  • the original file name of the micro-end login file is DZZ.EXE.
  • the user check code is renamed according to the user check code, so that the user terminal can determine the user check code according to the renamed file name. When it is implemented, it can be renamed in various ways.
  • the user check code is directly added to the specified position of the original file name, for example, by adding an underscore to the end of the original file name, and changing the original file name to DZZ_CODE.EXE.
  • a preset encryption algorithm may be performed on the user check code, and the encryption operation result is added to a specified location of the original file name.
  • the server provides the renamed micro-end login file to the user terminal for download. Specifically, the download entry of the renamed micro-end login file may be sent to the user terminal.
  • Step S350 When downloading the micro-end login file, the user terminal acquires the user verification code according to the file name of the micro-end login file.
  • the user terminal downloads the micro-end login file through the download portal fed back by the server.
  • the download portal can be in various forms such as a download link, a download icon, and the like.
  • the user terminal obtains the user check code according to the file name of the micro-end login file.
  • the specific acquisition method depends on the renaming method in the previous step.
  • the user verification code can be obtained directly by the file name; when the second renaming method is adopted, the file name is used.
  • the specified field performs a preset decryption algorithm to obtain the user check code.
  • step S350 can be automatically triggered according to the preset operation logic, for example, the user terminal can be set to automatically obtain the user verification code before the download starts; or the user terminal automatically obtains the user verification code during the downloading process; or, the user The terminal automatically obtains the user check code after the download is completed.
  • step S350 can also be triggered according to the operation request sent by the user. For example, when the user double-clicks the downloaded micro-end login file, the front-end client of the micro-end receives the operation request of the double-click type, and the operation of the double-click type is performed. The request is passed to the backend server of the microend for processing, and the backend server of the microend reads the renamed file name and obtains the user check code according to the operation of the double click type.
  • Step S360 The user terminal checks the user check code according to a preset verification rule.
  • the step may be continuously performed according to the triggering of step S350, that is, regardless of the manner of triggering in step S350, step S360 is automatically triggered as long as step S350 is performed.
  • this step can also be automatically triggered after the download of the micro-end login file is completed, that is, no matter what mode is triggered in step S350, step S360 is automatically triggered as long as the micro-end login file is downloaded.
  • the verification may be performed by using at least one of the following rules: the first verification rule is: determining whether the generation time of the user verification code exceeds a preset effective time, and if the determination result is no, The verification is successful; if the judgment result is yes, the verification fails. For example, when the preset effective time is 1 minute, if the generation time of the user check code exceeds one minute, the verification fails.
  • the second verification rule is: determining whether the number of times the user check code is used exceeds a preset effective number. If the judgment result is negative, the verification succeeds; if the judgment result is yes, the verification fails. For example, when the preset effective number is 1 time, the verification fails as long as the user check code has been used.
  • the third verification rule is: determining the user identifier corresponding to the user cookie according to the user cookie included in the user information, and if the determined user identifier is the same as the user identifier included in the user information, the verification succeeds; The test failed.
  • the above three verification methods can be used alone or in combination.
  • those skilled in the art can flexibly set other verification methods for verification, as long as the validity of the user verification code and its matching relationship with the user information can be determined.
  • this step determines whether the obtained user check code matches the user information on the user terminal side. Since the user check code is generated according to the user information, the user check code can obtain the user information. The legality of the user check code can be determined by comparing the obtained user information with the local user information on the user terminal side.
  • Step S370 When the verification is successful, the user terminal sends a login request message to the server.
  • the login request message may include the above User information and/or user check code for the server to determine the user to log in.
  • Step S380 The server receives the login request message sent after the user terminal successfully checks, and returns a login response message to the user terminal according to the login request message.
  • the login response message includes login entry information generated according to the user information and/or the user verification code, and the login is automatically completed by logging in the portal information.
  • the server can determine, according to the user information and/or the user check code, information about the current online game name, the game area service, the game platform, and the user cookie of the user to be logged in, according to which the server allocates the corresponding login entry information to Implement automatic login for this user.
  • Step S390 The user terminal automatically logs in to the micro-end according to the login response message returned by the server.
  • the step can be performed by using a micro-end server running on the user terminal.
  • the micro-end server After receiving the login response message, the micro-end server automatically logs in according to the login entry information contained therein.
  • the login entry information may be in the form of a login link or the like.
  • the automatic login of the micro-end can be realized by the method in the embodiment of the present invention, which eliminates the cumbersome operation of manually inputting user information and manually logging in, saves a lot of time for the user, and avoids the flawlessness after the micro-end download is completed.
  • the phenomenon of user loss caused by login can be realized by the method in the embodiment of the present invention, which eliminates the cumbersome operation of manually inputting user information and manually logging in, saves a lot of time for the user, and avoids the flawlessness after the micro-end download is completed.
  • FIG. 4 is a flowchart of a micro-end automatic login method according to still another embodiment of the present invention. As shown in FIG. 4, the method specifically includes the following steps:
  • Step S410 Receive a download request sent by the user terminal, and obtain a micro-end login file to be downloaded and user information according to the download request.
  • Step S420 Generate a user check code according to the user information, and redirect the download address of the micro-end login file to be downloaded according to the user check code, so that the user verification is included in the redirected download address.
  • the code is provided for the user terminal to verify according to the user check code after the download is completed.
  • the purpose of this step is to provide the user check code to the user terminal when the user terminal downloads the micro-end login file, and other ways of providing the user check code to the user terminal can also be applied to the present invention.
  • Step S430 Receive a login request message sent after the user terminal successfully checks, and return a login response message to the user terminal according to the login request message, so that the user terminal automatically logs in to the microend according to the login response message.
  • FIG. 5 is a flow chart showing an automatic login method of a micro-end provided by another example of the present invention. As shown in FIG. 5, the method specifically includes the following steps:
  • Step S510 The user terminal sends a download request to the server.
  • the user terminal includes various types of fixed terminals or mobile terminals, wherein the fixed terminal includes a personal computer or the like, and the mobile terminal includes a PAD, a mobile phone, and the like.
  • Various types of applications can be run on the user terminal, such as browser applications, game applications, and the like.
  • the game application may include platform games, web games, micro-end games, and the like.
  • the front-end client and the back-end server may be included, wherein the front-end client is used to provide an intuitive operation of the interface class, and the back-end server is used to provide background service support for the front-end client. And make the necessary communication with the server.
  • a download request can be sent for a certain game on the homepage to download the micro-end game corresponding to the game.
  • Step S520 The server receives the foregoing download request sent by the user terminal, and obtains the micro-end login file to be downloaded and the user information according to the download request.
  • the server mainly refers to the WEB server.
  • the server parses the download request and obtains the micro-end login file and user information to be downloaded according to the analysis result.
  • the specific acquisition manner can be flexibly set by a person skilled in the art.
  • the micro-end to be downloaded can be directly included in the download request.
  • the identification information of the recorded file and the user information the server can directly obtain the identification information of the micro-end login file and the user information through parsing.
  • the identifier information of the micro-end login file to be downloaded may be included in the download request, and the server obtains the address information of the user terminal that sends the download request according to the source address of the download request, and according to the The address information queries and acquires information about the running game application on the user terminal, and extracts the required user information therefrom.
  • the server can obtain user information through the Lua language.
  • the Lua language not only has a simple statement and high performance, but also can significantly improve the query efficiency through the Lua language.
  • those skilled in the art can also flexibly select various languages such as PHP and JAVA to obtain user information.
  • Step S530 The server generates a user check code according to the user information.
  • the user information may include various information.
  • the user information includes at least one of the following information: current system time, gaming platform, gaming area service, user identification, and user cookie.
  • the user check code is generated, the user information may be calculated according to a preset operation rule, and the user check code is generated according to the operation result.
  • the operation rules can be flexibly implemented by various algorithms, for example, md5 algorithm, SHA algorithm, hash algorithm, RSA algorithm and DES algorithm.
  • the md5 algorithm is taken as an example for description.
  • the user information is encrypted by the md5 algorithm to obtain the first operation result.
  • the preset bit number is intercepted from the first operation result as the second operation result, and the first The result of the second operation is used as a user check code.
  • 7 bits are randomly intercepted from 32 bits as a user check code.
  • the method of intercepting the preset number of bits can significantly shorten the subsequent transmission delay and improve the processing speed.
  • the first operation result may be directly used as the user verification code, or by other means.
  • To intercept the preset number of bits for example, in addition to continuously intercepting digits, you can also intercept one bit every few bits.
  • this step it may also be determined whether the second operation result is overlapped with the existing user verification code; if the determination result is no The second operation result is used as the user verification code; if the determination result is yes, the preset number of bits is re-intercepted from the first operation result until the re-intercepted preset number is not duplicated with the existing user verification code. The preset number of bits to be re-intercepted is used as the user check code.
  • the effective time and/or the effective number of the user verification code may be preset, and correspondingly, After the user check code is generated, the generation time and/or the number of times of the user check code may be recorded, and the state of the user check code whose generation time exceeds the valid time and/or the number of uses exceeds the effective number is set to an invalid state.
  • the valid time of the user check code can be set to one minute. After one minute, the user check code is in an invalid state and cannot be used normally; the effective number of the user check code can also be set to one time when it is used. After one time, it will automatically expire and cannot be reused. This makes it possible to avoid duplication between user check codes.
  • Step S540 The server redirects the download address of the micro-end login file to be downloaded according to the user verification code, so that the redirected download address includes the user verification code.
  • the redirection operation can be implemented as follows: First, a check parameter field is added to the download address of the micro-end login file to be downloaded, and the value of the check parameter field is set to the value of the user check code.
  • the check parameter field can be set anywhere in the download address, for example, at the end of the download address.
  • the download address of the micro-end login file to be downloaded is jumped to the download address after the check parameter field is added by the page jump mode.
  • the jump can be performed by the 302 jump mode.
  • 302 jump is also called temporary jump.
  • the user terminal will request the download address twice.
  • the first requested download address is the original download address that does not contain the check parameter field, the second time.
  • the requested download address is the redirected download address containing the check parameter field, and since the 302 jump is a temporary jump, the search engine does not store the redirected download address. Because of the server every The generated user check code is different. Therefore, the redirect address is different each time the redirect operation is performed. Therefore, using the 302 jump mode can complete the temporary redirect operation without changing the original download address.
  • Step S550 When downloading the micro-end login file, the user terminal acquires the user check code according to the check parameter field included in the downloaded address of the redirected micro-end login file.
  • the user terminal downloads the micro-end login file through the download address fed back by the server. Since the download address is redirected, the user terminal needs to request the server twice, first requesting the original download address from the server, and secondly requesting the server to redirect the download address according to the redirect instruction. During the download process or after the download is completed, the user terminal obtains the user check code according to the check parameter field included in the redirected download address.
  • the step S550 may be automatically triggered according to the preset operation logic.
  • the user terminal may be configured to automatically obtain the user verification code during the downloading process; or the user terminal automatically acquires the user verification code after the download is completed.
  • step S550 in the present embodiment generally does not have to be triggered according to an operation request issued by the user.
  • Step S560 The user terminal checks the user check code according to a preset check rule.
  • the step may be continuously performed according to the triggering of step S550, that is, regardless of the manner of triggering in step S550, step S560 is automatically triggered as long as step S550 is performed.
  • this step can also be triggered automatically after the download of the micro-end login file is completed, that is, no matter what mode is triggered in step S550, step S560 is automatically triggered as long as the micro-end login file is downloaded.
  • the verification may be performed by using at least one of the following rules: the first verification rule is: determining whether the generation time of the user verification code exceeds a preset effective time, and if the determination result is no, The verification is successful; if the judgment result is yes, the verification fails. For example, when the preset effective time is 1 minute, if the generation time of the user check code exceeds one minute, the verification fails.
  • the second verification rule is: determining whether the number of times the user check code is used exceeds a preset effective number. If the judgment result is negative, the verification succeeds; if the judgment result is yes, the verification fails. For example, when the preset effective number is 1 time, the verification fails as long as the user check code has been used.
  • the third verification rule is: determining the user identifier corresponding to the user cookie according to the user cookie included in the user information, and if the determined user identifier is the same as the user identifier included in the user information, the verification succeeds; The test failed.
  • the above three verification methods can be used alone or in combination.
  • those skilled in the art can flexibly set other verification methods for verification, as long as the validity of the user verification code and its matching relationship with the user information can be determined.
  • this step determines whether the obtained user check code matches the user information on the user terminal side. Since the user check code is generated according to the user information, the user check code can obtain the user information. The legality of the user check code can be determined by comparing the obtained user information with the local user information on the user terminal side.
  • Step S570 When the verification is successful, the user terminal sends a login request message to the server.
  • the login request message may include the foregoing user information and/or a user check code for the server to determine the user to be logged in.
  • Step S580 The server receives the login request message sent after the user terminal successfully checks, according to the login request message. A login response message is returned to the user terminal.
  • the login response message includes login entry information generated according to the user information and/or the user verification code, and the login is automatically completed by logging in the portal information.
  • the server can determine, according to the user information and/or the user check code, information about the current online game name, the game area service, the game platform, and the user cookie of the user to be logged in, according to which the server allocates the corresponding login entry information to Implement automatic login for this user.
  • Step S590 The user terminal automatically logs in to the micro-end according to the login response message returned by the server.
  • the step can be performed by using a micro-end server running on the user terminal.
  • the micro-end server After receiving the login response message, the micro-end server automatically logs in according to the login entry information contained therein.
  • the login entry information may be in the form of a login link or the like.
  • the server can generate a user check code for verification, and on the other hand, the user information can be verified by the micro-end server on the user terminal. And after the verification is passed, the login entry information for logging in the micro-end game is automatically requested from the server, thereby realizing the automatic login of the micro-end, eliminating the cumbersome operation of the user manually inputting the user information and manually logging in, saving the user a large amount of operations. Time, avoiding the phenomenon of user loss due to innocent login after the micro-end download is completed.
  • micro-end server can be integrated in the local area of the user terminal. More preferably, in order to facilitate unified management of each micro-end client, the accuracy and efficiency of the verification are improved.
  • the micro-end server can also be implemented by one or more separate web servers.
  • the above examples are mainly applied to the chrome browser or the Firefox browser.
  • the common feature of the two browsers is that the downloaded micro-end login file is usually an .exe format file, and after the download is completed, the user has to double-click.
  • the micro-end login file triggers the automatic login of the micro-end. Therefore, by renaming the micro-end login file, the micro-end login file automatically acquires and verifies the user verification code when receiving the double-click type operation request, so that The effect of automatic login after verification is passed.
  • the above example is mainly applied to the IE browser.
  • the micro-end login file downloaded through the browser is usually a file in the .application format, and after the download is completed, the IE browser can automatically run the downloaded micro-end login file without the user. The double-click operation is performed.
  • the download address of the micro-end login file can be redirected, so that the user terminal obtains the user verification code through the redirected download address during the download process and automatically performs verification.
  • the present invention can also be applied to other types of browsers, and the implementation details in the above embodiments are adjusted according to the characteristics of the browser, as long as the server can transmit the user verification code to the user.
  • the terminal can be used for the purpose of verification by the user terminal.
  • the present invention may also include the following embodiments in order to combine the above examples. Specifically, in the embodiment of the present invention, the steps in the above examples are first performed.
  • step S310 to step S330 the server determines the kernel type of the browser on the user terminal side, and if it determines the first type of the kernel type of the browser (ie, the chrome type or the Firefox type), performs step S340 to the step in the above example.
  • FIG. 6 is a structural diagram of an automatic login device for a micro-end according to an embodiment of the present invention. As shown in Figure 6, the device includes:
  • the sending module 61 is adapted to send a download request to the server, where the server obtains the micro-end login file to be downloaded and the user information according to the download request;
  • the obtaining module 62 is configured to acquire, when the micro-end login file is downloaded, a user check code generated by the server according to the user information;
  • the verification module 63 is configured to verify the user verification code according to a preset verification rule after the download is completed, and send a login request message to the server when the verification is successful;
  • the login module 64 is adapted to automatically log in to the microend according to the login response message returned by the server.
  • the obtaining module 62 is specifically configured to: obtain a user check code according to the file name of the micro-end login file.
  • the download request and the login request message are request messages sent by a chrome browser or a Firefox browser.
  • the obtaining module 62 is specifically configured to: obtain the user check code according to the check parameter field included in the download address of the redirected micro-end login file.
  • the download request and the login request message are request messages sent by an IE browser.
  • the user information includes at least one of the following: a current system time, a gaming platform, a gaming area, a user identification, and a user cookie.
  • the preset verification rule includes at least one of the following rules:
  • Determining a user identifier corresponding to the user cookie according to the user cookie included in the user information if the user identifier corresponding to the user cookie is the same as the user identifier included in the user information, the verification succeeds; failure.
  • the login request message includes the user information and/or the user verification code
  • the login response message includes a login generated according to the user information and/or the user verification code. Entrance information.
  • FIG. 7 is a structural diagram of an automatic login device for a micro-end according to another embodiment of the present invention. As shown in Figure 7, the device includes:
  • the receiving module 71 is adapted to receive a download request sent by the user terminal, and obtain the micro-end login file to be downloaded and the user information according to the download request.
  • the check code generating module 72 is configured to generate a user check code according to the user information, and rename the micro-end login file to be downloaded according to the user check code, and rename the renamed micro-end login file. Providing to the user terminal for downloading, so that the user terminal performs verification according to the user check code after the download is completed;
  • the login response module 73 is adapted to receive a login request message sent after the user terminal successfully checks, and return a login response message to the user terminal according to the login request message, for the user terminal to use the login response message according to the login response message. Automatically log in to the micro-end.
  • the check code generating module 72 is configured to: perform operations on the user information according to a preset operation rule, obtain a first operation result, and generate the user check code according to the first operation result.
  • the operation rule includes at least one of the following algorithms: an md5 algorithm, a SHA algorithm, a hash algorithm, an RSA algorithm, and a DES algorithm
  • the user information includes at least one of the following information: current system time, Game platform, game zone service, user identification, and user cookies.
  • the check code generating module 72 is configured to: intercept a preset number of bits from the first operation result as a second operation result, and use the second operation result as the user check code.
  • the check code generating module 72 is specifically configured to: determine whether the second operation result is repeated with an existing user check code; if the determination result is no, the second operation result is used as the a user check code; if the result of the determination is yes, the preset number of bits is re-intercepted from the first operation result until the re-intercepted preset number of bits does not overlap with the existing user check code, The re-intercepted preset number of bits is used as the user check code.
  • the device includes: a setting module 74, configured to preset a valid time and/or a valid number of times of the user check code, and the setting module may record the user check code after generating the user check code
  • the generation time and/or the number of uses, the state of the user check code whose generation time exceeds the effective time and/or the number of uses exceeds the effective number is set to an invalid state.
  • the login request message includes the user information and/or the user check code
  • the login response message includes login entry information generated according to the user information and/or the user check code.
  • the download request and the login request message are request messages sent by a chrome browser or a Firefox browser.
  • FIG. 8 is a structural diagram of a micro-end automatic login device according to still another embodiment of the present invention. As shown in Figure 8, the device includes:
  • the receiving module 81 is adapted to receive a download request sent by the user terminal, and obtain the micro-end login file to be downloaded and the user information according to the download request.
  • the check code generating module 82 is configured to generate a user check code according to the user information, and redirect the download address of the micro-end login file to be downloaded according to the user check code, so that the redirected download is performed.
  • the user check code is included in the address, so that the user terminal performs verification according to the user check code after the download is completed;
  • the login response module 83 is adapted to receive a login request message sent after the user terminal successfully checks, and return a login response message to the user terminal according to the login request message, for the user terminal to use the login response message according to the login response message. Automatically log in to the micro-end.
  • the check code generating module 82 is configured to: add a check parameter field to the download address of the micro-end login file to be downloaded, and set a value of the check parameter field to the user.
  • the value of the check code is obtained by the page jump mode, and the download address of the micro-end login file to be downloaded is jumped to the download address after the check parameter field is added.
  • the check code generating module 82 is specifically configured to: perform operations on the user information according to a preset operation rule, obtain a first operation result, and generate the user check code according to the first operation result.
  • the operation rule includes at least one of the following algorithms: an md5 algorithm, a SHA algorithm, a hash algorithm, an RSA algorithm, and a DES algorithm
  • the user information includes at least one of the following information: current system time, Game platform, game zone service, user identification, and user cookies.
  • the check code generating module 82 is specifically configured to: intercept a preset number of bits from the first operation result as a second operation result, and use the second operation result as the user check code.
  • the check code generating module 82 is specifically configured to: determine whether the second operation result is repeated with an existing user check code; if the determination result is no, the second operation result is used as the a user check code; if the result of the determination is yes, the preset number of bits is re-intercepted from the first operation result until the re-intercepted preset number of bits does not overlap with the existing user check code, The re-intercepted preset number of bits is used as the user check code.
  • the method may further include: a setting module 84, configured to preset a valid time and/or a valid number of times of the user check code, and the setting module may record the user check code after generating the user check code.
  • a setting module 84 configured to preset a valid time and/or a valid number of times of the user check code
  • the setting module may record the user check code after generating the user check code. The generation time and/or the number of uses, the generation of the user check code whose time exceeds the effective time and/or the number of uses exceeds the effective number of times Invalid state.
  • the login request message may include the user information and/or the user check code
  • the login response message includes a login entry generated according to the user information and/or the user check code. information.
  • the download request and the login request message are request messages sent by an IE browser.
  • the server can acquire the user information according to the download request sent by the user terminal, and generate a user verification code according to the data, and then can download the user verification code.
  • the user check code is provided to the user terminal during the process of logging in the file, so that the user terminal checks the user information according to the user check code, and automatically sends a login request message to the server to log in after the verification succeeds.
  • the user check code generated by the server according to the user information is sent to the user terminal for verification, so that the user terminal can automatically send the user information corresponding to the user check code to the server after the verification succeeds.
  • the login request message is further automatically logged in, thereby avoiding the cumbersome operation in the prior art that the user needs to manually input the user information and manually log in, which saves user time.
  • modules in the devices of the embodiments can be adaptively changed and placed in one or more devices different from the embodiment.
  • the modules or units or components of the embodiments may be combined into one module or unit or component, and further they may be divided into a plurality of sub-modules or sub-units or sub-components.
  • any combination of the features disclosed in the specification, including the accompanying claims, the abstract and the drawings, and any methods so disclosed, or All processes or units of the device are combined.
  • Each feature disclosed in this specification (including the accompanying claims, the abstract and the drawings) may be replaced by alternative features that provide the same, equivalent or similar purpose.
  • Various component embodiments of the present invention may be implemented in hardware or in software running on one or more processors Module implementations, or in combinations of them.
  • a microprocessor or digital signal processor may be used in practice to implement some or all of the functionality of some or all of the components in accordance with embodiments of the present invention.
  • the invention can also be implemented as a device or device program (e.g., a computer program and a computer program product) for performing some or all of the methods described herein.
  • a program implementing the invention may be stored on a computer readable medium or may be in the form of one or more signals. Such signals may be downloaded from an Internet website, provided on a carrier signal, or provided in any other form.
  • Figure 9 illustrates a computing device that can implement an automatic login method for microends in accordance with the present invention.
  • the computing device conventionally includes a processor 910 and a program product or readable medium in the form of a memory 920.
  • Memory 920 can be an electronic memory such as a flash memory, EEPROM (Electrically Erasable Programmable Read Only Memory), EPROM, or ROM.
  • Memory 920 has a memory space 930 for program code 931 for performing any of the method steps described above.
  • storage space 930 for program code may include various program code 931 for implementing various steps in the above methods, respectively.
  • These program codes can be read from or written to one or more program products.
  • These program products include program code carriers such as memory cards.
  • Such a program product is typically a portable or fixed storage unit as described with reference to FIG.
  • the storage unit may have storage segments, storage spaces, and the like that are similarly arranged to memory 920 in the computing device of FIG.
  • the program code can be compressed, for example, in an appropriate form.
  • the storage unit includes readable code 931', ie, code that can be read by a processor, such as 910, which, when executed by a computing device, causes the computing device to perform various steps in the methods described above. .

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

L'invention concerne un procédé et un dispositif de connexion automatique pour un client de microjeu, un programme, et un support. L'invention vise au moins à résoudre le problème technique lié à la complexité des opérations et à la consommation de temps dues à l'approche de connexion classique d'un client de microjeu exigeant une connexion manuelle. Le procédé consiste à : envoyer une demande de chargement aval à un serveur, pour que le serveur obtienne un fichier de connexion de client de microjeu devant être chargé vers l'aval et des informations utilisateur d'après la demande de chargement aval ; obtenir un code de vérification d'utilisateur généré par le serveur d'après les informations utilisateur lors du chargement aval du fichier de connexion de client de microjeu ; vérifier le code de vérification d'utilisateur selon une règle de vérification prédéterminée une fois le chargement aval accompli et, si le contrôle est concluant, envoyer un message de demande de connexion au serveur ; et se connecter automatiquement à un client de microjeu d'après un message de réponse de connexion retourné par le serveur.
PCT/CN2017/088692 2016-06-17 2017-06-16 Procédé et dispositif de connexion automatique pour client de microjeu, programme, et support WO2017215650A1 (fr)

Applications Claiming Priority (6)

Application Number Priority Date Filing Date Title
CN201610440213.5A CN106130964B (zh) 2016-06-17 2016-06-17 微端的自动登录方法及装置
CN201610440211.6A CN105871927B (zh) 2016-06-17 2016-06-17 微端的自动登录方法及装置
CN201610440211.6 2016-06-17
CN201610440213.5 2016-06-17
CN201610440215.4 2016-06-17
CN201610440215.4A CN106161429B (zh) 2016-06-17 2016-06-17 微端的自动登录方法及装置

Publications (1)

Publication Number Publication Date
WO2017215650A1 true WO2017215650A1 (fr) 2017-12-21

Family

ID=60663003

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/088692 WO2017215650A1 (fr) 2016-06-17 2017-06-16 Procédé et dispositif de connexion automatique pour client de microjeu, programme, et support

Country Status (1)

Country Link
WO (1) WO2017215650A1 (fr)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108170557A (zh) * 2018-01-24 2018-06-15 百度在线网络技术(北京)有限公司 用于输出信息的方法和装置
CN111744203A (zh) * 2020-06-23 2020-10-09 完美世界(北京)软件科技发展有限公司 云游戏的登录方法及装置、存储介质、电子装置
CN112613298A (zh) * 2020-12-29 2021-04-06 北京嘀嘀无限科技发展有限公司 数据校验方法、***、计算机程序产品和电子设备
CN112965933A (zh) * 2021-03-16 2021-06-15 支付宝(杭州)信息技术有限公司 一种业务规则加载方法、装置及设备

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104158896A (zh) * 2014-08-22 2014-11-19 百度在线网络技术(北京)有限公司 应用程序的推荐方法、***及应用程序商店服务器
CN104503784A (zh) * 2014-12-16 2015-04-08 珠海金山网络游戏科技有限公司 一种利用脚本控制微端下载的方法和***
CN105871927A (zh) * 2016-06-17 2016-08-17 北京奇虎科技有限公司 微端的自动登录方法及装置
CN106130964A (zh) * 2016-06-17 2016-11-16 北京奇虎科技有限公司 微端的自动登录方法及装置
CN106161429A (zh) * 2016-06-17 2016-11-23 北京奇虎科技有限公司 微端的自动登录方法及装置

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104158896A (zh) * 2014-08-22 2014-11-19 百度在线网络技术(北京)有限公司 应用程序的推荐方法、***及应用程序商店服务器
CN104503784A (zh) * 2014-12-16 2015-04-08 珠海金山网络游戏科技有限公司 一种利用脚本控制微端下载的方法和***
CN105871927A (zh) * 2016-06-17 2016-08-17 北京奇虎科技有限公司 微端的自动登录方法及装置
CN106130964A (zh) * 2016-06-17 2016-11-16 北京奇虎科技有限公司 微端的自动登录方法及装置
CN106161429A (zh) * 2016-06-17 2016-11-23 北京奇虎科技有限公司 微端的自动登录方法及装置

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108170557A (zh) * 2018-01-24 2018-06-15 百度在线网络技术(北京)有限公司 用于输出信息的方法和装置
CN108170557B (zh) * 2018-01-24 2022-11-25 百度在线网络技术(北京)有限公司 用于输出信息的方法和装置
CN111744203A (zh) * 2020-06-23 2020-10-09 完美世界(北京)软件科技发展有限公司 云游戏的登录方法及装置、存储介质、电子装置
CN112613298A (zh) * 2020-12-29 2021-04-06 北京嘀嘀无限科技发展有限公司 数据校验方法、***、计算机程序产品和电子设备
CN112965933A (zh) * 2021-03-16 2021-06-15 支付宝(杭州)信息技术有限公司 一种业务规则加载方法、装置及设备
CN112965933B (zh) * 2021-03-16 2023-07-25 支付宝(杭州)信息技术有限公司 一种业务规则加载方法、装置及设备

Similar Documents

Publication Publication Date Title
WO2017076193A1 (fr) Procédé et appareil de traitement de demande client
JP6282349B2 (ja) ウェブサイトにログインしている端末がモバイル端末であるかどうかを決定するための方法およびシステム
CN106302337B (zh) 漏洞检测方法和装置
CN105472052B (zh) 一种跨域服务器的登录方法和***
US10430487B2 (en) System and method to share content utilizing universal link format
US10778680B2 (en) Method and apparatus for accessing website
JP6438031B2 (ja) クライアントのダウンロード及びインストール方法及び装置
WO2017215650A1 (fr) Procédé et dispositif de connexion automatique pour client de microjeu, programme, et support
WO2016070718A1 (fr) Procédé, dispositif, et navigateur, pour le téléchargement de fichiers
CN111163095B (zh) 网络攻击分析方法、网络攻击分析装置、计算设备和介质
US10834105B2 (en) Method and apparatus for identifying malicious website, and computer storage medium
US11770385B2 (en) Systems and methods for malicious client detection through property analysis
US10992669B2 (en) Acquisition of a device fingerprint from an instance of a client application
WO2017107961A1 (fr) Système et procédé de sauvegarde
US20140215565A1 (en) Authentication server, and method authenticating application
JP2019519849A (ja) サーバへの攻撃を防ぐ方法及びデバイス
CN112187747A (zh) 一种远程容器登录方法、装置及电子设备
CN105592169A (zh) 终端识别方法及装置
CN112152993A (zh) 网页劫持的检测方法、装置、计算机设备以及存储介质
US9780951B2 (en) Prevention of forgery of web requests to a server
CN105871927B (zh) 微端的自动登录方法及装置
CN106161429B (zh) 微端的自动登录方法及装置
CN106130964B (zh) 微端的自动登录方法及装置
US20140317238A1 (en) Website server request rerouting
CN114448722A (zh) 跨浏览器登录方法、装置、计算机设备和存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17812761

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17812761

Country of ref document: EP

Kind code of ref document: A1