[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN109787991B - Secret-free login method, device, equipment and storage medium based on mobile terminal - Google Patents

Secret-free login method, device, equipment and storage medium based on mobile terminal Download PDF

Info

Publication number
CN109787991B
CN109787991B CN201910100168.2A CN201910100168A CN109787991B CN 109787991 B CN109787991 B CN 109787991B CN 201910100168 A CN201910100168 A CN 201910100168A CN 109787991 B CN109787991 B CN 109787991B
Authority
CN
China
Prior art keywords
current application
mobile phone
identifier
page
interface
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910100168.2A
Other languages
Chinese (zh)
Other versions
CN109787991A (en
Inventor
朱坤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN201910100168.2A priority Critical patent/CN109787991B/en
Publication of CN109787991A publication Critical patent/CN109787991A/en
Priority to PCT/CN2019/118286 priority patent/WO2020155767A1/en
Application granted granted Critical
Publication of CN109787991B publication Critical patent/CN109787991B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application relates to the field of consensus mechanisms, and particularly discloses a secret-free login method based on a mobile terminal, which comprises the steps of receiving a login request triggered by a user when the user uses a current application, wherein the login request comprises authorization information and an identifier of the current application, and the authorization information is used for authorizing the current application to allow the current application to access a telephone communication interface of a mobile phone; responding to the login request, and acquiring a mobile phone number from the telephone communication interface of the mobile phone; and sending the mobile phone number and the identifier of the current application to a server through a mobile network, so that the server calls a verification code generation interface to generate a verification code, and sends the verification code and the identifier of the current application to the mobile phone. The invention also discloses a secret-free login device based on the mobile terminal, which is used for executing the secret-free login method based on the mobile terminal. The invention can realize the secret-free login function based on the mobile terminal.

Description

Secret-free login method, device, equipment and storage medium based on mobile terminal
Technical Field
The present application relates to the field of consensus mechanisms, and in particular, to a secret-free login method, device, apparatus, and storage medium based on a mobile terminal.
Background
Most of the current internet products such as APP adopt account passwords and mobile phone short message login modes, and because of the massive popularization of mobile phones and the fact that the mobile phone number login can not only avoid the trouble of recording account passwords, but also avoid the registration process, the login mode of mobile phone short message verification is more convenient and faster than the account password login mode, and the use frequency is higher. However, in the process of using the mobile phone, the technicians find that the current mobile phone verification mode has some defects, and the first user may not receive the short message; secondly, the verification code needs to be manually input after the short message is acquired, and the operation is troublesome.
Disclosure of Invention
In order to solve the above problems, the present invention provides a secret-free login method and device based on a mobile terminal.
In a first aspect, the present invention provides a secret-free login method based on a mobile terminal, including:
receiving a login request triggered by a user when the user uses a current application, wherein the login request comprises authorization information and an identifier of the current application, and the authorization information is used for authorizing the current application to allow the current application to access a telephone communication interface of a mobile phone;
responding to the login request, and acquiring a mobile phone number from the telephone communication interface of the mobile phone;
sending the mobile phone number and the identifier of the current application to a server through a mobile network, so that the server calls a verification code generation interface to generate a verification code, and the server sends the verification code and the identifier of the current application to the mobile phone;
receiving the verification code and the identifier of the current application sent by the server, and transmitting the verification code to a monitoring interface of the current application pointed by the identifier of the current application by the mobile phone according to the identifier of the current application;
and calling a verification code filling interface of the current application to fill and write the verification in a verification page of the current application after the monitoring interface of the current application monitors the verification code.
Optionally, after the listening interface of the current application monitors the verification code, the listening interface calls a verification code filling interface of the current application to fill the verification code in the verification page of the current application, including the substeps of:
triggering the monitoring interface to read a page identifier pre-stored in a mobile phone memory, wherein the page identifier is bound with the identifier of the current application;
triggering the listening interface to transmit the page identification to a page loading interface,
triggering a page loading interface to set the page identifier at the head of a heap storage space, so that the current page of the mobile phone is the page pointed by the page identifier;
and calling a verification code filling interface by the verification code filling module to fill and write the verification in the verification page of the current application.
Optionally, before receiving the login request triggered by the user when using the current application, the method further includes:
generating an authorization prompt so that the user inputs an authorization instruction according to the authorization prompt, and if the authorization instruction indicates that the user does not grant the permission of acquiring the mobile phone number, prompting the user to manually input the mobile phone number;
and if the authorization instruction indicates that the user grants the permission to acquire the mobile phone number, generating the authorization information.
Optionally, before sending the mobile phone number and the identifier of the current application to the server, the method includes:
and encrypting the mobile phone number and the identifier of the current application according to a preset encryption rule, so that the server decrypts the mobile phone number and the identifier of the current application according to a decryption rule corresponding to the preset encryption rule after receiving the mobile phone number and the identifier of the current application.
In a second aspect, the present invention provides a secret-free login method and device based on a mobile terminal, where the device includes:
the system comprises a login request receiving module, a login request receiving module and a login request processing module, wherein the login request is triggered when a user uses a current application, the login request comprises authorization information and an identifier of the current application, and the authorization information is used for authorizing the current application to allow the current application to access a telephone communication interface of a mobile phone;
the login request response module is used for acquiring a mobile phone number from the telephone communication interface of the mobile phone, sending the mobile phone number and the identifier of the current application to a server through a mobile network, so that the server calls a verification code generation interface to generate a verification code, and sends the verification code and the identifier of the current application to the mobile phone;
the setting module is used for receiving the verification code and the identifier of the current application sent by the server, and the mobile phone transmits the verification code to a monitoring interface of the current application pointed by the identifier of the current application according to the identifier of the current application;
and the setting module is used for calling the verification code filling interface of the current application to fill and write the verification in the verification page of the current application after the monitoring interface of the current application monitors the verification code.
Optionally, the setting module includes:
page identification reading submodule: the monitoring interface is used for triggering the monitoring interface to read a page identifier pre-stored in a mobile phone memory, and the page identifier is bound with the identifier of the current application
The page filling sub-module is used for triggering the monitoring interface to transmit the page identifier to a page loading interface; the page filling sub-module is further used for triggering a page loading interface to set the page identifier at the head of the heap memory space, so that the current page of the mobile phone is the page pointed by the page identifier; and the page filling sub-module is also used for triggering the verification code filling module to call a verification code filling interface to write the verification in the verification page of the current application.
Optionally, the apparatus further comprises:
and the authorization module is used for generating an authorization prompt so that the user inputs an authorization instruction according to the authorization prompt, if the authorization instruction indicates that the user does not grant the authority to acquire the mobile phone number, the user is prompted to manually input the mobile phone number, and if the authorization instruction indicates that the user grants the authority to acquire the mobile phone number, the authorization information is generated.
Optionally, the apparatus further comprises:
and the encryption module is used for encrypting the mobile phone number and the identifier of the current application according to a preset encryption rule so that the server decrypts the mobile phone number and the identifier of the current application according to a decryption rule corresponding to the preset encryption rule after receiving the mobile phone number and the identifier of the current application.
In a third aspect, the present invention provides a secret-less login device based on a mobile terminal, including:
a memory storing executable program code;
a processor coupled to the memory;
the processor calls the executable program code stored in the memory to execute the steps of the mobile terminal based secure login method according to the first aspect of the present invention.
In a fourth aspect, the present invention provides a computer storage medium storing computer instructions which, when invoked, perform the method of the first aspect of the invention.
Therefore, in the embodiment of the invention, only one verification request needs to be initiated by the user, and the subsequent verification link can be completed according to the verification request, so that the safety problem of the user side caused by factors such as signals, viruses and the like is effectively avoided, and the problem of complicated operation caused by manual verification code input is avoided.
Additional aspects and advantages of the present application will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the present application.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic flowchart of a secret-free login method based on a mobile terminal according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of a secret-less login device based on a mobile terminal according to a second embodiment of the present invention;
fig. 3 is a schematic structural diagram of a secret-less login device based on a mobile terminal according to a third embodiment of the present invention.
Detailed Description
In order to make the technical solutions of the present invention better understood, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terms "first," "second," and the like in the description and claims of the present invention and in the above-described drawings are used for distinguishing between different objects and not for describing a particular order. Furthermore, the terms "include" and "have," as well as any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, apparatus, product, or apparatus that comprises a list of steps or elements is not limited to those listed but may alternatively include other steps or elements not listed or inherent to such process, method, product, or apparatus.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the invention. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein can be combined with other embodiments.
Most of the current internet products such as APP adopt account passwords and mobile phone short message login modes, and because of the massive popularization of mobile phones and the fact that the mobile phone number login can not only avoid the trouble of recording account passwords, but also avoid the registration process, the login mode of mobile phone short message verification is more convenient and faster than the account password login mode, and the use frequency is higher. However, in the process of using the mobile phone, the technicians find that the current mobile phone verification mode has some defects, and the first user may not receive the short message; secondly, the verification code needs to be manually input after the short message is acquired, and the operation is troublesome.
In view of the above problems, the following describes a secret-free login method and device based on a mobile terminal in detail with reference to specific implementation methods.
Implement one
Referring to fig. 1, fig. 1 is a schematic flowchart illustrating a secret-less login method based on a mobile terminal according to an embodiment of the present invention, as shown in fig. 1, the secret-less login method based on the mobile terminal includes:
101. and receiving a login request triggered by a user when the user uses the current application, wherein the login request comprises authorization information and the identifier of the current application, and the authorization information is used for authorizing the current application to allow the current application to access the telephone communication interface of the mobile phone.
102. Responding to the login request, and acquiring a mobile phone number from a telephone communication interface of the mobile phone;
103. and sending the mobile phone number and the identifier of the current application to a server through a mobile network, so that the server calls a verification code generation interface to generate a verification code, and sends the verification code and the identifier of the current application to the mobile phone.
In the embodiment of the invention, the mobile phone sends the mobile phone number and the identifier of the current application to the server in a JSON format. For example, loginnfo ═ phone:13600000006, id:6666 }.
In the embodiment of the invention, the server analyzes the phone number information in the JSON data, and the communication session information needs to be kept for subsequent verification code returning operation. Obviously, the connection mode of the communication session information is a long connection mode.
In the embodiment of the present invention, after the server receives the mobile phone number, the secret-less login method based on the mobile terminal according to the embodiment of the present invention further includes:
the server matches the operator according to the mobile phone number and requests the operator to return the verification code.
In the embodiment of the present invention, as an optional implementation manner, the matching, by the server, the operator according to the mobile phone number may include the substeps of:
and judging the number section to which the mobile phone number belongs, and matching the operator according to the number section range.
In the embodiment of the present invention, optionally, the number segment groups of the same operator are spliced into a plurality of character strings according to a predetermined format, and then the operator and the character strings are subjected to mapping management, and an optional manner is that number segment characters corresponding to a plurality of operators are stored as a relationship data result, for example, MAP is used to associate the relationship between the character strings and the operator.
In the embodiment of the present invention, optionally, the first three numbers of the mobile phone number are extracted as the number segment comparison parameters.
104. Receiving a verification code and a current application identifier sent by a server, and transmitting the verification code into a monitoring interface of the current application to which the current application identifier points by the mobile phone according to the current application identifier;
105. after the monitoring interface of the current application monitors the verification code, the monitoring interface calls the verification code filling interface of the current application to fill the verification in the verification page of the current application.
In the embodiment of the present invention, as an optional implementation manner, after the listening interface of the current application listens to the verification code, the listening interface calls the verification code filling interface of the current application to fill the verification in the verification page of the current application, which includes the substeps of:
triggering a monitoring interface to read a page identifier pre-stored in a mobile phone memory, wherein the page identifier is bound with an identifier of a current application;
triggering the listening interface to transmit the page identification to the page loading interface,
triggering a page loading interface to set a page identifier at the head of the heap storage space so as to enable the current page of the mobile phone to be the page pointed by the page identifier;
and the page loading interface triggers the verification code filling interface to fill verification in the verification page of the current application.
In this embodiment of the present invention, optionally, before receiving a login request triggered by a user when using a current application, the method further includes:
generating an authorization prompt so that a user inputs an authorization instruction according to the authorization prompt, and prompting the user to manually input a mobile phone number if the authorization instruction indicates that the user does not grant the permission of acquiring the mobile phone number;
and if the authorization instruction indicates that the user grants the permission of obtaining the mobile phone number, generating authorization information.
In the implementation of the present invention, as an optional manner, optionally, when the user uses the current application for the first time, the mobile phone generates an authorization prompt to inquire whether the current application is allowed to read the local number, and if the authorization is allowed, the mobile phone stores the authorization information of this time.
In this embodiment of the present invention, as an optional implementation manner, before sending the mobile phone number and the identifier of the current application to the server, the method includes:
and encrypting the mobile phone number and the currently applied identifier according to a preset encryption rule, so that the server decrypts the mobile phone number and the currently applied identifier according to a decryption rule corresponding to the preset encryption rule after receiving the mobile phone number and the currently applied identifier.
In the embodiment of the present invention, as an optional implementation manner, a Hash encryption algorithm is used to encrypt the mobile phone number and the currently applied identifier. And carrying out Hash operation on the verification code, namely hashing the verification code into a Hash value with a fixed length and Hash mapping data, wherein the Hash value and the Hash mapping data need to be sent to the server together.
Therefore, in the embodiment of the invention, only one verification request needs to be initiated by the user, and the subsequent verification link can be completed according to the verification request, so that the safety problem of the user side caused by factors such as signals, viruses and the like is effectively avoided, and the problem of complicated operation caused by manual verification code input is avoided.
Example two
Referring to fig. 2, fig. 2 is a schematic structural diagram of a secret-less login device based on a mobile terminal according to a second embodiment of the present invention. As shown in fig. 2, the mobile terminal-based secret-less login device may include:
a login request receiving module 201, configured to receive a login request triggered when a user uses a current application, where the login request includes authorization information and an identifier of the current application, and the authorization information is used to authorize the current application to allow access to a telephone communication interface of a mobile phone;
the login request response module 202 is used for acquiring a mobile phone number from a telephone communication interface of the mobile phone, sending the mobile phone number and the identifier of the current application to the server through a mobile network, so that the server calls the identifier generation interface to generate an identifier, and sends the returned identifier and the identifier of the current application to the mobile phone;
the setting module 203 is used for receiving the verification code sent by the server and the identifier of the current application, and the mobile phone transmits the verification code to the monitoring interface of the current application pointed by the identifier of the current application according to the identifier of the current application;
and the verification code filling module 204 is used for calling the verification code filling interface of the current application to fill the verification in the verification page of the current application after the monitoring interface of the current application monitors the verification code.
In this embodiment of the present invention, optionally, the setting module 203 includes:
the page identifier reading sub-module 2031, configured to trigger the monitoring interface to read a page identifier pre-stored in the mobile phone memory, where the page identifier is bound to the identifier of the current application
The page filling sub-module 2032 is configured to trigger the monitoring interface to transmit the page identifier to the page loading interface; the page filling sub-module 2032 is further configured to trigger the page loading interface to set the page identifier at the head of the heap memory space, so that the current page of the mobile phone is the page pointed to by the page identifier; and the page filling sub-module 2032 is further configured to trigger the page loading interface to trigger the verification code filling interface to fill in the verification page of the current application.
In the embodiment of the invention, the mobile phone sends the mobile phone number and the identifier of the current application to the server in a JSON format. For example, loginnfo ═ phone:13600000666, id:6666 }.
In the embodiment of the invention, the server analyzes the phone number information in the JSON data, and the communication session information needs to be kept for subsequent verification code returning operation. Obviously, the connection mode of the communication session information is a long connection mode.
In the embodiment of the present invention, optionally, after receiving the mobile phone number, the server matches the operator according to the mobile phone number, and requests the operator to return the verification code.
In the embodiment of the present invention, as an optional implementation manner, the server matching the operator according to the mobile phone number may include the substeps of:
and judging the number section to which the mobile phone number belongs, and matching the operator according to the number section range.
In the embodiment of the present invention, optionally, the number segment groups of the same operator are spliced into a plurality of character strings according to a predetermined format, and then the operator and the character strings are subjected to mapping management, and an optional manner is that number segment characters corresponding to a plurality of operators are stored as a relationship data result, for example, MAP is used to associate the relationship between the character strings and the operator.
In the embodiment of the present invention, optionally, the first three numbers of the mobile phone number are extracted as the number segment comparison parameters.
In the embodiment of the present invention, as an optional implementation manner, the apparatus further includes:
the authorization module 205 is configured to generate an authorization prompt, so that a user inputs an authorization instruction according to the authorization prompt, if the authorization instruction indicates that the user does not grant the right to acquire the mobile phone number, the user is prompted to manually input the mobile phone number, and if the authorization instruction indicates that the user grants the right to acquire the mobile phone number, authorization information is generated.
In the implementation of the present invention, as an optional manner, when the user uses the current application for the first time, the mobile phone generates an authorization prompt to inquire whether the current application is allowed to read the local number, and if the authorization is allowed, the mobile phone stores the authorization information of the time.
In the embodiment of the present invention, as an optional implementation manner, the apparatus further includes:
and the encryption module is used for encrypting the mobile phone number and the currently applied identification according to a preset encryption rule so that the server decrypts the mobile phone number and the currently applied identification according to a decryption rule corresponding to the preset encryption rule after receiving the mobile phone number and the currently applied identification.
In the embodiment of the present invention, as an optional implementation manner, a Hash encryption algorithm is used to encrypt the mobile phone number and the currently applied identifier. And carrying out Hash operation on the verification code, namely hashing the verification code into a Hash value with a fixed length and Hash mapping data, wherein the Hash value and the Hash mapping data need to be sent to the server together.
Therefore, in the embodiment of the invention, only one verification request needs to be initiated by the user, and the subsequent verification link can be completed according to the verification request, so that the safety problem of the user side caused by factors such as signals, viruses and the like is effectively avoided, and the problem of complicated operation caused by manual verification code input is avoided.
EXAMPLE III
Referring to fig. 3, as shown in fig. 3, a fifth embodiment of the present invention discloses a secret-less login apparatus based on a mobile terminal, including:
a communication interface 301 for enabling the apparatus 30 to communicate with other communication devices. In particular implementations, communication interface 301 may include a wired communication interface (e.g., an ethernet interface) or may include a wireless communication interface.
A memory 303 is coupled to the processor 302 for storing various software programs and/or sets of instructions, network communication programs, etc. In embodiments of the present invention, the memory 303 may be used to store a database.
In this embodiment of the present invention, optionally, the memory 303 may be used to store an implementation program of the secret-less login method based on the mobile terminal disclosed in one or more embodiments of the present invention. For the implementation of the secret-less login method based on the mobile terminal disclosed in one or more embodiments of the present invention, please refer to the method embodiment shown in fig. 1.
In embodiments of the present invention, processor 302 may be used to read and execute computer readable instructions. Specifically, the processor 302 may be configured to call a program stored in the memory 303, such as an implementation program of the mobile terminal-based secure login method disclosed in one or more embodiments of the present invention, and execute instructions included in the implementation program.
Therefore, in the embodiment of the invention, only one verification request needs to be initiated by the user, and the subsequent verification link can be completed according to the verification request, so that the safety problem of the user side caused by factors such as signals, viruses and the like is effectively avoided, and the problem of complicated operation caused by manual input of verification codes is avoided.
Example four
The embodiment of the invention discloses a computer-readable storage medium which stores a computer program for electronic data exchange, wherein the computer program enables a computer to execute the steps in the secret-free login method based on a mobile terminal described in the first embodiment of the invention.
Therefore, in the embodiment of the invention, only one verification request needs to be initiated by the user, and the subsequent verification link can be completed according to the verification request, so that the safety problem of the user side caused by factors such as signals, viruses and the like is effectively avoided, and the problem of complicated operation caused by manual verification code input is avoided.
EXAMPLE five
The embodiment of the invention discloses a computer program product, which comprises a non-transitory computer readable storage medium storing a computer program, wherein the computer program is operable to make a computer execute the steps in the secret-free login method based on a mobile terminal described in the embodiment of the invention.
The embodiment of the invention discloses a computer program product, which comprises a non-transitory computer readable storage medium storing a computer program, wherein the computer program is operable to make a computer execute the steps in the secret-free login method based on a mobile terminal described in the embodiment of the invention.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable memory. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a memory and includes several instructions for causing a computer device (which may be a personal computer, a server, a network device, or the like) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned memory comprises: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
Those skilled in the art will appreciate that all or part of the steps in the methods of the above embodiments may be implemented by associated hardware instructed by a program, which may be stored in a computer-readable memory, which may include: flash Memory disks, Read-Only memories (ROMs), Random Access Memories (RAMs), magnetic or optical disks, and the like.
The above embodiments of the present invention are described in detail, and the principle and the implementation of the present invention are explained by applying specific embodiments, and the above description of the embodiments is only used to help understanding the method of the present invention and the core idea thereof; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.

Claims (10)

1. A secret-free login method based on a mobile terminal is characterized by comprising the following steps:
receiving a login request triggered by a user when the user uses a current application, wherein the login request comprises authorization information and an identifier of the current application, and the authorization information is used for authorizing the current application to allow the current application to access a telephone communication interface of a mobile phone; the identifier of the current application can be bound with a page identifier in a memory of the mobile phone;
responding to the login request, and acquiring a mobile phone number from the telephone communication interface of the mobile phone;
sending the mobile phone number and the identifier of the current application to a server through a mobile network, so that the server calls a verification code generation interface to generate a verification code, and the server sends the verification code and the identifier of the current application to the mobile phone;
receiving the verification code and the identifier of the current application sent by the server, and transmitting the verification code to a monitoring interface of the current application pointed by the identifier of the current application by the mobile phone according to the identifier of the current application;
and when the monitoring interface of the current application monitors the verification code, the monitoring interface calls the verification code filling interface of the current application to fill the verification code in the verification page of the current application.
2. A method as recited in claim 1, wherein after the listening interface of the current application has listened to the verification code, the listening interface invoking a verification code completion interface of the current application to write the verification completion in the verification page of the current application comprises the sub-steps of:
triggering the monitoring interface to read a page identifier pre-stored in a mobile phone memory, wherein the page identifier is bound with the identifier of the current application;
triggering the monitoring interface to transmit the page identifier to a page loading interface;
triggering a page loading interface to set the page identifier at the head of a heap storage space, so that the current page of the mobile phone is the page pointed by the page identifier;
and triggering an identifying code filling interface by the page loading interface to fill the identifying code in the identifying page of the current application.
3. The method of claim 2, wherein prior to receiving the login request triggered by the user when using the current application, the mobile terminal-based secure login method further comprises:
generating an authorization prompt so that the user inputs an authorization instruction according to the authorization prompt, and if the authorization instruction indicates that the user does not grant the permission of acquiring the mobile phone number, prompting the user to manually input the mobile phone number;
and if the authorization instruction indicates that the user grants the permission to acquire the mobile phone number, generating the authorization information.
4. The mobile terminal-based secure login method of claim 1, wherein before sending the mobile phone number and the identifier of the current application to the server, the mobile terminal-based secure login method comprises:
and encrypting the mobile phone number and the identifier of the current application according to a preset encryption rule, so that the server decrypts the mobile phone number and the identifier of the current application according to a decryption rule corresponding to the preset encryption rule after receiving the mobile phone number and the identifier of the current application.
5. A secret-free login device based on a mobile terminal is characterized by comprising:
the system comprises a login request receiving module, a login request receiving module and a login request processing module, wherein the login request is triggered when a user uses a current application, the login request comprises authorization information and an identifier of the current application, and the authorization information is used for authorizing the current application to allow the current application to access a telephone communication interface of a mobile phone; the identifier of the current application can be bound with a page identifier in a memory of the mobile phone;
the login request response module is used for acquiring a mobile phone number from the telephone communication interface of the mobile phone, sending the mobile phone number and the identifier of the current application to a server through a mobile network, so that the server calls a verification code generation interface to generate a verification code, and sends the verification code and the identifier of the current application to the mobile phone;
the setting module is used for receiving the verification code and the identifier of the current application sent by the server, and the mobile phone transmits the verification code to a monitoring interface of the current application pointed by the identifier of the current application according to the identifier of the current application;
and the verification code filling module is used for calling the verification code filling interface of the current application to fill and write the verification in the verification page of the current application after the monitoring interface of the current application monitors the verification code.
6. The mobile terminal-based secure login device of claim 5, wherein the setting module comprises:
page identification reading submodule: the monitoring interface is used for triggering the monitoring interface to read a page identifier pre-stored in a mobile phone memory, and the page identifier is bound with the identifier of the current application
The page filling sub-module is used for triggering the monitoring interface to transmit the page identifier to a page loading interface; the page filling sub-module is further used for triggering a page loading interface to set the page identifier at the head of the heap memory space, so that the current page of the mobile phone is the page pointed by the page identifier; and the page filling sub-module is also used for triggering the verification code filling module to call a verification code filling interface to write the verification in the verification page of the current application.
7. The mobile terminal-based secure login apparatus according to claim 5, wherein said apparatus further comprises:
and the authorization module is used for generating an authorization prompt so that the user inputs an authorization instruction according to the authorization prompt, if the authorization instruction indicates that the user does not grant the authority to acquire the mobile phone number, the user is prompted to manually input the mobile phone number, and if the authorization instruction indicates that the user grants the authority to acquire the mobile phone number, the authorization information is generated.
8. The mobile terminal-based secure login apparatus according to claim 5, wherein said apparatus further comprises:
and the encryption module is used for encrypting the mobile phone number and the identifier of the current application according to a preset encryption rule so that the server decrypts the mobile phone number and the identifier of the current application according to a decryption rule corresponding to the preset encryption rule after receiving the mobile phone number and the identifier of the current application.
9. A secret-free login device based on a mobile terminal is characterized by comprising:
a memory storing executable program code;
a processor coupled to the memory;
the processor invokes executable program code stored in the memory to perform the steps of the mobile terminal based secure login method according to any of claims 1-4.
10. A computer storage medium having stored thereon computer instructions which, when invoked, perform the method of any one of claims 1 to 4.
CN201910100168.2A 2019-01-31 2019-01-31 Secret-free login method, device, equipment and storage medium based on mobile terminal Active CN109787991B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201910100168.2A CN109787991B (en) 2019-01-31 2019-01-31 Secret-free login method, device, equipment and storage medium based on mobile terminal
PCT/CN2019/118286 WO2020155767A1 (en) 2019-01-31 2019-11-14 Mobile terminal-based passwordless login method and apparatus, device, and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910100168.2A CN109787991B (en) 2019-01-31 2019-01-31 Secret-free login method, device, equipment and storage medium based on mobile terminal

Publications (2)

Publication Number Publication Date
CN109787991A CN109787991A (en) 2019-05-21
CN109787991B true CN109787991B (en) 2022-02-25

Family

ID=66503037

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910100168.2A Active CN109787991B (en) 2019-01-31 2019-01-31 Secret-free login method, device, equipment and storage medium based on mobile terminal

Country Status (2)

Country Link
CN (1) CN109787991B (en)
WO (1) WO2020155767A1 (en)

Families Citing this family (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109787991B (en) * 2019-01-31 2022-02-25 平安科技(深圳)有限公司 Secret-free login method, device, equipment and storage medium based on mobile terminal
CN111680244A (en) * 2020-04-16 2020-09-18 上海淇玥信息技术有限公司 Page display method and device, electronic equipment and computer readable storage medium
CN111740980B (en) * 2020-06-18 2022-05-17 天翼数字生活科技有限公司 Method and device for logging in application, mobile terminal and storage medium
CN111935709B (en) * 2020-09-23 2021-02-05 广州市玄武无线科技股份有限公司 Application program login method and device of terminal and electronic equipment
CN112199666B (en) * 2020-09-30 2023-02-03 江苏恒宝智能系统技术有限公司 Equipment communication method, device, system and electronic equipment
CN112199676B (en) * 2020-11-03 2024-08-30 中国南方电网有限责任公司 Substation operation and maintenance system, method and device and computer equipment
CN112738046B (en) * 2020-12-24 2023-04-07 中国银联股份有限公司 One-key login method, terminal and system server
CN113157375A (en) * 2021-04-27 2021-07-23 北京达佳互联信息技术有限公司 Content display method, device, equipment, system and storage medium
CN115460599A (en) * 2021-06-08 2022-12-09 中移雄安信息通信科技有限公司 Login authority verification method and device based on 5G message
CN113553557B (en) * 2021-07-23 2024-09-27 咪咕文化科技有限公司 Application password-free login method and device, electronic equipment and storage medium
CN113779542B (en) * 2021-08-11 2023-03-17 上海数禾信息科技有限公司 One-key login processing method and device, computer equipment and storage medium
CN113626800A (en) * 2021-08-12 2021-11-09 中国北方车辆研究所 Vehicle information system authority management method
CN113572789A (en) * 2021-08-17 2021-10-29 四川启睿克科技有限公司 Secret-free login system and method for Internet of things intelligent equipment application
CN113824628B (en) * 2021-09-30 2023-04-07 传仲智能数字科技(上海)有限公司 User identity authentication method, device, server and storage medium based on IM
CN113870465A (en) * 2021-10-19 2021-12-31 南方电网数字电网研究院有限公司 Electronic lock control method and device, computer equipment and storage medium
CN114143102B (en) * 2021-12-06 2024-01-26 深圳市共进电子股份有限公司 Router secret-free login method, secret-free login device and computer device
CN114338132B (en) * 2021-12-24 2023-08-01 中国联合网络通信集团有限公司 Secret-free login method, client application, operator server and electronic equipment
CN114500090B (en) * 2022-02-24 2024-07-23 特赞(上海)信息科技有限公司 Information processing method and device for password-free login
CN114666364A (en) * 2022-03-10 2022-06-24 中国第一汽车股份有限公司 Vehicle-mounted internet access method and device based on Portal authentication network and vehicle
CN114978748A (en) * 2022-06-14 2022-08-30 中国电信股份有限公司 Login control method and device, readable storage medium and electronic equipment
CN117768197A (en) * 2023-05-18 2024-03-26 洪碧群 Logging in big data blockchain cloud platform by means of intelligent handheld mobile terminal
CN117098134B (en) * 2023-10-17 2024-01-26 湖北星纪魅族集团有限公司 Security control method, terminal, and non-transitory computer-readable storage medium
CN117725609A (en) * 2023-11-09 2024-03-19 联通在线信息科技有限公司 User authorization information storage method, device, electronic equipment and storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102984261A (en) * 2012-12-04 2013-03-20 中国联合网络通信集团有限公司 Network service login method, equipment and system based on mobile telephone terminal
CN104954383A (en) * 2015-06-24 2015-09-30 深圳市兰丁科技有限公司 Application program login method and system
CN105306733A (en) * 2015-11-13 2016-02-03 深圳正品创想科技有限公司 Third-party login mobile phone number binding method based on mobile phone APP
CN105959942A (en) * 2016-04-25 2016-09-21 上海众人网络安全技术有限公司 Identification authentication system and identification authentication method based on wireless access
CN106572081A (en) * 2016-10-18 2017-04-19 江西博瑞彤芸科技有限公司 Login authority verifying method
CN108650276A (en) * 2018-05-21 2018-10-12 北京五八信息技术有限公司 A kind of login method, device, electronic equipment and storage medium
CN109089264A (en) * 2018-08-02 2018-12-25 江苏满运软件科技有限公司 A kind of mobile terminal exempts from the method and system of close login
CN109241722A (en) * 2018-09-25 2019-01-18 上海盛付通电子支付服务有限公司 For obtaining method, electronic equipment and the computer-readable medium of information

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102546914A (en) * 2010-12-27 2012-07-04 梁志龙 Automatic login system based on smart phone and control method
GB2497077A (en) * 2011-11-23 2013-06-05 Barclays Bank Plc Peer-to-peer payment registration and activation
CN104301875B (en) * 2014-09-23 2018-05-15 广东欧珀移动通信有限公司 SMS processing and device
CN105159533A (en) * 2015-08-31 2015-12-16 努比亚技术有限公司 Mobile terminal and automatic verification code input method thereof
CN105490815B (en) * 2015-12-11 2019-07-23 北京奇虎科技有限公司 Short message verification code acquisition methods and device, login method, apparatus and system
CN109040010A (en) * 2015-12-31 2018-12-18 华为技术有限公司 A kind of identifying code acquisition methods, device and terminal
CN109787991B (en) * 2019-01-31 2022-02-25 平安科技(深圳)有限公司 Secret-free login method, device, equipment and storage medium based on mobile terminal

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102984261A (en) * 2012-12-04 2013-03-20 中国联合网络通信集团有限公司 Network service login method, equipment and system based on mobile telephone terminal
CN104954383A (en) * 2015-06-24 2015-09-30 深圳市兰丁科技有限公司 Application program login method and system
CN105306733A (en) * 2015-11-13 2016-02-03 深圳正品创想科技有限公司 Third-party login mobile phone number binding method based on mobile phone APP
CN105959942A (en) * 2016-04-25 2016-09-21 上海众人网络安全技术有限公司 Identification authentication system and identification authentication method based on wireless access
CN106572081A (en) * 2016-10-18 2017-04-19 江西博瑞彤芸科技有限公司 Login authority verifying method
CN108650276A (en) * 2018-05-21 2018-10-12 北京五八信息技术有限公司 A kind of login method, device, electronic equipment and storage medium
CN109089264A (en) * 2018-08-02 2018-12-25 江苏满运软件科技有限公司 A kind of mobile terminal exempts from the method and system of close login
CN109241722A (en) * 2018-09-25 2019-01-18 上海盛付通电子支付服务有限公司 For obtaining method, electronic equipment and the computer-readable medium of information

Also Published As

Publication number Publication date
CN109787991A (en) 2019-05-21
WO2020155767A1 (en) 2020-08-06

Similar Documents

Publication Publication Date Title
CN109787991B (en) Secret-free login method, device, equipment and storage medium based on mobile terminal
CN112771826B (en) Application program login method, application program login device and mobile terminal
KR102712361B1 (en) First factor contactless card authentication system and method
CN106341234B (en) Authorization method and device
CN112559993B (en) Identity authentication method, device and system and electronic equipment
CN111030812A (en) Token verification method, device, storage medium and server
US20170223539A1 (en) Authentication method, wireless router and computer storage medium
CN111163467B (en) Method for 5G user terminal to access 5G network, user terminal equipment and medium
CN106161475B (en) Method and device for realizing user authentication
CN113472716B (en) System access method, gateway device, server, electronic device and storage medium
CN105577619B (en) Client login method, client and system
US20150180851A1 (en) Method, device, and system for registering terminal application
WO2018099407A1 (en) Account authentication login method and device
CN106790036B (en) A kind of information tamper resistant method, device, server and terminal
CN110290097B (en) Data processing method and device, storage medium and electronic device
CN108574658B (en) Application login method and device
EP3079329A1 (en) Terminal application registration method, device and system
CN113761498A (en) Third party login information hosting method, system, equipment and storage medium
CN111182010B (en) Local service providing method and device
CN107623679B (en) Data marking processing method and device and storage medium
CN114448722B (en) Cross-browser login method and device, computer equipment and storage medium
WO2015151251A1 (en) Network service providing device, network service providing method, and program
CN115757535A (en) Data query method, data storage method and device and electronic equipment
CN104468495A (en) Electronic resource borrowing control method and system
CN113099453A (en) Authentication method, device and equipment for access server and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant