CN109787991B - Secret-free login method, device, equipment and storage medium based on mobile terminal - Google Patents
Secret-free login method, device, equipment and storage medium based on mobile terminal Download PDFInfo
- Publication number
- CN109787991B CN109787991B CN201910100168.2A CN201910100168A CN109787991B CN 109787991 B CN109787991 B CN 109787991B CN 201910100168 A CN201910100168 A CN 201910100168A CN 109787991 B CN109787991 B CN 109787991B
- Authority
- CN
- China
- Prior art keywords
- current application
- mobile phone
- identifier
- page
- interface
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Telephonic Communication Services (AREA)
- Telephone Function (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The application relates to the field of consensus mechanisms, and particularly discloses a secret-free login method based on a mobile terminal, which comprises the steps of receiving a login request triggered by a user when the user uses a current application, wherein the login request comprises authorization information and an identifier of the current application, and the authorization information is used for authorizing the current application to allow the current application to access a telephone communication interface of a mobile phone; responding to the login request, and acquiring a mobile phone number from the telephone communication interface of the mobile phone; and sending the mobile phone number and the identifier of the current application to a server through a mobile network, so that the server calls a verification code generation interface to generate a verification code, and sends the verification code and the identifier of the current application to the mobile phone. The invention also discloses a secret-free login device based on the mobile terminal, which is used for executing the secret-free login method based on the mobile terminal. The invention can realize the secret-free login function based on the mobile terminal.
Description
Technical Field
The present application relates to the field of consensus mechanisms, and in particular, to a secret-free login method, device, apparatus, and storage medium based on a mobile terminal.
Background
Most of the current internet products such as APP adopt account passwords and mobile phone short message login modes, and because of the massive popularization of mobile phones and the fact that the mobile phone number login can not only avoid the trouble of recording account passwords, but also avoid the registration process, the login mode of mobile phone short message verification is more convenient and faster than the account password login mode, and the use frequency is higher. However, in the process of using the mobile phone, the technicians find that the current mobile phone verification mode has some defects, and the first user may not receive the short message; secondly, the verification code needs to be manually input after the short message is acquired, and the operation is troublesome.
Disclosure of Invention
In order to solve the above problems, the present invention provides a secret-free login method and device based on a mobile terminal.
In a first aspect, the present invention provides a secret-free login method based on a mobile terminal, including:
receiving a login request triggered by a user when the user uses a current application, wherein the login request comprises authorization information and an identifier of the current application, and the authorization information is used for authorizing the current application to allow the current application to access a telephone communication interface of a mobile phone;
responding to the login request, and acquiring a mobile phone number from the telephone communication interface of the mobile phone;
sending the mobile phone number and the identifier of the current application to a server through a mobile network, so that the server calls a verification code generation interface to generate a verification code, and the server sends the verification code and the identifier of the current application to the mobile phone;
receiving the verification code and the identifier of the current application sent by the server, and transmitting the verification code to a monitoring interface of the current application pointed by the identifier of the current application by the mobile phone according to the identifier of the current application;
and calling a verification code filling interface of the current application to fill and write the verification in a verification page of the current application after the monitoring interface of the current application monitors the verification code.
Optionally, after the listening interface of the current application monitors the verification code, the listening interface calls a verification code filling interface of the current application to fill the verification code in the verification page of the current application, including the substeps of:
triggering the monitoring interface to read a page identifier pre-stored in a mobile phone memory, wherein the page identifier is bound with the identifier of the current application;
triggering the listening interface to transmit the page identification to a page loading interface,
triggering a page loading interface to set the page identifier at the head of a heap storage space, so that the current page of the mobile phone is the page pointed by the page identifier;
and calling a verification code filling interface by the verification code filling module to fill and write the verification in the verification page of the current application.
Optionally, before receiving the login request triggered by the user when using the current application, the method further includes:
generating an authorization prompt so that the user inputs an authorization instruction according to the authorization prompt, and if the authorization instruction indicates that the user does not grant the permission of acquiring the mobile phone number, prompting the user to manually input the mobile phone number;
and if the authorization instruction indicates that the user grants the permission to acquire the mobile phone number, generating the authorization information.
Optionally, before sending the mobile phone number and the identifier of the current application to the server, the method includes:
and encrypting the mobile phone number and the identifier of the current application according to a preset encryption rule, so that the server decrypts the mobile phone number and the identifier of the current application according to a decryption rule corresponding to the preset encryption rule after receiving the mobile phone number and the identifier of the current application.
In a second aspect, the present invention provides a secret-free login method and device based on a mobile terminal, where the device includes:
the system comprises a login request receiving module, a login request receiving module and a login request processing module, wherein the login request is triggered when a user uses a current application, the login request comprises authorization information and an identifier of the current application, and the authorization information is used for authorizing the current application to allow the current application to access a telephone communication interface of a mobile phone;
the login request response module is used for acquiring a mobile phone number from the telephone communication interface of the mobile phone, sending the mobile phone number and the identifier of the current application to a server through a mobile network, so that the server calls a verification code generation interface to generate a verification code, and sends the verification code and the identifier of the current application to the mobile phone;
the setting module is used for receiving the verification code and the identifier of the current application sent by the server, and the mobile phone transmits the verification code to a monitoring interface of the current application pointed by the identifier of the current application according to the identifier of the current application;
and the setting module is used for calling the verification code filling interface of the current application to fill and write the verification in the verification page of the current application after the monitoring interface of the current application monitors the verification code.
Optionally, the setting module includes:
page identification reading submodule: the monitoring interface is used for triggering the monitoring interface to read a page identifier pre-stored in a mobile phone memory, and the page identifier is bound with the identifier of the current application
The page filling sub-module is used for triggering the monitoring interface to transmit the page identifier to a page loading interface; the page filling sub-module is further used for triggering a page loading interface to set the page identifier at the head of the heap memory space, so that the current page of the mobile phone is the page pointed by the page identifier; and the page filling sub-module is also used for triggering the verification code filling module to call a verification code filling interface to write the verification in the verification page of the current application.
Optionally, the apparatus further comprises:
and the authorization module is used for generating an authorization prompt so that the user inputs an authorization instruction according to the authorization prompt, if the authorization instruction indicates that the user does not grant the authority to acquire the mobile phone number, the user is prompted to manually input the mobile phone number, and if the authorization instruction indicates that the user grants the authority to acquire the mobile phone number, the authorization information is generated.
Optionally, the apparatus further comprises:
and the encryption module is used for encrypting the mobile phone number and the identifier of the current application according to a preset encryption rule so that the server decrypts the mobile phone number and the identifier of the current application according to a decryption rule corresponding to the preset encryption rule after receiving the mobile phone number and the identifier of the current application.
In a third aspect, the present invention provides a secret-less login device based on a mobile terminal, including:
a memory storing executable program code;
a processor coupled to the memory;
the processor calls the executable program code stored in the memory to execute the steps of the mobile terminal based secure login method according to the first aspect of the present invention.
In a fourth aspect, the present invention provides a computer storage medium storing computer instructions which, when invoked, perform the method of the first aspect of the invention.
Therefore, in the embodiment of the invention, only one verification request needs to be initiated by the user, and the subsequent verification link can be completed according to the verification request, so that the safety problem of the user side caused by factors such as signals, viruses and the like is effectively avoided, and the problem of complicated operation caused by manual verification code input is avoided.
Additional aspects and advantages of the present application will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the present application.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic flowchart of a secret-free login method based on a mobile terminal according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of a secret-less login device based on a mobile terminal according to a second embodiment of the present invention;
fig. 3 is a schematic structural diagram of a secret-less login device based on a mobile terminal according to a third embodiment of the present invention.
Detailed Description
In order to make the technical solutions of the present invention better understood, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terms "first," "second," and the like in the description and claims of the present invention and in the above-described drawings are used for distinguishing between different objects and not for describing a particular order. Furthermore, the terms "include" and "have," as well as any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, apparatus, product, or apparatus that comprises a list of steps or elements is not limited to those listed but may alternatively include other steps or elements not listed or inherent to such process, method, product, or apparatus.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the invention. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein can be combined with other embodiments.
Most of the current internet products such as APP adopt account passwords and mobile phone short message login modes, and because of the massive popularization of mobile phones and the fact that the mobile phone number login can not only avoid the trouble of recording account passwords, but also avoid the registration process, the login mode of mobile phone short message verification is more convenient and faster than the account password login mode, and the use frequency is higher. However, in the process of using the mobile phone, the technicians find that the current mobile phone verification mode has some defects, and the first user may not receive the short message; secondly, the verification code needs to be manually input after the short message is acquired, and the operation is troublesome.
In view of the above problems, the following describes a secret-free login method and device based on a mobile terminal in detail with reference to specific implementation methods.
Implement one
Referring to fig. 1, fig. 1 is a schematic flowchart illustrating a secret-less login method based on a mobile terminal according to an embodiment of the present invention, as shown in fig. 1, the secret-less login method based on the mobile terminal includes:
101. and receiving a login request triggered by a user when the user uses the current application, wherein the login request comprises authorization information and the identifier of the current application, and the authorization information is used for authorizing the current application to allow the current application to access the telephone communication interface of the mobile phone.
102. Responding to the login request, and acquiring a mobile phone number from a telephone communication interface of the mobile phone;
103. and sending the mobile phone number and the identifier of the current application to a server through a mobile network, so that the server calls a verification code generation interface to generate a verification code, and sends the verification code and the identifier of the current application to the mobile phone.
In the embodiment of the invention, the mobile phone sends the mobile phone number and the identifier of the current application to the server in a JSON format. For example, loginnfo ═ phone:13600000006, id:6666 }.
In the embodiment of the invention, the server analyzes the phone number information in the JSON data, and the communication session information needs to be kept for subsequent verification code returning operation. Obviously, the connection mode of the communication session information is a long connection mode.
In the embodiment of the present invention, after the server receives the mobile phone number, the secret-less login method based on the mobile terminal according to the embodiment of the present invention further includes:
the server matches the operator according to the mobile phone number and requests the operator to return the verification code.
In the embodiment of the present invention, as an optional implementation manner, the matching, by the server, the operator according to the mobile phone number may include the substeps of:
and judging the number section to which the mobile phone number belongs, and matching the operator according to the number section range.
In the embodiment of the present invention, optionally, the number segment groups of the same operator are spliced into a plurality of character strings according to a predetermined format, and then the operator and the character strings are subjected to mapping management, and an optional manner is that number segment characters corresponding to a plurality of operators are stored as a relationship data result, for example, MAP is used to associate the relationship between the character strings and the operator.
In the embodiment of the present invention, optionally, the first three numbers of the mobile phone number are extracted as the number segment comparison parameters.
104. Receiving a verification code and a current application identifier sent by a server, and transmitting the verification code into a monitoring interface of the current application to which the current application identifier points by the mobile phone according to the current application identifier;
105. after the monitoring interface of the current application monitors the verification code, the monitoring interface calls the verification code filling interface of the current application to fill the verification in the verification page of the current application.
In the embodiment of the present invention, as an optional implementation manner, after the listening interface of the current application listens to the verification code, the listening interface calls the verification code filling interface of the current application to fill the verification in the verification page of the current application, which includes the substeps of:
triggering a monitoring interface to read a page identifier pre-stored in a mobile phone memory, wherein the page identifier is bound with an identifier of a current application;
triggering the listening interface to transmit the page identification to the page loading interface,
triggering a page loading interface to set a page identifier at the head of the heap storage space so as to enable the current page of the mobile phone to be the page pointed by the page identifier;
and the page loading interface triggers the verification code filling interface to fill verification in the verification page of the current application.
In this embodiment of the present invention, optionally, before receiving a login request triggered by a user when using a current application, the method further includes:
generating an authorization prompt so that a user inputs an authorization instruction according to the authorization prompt, and prompting the user to manually input a mobile phone number if the authorization instruction indicates that the user does not grant the permission of acquiring the mobile phone number;
and if the authorization instruction indicates that the user grants the permission of obtaining the mobile phone number, generating authorization information.
In the implementation of the present invention, as an optional manner, optionally, when the user uses the current application for the first time, the mobile phone generates an authorization prompt to inquire whether the current application is allowed to read the local number, and if the authorization is allowed, the mobile phone stores the authorization information of this time.
In this embodiment of the present invention, as an optional implementation manner, before sending the mobile phone number and the identifier of the current application to the server, the method includes:
and encrypting the mobile phone number and the currently applied identifier according to a preset encryption rule, so that the server decrypts the mobile phone number and the currently applied identifier according to a decryption rule corresponding to the preset encryption rule after receiving the mobile phone number and the currently applied identifier.
In the embodiment of the present invention, as an optional implementation manner, a Hash encryption algorithm is used to encrypt the mobile phone number and the currently applied identifier. And carrying out Hash operation on the verification code, namely hashing the verification code into a Hash value with a fixed length and Hash mapping data, wherein the Hash value and the Hash mapping data need to be sent to the server together.
Therefore, in the embodiment of the invention, only one verification request needs to be initiated by the user, and the subsequent verification link can be completed according to the verification request, so that the safety problem of the user side caused by factors such as signals, viruses and the like is effectively avoided, and the problem of complicated operation caused by manual verification code input is avoided.
Example two
Referring to fig. 2, fig. 2 is a schematic structural diagram of a secret-less login device based on a mobile terminal according to a second embodiment of the present invention. As shown in fig. 2, the mobile terminal-based secret-less login device may include:
a login request receiving module 201, configured to receive a login request triggered when a user uses a current application, where the login request includes authorization information and an identifier of the current application, and the authorization information is used to authorize the current application to allow access to a telephone communication interface of a mobile phone;
the login request response module 202 is used for acquiring a mobile phone number from a telephone communication interface of the mobile phone, sending the mobile phone number and the identifier of the current application to the server through a mobile network, so that the server calls the identifier generation interface to generate an identifier, and sends the returned identifier and the identifier of the current application to the mobile phone;
the setting module 203 is used for receiving the verification code sent by the server and the identifier of the current application, and the mobile phone transmits the verification code to the monitoring interface of the current application pointed by the identifier of the current application according to the identifier of the current application;
and the verification code filling module 204 is used for calling the verification code filling interface of the current application to fill the verification in the verification page of the current application after the monitoring interface of the current application monitors the verification code.
In this embodiment of the present invention, optionally, the setting module 203 includes:
the page identifier reading sub-module 2031, configured to trigger the monitoring interface to read a page identifier pre-stored in the mobile phone memory, where the page identifier is bound to the identifier of the current application
The page filling sub-module 2032 is configured to trigger the monitoring interface to transmit the page identifier to the page loading interface; the page filling sub-module 2032 is further configured to trigger the page loading interface to set the page identifier at the head of the heap memory space, so that the current page of the mobile phone is the page pointed to by the page identifier; and the page filling sub-module 2032 is further configured to trigger the page loading interface to trigger the verification code filling interface to fill in the verification page of the current application.
In the embodiment of the invention, the mobile phone sends the mobile phone number and the identifier of the current application to the server in a JSON format. For example, loginnfo ═ phone:13600000666, id:6666 }.
In the embodiment of the invention, the server analyzes the phone number information in the JSON data, and the communication session information needs to be kept for subsequent verification code returning operation. Obviously, the connection mode of the communication session information is a long connection mode.
In the embodiment of the present invention, optionally, after receiving the mobile phone number, the server matches the operator according to the mobile phone number, and requests the operator to return the verification code.
In the embodiment of the present invention, as an optional implementation manner, the server matching the operator according to the mobile phone number may include the substeps of:
and judging the number section to which the mobile phone number belongs, and matching the operator according to the number section range.
In the embodiment of the present invention, optionally, the number segment groups of the same operator are spliced into a plurality of character strings according to a predetermined format, and then the operator and the character strings are subjected to mapping management, and an optional manner is that number segment characters corresponding to a plurality of operators are stored as a relationship data result, for example, MAP is used to associate the relationship between the character strings and the operator.
In the embodiment of the present invention, optionally, the first three numbers of the mobile phone number are extracted as the number segment comparison parameters.
In the embodiment of the present invention, as an optional implementation manner, the apparatus further includes:
the authorization module 205 is configured to generate an authorization prompt, so that a user inputs an authorization instruction according to the authorization prompt, if the authorization instruction indicates that the user does not grant the right to acquire the mobile phone number, the user is prompted to manually input the mobile phone number, and if the authorization instruction indicates that the user grants the right to acquire the mobile phone number, authorization information is generated.
In the implementation of the present invention, as an optional manner, when the user uses the current application for the first time, the mobile phone generates an authorization prompt to inquire whether the current application is allowed to read the local number, and if the authorization is allowed, the mobile phone stores the authorization information of the time.
In the embodiment of the present invention, as an optional implementation manner, the apparatus further includes:
and the encryption module is used for encrypting the mobile phone number and the currently applied identification according to a preset encryption rule so that the server decrypts the mobile phone number and the currently applied identification according to a decryption rule corresponding to the preset encryption rule after receiving the mobile phone number and the currently applied identification.
In the embodiment of the present invention, as an optional implementation manner, a Hash encryption algorithm is used to encrypt the mobile phone number and the currently applied identifier. And carrying out Hash operation on the verification code, namely hashing the verification code into a Hash value with a fixed length and Hash mapping data, wherein the Hash value and the Hash mapping data need to be sent to the server together.
Therefore, in the embodiment of the invention, only one verification request needs to be initiated by the user, and the subsequent verification link can be completed according to the verification request, so that the safety problem of the user side caused by factors such as signals, viruses and the like is effectively avoided, and the problem of complicated operation caused by manual verification code input is avoided.
EXAMPLE III
Referring to fig. 3, as shown in fig. 3, a fifth embodiment of the present invention discloses a secret-less login apparatus based on a mobile terminal, including:
a communication interface 301 for enabling the apparatus 30 to communicate with other communication devices. In particular implementations, communication interface 301 may include a wired communication interface (e.g., an ethernet interface) or may include a wireless communication interface.
A memory 303 is coupled to the processor 302 for storing various software programs and/or sets of instructions, network communication programs, etc. In embodiments of the present invention, the memory 303 may be used to store a database.
In this embodiment of the present invention, optionally, the memory 303 may be used to store an implementation program of the secret-less login method based on the mobile terminal disclosed in one or more embodiments of the present invention. For the implementation of the secret-less login method based on the mobile terminal disclosed in one or more embodiments of the present invention, please refer to the method embodiment shown in fig. 1.
In embodiments of the present invention, processor 302 may be used to read and execute computer readable instructions. Specifically, the processor 302 may be configured to call a program stored in the memory 303, such as an implementation program of the mobile terminal-based secure login method disclosed in one or more embodiments of the present invention, and execute instructions included in the implementation program.
Therefore, in the embodiment of the invention, only one verification request needs to be initiated by the user, and the subsequent verification link can be completed according to the verification request, so that the safety problem of the user side caused by factors such as signals, viruses and the like is effectively avoided, and the problem of complicated operation caused by manual input of verification codes is avoided.
Example four
The embodiment of the invention discloses a computer-readable storage medium which stores a computer program for electronic data exchange, wherein the computer program enables a computer to execute the steps in the secret-free login method based on a mobile terminal described in the first embodiment of the invention.
Therefore, in the embodiment of the invention, only one verification request needs to be initiated by the user, and the subsequent verification link can be completed according to the verification request, so that the safety problem of the user side caused by factors such as signals, viruses and the like is effectively avoided, and the problem of complicated operation caused by manual verification code input is avoided.
EXAMPLE five
The embodiment of the invention discloses a computer program product, which comprises a non-transitory computer readable storage medium storing a computer program, wherein the computer program is operable to make a computer execute the steps in the secret-free login method based on a mobile terminal described in the embodiment of the invention.
The embodiment of the invention discloses a computer program product, which comprises a non-transitory computer readable storage medium storing a computer program, wherein the computer program is operable to make a computer execute the steps in the secret-free login method based on a mobile terminal described in the embodiment of the invention.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable memory. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a memory and includes several instructions for causing a computer device (which may be a personal computer, a server, a network device, or the like) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned memory comprises: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
Those skilled in the art will appreciate that all or part of the steps in the methods of the above embodiments may be implemented by associated hardware instructed by a program, which may be stored in a computer-readable memory, which may include: flash Memory disks, Read-Only memories (ROMs), Random Access Memories (RAMs), magnetic or optical disks, and the like.
The above embodiments of the present invention are described in detail, and the principle and the implementation of the present invention are explained by applying specific embodiments, and the above description of the embodiments is only used to help understanding the method of the present invention and the core idea thereof; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.
Claims (10)
1. A secret-free login method based on a mobile terminal is characterized by comprising the following steps:
receiving a login request triggered by a user when the user uses a current application, wherein the login request comprises authorization information and an identifier of the current application, and the authorization information is used for authorizing the current application to allow the current application to access a telephone communication interface of a mobile phone; the identifier of the current application can be bound with a page identifier in a memory of the mobile phone;
responding to the login request, and acquiring a mobile phone number from the telephone communication interface of the mobile phone;
sending the mobile phone number and the identifier of the current application to a server through a mobile network, so that the server calls a verification code generation interface to generate a verification code, and the server sends the verification code and the identifier of the current application to the mobile phone;
receiving the verification code and the identifier of the current application sent by the server, and transmitting the verification code to a monitoring interface of the current application pointed by the identifier of the current application by the mobile phone according to the identifier of the current application;
and when the monitoring interface of the current application monitors the verification code, the monitoring interface calls the verification code filling interface of the current application to fill the verification code in the verification page of the current application.
2. A method as recited in claim 1, wherein after the listening interface of the current application has listened to the verification code, the listening interface invoking a verification code completion interface of the current application to write the verification completion in the verification page of the current application comprises the sub-steps of:
triggering the monitoring interface to read a page identifier pre-stored in a mobile phone memory, wherein the page identifier is bound with the identifier of the current application;
triggering the monitoring interface to transmit the page identifier to a page loading interface;
triggering a page loading interface to set the page identifier at the head of a heap storage space, so that the current page of the mobile phone is the page pointed by the page identifier;
and triggering an identifying code filling interface by the page loading interface to fill the identifying code in the identifying page of the current application.
3. The method of claim 2, wherein prior to receiving the login request triggered by the user when using the current application, the mobile terminal-based secure login method further comprises:
generating an authorization prompt so that the user inputs an authorization instruction according to the authorization prompt, and if the authorization instruction indicates that the user does not grant the permission of acquiring the mobile phone number, prompting the user to manually input the mobile phone number;
and if the authorization instruction indicates that the user grants the permission to acquire the mobile phone number, generating the authorization information.
4. The mobile terminal-based secure login method of claim 1, wherein before sending the mobile phone number and the identifier of the current application to the server, the mobile terminal-based secure login method comprises:
and encrypting the mobile phone number and the identifier of the current application according to a preset encryption rule, so that the server decrypts the mobile phone number and the identifier of the current application according to a decryption rule corresponding to the preset encryption rule after receiving the mobile phone number and the identifier of the current application.
5. A secret-free login device based on a mobile terminal is characterized by comprising:
the system comprises a login request receiving module, a login request receiving module and a login request processing module, wherein the login request is triggered when a user uses a current application, the login request comprises authorization information and an identifier of the current application, and the authorization information is used for authorizing the current application to allow the current application to access a telephone communication interface of a mobile phone; the identifier of the current application can be bound with a page identifier in a memory of the mobile phone;
the login request response module is used for acquiring a mobile phone number from the telephone communication interface of the mobile phone, sending the mobile phone number and the identifier of the current application to a server through a mobile network, so that the server calls a verification code generation interface to generate a verification code, and sends the verification code and the identifier of the current application to the mobile phone;
the setting module is used for receiving the verification code and the identifier of the current application sent by the server, and the mobile phone transmits the verification code to a monitoring interface of the current application pointed by the identifier of the current application according to the identifier of the current application;
and the verification code filling module is used for calling the verification code filling interface of the current application to fill and write the verification in the verification page of the current application after the monitoring interface of the current application monitors the verification code.
6. The mobile terminal-based secure login device of claim 5, wherein the setting module comprises:
page identification reading submodule: the monitoring interface is used for triggering the monitoring interface to read a page identifier pre-stored in a mobile phone memory, and the page identifier is bound with the identifier of the current application
The page filling sub-module is used for triggering the monitoring interface to transmit the page identifier to a page loading interface; the page filling sub-module is further used for triggering a page loading interface to set the page identifier at the head of the heap memory space, so that the current page of the mobile phone is the page pointed by the page identifier; and the page filling sub-module is also used for triggering the verification code filling module to call a verification code filling interface to write the verification in the verification page of the current application.
7. The mobile terminal-based secure login apparatus according to claim 5, wherein said apparatus further comprises:
and the authorization module is used for generating an authorization prompt so that the user inputs an authorization instruction according to the authorization prompt, if the authorization instruction indicates that the user does not grant the authority to acquire the mobile phone number, the user is prompted to manually input the mobile phone number, and if the authorization instruction indicates that the user grants the authority to acquire the mobile phone number, the authorization information is generated.
8. The mobile terminal-based secure login apparatus according to claim 5, wherein said apparatus further comprises:
and the encryption module is used for encrypting the mobile phone number and the identifier of the current application according to a preset encryption rule so that the server decrypts the mobile phone number and the identifier of the current application according to a decryption rule corresponding to the preset encryption rule after receiving the mobile phone number and the identifier of the current application.
9. A secret-free login device based on a mobile terminal is characterized by comprising:
a memory storing executable program code;
a processor coupled to the memory;
the processor invokes executable program code stored in the memory to perform the steps of the mobile terminal based secure login method according to any of claims 1-4.
10. A computer storage medium having stored thereon computer instructions which, when invoked, perform the method of any one of claims 1 to 4.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910100168.2A CN109787991B (en) | 2019-01-31 | 2019-01-31 | Secret-free login method, device, equipment and storage medium based on mobile terminal |
PCT/CN2019/118286 WO2020155767A1 (en) | 2019-01-31 | 2019-11-14 | Mobile terminal-based passwordless login method and apparatus, device, and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910100168.2A CN109787991B (en) | 2019-01-31 | 2019-01-31 | Secret-free login method, device, equipment and storage medium based on mobile terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109787991A CN109787991A (en) | 2019-05-21 |
CN109787991B true CN109787991B (en) | 2022-02-25 |
Family
ID=66503037
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910100168.2A Active CN109787991B (en) | 2019-01-31 | 2019-01-31 | Secret-free login method, device, equipment and storage medium based on mobile terminal |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN109787991B (en) |
WO (1) | WO2020155767A1 (en) |
Families Citing this family (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109787991B (en) * | 2019-01-31 | 2022-02-25 | 平安科技(深圳)有限公司 | Secret-free login method, device, equipment and storage medium based on mobile terminal |
CN111680244A (en) * | 2020-04-16 | 2020-09-18 | 上海淇玥信息技术有限公司 | Page display method and device, electronic equipment and computer readable storage medium |
CN111740980B (en) * | 2020-06-18 | 2022-05-17 | 天翼数字生活科技有限公司 | Method and device for logging in application, mobile terminal and storage medium |
CN111935709B (en) * | 2020-09-23 | 2021-02-05 | 广州市玄武无线科技股份有限公司 | Application program login method and device of terminal and electronic equipment |
CN112199666B (en) * | 2020-09-30 | 2023-02-03 | 江苏恒宝智能系统技术有限公司 | Equipment communication method, device, system and electronic equipment |
CN112199676B (en) * | 2020-11-03 | 2024-08-30 | 中国南方电网有限责任公司 | Substation operation and maintenance system, method and device and computer equipment |
CN112738046B (en) * | 2020-12-24 | 2023-04-07 | 中国银联股份有限公司 | One-key login method, terminal and system server |
CN113157375A (en) * | 2021-04-27 | 2021-07-23 | 北京达佳互联信息技术有限公司 | Content display method, device, equipment, system and storage medium |
CN115460599A (en) * | 2021-06-08 | 2022-12-09 | 中移雄安信息通信科技有限公司 | Login authority verification method and device based on 5G message |
CN113553557B (en) * | 2021-07-23 | 2024-09-27 | 咪咕文化科技有限公司 | Application password-free login method and device, electronic equipment and storage medium |
CN113779542B (en) * | 2021-08-11 | 2023-03-17 | 上海数禾信息科技有限公司 | One-key login processing method and device, computer equipment and storage medium |
CN113626800A (en) * | 2021-08-12 | 2021-11-09 | 中国北方车辆研究所 | Vehicle information system authority management method |
CN113572789A (en) * | 2021-08-17 | 2021-10-29 | 四川启睿克科技有限公司 | Secret-free login system and method for Internet of things intelligent equipment application |
CN113824628B (en) * | 2021-09-30 | 2023-04-07 | 传仲智能数字科技(上海)有限公司 | User identity authentication method, device, server and storage medium based on IM |
CN113870465A (en) * | 2021-10-19 | 2021-12-31 | 南方电网数字电网研究院有限公司 | Electronic lock control method and device, computer equipment and storage medium |
CN114143102B (en) * | 2021-12-06 | 2024-01-26 | 深圳市共进电子股份有限公司 | Router secret-free login method, secret-free login device and computer device |
CN114338132B (en) * | 2021-12-24 | 2023-08-01 | 中国联合网络通信集团有限公司 | Secret-free login method, client application, operator server and electronic equipment |
CN114500090B (en) * | 2022-02-24 | 2024-07-23 | 特赞(上海)信息科技有限公司 | Information processing method and device for password-free login |
CN114666364A (en) * | 2022-03-10 | 2022-06-24 | 中国第一汽车股份有限公司 | Vehicle-mounted internet access method and device based on Portal authentication network and vehicle |
CN114978748A (en) * | 2022-06-14 | 2022-08-30 | 中国电信股份有限公司 | Login control method and device, readable storage medium and electronic equipment |
CN117768197A (en) * | 2023-05-18 | 2024-03-26 | 洪碧群 | Logging in big data blockchain cloud platform by means of intelligent handheld mobile terminal |
CN117098134B (en) * | 2023-10-17 | 2024-01-26 | 湖北星纪魅族集团有限公司 | Security control method, terminal, and non-transitory computer-readable storage medium |
CN117725609A (en) * | 2023-11-09 | 2024-03-19 | 联通在线信息科技有限公司 | User authorization information storage method, device, electronic equipment and storage medium |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102984261A (en) * | 2012-12-04 | 2013-03-20 | 中国联合网络通信集团有限公司 | Network service login method, equipment and system based on mobile telephone terminal |
CN104954383A (en) * | 2015-06-24 | 2015-09-30 | 深圳市兰丁科技有限公司 | Application program login method and system |
CN105306733A (en) * | 2015-11-13 | 2016-02-03 | 深圳正品创想科技有限公司 | Third-party login mobile phone number binding method based on mobile phone APP |
CN105959942A (en) * | 2016-04-25 | 2016-09-21 | 上海众人网络安全技术有限公司 | Identification authentication system and identification authentication method based on wireless access |
CN106572081A (en) * | 2016-10-18 | 2017-04-19 | 江西博瑞彤芸科技有限公司 | Login authority verifying method |
CN108650276A (en) * | 2018-05-21 | 2018-10-12 | 北京五八信息技术有限公司 | A kind of login method, device, electronic equipment and storage medium |
CN109089264A (en) * | 2018-08-02 | 2018-12-25 | 江苏满运软件科技有限公司 | A kind of mobile terminal exempts from the method and system of close login |
CN109241722A (en) * | 2018-09-25 | 2019-01-18 | 上海盛付通电子支付服务有限公司 | For obtaining method, electronic equipment and the computer-readable medium of information |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102546914A (en) * | 2010-12-27 | 2012-07-04 | 梁志龙 | Automatic login system based on smart phone and control method |
GB2497077A (en) * | 2011-11-23 | 2013-06-05 | Barclays Bank Plc | Peer-to-peer payment registration and activation |
CN104301875B (en) * | 2014-09-23 | 2018-05-15 | 广东欧珀移动通信有限公司 | SMS processing and device |
CN105159533A (en) * | 2015-08-31 | 2015-12-16 | 努比亚技术有限公司 | Mobile terminal and automatic verification code input method thereof |
CN105490815B (en) * | 2015-12-11 | 2019-07-23 | 北京奇虎科技有限公司 | Short message verification code acquisition methods and device, login method, apparatus and system |
CN109040010A (en) * | 2015-12-31 | 2018-12-18 | 华为技术有限公司 | A kind of identifying code acquisition methods, device and terminal |
CN109787991B (en) * | 2019-01-31 | 2022-02-25 | 平安科技(深圳)有限公司 | Secret-free login method, device, equipment and storage medium based on mobile terminal |
-
2019
- 2019-01-31 CN CN201910100168.2A patent/CN109787991B/en active Active
- 2019-11-14 WO PCT/CN2019/118286 patent/WO2020155767A1/en active Application Filing
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102984261A (en) * | 2012-12-04 | 2013-03-20 | 中国联合网络通信集团有限公司 | Network service login method, equipment and system based on mobile telephone terminal |
CN104954383A (en) * | 2015-06-24 | 2015-09-30 | 深圳市兰丁科技有限公司 | Application program login method and system |
CN105306733A (en) * | 2015-11-13 | 2016-02-03 | 深圳正品创想科技有限公司 | Third-party login mobile phone number binding method based on mobile phone APP |
CN105959942A (en) * | 2016-04-25 | 2016-09-21 | 上海众人网络安全技术有限公司 | Identification authentication system and identification authentication method based on wireless access |
CN106572081A (en) * | 2016-10-18 | 2017-04-19 | 江西博瑞彤芸科技有限公司 | Login authority verifying method |
CN108650276A (en) * | 2018-05-21 | 2018-10-12 | 北京五八信息技术有限公司 | A kind of login method, device, electronic equipment and storage medium |
CN109089264A (en) * | 2018-08-02 | 2018-12-25 | 江苏满运软件科技有限公司 | A kind of mobile terminal exempts from the method and system of close login |
CN109241722A (en) * | 2018-09-25 | 2019-01-18 | 上海盛付通电子支付服务有限公司 | For obtaining method, electronic equipment and the computer-readable medium of information |
Also Published As
Publication number | Publication date |
---|---|
CN109787991A (en) | 2019-05-21 |
WO2020155767A1 (en) | 2020-08-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109787991B (en) | Secret-free login method, device, equipment and storage medium based on mobile terminal | |
CN112771826B (en) | Application program login method, application program login device and mobile terminal | |
KR102712361B1 (en) | First factor contactless card authentication system and method | |
CN106341234B (en) | Authorization method and device | |
CN112559993B (en) | Identity authentication method, device and system and electronic equipment | |
CN111030812A (en) | Token verification method, device, storage medium and server | |
US20170223539A1 (en) | Authentication method, wireless router and computer storage medium | |
CN111163467B (en) | Method for 5G user terminal to access 5G network, user terminal equipment and medium | |
CN106161475B (en) | Method and device for realizing user authentication | |
CN113472716B (en) | System access method, gateway device, server, electronic device and storage medium | |
CN105577619B (en) | Client login method, client and system | |
US20150180851A1 (en) | Method, device, and system for registering terminal application | |
WO2018099407A1 (en) | Account authentication login method and device | |
CN106790036B (en) | A kind of information tamper resistant method, device, server and terminal | |
CN110290097B (en) | Data processing method and device, storage medium and electronic device | |
CN108574658B (en) | Application login method and device | |
EP3079329A1 (en) | Terminal application registration method, device and system | |
CN113761498A (en) | Third party login information hosting method, system, equipment and storage medium | |
CN111182010B (en) | Local service providing method and device | |
CN107623679B (en) | Data marking processing method and device and storage medium | |
CN114448722B (en) | Cross-browser login method and device, computer equipment and storage medium | |
WO2015151251A1 (en) | Network service providing device, network service providing method, and program | |
CN115757535A (en) | Data query method, data storage method and device and electronic equipment | |
CN104468495A (en) | Electronic resource borrowing control method and system | |
CN113099453A (en) | Authentication method, device and equipment for access server and readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |