[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN116599764B - Application login method, application login device, storage medium and system - Google Patents

Application login method, application login device, storage medium and system Download PDF

Info

Publication number
CN116599764B
CN116599764B CN202310774636.0A CN202310774636A CN116599764B CN 116599764 B CN116599764 B CN 116599764B CN 202310774636 A CN202310774636 A CN 202310774636A CN 116599764 B CN116599764 B CN 116599764B
Authority
CN
China
Prior art keywords
authorized
information
authorization
application
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310774636.0A
Other languages
Chinese (zh)
Other versions
CN116599764A (en
Inventor
郭晓
李向荣
吕亚东
刘杨
郑强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yangguang Yunting Cultural Media Co ltd
Original Assignee
Yangguang Yunting Cultural Media Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yangguang Yunting Cultural Media Co ltd filed Critical Yangguang Yunting Cultural Media Co ltd
Priority to CN202310774636.0A priority Critical patent/CN116599764B/en
Publication of CN116599764A publication Critical patent/CN116599764A/en
Application granted granted Critical
Publication of CN116599764B publication Critical patent/CN116599764B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • H04L2209/608Watermarking
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Storage Device Security (AREA)

Abstract

The present disclosure provides an application login method, an application login device, a storage medium, and a system, wherein a first device sends an authorized audio acquisition request including device information of the first device to a first device server in response to receiving an application login request of a user; the first equipment server responds to the authorized audio acquisition request, and embeds an authorized tag and equipment information for uniquely specifying the first equipment as digital watermark information into preset audio to generate authorized audio; the first device plays the authorized audio; intercepting the played authorized audio by the second equipment of the authorized login application, extracting digital watermark information in the authorized audio, transmitting the digital watermark information and the authorized user information to the second equipment server, and checking the digital watermark information by the second equipment server; generating, by the first device server, authorization identity information based on the authorized user information provided by the second device server after the verification passes; the first device performs application login based on the authorized identity information.

Description

Application login method, application login device, storage medium and system
Technical Field
The present disclosure relates to the field of communication technologies, and more particularly, to an application login method, an application login device, a storage medium, and a system.
Background
Methods of logging in across device applications may generally include: when a user logs in an application at a mobile terminal, if the user needs to log in the same type of application at other screen terminals (such as a car machine, a screen sound box and the like), a two-dimensional code can be generated through the other screen terminals, and the same account number authorization login is performed in a mode of scanning the code by the mobile terminal application. However, this method requires authorization by code scanning and cannot be applied to a non-screen terminal.
For a non-screen terminal, cross-device application login can be accomplished through audio digital watermarking technology. The audio digital watermarking technology is an information hiding technology, the digital watermark is embedded into an audio file (such as wav, mp3, avi (Audio Video Interleaved, audio video interleaving format) and the like) through a watermark embedding algorithm, and the digital watermark is not easily perceived by utilizing the human ear masking effect. The audio digital watermark can be completely extracted from the audio host file through a watermark extraction algorithm, and is used for copyright protection, source authentication and the like. Existing ways of authorizing a login application may include: the server generates a check code and sends the check code to the second equipment (logged in), the second equipment broadcasts an audio signal containing the check code, the first equipment (not logged in) acquires the check code from the audio signal after detecting the audio signal, and sends the check code to the server for verification, and the server allows the first equipment to authorize after the check is passed. However, such a scheme may have a set of check code scenario common to multiple first devices, and may not enable a certain first device (e.g., a target device) to perform accurate authorization, which has a certain security hidden danger.
Disclosure of Invention
The application login method, the application login device, the storage medium and the system solve the problems existing in the prior related art, so that accurate authorization of target equipment is realized, and safety is improved.
To achieve the above object, according to one aspect of the present disclosure, there is provided an application login method applied to a first device to be authorized to login an application, including: in response to receiving an application login request of a user, sending an authorized audio acquisition request to a first equipment server; wherein the authorized audio acquisition request includes device information of the first device; receiving authorization audio from the first device server, wherein the authorization audio is generated by the first device server in response to the authorization audio acquisition request by embedding an authorization tag and the device information as digital watermark information into preset audio, the authorization tag being a tag generated by the first device server for uniquely specifying the first device; playing the authorized audio; receiving authorization identity information from the first device server; wherein the authorization identity information is generated by: intercepting the played authorized audio by a second device of an authorized login application, extracting the digital watermark information in the authorized audio, transmitting the digital watermark information and authorized user information to a second device server, checking the digital watermark information by the second device server, and generating the authorized identity information by the first device server based on the authorized user information provided by the second device server after the digital watermark information passes the checking; and carrying out application login based on the authorized identity information.
According to one aspect of the disclosure, the to-be-authorized login application device can play the authorized audio carrying the digital watermark capable of uniquely identifying the device, and after the authorized login application device listens to the played authorized audio and extracts the unique identifier in the carried digital watermark, the to-be-authorized login application device is authorized when the unique identifier passes verification, so that accurate authorization of a certain to-be-authorized login application device can be realized, and safety is improved.
Optionally, the authorization tag and the device information are sent to a database by the first device server to be stored, so that the second device server uses the authorization tag and the device information stored in the database to verify the digital watermark information extracted by the second device.
Optionally, the step of verifying includes: the second device server determines that verification passes under the condition that the authorization tag and the device information stored in the database are consistent with the digital watermark information extracted by the second device; the step of the second device server providing the authorized user information to the first device server comprises: if the verification passes, the second equipment server sends the authorized user information to the database to be bound and stored with the authorization tag; the first device server extracts the authorized user information from the database based on the authorization tag.
Optionally, the method further comprises: after the first device logs in the application, responding to a de-authorization instruction sent by a user to the second device, logging out, wherein logging out is realized through the following steps: the second device sends a de-authorization request to the second device server in response to receiving a de-authorization instruction, the de-authorization request including at least one of: the authorized user information, the authorization tag; and the second equipment server responds to the de-authorization request, and unbinds the authorized user information which is bound and stored in the database and the authorization tag, so that the first equipment exits from the authorized state.
Optionally, the step of transmitting the digital watermark information and the authorized user information to the second device server includes: the second device displays the extracted device information in the digital watermark information, and responds to an instruction which is sent by a user for allowing authorization of the device information, and sends the digital watermark information and the authorized user information to the second device server.
According to the method, the authorized login application device can display the device information of the login application device to be authorized, which is extracted from the played authorization audio, and the user can decide whether to allow the login application device to be authorized to obtain authorization according to the displayed device information, so that the safety is improved, and meanwhile, the use experience of the user is improved.
Optionally, the method further comprises: after logging in an application and logging out, responding to an application login request of a user again, and if the time interval between the re-received application login request and the application logged in before is not longer than the session validity period between the first equipment and the first equipment server, automatically logging in without requesting authorization to the second equipment; after the first device logs in the application for the last time, the first device establishes a session with the first device by the first device server.
According to the method, after the application equipment to be authorized logs in successfully and logs out of the application, the login can be automatically performed within the effective period of the session when logging in again, the authorized login application equipment does not need to be requested for authorization again, and the efficiency and convenience of the login process are improved.
Optionally, the session validity period is refreshed by the following method: after the first device logs in an application, the first device server generates a token with a validity period greater than the session validity period; and refreshing the validity period of the session according to the token if the time interval does not exceed the validity period of the session.
According to the method, the session validity period is refreshed through the token, and continuous updating of automatic login timeliness is guaranteed.
According to another aspect of the present disclosure, there is provided an application login method, applied to a first device server, including: receiving an authorized audio acquisition request from a first device, wherein the authorized audio acquisition request is sent after the first device receives an application login request of a user and comprises device information of the first device; generating an authorization tag in response to the authorization audio acquisition request, and embedding the authorization tag and the equipment information as digital watermark information into preset audio to obtain authorization audio, wherein the authorization tag is a tag for uniquely specifying the first equipment; transmitting the authorization audio to the first device; generating authorization identity information based on authorized user information provided by the second device server after the digital watermark information passes verification; wherein, the digital watermark information is verified by the following steps: playing the authorized audio by the first device, intercepting the authorized audio played by the first device by a second device of the authorized login application, extracting the digital watermark information in the authorized audio, sending the digital watermark information and the authorized user information to a second device server, and checking the digital watermark information by the second device server; and sending the authorized identity information to the first equipment, so that the first equipment carries out application login according to the authorized identity information.
Optionally, the method further comprises: and sending the authorization tag and the equipment information to a database for storage, so that the second equipment server uses the authorization tag and the equipment information stored in the database to verify the digital watermark information extracted by the second equipment.
Optionally, the step of verifying includes: the second device server determines that verification passes under the condition that the authorization tag and the device information stored in the database are consistent with the digital watermark information extracted by the second device; the step of the second device server providing the authorized user information to the first device server comprises: if the verification passes, the second equipment server sends the authorized user information to the database to be bound and stored with the authorization tag; extracting the authorized user information from the database based on the authorization tag.
Optionally, after the first device logs in to the application, the first device logs out in response to a de-authorization instruction sent by the user to the second device, wherein the log-out is realized through the following steps: the second device sends a de-authorization request to the second device server in response to receiving a de-authorization instruction, the de-authorization request including at least one of: the authorized user information, the authorization tag; and the second equipment server responds to the de-authorization request, and unbinds the authorized user information which is bound and stored in the database and the authorization tag, so that the first equipment exits from the authorized state.
Optionally, the step of transmitting the digital watermark information and the authorized user information to the second device server includes: the second device displays the extracted device information in the digital watermark information, and responds to an instruction which is sent by a user for allowing authorization of the device information, and sends the digital watermark information and the authorized user information to the second device server.
Optionally, the method further comprises: after the first device logs in an application, establishing a session with the first device; after the first device logs in to the application and exits, responding to the application login request of the user again, and if the time interval between the application login request received again and the application logged in before is not longer than the session validity period between the first device and the first device server, automatically logging in without requesting authorization to the second device.
Optionally, the method further comprises: after the first device logs in an application, generating a token with the validity period being greater than the session validity period; and refreshing the validity period of the session according to the token if the time interval does not exceed the validity period of the session.
According to another aspect of the present disclosure, there is provided an application login method applied to a second device authorized to login an application, including: responding to the received audio scanning request of the user, and intercepting the played authorized audio; wherein the authorized audio is generated by: a first device of a login application to be authorized sends an authorization audio acquisition request comprising device information of the first device to a first device server in response to receiving an application login request of a user, the first device server embeds an authorization tag and the device information as digital watermark information into preset audio to generate the authorization audio in response to the authorization audio acquisition request, and the authorization tag is a tag which is generated by the first device server and is used for uniquely specifying the first device; extracting the digital watermark information in the authorized audio and transmitting the digital watermark information and authorized user information to a second equipment server; and after the second equipment server verifies and passes the digital watermark information, the first equipment server generates authorized identity information based on the authorized user information provided by the second equipment server, the authorized identity information is sent to the first equipment, and the first equipment performs application login based on the authorized identity information.
Optionally, the authorization tag and the device information are sent to a database by the first device server to be stored, so that a second device server uses the authorization tag and the device information stored in the database to verify the digital watermark information extracted by the second device.
Optionally, the step of verifying includes: the second device server determines that verification passes under the condition that the authorization tag and the device information stored in the database are consistent with the digital watermark information extracted by the second device; the step of the second device server providing the authorized user information to the first device server comprises: if the verification passes, the second equipment server sends the authorized user information to the database to be bound and stored with the authorization tag; the first device server extracts the authorized user information from the database based on the authorization tag.
Optionally, the method further comprises: after the first device logs in to an application, the second device responds to receiving a de-authorization instruction sent by a user and sends a de-authorization request to the second device server, wherein the de-authorization request comprises at least one of the following: the authorized user information, the authorization tag; and the second equipment server responds to the de-authorization request, and unbinds the authorized user information which is bound and stored in the database and the authorization tag, so that the first equipment exits from the authorized state.
Optionally, the step of transmitting the digital watermark information and the authorized user information to the second device server includes: and displaying the extracted equipment information in the digital watermark information, and responding to an instruction which is sent by a user for allowing authorization of the equipment information, and sending the digital watermark information and the authorized user information to the second equipment server.
Optionally, after the first device logs in to the application and exits, responding to the application login request of the user again, if the time interval between the application login request received again and the application logged in before is not more than the session validity period between the first device and the first device server, automatically logging in without requesting authorization to the second device; after the first device logs in the application for the last time, the first device establishes a session with the first device by the first device server.
Optionally, the session validity period is refreshed by the following method: after the first device logs in an application, the first device server generates a token with a validity period greater than the session validity period; and refreshing the validity period of the session according to the token if the time interval does not exceed the validity period of the session.
According to another aspect of the present disclosure, there is provided an application login method applied to a second device server, including: receiving digital watermark information sent by a second device of an authorized login application and authorized user information; wherein, the digital watermark information is obtained by the following steps: a first device of a login application to be authorized responds to an application login request of a user, an authorization audio acquisition request comprising device information of the first device is sent to a first device server, the first device server responds to the authorization audio acquisition request, an authorization tag and the device information are used as digital watermark information to be embedded into preset audio to generate authorization audio, the authorization audio is sent to the first device, the authorization tag is a tag which is generated by the first device server and is used for uniquely specifying the first device, after the first device plays the authorization audio, the second device listens to the played authorization audio, and the digital watermark information in the authorization audio is extracted; verifying the digital watermark information, and providing the authorized user information to the first equipment server after the verification is passed; wherein the authorized user information is for: and generating authorized identity information based on the authorized user information by the first equipment server, and after the authorized identity information is sent to the first equipment, performing application login based on the authorized identity information by the first equipment.
Optionally, the authorization tag and the device information are sent to a database by the first device server to be stored, and are used for verifying the digital watermark information.
Optionally, the step of verifying the digital watermark information includes: determining that verification passes under the condition that the authorization tag and the equipment information stored in the database are consistent with the digital watermark information extracted by the second equipment; the step of providing the authorized user information to the first device server comprises: under the condition that verification passes, the authorized user information is sent to the database to be bound and stored with the authorization tag; the first device server extracts the authorized user information from the database based on the authorization tag.
Optionally, after the first device logs in to the application, the login is exited in response to a de-authorization instruction sent by the user to the second device, where the login is achieved by the following steps: receiving a de-authorization request sent by the second device in response to the received de-authorization instruction, the de-authorization request comprising at least one of: the authorized user information, the authorization tag; and in response to the de-authorization request, unbinding the authorized user information stored in the database in a binding manner with the authorization tag, so that the first device exits the authorized state.
Optionally, the step of receiving the digital watermark information and the authorized user information sent by the second device of the authorized login application includes: and after the second equipment of the authorized login application displays the extracted equipment information in the digital watermark information and responds to an instruction which is sent by a user for allowing authorization for the equipment information, receiving the digital watermark information and the authorized user information sent by the second equipment.
Optionally, the method further comprises: after the first equipment logs in an application and exits, the first equipment responds to the application login request of a user again, and if the time interval between the re-received application login request and the previous login application is not longer than the session validity period between the first equipment and the first equipment server, the first equipment automatically logs in without requesting authorization from the second equipment; after the first device logs in the application for the last time, the first device establishes a session with the first device by the first device server.
Optionally, the session validity period is refreshed by the following method: after the first device logs in an application, the first device server generates a token with a validity period greater than the session validity period; and refreshing the validity period of the session according to the token if the time interval does not exceed the validity period of the session.
According to another aspect of the present disclosure, there is provided an application login apparatus serving as a first device to log in an application to be authorized, including: an input unit configured to: receiving an application login request of a user; a transmission unit configured to: in response to receiving an application login request of a user, sending an authorized audio acquisition request to a first equipment server; wherein the authorized audio acquisition request includes device information of the first device; a receiving unit configured to: receiving authorization audio from the first device server, wherein the authorization audio is generated by the first device server in response to the authorization audio acquisition request by embedding an authorization tag and the device information as digital watermark information into preset audio, the authorization tag being a tag generated by the first device server for uniquely specifying the first device; a playback unit configured to: playing the authorized audio; the receiving unit is further configured to: receiving authorization identity information from the first device server; wherein the authorization identity information is generated by: intercepting the played authorized audio by a second device of an authorized login application, extracting the digital watermark information in the authorized audio, transmitting the digital watermark information and authorized user information to a second device server, checking the digital watermark information by the second device server, and generating the authorized identity information by the first device server based on the authorized user information provided by the second device server after the digital watermark information passes the checking; a login unit configured to: and carrying out application login based on the authorized identity information.
According to another aspect of the present disclosure, there is provided an application login apparatus serving as a first device server, including: a receiving unit configured to: receiving an authorized audio acquisition request from a first device, wherein the authorized audio acquisition request is sent after the first device receives an application login request of a user and comprises device information of the first device; a processing unit configured to: generating an authorization tag in response to the authorization audio acquisition request, and embedding the authorization tag and the equipment information as digital watermark information into preset audio to obtain authorization audio, wherein the authorization tag is a tag for uniquely specifying the first equipment; a transmission unit configured to: transmitting the authorization audio to the first device; the processing unit is further configured to: generating authorization identity information based on authorized user information provided by the second device server after the digital watermark information passes verification; wherein, the digital watermark information is verified by the following steps: playing the authorized audio by the first device, intercepting the authorized audio played by the first device by a second device of the authorized login application, extracting the digital watermark information in the authorized audio, sending the digital watermark information and the authorized user information to a second device server, and checking the digital watermark information by the second device server; the transmitting unit is further configured to: and sending the authorized identity information to the first equipment, so that the first equipment carries out application login according to the authorized identity information.
According to another aspect of the present disclosure, there is provided an application login apparatus, serving as a second device authorized to login an application, including: an input unit configured to: receiving an audio scanning request of a user; a listening unit configured to: responding to the received audio scanning request of the user, and intercepting the played authorized audio; wherein the authorized audio is generated by: a first device of a login application to be authorized sends an authorization audio acquisition request comprising device information of the first device to a first device server in response to receiving an application login request of a user, the first device server embeds an authorization tag and the device information as digital watermark information into preset audio to generate the authorization audio in response to the authorization audio acquisition request, and the authorization tag is a tag which is generated by the first device server and is used for uniquely specifying the first device; an extraction unit configured to: extracting the digital watermark information in the authorized audio; a transmission unit configured to: transmitting the digital watermark information and the authorized user information to a second equipment server; and after the second equipment server verifies and passes the digital watermark information, the first equipment server generates authorized identity information based on the authorized user information provided by the second equipment server, the authorized identity information is sent to the first equipment, and the first equipment performs application login based on the authorized identity information.
According to another aspect of the present disclosure, there is provided an application login apparatus serving as a second device server, including: a receiving unit configured to: receiving digital watermark information sent by a second device of an authorized login application and authorized user information; wherein, the digital watermark information is obtained by the following steps: a first device of a login application to be authorized responds to an application login request of a user, an authorization audio acquisition request comprising device information of the first device is sent to a first device server, the first device server responds to the authorization audio acquisition request, an authorization tag and the device information are used as digital watermark information to be embedded into preset audio to generate authorization audio, the authorization audio is sent to the first device, the authorization tag is a tag which is generated by the first device server and is used for uniquely specifying the first device, after the first device plays the authorization audio, the second device listens to the played authorization audio, and the digital watermark information in the authorization audio is extracted; a verification unit configured to: verifying the digital watermark information; a transmission unit configured to: providing the authorized user information to the first device server after verification is passed; wherein the authorized user information is for: and generating authorized identity information based on the authorized user information by the first equipment server, and after the authorized identity information is sent to the first equipment, performing application login based on the authorized identity information by the first equipment.
According to another aspect of the present disclosure, there is provided a computer-readable storage medium storing instructions that, when executed by at least one computing device, cause the at least one computing device to perform an application login method as described above.
According to another aspect of the present disclosure, there is provided a system comprising at least one computing device and at least one storage device storing instructions, wherein the instructions, when executed by the at least one computing device, cause the at least one computing device to perform a method of application login as described above.
The technical scheme provided by the disclosure at least brings the following beneficial effects:
according to the application login method, the application login device, the storage medium and the system, the to-be-authorized login application device can realize accurate authorization of a certain to-be-authorized login application device by playing the authorization audio carrying the digital watermark capable of uniquely identifying the device, listening to the played authorization audio by the authorized login application device and extracting the unique identifier in the carried digital watermark, and then authorizing the to-be-authorized login application device when the unique identifier passes verification.
In addition, after the application equipment to be authorized logs in successfully and logs out of the application, the login can be automatically performed within the effective period of the session when logging in again, the authorized login application equipment is not required to be authorized again, and the efficiency and convenience of the login process are improved.
In addition, the session validity period is refreshed through the token, so that continuous updating of automatic login timeliness is guaranteed.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the disclosure and together with the description, serve to explain the principles of the disclosure and do not constitute an undue limitation on the disclosure.
FIG. 1 illustrates a system diagram of an application login that may be performed using an application login method of an exemplary embodiment of the present disclosure;
FIG. 2 illustrates a timing diagram of application login according to an exemplary embodiment of the present disclosure;
FIG. 3 illustrates an application login method flowchart for logging in an application device to be authorized in accordance with an exemplary embodiment of the present disclosure;
FIG. 4 illustrates an application login method flowchart for logging-on to an application device server to be authorized in accordance with an exemplary embodiment of the present disclosure;
FIG. 5 illustrates an application login method flowchart for an authorized login application device according to an exemplary embodiment of the present disclosure;
FIG. 6 illustrates an application login method flowchart for authorized login to an application device server, according to an exemplary embodiment of the present disclosure;
FIG. 7 illustrates a block diagram of an application login apparatus for use as an application device to be authorized to login in accordance with an exemplary embodiment of the present disclosure;
FIG. 8 illustrates a block diagram of an application login apparatus that serves as a corresponding server for an application device to be authorized to login in accordance with an exemplary embodiment of the present disclosure;
FIG. 9 illustrates a block diagram of an application login apparatus for use as an authorized login application device according to an exemplary embodiment of the present disclosure;
fig. 10 illustrates a block diagram of an application login apparatus serving as a server corresponding to an authorized login application device according to an exemplary embodiment of the present disclosure.
Detailed Description
In order to enable those skilled in the art to better understand the technical solutions of the present disclosure, the technical solutions of the embodiments of the present disclosure will be clearly and completely described below with reference to the accompanying drawings.
It should be noted that the terms "first," "second," and the like in the description and claims of the present disclosure and in the foregoing figures are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments of the disclosure described herein may be capable of operation in sequences other than those illustrated or described herein. The embodiments described in the examples below are not representative of all embodiments consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with some aspects of the present disclosure as detailed in the accompanying claims.
It should be noted that, in this disclosure, "at least one of the items" refers to a case where three types of juxtaposition including "any one of the items", "a combination of any of the items", "an entirety of the items" are included. For example, "including at least one of a and B" includes three cases side by side as follows: (1) comprises A; (2) comprising B; (3) includes A and B. For example, "at least one of the first and second steps is executed", that is, three cases are juxtaposed as follows: (1) performing step one; (2) executing the second step; (3) executing the first step and the second step.
In the method that the two-dimension code scanning mode cannot be applied to application login of a non-screen terminal and the audio is used for logging in the non-screen equipment, the logged-in equipment broadcasts the audio carrying the digital watermark to enable the non-logged-in equipment to intercept and extract the digital watermark and then verify the extracted digital watermark, and the non-logged-in equipment is authorized to log in after verification is passed, the problem that when a set of verification codes are shared by a plurality of non-logged-in equipment, accurate authorization cannot be carried out on a certain target equipment which is not logged in, and potential safety hazards exist exists.
In order to solve the above problems, the present disclosure provides an application login method, an application login device, a storage medium, and a system, where an application device to be authorized can play an authorized audio carrying a digital watermark capable of uniquely identifying its device, and after the authorized login application device listens to the played authorized audio and extracts a unique identifier in the carried digital watermark, when the unique identifier passes verification, the application device to be authorized is authorized, so that accurate authorization of a certain application device to be authorized can be achieved, and security is improved.
In addition, according to the application login method, the application login device, the storage medium and the system, when the application equipment to be authorized to login successfully logs in the application and exits from logging in, login can be automatically performed within the session validity period when logging in again, authorization is not required to be requested again from the authorized login application equipment, and the efficiency and convenience of a login process are improved.
In addition, according to the application login method, the application login device, the storage medium and the system, the session validity period can be refreshed through the token, and continuous updating of automatic login timeliness is guaranteed.
Next, the application login method, the application login device, the storage medium, and the system of the present disclosure will be specifically described with reference to fig. 1 to 10.
Fig. 1 shows a system schematic diagram of an application login that may be performed using the application login method of an exemplary embodiment of the present disclosure.
Referring to fig. 1, a first device 101, a first device server 102, a second device 103, a second device server 104, and a database 105 to be authorized to login applications may be included in a system. The database 105 is used for data backup and interaction with the first device server 102 and the second device server 104, and it is understood that other devices and unit modules capable of performing similar functions are within the scope of the present disclosure and are not limited to the database form shown in fig. 1.
Fig. 2 illustrates a timing diagram of application login according to an exemplary embodiment of the present disclosure. The timing diagram shown in fig. 2 may correspond to the system of fig. 1, but with the timing object of the database 105 of fig. 1 implicit in the timing object of the second device server 104.
The principle of the system performing application login is described below in connection with fig. 1 and 2.
Referring to fig. 1 and 2, the first device 101 may receive an application login request from a user side; in response to the application login request, the first device 101 may send an authorized audio acquisition request to the first device server 102, which may include device information of the first device 101.
The first device server 102 may receive the authorized audio acquisition request sent by the first device 101, and respond to the authorized audio acquisition request to acquire corresponding first device information in the request information, generate an authorized tag for uniquely specifying the first device 101, and send the authorized audio to the first device 101 after embedding the first device information and the authorized tag as a digital watermark into the preset audio to obtain the authorized audio. According to an exemplary embodiment of the present disclosure, the first device 101 to which the login application is to be authorized may play the authorization audio received from the first device server 102 through a speaker.
After the first device 101 plays the authorized audio through the speaker, the second device 103 authorized to log in the application may intercept the authorized audio played by the first device 101 under the instruction of the user, after interception, the second device 103 may extract the digital watermark information carried in the authorized audio, and then, the second device 103 may send the extracted digital watermark information and the authorized user information to the second device server 104.
The step of transmitting the digital watermark information and the authorized user information to the second device server 104 may include: the second device 103 presents the device information in the extracted digital watermark information and transmits the digital watermark information and authorized user information to the second device server 104 in response to an instruction for permission of authorization transmitted by the user for the device information.
The first device server 102 may embed the authorization tag and the first device information as digital watermark information into a preset audio to obtain the authorization audio, and then may send the authorization tag and the first device information to the database 105 to store, so that the second device server 104 may use the authorization tag and the device information stored in the database 105 to verify the digital watermark information extracted by the second device 103.
The second device server 104 may verify the authorization tag and the device information stored in the database 105 with the digital watermark information extracted by the second device 103; in the case that the verification passes, the second device server 104 may send the authorized user information to the database 105 to be bound with the authorization tag for storage; the first device server 102 may extract authorized user information from the database 105 based on the authorization tag, and the first device server 102 may then send the authorized identity information to the first device 101.
The first device 101 may perform application login based on the authorization identity information received from the first device server 102.
The application login method performed by each device in fig. 1 and 2 is described in detail below with reference to fig. 3 to 6.
Fig. 3 illustrates an application login method flowchart for logging in an application device to be authorized according to an exemplary embodiment of the present disclosure. The login application to be authorized may refer to the first device 101 in fig. 1 and fig. 2. In step S301, an authorized audio acquisition request may be sent to the first device server 102 in response to receiving an application login request of the user; wherein the authorized audio acquisition request may comprise device information of the first device 101.
According to an exemplary embodiment of the present disclosure, the first device 101 to be authorized to log in to the application may be a terminal device capable of acquiring a user instruction, playing an audio file, such as a car set, a screen or a no-screen sound, etc. The first device server 102 is a server with digital watermarks embedded in audio files, and the first device 101 and the first device server 102 may have voice interaction capabilities. According to an exemplary embodiment of the present disclosure, the user may cause the first device 101 to receive an application login request from the user side by clicking a login button or voice-controlled login or the like to the first device 101; in response to the application login request, the first device 101 may send an authorized audio acquisition request to the first device server 102, which may include device information of the first device 101, for example, but not limited to, the authorized audio acquisition request may include information of the device name of the first device 101, a unique device identification of the first device 101, a device model number of the first device 101, a request time of the first device 101, and the like.
In step S302, authorization audio may be received from the first device server 102, where the authorization audio may be generated by the first device server 102 embedding an authorization tag and device information as digital watermark information into preset audio in response to the authorization audio acquisition request, and the authorization tag may be a tag generated by the first device server 102 for uniquely specifying the first device 101.
According to an exemplary embodiment of the present disclosure, the first device server 102 may receive an authorized audio acquisition request sent by the first device 101, and the first device server 102 may further respond to the authorized audio acquisition request to acquire corresponding first device information in the request information, generate an authorization tag for uniquely specifying the first device 101, and send the authorized audio to the first device 101 after embedding the first device information and the authorization tag as a digital watermark into the preset audio to obtain the authorized audio.
According to an exemplary embodiment of the present disclosure, the authorization tag may be a data string that is randomly generated by the first device server 102 or generated according to the first device information, and may be identified by a UUID. When the authorization tag UUID is randomly generated by the first device server 102, the server operation load and the running time can be reduced while ensuring the data uniqueness as much as possible. Of course, the authorization tag may be any other tag that can be used to uniquely specify the first device 101.
In step S303, the authorized audio may be played.
According to an exemplary embodiment of the present disclosure, the first device 101 to which the login application is to be authorized may play the authorization audio received from the first device server 102 through a speaker.
At step S304, authorization identity information may be received from the first device server 102; wherein the authorization identity information may be generated by: interception of the played authorized audio by the second device 103 of the authorized login application, extraction of digital watermark information in the authorized audio, transmission of the digital watermark information and the authorized user information to the second device server 104, verification of the digital watermark information by the second device server 104, and generation of authorized identity information by the first device server 102 based on the authorized user information provided by the second device server 104 after the verification is passed.
According to an exemplary embodiment of the present disclosure, after the first device 101 plays the authorized audio through the speaker, the second device 103 of the authorized login application may listen to the authorized audio played by the first device 101 under the instruction of the user, for example, the user may control the interception of the second device 103 by opening the "find surrounding device" function of the logged application in the second device 103, after interception, the second device 103 may extract the digital watermark information carried in the authorized audio, and the second device 103 may be any terminal device, typically a mobile terminal with a screen, such as a mobile phone end, that may use the same algorithm as that used when embedding the digital watermark information to perform watermark extraction; the second device 103 may then send the extracted digital watermark information and authorized user information to the second device server 104, which may be the user ID of the corresponding logged-in application in the second device 103 of the authorized login application or any other user identity information that may be indicative of the logged-in application.
According to an exemplary embodiment of the present disclosure, the step of transmitting the digital watermark information and the authorized user information to the second device server 104 may include: the second device 103 presents the device information in the extracted digital watermark information and transmits the digital watermark information and authorized user information to the second device server 104 in response to an instruction for permission of authorization transmitted by the user for the device information.
According to the exemplary embodiment of the present disclosure, after the second device 103 extracts the digital watermark information in the played authorized audio, the second device 103 may display the device information in the extracted digital watermark information, so that the user may determine whether to allow the corresponding first device 101 represented by the device information to obtain an opportunity to continue to execute the authorization procedure according to the displayed device information; if the user selects permission for authorization, the second device 103 may continue to send the digital watermark information and the authorized user information to the second device server 104 in response to the permission authorization instruction sent by the user; if the user selects to reject the authorization, the second device 103 may terminate the authorization process in response to the authorization reject instruction sent by the user.
According to an exemplary embodiment of the present disclosure, the second device server 104 may verify the digital watermark information after receiving the extracted digital watermark information, and the second device server 104 may verify the digital watermark information according to whether the digital watermark information meets a preset rule or exists in a preset whitelist, or the like, which is not limited herein.
According to an exemplary embodiment of the present disclosure, the authorization tag and the device information may be transmitted by the first device server 102 to the database 105 to be saved, so that the second device server 104 may verify the digital watermark information extracted by the second device 103 using the authorization tag and the device information saved in the database 105.
According to an exemplary embodiment of the present disclosure, the first device server 102 may embed the authorization tag and the first device information as digital watermark information into a preset audio to obtain the authorization audio, and may transmit the authorization tag and the first device information to the database 105 to be stored, so that the second device server 104 may verify the digital watermark information extracted by the second device 103 using the authorization tag and the device information stored in the database 105.
According to an exemplary embodiment of the present disclosure, the step of verifying may include: in the case where the authorization tag and the device information stored in the database 105 are identical to the digital watermark information extracted by the second device 103, verification passing may be determined by the second device server 104; the second device server 104 may provide authorized user information to the first device server 102, and the providing step may include: in the case that the verification passes, the second device server 104 sends the authorized user information to the database 105 to be bound and stored with the authorization tag; the first device server 102 extracts authorized user information from the database 105 based on the authorization tag.
According to an exemplary embodiment of the present disclosure, the second device server 104 may determine that the verification passes in the case where the authorization tag and the device information stored in the database 105 are consistent with the digital watermark information content extracted by the second device 103.
In accordance with an exemplary embodiment of the present disclosure, in the event that the verification passes, the authorized user information may be sent by the second device server 104 to the database 105 for binding with the authorization tag, so that the first device server 102 may extract the corresponding bound authorized user information from the database 105 based on the authorization tag.
According to an exemplary embodiment of the present disclosure, after the verification is passed, the first device server 102 may be provided with authorized user information received from the second device 103 by the second device server 104, the first device server 102 may generate authorized identity information based on the authorized user information, and the authorized identity information may be, but is not limited to, a token (in the form of a header, a requestbody, url, etc.) generated by the first device server 102 based on the received user ID or a cookie with user ID information, etc. data form; the first device server 102 may then send the authorization identity information to the first device 101.
In step S305, application login may be performed based on the authorized identity information.
According to an exemplary embodiment of the present disclosure, the first device 101 may perform application login based on the authorized identity information received from the first device server 102.
According to an exemplary embodiment of the present disclosure, after the application login of the first device 101 is completed, the first device 101 may prompt "login is successful" through voice and stop playing the authorized audio.
According to an exemplary embodiment of the present disclosure, after the first device 101 logs in to the application, the login may be logged out in response to a de-authorization instruction sent by the user to the second device 103, where the logging out may be implemented by: the second device 103, in response to receiving the de-authorization instruction, sends a de-authorization request to the second device server 104, the de-authorization request may include, but is not limited to, at least one of: authorized user information, authorization tags; the authorized user information stored in the binding in the database 105 may be unbinding with the authorization tag by the second device server 104 in response to the de-authorization request, such that the first device 101 exits the authorized state.
According to an exemplary embodiment of the present disclosure, after the first device 101 logs in to the application through the complaint method, if the user issues an instruction to the second device 103 to release the authorization of the first device 101, the second device 103 may respond to the release authorization instruction and may send a release authorization request to the second device server 104, where the release authorization request may include any one or two of authorized user information and an authorization tag, or other information that enables the second device server 104 to receive and then log out the logged-in application in the first device 101; the second device server 104 may respond to the de-authorization request, and may find, according to the authorized user information or the authorization tag included in the de-authorization request, the corresponding authorized user information and the authorization tag stored in the binding manner in the database 105, and may unbind the authorized user information and the authorization tag stored in the binding manner, so that no identity authentication information for maintaining login validity of the first device 101 exists in the database 105, and further, the first device 101 exits the authorized login state.
According to an exemplary embodiment of the present disclosure, after logging in and logging out of an application, an application login request of a user may be received again, and if a time interval between the received application login request and a previous logging in application does not exceed a session validity period between the first device 101 and the first device server 102, the user may automatically log in without requesting authorization from the second device 103; wherein the first device 101 may establish a session with the first device 101 by the first device server 102 after a previous login to the application.
According to an exemplary embodiment of the present disclosure, after the first device 101 logs into the application, a session with the first device 101 may be established by the first device server 102, and the session may have a validity period; after the first device 101 logs out, the user may attempt to log in the application again by sending a login instruction to the first device 101, and the first device 101 may respond to the re-received application login request and may determine, through a timestamp typically carried in the request, whether a time interval between the re-received application login request and the previous logged-in application exceeds a session validity period; if not, authorizing the first device 101 to automatically log in the application; if the request exceeds the request, the second device 103 of the authorized login application can be re-requested for authorization, and the second device 103 of the application to be authorized login can be re-authorized through the application login method.
According to an exemplary embodiment of the present disclosure, the session validity period may be refreshed by: after the first device 101 logs into the application, a token having a validity period greater than the validity period of the session may be generated by the first device server 102; if the time interval does not exceed the validity period of the session, the validity period of the session may be refreshed according to the token.
According to an exemplary embodiment of the present disclosure, after the first device 101 logs in to an application, the first device server 102 may generate a token, such as a token, according to device information of the first device 101 and a login timestamp, and set the validity period of the token to be greater than the validity period of a session between the first device server 102 and the first device 101, and when a time interval between a re-received application login request and a previous login application does not exceed the validity period of the session, the first device 101 may automatically perform login, and then automatically refresh the validity period of the session using the valid token; if the time interval is greater than the session validity period, the session expires, the first device 101 cannot automatically log in and may re-request authorization from the second device 103 of the authorized login application.
According to the application login method applied to the to-be-authorized login application equipment server, the to-be-authorized login application equipment can realize accurate authorization of a certain to-be-authorized login application equipment and improve safety by playing the authorized audio carrying the digital watermark capable of uniquely identifying the to-be-authorized login application equipment, listening the played authorized audio by the authorized login application equipment and extracting the unique identification in the carried digital watermark, and then authorizing the to-be-authorized login application equipment when the unique identification passes verification.
Fig. 4 illustrates an application login method flowchart for logging-in to be authorized to an application device server according to an exemplary embodiment of the present disclosure. The login application device server to be authorized may refer to the first device server 102 in fig. 1 and 2.
Referring to fig. 4 in combination with fig. 1 and 2, in step S401, an authorized audio acquisition request may be received from the first device 101, wherein the authorized audio acquisition request may be transmitted after the first device 101 receives an application login request of a user, and may include device information of the first device 101.
In step S402, an authorization tag may be generated in response to the authorization audio acquisition request, and the authorization tag and the device information may be embedded as digital watermark information in the preset audio-derived authorization audio, wherein the authorization tag may be a tag for uniquely specifying the first device 101.
In step S403, the authorization audio may be transmitted to the first device 101.
After the digital watermark information passes the verification, authorization identity information may be generated based on the authorized user information provided by the second device server 104 at step S404; wherein, the digital watermark information can be verified by the following steps: the first device 101 plays the authorized audio, the second device 103 of the authorized login application listens to the authorized audio played by the first device 101, extracts the digital watermark information in the authorized audio, and can send the digital watermark information and the authorized user information to the second device server 104, and the second device server 104 verifies the digital watermark information.
In step S405, authorization identity information may be sent to the first device 101, so that the first device 101 performs application login according to the authorization identity information.
The exemplary embodiments of the steps S401 to S405 are substantially the same as those of the steps S301 to S305, and will not be described herein.
According to the application login method applied to the to-be-authorized login application equipment server, the to-be-authorized login application equipment can realize accurate authorization of a certain to-be-authorized login application equipment and improve safety by playing the authorized audio carrying the digital watermark capable of uniquely identifying the to-be-authorized login application equipment, listening the played authorized audio by the authorized login application equipment and extracting the unique identification in the carried digital watermark, and then authorizing the to-be-authorized login application equipment when the unique identification passes verification.
Fig. 5 illustrates an application login method flowchart for an authorized login application device according to an exemplary embodiment of the present disclosure. The authorized login application device described above may refer to the second device 103 in fig. 1 and 2.
Referring to fig. 5, referring to fig. 1 and 2 in combination, in step S501, playback authorized audio may be listened to in response to receiving an audio scanning request from a user; wherein the authorized audio may be generated by: an authorized audio acquisition request including device information of the first device 101 may be transmitted to the first device server 102 by the first device 101 of the application to be authorized to login in response to receiving an application login request of a user, and an authorized audio may be generated by the first device server 102 in response to the authorized audio acquisition request by embedding an authorized tag, which may be a tag generated by the first device server 102 to uniquely specify the first device 101, and the device information as digital watermark information into a preset audio.
In step S502, digital watermark information in the authorized audio may be extracted, and the digital watermark information and authorized user information may be transmitted to the second device server 104; wherein the authorized user information may be used to generate, by the first device server 102, authorized identity information based on the authorized user information provided by the second device server 104 after the second device server 104 verifies and passes the digital watermark information, and may send the authorized identity information to the first device 101, and the first device 101 performs application login based on the authorized identity information.
The exemplary embodiments of the steps S501 to S502 are substantially the same as those of the steps S301 to S305, and will not be described herein.
According to the application login method applied to the authorized login application device, the to-be-authorized login application device can realize accurate authorization of a certain to-be-authorized login application device and improve safety by playing the authorized audio carrying the digital watermark capable of uniquely identifying the device, listening to the played authorized audio by the authorized login application device and extracting the unique identifier in the carried digital watermark, and then authorizing the to-be-authorized login application device when the unique identifier passes verification.
Fig. 6 illustrates an application login method flowchart for authorized login to an application device server according to an exemplary embodiment of the present disclosure. The authorized login application device server described above may refer to the second device server 104 in fig. 1 and 2.
Referring to fig. 6 in combination with fig. 1 and 2, in step S601, digital watermark information transmitted by the second device 103 of the authorized login application and authorized user information may be received; wherein, the digital watermark information can be obtained by the following steps: the first device 101 of the login application to be authorized may send an authorized audio acquisition request including device information of the first device 101 to the first device server 102 in response to receiving an application login request of a user, may generate authorized audio by the first device server 102 in response to the authorized audio acquisition request, embed an authorized tag and device information as digital watermark information into preset audio, and may send the authorized audio to the first device 101, the authorized tag may be a tag generated by the first device server 102 for uniquely specifying the first device 101, and after the first device 101 plays the authorized audio, the second device 103 may listen to the played authorized audio, and extract the digital watermark information in the authorized audio.
At step S602, the digital watermark information may be verified, and after the verification is passed, authorized user information may be provided to the first device server 102; wherein the authorized user information may be used to: after generating authorization identity information based on the authorized user information by the first device server 102 and transmitting the authorization identity information to the first device 101, application login is performed by the first device 101 based on the authorization identity information.
The exemplary embodiments of the steps S601 to S602 are substantially the same as those of the steps S301 to S305, and will not be described herein.
According to the application login method applied to the authorized login application equipment server, the to-be-authorized login application equipment can realize accurate authorization of a certain to-be-authorized login application equipment and improve safety by playing the authorized audio carrying the digital watermark capable of uniquely identifying the to-be-authorized login application equipment, listening to the played authorized audio by the authorized login application equipment and extracting the unique identification in the carried digital watermark, and then authorizing the to-be-authorized login application equipment when the unique identification passes verification.
Fig. 7 shows a block diagram of an application login apparatus used as an application device to be authorized to login according to an exemplary embodiment of the present disclosure. The login application to be authorized may refer to the first device 101 in fig. 1 and fig. 2.
Referring to fig. 7, an application login apparatus 700 serving as an application device to be authorized to login may include an input unit 701, a transmission unit 702, a reception unit 703, a play unit 704, and a login unit 705.
Referring to fig. 1 and 2 in combination, the input unit 701 may receive an application login request of a user; the transmitting unit 702 may transmit an authorized audio acquisition request to the first device server 102 in response to receiving an application login request of the user; wherein the authorized audio acquisition request may include device information of the first device 101; the receiving unit 703 may receive the authorization audio from the first device server 102, wherein the authorization audio may be generated by the first device server 102 embedding an authorization tag and device information as digital watermark information into a preset audio in response to an authorization audio acquisition request, and the authorization tag may be a tag generated by the first device server 102 for uniquely specifying the first device 101; the playback unit 704 may play the authorized audio; the receiving unit 703 may receive authorization identity information from the first device server 102; wherein the authorization identity information may be generated by, but is not limited to, the following operations: intercepting the played authorized audio by the second device 103 of the authorized login application, extracting digital watermark information in the authorized audio, transmitting the digital watermark information and the authorized user information to the second device server 104, checking the digital watermark information by the second device server 104, and generating authorized identity information by the first device server 102 based on the authorized user information provided by the second device server 104 after the digital watermark information passes the check; the login unit 705 may perform application login based on the authorized identity information. It will be appreciated that the above-described combinations and distinctions of functional units in the application login device used as the device to be authorized to login to the application are not limited to the above-described forms, and other equivalent or similar situations are within the scope of the present disclosure.
Fig. 8 illustrates a block diagram of an application login apparatus serving as a server corresponding to an application device to be authorized to login according to an exemplary embodiment of the present disclosure. The server corresponding to the login application to be authorized may refer to the first device server 102 in fig. 1 and fig. 2.
Referring to fig. 8, an application login apparatus 800 serving as a server to which a login application to be authorized corresponds may include a receiving unit 801, a processing unit 802, and a transmitting unit 803.
Referring to fig. 1 and 2 in combination, the receiving unit 801 may receive an authorized audio acquisition request from the first device 101, wherein the authorized audio acquisition request may be transmitted after the first device 101 receives an application login request of a user, and may include device information of the first device 101; the processing unit 802 may generate an authorization tag in response to the authorization audio acquisition request, and may embed the authorization tag and the device information as digital watermark information into preset audio to obtain authorization audio, where the authorization tag may be a tag for uniquely specifying the first device 101; the transmitting unit 803 may transmit the authorized audio to the first device 101; the processing unit 802 may also generate authorized identity information based on the authorized user information provided by the second device server 104 after the digital watermark information passes verification; wherein, the digital watermark information can be verified by the following steps: the first device 101 plays the authorized audio, the second device 103 of the authorized login application listens to the authorized audio played by the first device 101, extracts the digital watermark information in the authorized audio, sends the digital watermark information and the authorized user information to the second device server 104, and the second device server 104 verifies the digital watermark information; the transmitting unit 803 may also transmit authorization identity information to the first device 101, such that the first device 101 performs application login according to the authorization identity information.
It will be appreciated that the above-described combinations and distinctions of functional units in the application login device used as the device to be authorized to login to the application are not limited to the above-described forms, and other equivalent or similar situations are within the scope of the present disclosure.
Fig. 9 shows a block diagram of an application login apparatus used as an authorized login application device according to an exemplary embodiment of the present disclosure. The authorized login application device described above may refer to the second device 103 in fig. 1 and 2.
Referring to fig. 9, an application login apparatus 900 serving as an authorized login application device may include an input unit 901, a listening unit 902, an extracting unit 903, and a transmitting unit 904.
Referring to fig. 1 and 2 in combination, the input unit 901 may receive an audio scan request of a user; interception unit 902 may intercept the played authorized audio in response to receiving an audio scanning request from the user; wherein the authorized audio may be generated by: the first device 101 of the login application to be authorized may send an authorization audio acquisition request including device information of the first device 101 to the first device server 102 in response to receiving an application login request of a user, the first device server 102 may embed an authorization tag and device information as digital watermark information in a preset audio to generate an authorization audio in response to the authorization audio acquisition request, and the authorization tag may be a tag generated by the first device server 102 to uniquely specify the first device 101; the extraction unit 903 may extract digital watermark information in the authorized audio; the transmitting unit 904 may transmit the digital watermark information and the authorized user information to the second device server 104; the authorized user information may be used by the second device server 104 to verify the digital watermark information, and after the digital watermark information passes the verification, the first device server 102 generates authorized identity information based on the authorized user information provided by the second device server 104, and may send the authorized identity information to the first device 101, and the first device 101 performs application login based on the authorized identity information.
It will be appreciated that the above-described combinations and distinctions of functional units in the application login device used as the device to be authorized to login to the application are not limited to the above-described forms, and other equivalent or similar situations are within the scope of the present disclosure.
Fig. 10 illustrates a block diagram of an application login apparatus serving as a server corresponding to an authorized login application device according to an exemplary embodiment of the present disclosure. The server corresponding to the authorized login application device may refer to the second device server 104 in fig. 1 and fig. 2.
Referring to fig. 10, an application login apparatus 1000 serving as a server to which an authorized login application device corresponds may include a receiving unit 1001, a verifying unit 1002, and a transmitting unit 1003.
Referring to fig. 1 and 2 in combination, the receiving unit 1001 may receive digital watermark information transmitted by the second device 103 of the authorized login application and authorized user information; wherein, the digital watermark information can be obtained by the following steps: the first device 101 of the application to be authorized to log in may send an authorized audio acquisition request including device information of the first device 101 to the first device server 102 in response to receiving an application login request of a user, the first device server 102 may embed an authorized tag and device information as digital watermark information into preset audio in response to the authorized audio acquisition request to generate authorized audio, and may send the authorized audio to the first device 101, the authorized tag may be a tag generated by the first device server 102 for uniquely specifying the first device 101, and after the first device 101 plays the authorized audio, the second device 103 may listen to the played authorized audio and extract the digital watermark information in the authorized audio; the verification unit 1002 may verify the digital watermark information; the transmission unit 1003 may provide authorized user information to the first device server 102 after the verification is passed; wherein the authorized user information may be used to: after generating authorization identity information based on the authorized user information by the first device server 102 and transmitting the authorization identity information to the first device 101, application login is performed by the first device 101 based on the authorization identity information.
It will be appreciated that the above-described combinations and distinctions of functional units in the application login device used as the device to be authorized to login to the application are not limited to the above-described forms, and other equivalent or similar situations are within the scope of the present disclosure.
According to an embodiment of the present disclosure, there may also be provided a computer-readable storage medium storing instructions, wherein the instructions, when executed by at least one processor, cause the at least one processor to perform an image processing method and a model training method according to the present disclosure. Examples of the computer readable storage medium herein include: read-only memory (ROM), random-access programmable read-only memory (PROM), electrically erasable programmable read-only memory (EEPROM), random-access memory (RAM), dynamic random-access memory (DRAM), static random-access memory (SRAM), flash memory, nonvolatile memory, CD-ROM, CD-R, CD + R, CD-RW, CD+RW, DVD-ROM, DVD-R, DVD + R, DVD-RW, DVD+RW, DVD-RAM, BD-ROM, BD-R, BD-R LTH, BD-RE, blu-ray or optical disk storage, hard Disk Drives (HDD), solid State Disks (SSD), card memory (such as multimedia cards, secure Digital (SD) cards or ultra-fast digital (XD) cards), magnetic tape, floppy disks, magneto-optical data storage, hard disks, solid state disks, and any other means configured to store computer programs and any associated data, data files and data structures in a non-transitory manner and to provide the computer programs and any associated data, data files and data structures to a processor or computer to enable the processor or computer to execute the programs. The computer programs in the computer readable storage media described above can be run in an environment deployed in a computer device, such as a client, host, proxy device, server, etc., and further, in one example, the computer programs and any associated data, data files, and data structures are distributed across networked computer systems such that the computer programs and any associated data, data files, and data structures are stored, accessed, and executed in a distributed fashion by one or more processors or computers.
In accordance with embodiments of the present disclosure, a computer program product may also be provided, instructions in which are executable by a processor of a computer device to perform the above-described application login method.
By way of example, the above-mentioned device may be a PC computer, tablet device, personal digital assistant, smart phone, or other device capable of executing the above-mentioned set of instructions. Here, the above-mentioned apparatus is not necessarily a single application login device, but may be any device or aggregate of circuits capable of executing the above-mentioned instructions (or instruction sets) individually or in combination. The above-mentioned device may also be part of an integrated control system or system manager, or may be configured as a portable application login apparatus that interfaces locally or remotely (e.g., via wireless transmission).
Another embodiment of the present disclosure is directed to a system comprising at least one computing device and at least one storage device storing instructions that, when executed by the at least one computing device, cause the at least one computing device to perform the above-described method embodiments.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This disclosure is intended to cover any adaptations, uses, or adaptations of the disclosure following the general principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It is to be understood that the present disclosure is not limited to the precise arrangements and instrumentalities shown in the drawings, and that various modifications and changes may be effected without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.

Claims (34)

1. An application login method, which is characterized in that the application is applied to a first device to be authorized to login an application, comprising:
in response to receiving an application login request of a user, sending an authorized audio acquisition request to a first equipment server; wherein the authorized audio acquisition request includes device information of the first device;
receiving authorization audio from the first device server, wherein the authorization audio is generated by the first device server in response to the authorization audio acquisition request by embedding an authorization tag and the device information as digital watermark information into preset audio, the authorization tag being a tag generated by the first device server for uniquely specifying the first device;
playing the authorized audio;
receiving authorization identity information from the first device server; wherein the authorization identity information is generated by: intercepting the played authorized audio by a second device of an authorized login application, extracting the digital watermark information in the authorized audio, transmitting the digital watermark information and authorized user information to a second device server, checking the digital watermark information by the second device server, and generating the authorized identity information by the first device server based on the authorized user information provided by the second device server after the digital watermark information passes the checking;
And carrying out application login based on the authorized identity information.
2. The application login method according to claim 1, wherein,
and the authorization tag and the equipment information are sent to a database by the first equipment server to be stored, so that the second equipment server uses the authorization tag and the equipment information stored in the database to verify the digital watermark information extracted by the second equipment.
3. The application login method according to claim 2, wherein said step of verifying includes:
the second device server determines that verification passes under the condition that the authorization tag and the device information stored in the database are consistent with the digital watermark information extracted by the second device;
the step of the second device server providing the authorized user information to the first device server comprises:
if the verification passes, the second equipment server sends the authorized user information to the database to be bound and stored with the authorization tag;
the first device server extracts the authorized user information from the database based on the authorization tag.
4. The application login method according to claim 3, wherein said method further comprises:
after the first device logs in to the application, responding to a de-authorization instruction sent by the user to the second device, logging out,
wherein, log-out is realized by the following steps:
the second device sends a de-authorization request to the second device server in response to receiving a de-authorization instruction, the de-authorization request including at least one of: the authorized user information, the authorization tag;
and the second equipment server responds to the de-authorization request, and unbinds the authorized user information which is bound and stored in the database and the authorization tag, so that the first equipment exits from the authorized state.
5. The application login method according to claim 1, wherein the step of transmitting the digital watermark information and authorized user information to the second device server includes:
the second device displays the extracted device information in the digital watermark information, and responds to an instruction which is sent by a user for allowing authorization of the device information, and sends the digital watermark information and the authorized user information to the second device server.
6. The application login method according to claim 1, wherein said method further comprises:
after logging in an application and logging out, responding to an application login request of a user again, and if the time interval between the re-received application login request and the application logged in before is not longer than the session validity period between the first equipment and the first equipment server, automatically logging in without requesting authorization to the second equipment;
after the first device logs in the application for the last time, the first device establishes a session with the first device by the first device server.
7. The application login method as recited in claim 6 wherein said session validity period is refreshed by:
after the first device logs in an application, the first device server generates a token with a validity period greater than the session validity period;
and refreshing the validity period of the session according to the token if the time interval does not exceed the validity period of the session.
8. An application login method, applied to a first device server, comprising:
receiving an authorized audio acquisition request from a first device, wherein the authorized audio acquisition request is sent after the first device receives an application login request of a user and comprises device information of the first device;
Generating an authorization tag in response to the authorization audio acquisition request, and embedding the authorization tag and the equipment information as digital watermark information into preset audio to obtain authorization audio, wherein the authorization tag is a tag for uniquely specifying the first equipment;
transmitting the authorization audio to the first device;
generating authorization identity information based on authorized user information provided by the second device server after the digital watermark information passes verification; wherein, the digital watermark information is verified by the following steps: playing the authorized audio by the first device, intercepting the authorized audio played by the first device by a second device of the authorized login application, extracting the digital watermark information in the authorized audio, sending the digital watermark information and the authorized user information to a second device server, and checking the digital watermark information by the second device server;
and sending the authorized identity information to the first equipment, so that the first equipment carries out application login according to the authorized identity information.
9. The application login method as recited in claim 8, wherein said method further comprises:
And sending the authorization tag and the equipment information to a database for storage, so that the second equipment server uses the authorization tag and the equipment information stored in the database to verify the digital watermark information extracted by the second equipment.
10. The application login method as recited in claim 9 wherein said step of verifying comprises:
the second device server determines that verification passes under the condition that the authorization tag and the device information stored in the database are consistent with the digital watermark information extracted by the second device;
the step of the second device server providing the authorized user information to the first device server comprises:
if the verification passes, the second equipment server sends the authorized user information to the database to be bound and stored with the authorization tag;
extracting the authorized user information from the database based on the authorization tag.
11. The application login method according to claim 10, wherein,
after the first device logs in an application, responding to a de-authorization instruction sent by a user to the second device, logging out, wherein logging out is realized through the following steps:
The second device sends a de-authorization request to the second device server in response to receiving a de-authorization instruction, the de-authorization request including at least one of: the authorized user information, the authorization tag;
and the second equipment server responds to the de-authorization request, and unbinds the authorized user information which is bound and stored in the database and the authorization tag, so that the first equipment exits from the authorized state.
12. The application login method according to claim 8, wherein,
the step of transmitting the digital watermark information and the authorized user information to a second device server includes:
the second device displays the extracted device information in the digital watermark information, and responds to an instruction which is sent by a user for allowing authorization of the device information, and sends the digital watermark information and the authorized user information to the second device server.
13. The application login method as recited in claim 8, wherein said method further comprises:
after the first device logs in an application, establishing a session with the first device;
After the first device logs in to the application and exits, responding to the application login request of the user again, and if the time interval between the application login request received again and the application logged in before is not longer than the session validity period between the first device and the first device server, automatically logging in without requesting authorization to the second device.
14. The application login method according to claim 13, wherein said method further comprises:
after the first device logs in an application, generating a token with the validity period being greater than the session validity period;
and refreshing the validity period of the session according to the token if the time interval does not exceed the validity period of the session.
15. An application login method, wherein the second device for which the application is authorized to login comprises:
responding to the received audio scanning request of the user, and intercepting the played authorized audio; wherein the authorized audio is generated by: a first device of a login application to be authorized sends an authorization audio acquisition request comprising device information of the first device to a first device server in response to receiving an application login request of a user, the first device server embeds an authorization tag and the device information as digital watermark information into preset audio to generate the authorization audio in response to the authorization audio acquisition request, and the authorization tag is a tag which is generated by the first device server and is used for uniquely specifying the first device;
Extracting the digital watermark information in the authorized audio and transmitting the digital watermark information and authorized user information to a second equipment server; and after the second equipment server verifies and passes the digital watermark information, the first equipment server generates authorized identity information based on the authorized user information provided by the second equipment server, the authorized identity information is sent to the first equipment, and the first equipment performs application login based on the authorized identity information.
16. The application login method according to claim 15, wherein,
and the authorization tag and the device information are sent to a database by the first device server to be stored, so that a second device server uses the authorization tag and the device information stored in the database to verify the digital watermark information extracted by the second device.
17. The application login method as recited in claim 16 wherein said step of verifying comprises:
the second device server determines that verification passes under the condition that the authorization tag and the device information stored in the database are consistent with the digital watermark information extracted by the second device;
The step of the second device server providing the authorized user information to the first device server comprises:
if the verification passes, the second equipment server sends the authorized user information to the database to be bound and stored with the authorization tag;
the first device server extracts the authorized user information from the database based on the authorization tag.
18. The application login method according to claim 17, wherein said method further comprises:
after the first device logs in to an application, the second device responds to receiving a de-authorization instruction sent by a user and sends a de-authorization request to the second device server, wherein the de-authorization request comprises at least one of the following: the authorized user information, the authorization tag;
and the second equipment server responds to the de-authorization request, and unbinds the authorized user information which is bound and stored in the database and the authorization tag, so that the first equipment exits from the authorized state.
19. The application login method according to claim 15, wherein the step of transmitting the digital watermark information and authorized user information to the second device server comprises:
And displaying the extracted equipment information in the digital watermark information, and responding to an instruction which is sent by a user for allowing authorization of the equipment information, and sending the digital watermark information and the authorized user information to the second equipment server.
20. The application login method according to claim 15, wherein,
after the first equipment logs in the application and exits, responding to the application login request of the user again, and if the time interval between the application login request received again and the application logged in before is not more than the session validity period between the first equipment and the first equipment server, automatically logging in without requesting authorization to the second equipment;
after the first device logs in the application for the last time, the first device establishes a session with the first device by the first device server.
21. The application login method according to claim 20, wherein said session validity period is refreshed by:
after the first device logs in an application, the first device server generates a token with a validity period greater than the session validity period;
and refreshing the validity period of the session according to the token if the time interval does not exceed the validity period of the session.
22. An application login method, applied to a second device server, comprising:
receiving digital watermark information sent by a second device of an authorized login application and authorized user information;
wherein, the digital watermark information is obtained by the following steps: the first device to be authorized to log in to the application sends an authorized audio acquisition request comprising device information of the first device to a first device server in response to receiving an application login request of a user,
the first device server generating the authorization audio by embedding an authorization tag and the device information as the digital watermark information into a preset audio in response to the authorization audio acquisition request, and transmitting the authorization audio to the first device, the authorization tag being a tag generated by the first device server for uniquely specifying the first device,
after the first device plays the authorized audio, the second device listens to the played authorized audio and extracts the digital watermark information in the authorized audio;
verifying the digital watermark information, and providing the authorized user information to the first equipment server after the verification is passed; wherein the authorized user information is for: and generating authorized identity information based on the authorized user information by the first equipment server, and after the authorized identity information is sent to the first equipment, performing application login based on the authorized identity information by the first equipment.
23. The application login method according to claim 22, wherein,
and the authorization tag and the equipment information are sent to a database by the first equipment server to be stored for verifying the digital watermark information.
24. The application login method according to claim 23, wherein said step of verifying said digital watermark information comprises:
determining that verification passes under the condition that the authorization tag and the equipment information stored in the database are consistent with the digital watermark information extracted by the second equipment;
the step of providing the authorized user information to the first device server comprises:
under the condition that verification passes, the authorized user information is sent to the database to be bound and stored with the authorization tag;
the first device server extracts the authorized user information from the database based on the authorization tag.
25. The application login method according to claim 24, wherein,
after the first device logs in the application, responding to a de-authorization instruction sent by a user to the second device, logging out, wherein logging out is realized through the following steps:
Receiving a de-authorization request sent by the second device in response to the received de-authorization instruction, the de-authorization request comprising at least one of: the authorized user information, the authorization tag;
and in response to the de-authorization request, unbinding the authorized user information stored in the database in a binding manner with the authorization tag, so that the first device exits the authorized state.
26. The application login method as recited in claim 22, wherein the step of receiving digital watermark information transmitted by the second device of the authorized login application and authorized user information includes:
and after the second equipment of the authorized login application displays the extracted equipment information in the digital watermark information and responds to an instruction which is sent by a user for allowing authorization for the equipment information, receiving the digital watermark information and the authorized user information sent by the second equipment.
27. The application login method according to claim 22, wherein said method further comprises:
after the first equipment logs in an application and exits, the first equipment responds to the application login request of a user again, and if the time interval between the re-received application login request and the previous login application is not longer than the session validity period between the first equipment and the first equipment server, the first equipment automatically logs in without requesting authorization from the second equipment;
After the first device logs in the application for the last time, the first device establishes a session with the first device by the first device server.
28. The application login method as recited in claim 27 wherein said session validity period is refreshed by:
after the first device logs in an application, the first device server generates a token with a validity period greater than the session validity period;
and refreshing the validity period of the session according to the token if the time interval does not exceed the validity period of the session.
29. An application login apparatus, serving as a first device to be authorized to login an application, comprising:
an input unit configured to: receiving an application login request of a user;
a transmission unit configured to: in response to receiving an application login request of a user, sending an authorized audio acquisition request to a first equipment server; wherein the authorized audio acquisition request includes device information of the first device;
a receiving unit configured to: receiving authorization audio from the first device server, wherein the authorization audio is generated by the first device server in response to the authorization audio acquisition request by embedding an authorization tag and the device information as digital watermark information into preset audio, the authorization tag being a tag generated by the first device server for uniquely specifying the first device;
A playback unit configured to: playing the authorized audio;
the receiving unit is further configured to: receiving authorization identity information from the first device server; wherein the authorization identity information is generated by: intercepting the played authorized audio by a second device of an authorized login application, extracting the digital watermark information in the authorized audio, transmitting the digital watermark information and authorized user information to a second device server, checking the digital watermark information by the second device server, and generating the authorized identity information by the first device server based on the authorized user information provided by the second device server after the digital watermark information passes the checking;
a login unit configured to: and carrying out application login based on the authorized identity information.
30. An application login device for use as a first device server, comprising:
a receiving unit configured to: receiving an authorized audio acquisition request from a first device, wherein the authorized audio acquisition request is sent after the first device receives an application login request of a user and comprises device information of the first device;
A processing unit configured to: generating an authorization tag in response to the authorization audio acquisition request, and embedding the authorization tag and the equipment information as digital watermark information into preset audio to obtain authorization audio, wherein the authorization tag is a tag for uniquely specifying the first equipment;
a transmission unit configured to: transmitting the authorization audio to the first device;
the processing unit is further configured to: generating authorization identity information based on authorized user information provided by the second device server after the digital watermark information passes verification; wherein, the digital watermark information is verified by the following steps: playing the authorized audio by the first device, intercepting the authorized audio played by the first device by a second device of the authorized login application, extracting the digital watermark information in the authorized audio, sending the digital watermark information and the authorized user information to a second device server, and checking the digital watermark information by the second device server;
the transmitting unit is further configured to: and sending the authorized identity information to the first equipment, so that the first equipment carries out application login according to the authorized identity information.
31. An application login apparatus for use as a second device authorized to login to an application, comprising:
an input unit configured to: receiving an audio scanning request of a user;
a listening unit configured to: responding to the received audio scanning request of the user, and intercepting the played authorized audio; wherein the authorized audio is generated by: a first device of a login application to be authorized sends an authorization audio acquisition request comprising device information of the first device to a first device server in response to receiving an application login request of a user, the first device server embeds an authorization tag and the device information as digital watermark information into preset audio to generate the authorization audio in response to the authorization audio acquisition request, and the authorization tag is a tag which is generated by the first device server and is used for uniquely specifying the first device;
an extraction unit configured to: extracting the digital watermark information in the authorized audio;
a transmission unit configured to: transmitting the digital watermark information and the authorized user information to a second equipment server; and after the second equipment server verifies and passes the digital watermark information, the first equipment server generates authorized identity information based on the authorized user information provided by the second equipment server, the authorized identity information is sent to the first equipment, and the first equipment performs application login based on the authorized identity information.
32. An application login apparatus for use as a second device server, comprising:
a receiving unit configured to: receiving digital watermark information sent by a second device of an authorized login application and authorized user information; wherein, the digital watermark information is obtained by the following steps: a first device of a login application to be authorized responds to an application login request of a user, an authorization audio acquisition request comprising device information of the first device is sent to a first device server, the first device server responds to the authorization audio acquisition request, an authorization tag and the device information are used as digital watermark information to be embedded into preset audio to generate authorization audio, the authorization audio is sent to the first device, the authorization tag is a tag which is generated by the first device server and is used for uniquely specifying the first device, after the first device plays the authorization audio, the second device listens to the played authorization audio, and the digital watermark information in the authorization audio is extracted;
a verification unit configured to: verifying the digital watermark information;
A transmission unit configured to: providing the authorized user information to the first device server after verification is passed; wherein the authorized user information is for: and generating authorized identity information based on the authorized user information by the first equipment server, and after the authorized identity information is sent to the first equipment, performing application login based on the authorized identity information by the first equipment.
33. A computer readable storage medium storing instructions which, when executed by at least one computing device, cause the at least one computing device to perform the application login method of any one of claims 1 to 28.
34. A system comprising at least one computing device and at least one storage device storing instructions that, when executed by the at least one computing device, cause the at least one computing device to perform the application login method of any of claims 1 to 28.
CN202310774636.0A 2023-06-28 2023-06-28 Application login method, application login device, storage medium and system Active CN116599764B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310774636.0A CN116599764B (en) 2023-06-28 2023-06-28 Application login method, application login device, storage medium and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310774636.0A CN116599764B (en) 2023-06-28 2023-06-28 Application login method, application login device, storage medium and system

Publications (2)

Publication Number Publication Date
CN116599764A CN116599764A (en) 2023-08-15
CN116599764B true CN116599764B (en) 2023-09-19

Family

ID=87604587

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310774636.0A Active CN116599764B (en) 2023-06-28 2023-06-28 Application login method, application login device, storage medium and system

Country Status (1)

Country Link
CN (1) CN116599764B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106506433A (en) * 2015-09-06 2017-03-15 中兴通讯股份有限公司 Login authentication method, certificate server, Authentication Client and login client
CN106921650A (en) * 2016-12-21 2017-07-04 阿里巴巴集团控股有限公司 The login method of striding equipment, system and device
CN113010858A (en) * 2021-03-01 2021-06-22 上海掌门科技有限公司 Method and equipment for logging in application in user equipment

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007016114A2 (en) * 2005-07-27 2007-02-08 Shea Writer Methods and systems for improved security for financial transactions through a trusted third party entity

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106506433A (en) * 2015-09-06 2017-03-15 中兴通讯股份有限公司 Login authentication method, certificate server, Authentication Client and login client
CN106921650A (en) * 2016-12-21 2017-07-04 阿里巴巴集团控股有限公司 The login method of striding equipment, system and device
CN113010858A (en) * 2021-03-01 2021-06-22 上海掌门科技有限公司 Method and equipment for logging in application in user equipment

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于跨平台域用户单点登录功能的设计和实现;王川;数字通信世界;全文 *

Also Published As

Publication number Publication date
CN116599764A (en) 2023-08-15

Similar Documents

Publication Publication Date Title
US10176309B2 (en) Systems and methods for authenticating video using watermarks
US20240022572A1 (en) System and method for providing a web service using a mobile device capturing dual images
CN103685311B (en) A kind of login validation method and equipment
US10511592B1 (en) System and method for authenticating a user via a mobile device to provide a web service on a different computer system
US7650359B2 (en) Content reproduction apparatus and content reproduction method
US8468360B2 (en) Client terminal, server, server-client system, cooperation processing method, program and recording medium
CN104364762A (en) Systems and methods for controlling a local application through a web page
CN101635714B (en) Method and system for improving network application safety
CN111030812A (en) Token verification method, device, storage medium and server
CN113411638A (en) Video file playing processing method and device, electronic equipment and storage medium
CN107770161B (en) The method and device of brush present is prevented in a kind of live streaming platform
CN107145769A (en) A kind of digital rights management method about DRM, equipment and system
EP3018913B1 (en) Media player
CN113365097B (en) Live broadcast information stream processing method, device and system, electronic equipment and storage medium
CN103647652B (en) A kind of method for realizing data transfer, device and server
US9705915B2 (en) Techniques for reliable network authentication
CN104349318B (en) The automatic authentication method of WLAN, device and system
KR102100178B1 (en) System for check falsify recording file based on block chain and method performing thereof
CN116599764B (en) Application login method, application login device, storage medium and system
CN108235067B (en) Authentication method and device for video stream address
CN112633091B (en) Method and system for verifying real meeting
KR101440898B1 (en) Method and apparatus for inserting water mark, method and system for detecting a duplicate of data
WO2017096840A1 (en) Method and device for detecting hotlinking
US10587661B2 (en) Method and program for providing content streaming service and managing data statistics of user using QR code
CN107979596B (en) Method and system for preventing people from being refreshed in live broadcast

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant