CN104540129A - Registration and login method and system for third party application - Google Patents

Registration and login method and system for third party application Download PDF

Info

Publication number
CN104540129A
CN104540129A CN201410840953.9A CN201410840953A CN104540129A CN 104540129 A CN104540129 A CN 104540129A CN 201410840953 A CN201410840953 A CN 201410840953A CN 104540129 A CN104540129 A CN 104540129A
Authority
CN
China
Prior art keywords
party application
user
login
registration
token value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410840953.9A
Other languages
Chinese (zh)
Other versions
CN104540129B (en
Inventor
郑琦腾
朱仕达
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Pinwei Software Co Ltd
Original Assignee
Guangzhou Vipshop Information And Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Vipshop Information And Technology Co Ltd filed Critical Guangzhou Vipshop Information And Technology Co Ltd
Priority to CN201410840953.9A priority Critical patent/CN104540129B/en
Publication of CN104540129A publication Critical patent/CN104540129A/en
Application granted granted Critical
Publication of CN104540129B publication Critical patent/CN104540129B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention provides a registration and login method and system for a third party application. The method includes the steps that after the third party application starts to be registered, biological feature information of a registered user is acquired and authenticated, and if authentication passes, a registration instruction is sent to a server; after the server receives the registration instruction, identification of the third party application and corresponding user information of the third party application are acquired, a user account and a token value which correspond to the third party application are generated, the mapping relation among the identification of the third party application, the user account and the token value is stored, and the token value is sent to the third party application; after the third party application receives and stores the token value, it is confirmed that registration is successful; when the third party application receives a login trigger instruction of a login user, biological feature information of the login user is acquired and authenticated, and if authentication passes, the identification and the token value of the third party application are sent to the server; the server finds out the user account corresponding to the third party application through the identification and the token value, the user account is sent to the third party application, and then the user logs in the third party application. Registration efficiency is improved through the method and system.

Description

The registration of third-party application and login method and system
Technical field
The present invention relates to mobile internet technical field, particularly relate to a kind of registration of third-party application and login method and system.
Background technology
Along with the rise of mobile Internet, in mobile terminal, operable third-party application (also can be called APP) gets more and more, and before using third-party application, user needs to register third-party application on mobile terminals usually, and log according to the user cipher of registration.
At present, first on mobile phone WAP, fill in username and password carries out account registration to user, and log-on message is stored in the application data base of Password.During login, user can select the Safari plug-in unit starting this application, is logged in by username and password.
Traditional registration login method, user needs to fill in relevant information in advance and registers, and log-on message will be saved in inside Password, logs in although simplify next time, also unavoidable log-on message and the stored complicated processes of guarantor.
Summary of the invention
Based on this, be necessary to register inefficient problem for third-party application, a kind of registration of third-party application and login method and system are provided.
The registration of third-party application and a login method, comprising:
After third-party application registration starts, gather the biological information of registered user, and authentication is carried out to described biological information, if authentication is passed through, then send register instruction to server;
After server receives register instruction, obtain the mark of described third-party application and the user profile of correspondence thereof, user account corresponding to the 3rd application is generated according to described user profile, token value is generated according to described user account, mapping relations between the mark three storing described token value, user account, third-party application, and described token value is sent to third-party application;
After third-party application receives and stores described token value, confirm to succeed in registration;
When third-party application receives the login triggering command of login user, gather the biological information of login user, and carry out authentication, if authentication is passed through, the mark of third-party application and described token value are sent to server; Described server by utilizing mark and described token value find out user account corresponding to this third-party application, and are sent to described third-party application and log in.
The registration of third-party application and a login system, comprising:
Register and authentication module, for after third-party application registration starts, gathers the biological information of registered user, and carries out authentication to described biological information, if authentication is passed through, then sends register instruction to server;
Mapping relations memory module, for after server receives register instruction, obtain the mark of described third-party application and the user profile of correspondence thereof, user account corresponding to the 3rd application is generated according to described user profile, token value is generated according to described user account, mapping relations between the mark three storing described token value, user account, third-party application, and described token value is sent to third-party application;
Accreditation verification module, for receiving at third-party application and after storing described token value, confirming to succeed in registration;
Log in authentication module, during for receiving the login triggering command of login user at third-party application, gather the biological information of login user, and carry out authentication, if authentication is passed through, the mark of third-party application and described token value are sent to server;
User account searches module, finds out user account corresponding to this third-party application, and be sent to described third-party application for described server by utilizing mark and described token value;
Login module, for when third-party application receives user account, logs in.
The registration of above-mentioned third-party application and login method and system, by when third-party application authentication is passed through, the mark of third-party application and the user profile of correspondence thereof is obtained at server, user account corresponding to the 3rd application is generated according to user profile, token value is generated according to user account, store token value, user account, mapping relations between the mark three of third-party application, and token value is sent to third-party application stores, thus complete registration, directly user account is acquired according to token value in subsequent login process, log according to user account.Thus fill in numerous and diverse log-on message without the need to user, automatically generate user account, improve registration efficiency, meanwhile, by when the biological information authentication of login user is successful, automatically realizes login process, thus improve login efficiency.
Accompanying drawing explanation
Fig. 1 is the registration of third-party application of the present invention and the schematic flow sheet of login method embodiment;
Fig. 2 is that in one of them example of the present invention, user registers login interface figure;
Fig. 3 is user fingerprints identification register interface figure in one of them example of the present invention;
Fig. 4 is user fingerprints identification login prompt surface chart in one of them example of the present invention;
Fig. 5 is user fingerprints identification login interface figure in one of them example of the present invention;
Fig. 6 is the registration of third-party application of the present invention and the structural representation of login system embodiment.
Embodiment
Below in conjunction with embodiment and accompanying drawing, the present invention is described in further detail, but embodiments of the present invention are not limited thereto.
As shown in Figure 1, be the registration of third-party application of the present invention and the schematic flow sheet of login method embodiment, comprise step:
S101: after third-party application registration starts, gather the biological information of registered user, and carry out authentication to described biological information, if authentication is passed through, then sends register instruction to server;
Third-party application can be the client run in terminal, can be called App again.Such as, can be the application programs such as Email, instant messaging, ecommerce.Terminal can be the terminals such as smart mobile phone, panel computer, palmtop PC, PC.In terminal, authentication App can be installed, when third-party application registration starts, authentication App gathers the biological information of registered user, and authentication is carried out to biological information, if authentication is passed through, then transmit authentication successful information to third-party application, third-party application sends register instruction to server.Also can be the biological information that third-party application directly gathers registered user, and authentication is carried out to biological information, if authentication is passed through, then send register instruction to server.Certainly, if authentication is not passed through, then can point out " authentication is unsuccessful, please re-enter the biological information of registered user ".
In the present embodiment, biological information can comprise the information for identifying user such as fingerprint identification information, face recognition information, voice identification information.Here biological information comprises the biological information of registered user, the information of registered users of login user, the information of registered users that prestores.And then known, terminal has the terminal identifying biological information.
Such as, biological information can be fingerprint identification information, then terminal has the terminal identifying fingerprint identification information.Gather the fingerprint identification information of registered user, and authentication is carried out to fingerprint identification information, if authentication is passed through, then send register instruction to server.
And for example, biological information can be user's face recognition information, then terminal has the terminal identifying user's face recognition information.Gather the face recognition information of registered user, and authentication is carried out to user's face recognition information, if authentication is passed through, then send register instruction to server.
For another example, biological information can be user voice identifying information, then terminal has the terminal identifying user voice identifying information.Gather the voice identification information of registered user, and authentication is carried out to user voice identifying information, if authentication is passed through, then send register instruction to server.
The method starting third-party application registration has a variety of, wherein in an embodiment, when receiving a key registration triggering command of registered user, can start third-party application registration.Such as, can set up a key registration button on interface, user by clicking/sliding a key registration button, then triggers a key registration triggering command.
S102: after server receives register instruction, obtain the mark of described third-party application and the user profile of correspondence thereof, user account corresponding to the 3rd application is generated according to described user profile, token value is generated according to described user account, mapping relations between the mark three storing described token value, user account, third-party application, and described token value is sent to third-party application;
The mark of third-party application is used to identify third-party application, to come with other application difference.Often buffer memory or store user profile on third-party application.Such as, when user places an order, user profile can be filled in.
Server can directly obtain these user profile, and generate user account corresponding to the 3rd application according to user profile, token value (token value) is generated according to user account, mapping relations between the mark three of storage token value, user account, third-party application, and token value is sent to third-party application.User account can comprise user's name, also can comprise user's name and password etc.Token value can comprise PKI, private key.
S103: after third-party application receives and stores described token value, confirm to succeed in registration;
Third-party application receives token value, namely represents and succeeds in registration.
S104: when third-party application receives the login triggering command of login user, gathers the biological information of login user, and carries out authentication, if authentication is passed through, the mark of third-party application and described token value are sent to server;
Here the object of authentication is to judge whether login user is registered user, if so, then the mark of third-party application and token value is sent to server.
S105: described server by utilizing mark and described token value find out user account corresponding to this third-party application, and are sent to described third-party application;
S106: when third-party application receives user account, log in.
Third-party application can directly log according to user account.
The present embodiment is by when third-party application authentication is passed through, the mark of third-party application and the user profile of correspondence thereof is obtained at server, user account corresponding to the 3rd application is generated according to user profile, token value is generated according to user account, mapping relations between the mark three of storage token value, user account, third-party application, and token value is sent to third-party application stores, thus complete registration, directly acquire user account according to token value in subsequent login process, log according to user account.Thus fill in numerous and diverse log-on message without the need to user, automatically generate user account, improve registration efficiency, meanwhile, by when the biological information authentication of login user is successful, automatically realizes login process, thus improve login efficiency.
Wherein in an embodiment, described authentication is carried out to described biological information, if authentication is passed through, then sends register instruction step to server, comprising:
Judge that whether the biological information of described registered user is identical with the biological information prestored, if so, then send register instruction to server;
The biological information of described collection login user, and carry out authentication, if authentication is passed through, the mark of third-party application and described token value are sent to server step, comprise:
Gather the biological information of login user, judge that whether the biological information of login user is identical with the described biological information prestored, if so, then the mark of third-party application and described token value are sent to server.
The present embodiment is that the biological information by prestoring carries out authentication, judges whether login user is registered user by the biological information prestored.Here the biological information prestored can be the biological information of local user, local user is then only allowed to register, the object of carrying out authentication at the follow-up biological information to login user is to judge whether login user is local user, if so, just the mark of third-party application and described token value are sent to server.In other embodiments, the biological information prestored also can be biological information corresponding to multiple user, as long as judge that the biological information of registered user is identical with the same biological information prestored with the biological information of login user, then login user is registered user.
The biological information prestored can be user fingerprints identifying information, user's face recognition information, user voice identifying information.
For example, such as biological information can be fingerprint identification information, then above-mentioned two steps are respectively:
Judge that whether the fingerprint identification information of registered user is identical with the fingerprint identification information prestored, if so, then send register instruction to server.
Gather the fingerprint identification information of login user, judge that whether the fingerprint identification information of login user is identical with the described fingerprint identification information prestored, if so, then the mark of third-party application and token value are sent to server.
And for example, biological information can be face recognition information, then above-mentioned two steps are respectively:
Judge that whether the face recognition information of registered user is identical with the face recognition information prestored, if so, then send register instruction to server.
Gather the face recognition information of login user, judge that whether the face recognition information of login user is identical with the described face recognition information prestored, if so, then the mark of third-party application and token value are sent to server.
For another example, biological information can be voice identification information, then above-mentioned two steps are respectively:
Judge that whether the voice identification information of registered user is identical with the voice identification information prestored, if so, then send register instruction to server.
Gather the voice identification information of login user, judge that whether the voice identification information of login user is identical with the described voice identification information prestored, if so, then the mark of third-party application and token value are sent to server.
Various technical characteristics in above execution mode can combine arbitrarily, as long as there is not conflict or contradiction in the combination between feature, but as space is limited, describe one by one, the carrying out arbitrarily combining of the various technical characteristics therefore in above-mentioned execution mode also belongs to this specification scope of disclosure.
Be more than the registration of third-party application of the present invention and the content of login method embodiment, below set forth the inventive method example in actual applications.
Such as, the method can be applied in page ejection user when click places an order to register in the authentication scene of login interface.When user is after the order page fills in relevant user information, when triggering " placing an order " button, eject user and register login interface, as shown in Figure 2, in one of them example of the present invention, user registers login interface figure.If this user is new user, then need registration.When " a key registration " button is triggered, eject user fingerprints identification register interface, prompting user can register XX application by fingerprint recognition.Such as point out " identity that flicking fingerprint checks you ".As shown in Figure 3, be user fingerprints identification register interface figure in one of them example of the present invention.Gather the fingerprint identification information of registered user, and authentication is carried out to fingerprint identification information, if authentication is passed through, then send register instruction to server.Wherein, if when only allowing local user to carry out registration login, also can not this authentication step be carried out, send register instruction directly to server.
After server receives register instruction, obtain the mark of third-party application and the user profile (contact method that such as order is filled in, consignee, ship-to etc.) of correspondence thereof, the user account of this application correspondence is generated according to user profile, token value is generated according to user account, mapping relations between the mark three of storage token value, user account, third-party application, and token value is sent to third-party application.After third-party application receives and stores token value, confirm to succeed in registration.Ejecting user fingerprints identification login prompt interface, as shown in Figure 4, is user fingerprints identification login prompt surface chart in one of them example of the present invention.When " fingerprint recognition login " button triggers, eject user fingerprints identification interface, prompting user can log in application by fingerprint recognition.Such as point out " identity that flicking fingerprint checks you ".As shown in Figure 5, be user fingerprints identification login interface figure in one of them example of the present invention.Gather the biological information of login user, and carry out authentication, if authentication is passed through, the mark of third-party application and token value are sent to server; Server by utilizing mark and token value find out user account corresponding to this third-party application, and are sent to third-party application and log in.When this user is registered users, " login " button can be triggered, eject user fingerprints identification login prompt interface.
Here user profile can be used for improving account checking and giving mechanism for change.In whole generation account process, user, without the need to fill message, generates unique identification with the mark of third-party application and user profile and preserves in a database.Optimizing user is experienced, and based on the touch ID open interface of IOS8, identifierForVendor device identification method simplifies registration login process, the simplification of realization flow.
Based on said method, the present invention also provides a kind of registration and login system of third-party application, as shown in Figure 6, is the registration of third-party application of the present invention and the structural representation of login system embodiment, comprises:
Register and authentication module 610, for after third-party application registration starts, gathers the biological information of registered user, and carries out authentication to described biological information, if authentication is passed through, then sends register instruction to server;
Mapping relations memory module 620, for after server receives register instruction, obtain the mark of described third-party application and the user profile of correspondence thereof, user account corresponding to the 3rd application is generated according to described user profile, token value is generated according to described user account, mapping relations between the mark three storing described token value, user account, third-party application, and described token value is sent to third-party application;
Accreditation verification module 630, for receiving at third-party application and after storing described token value, confirming to succeed in registration;
Log in authentication module 640, during for receiving the login triggering command of login user at third-party application, gather the biological information of login user, and carry out authentication, if authentication is passed through, the mark of third-party application and described token value are sent to server;
User account searches module 650, finds out user account corresponding to this third-party application, and be sent to described third-party application for described server by utilizing mark and described token value;
Login module 660, for when third-party application receives user account, logs in.
Wherein in an embodiment, described biological information comprises fingerprint identification information, face recognition information, voice identification information.
Wherein in an embodiment, also comprising startup module, when the key for receiving registered user registers triggering command, starting third-party application registration.
Wherein in an embodiment, described register and authentication module, whether identical with the biological information prestored for judging the biological information of described registered user, if so, then send register instruction to server;
Described login authentication module, for gathering the biological information of login user, judging that whether the biological information of login user is identical with the described biological information prestored, if so, then the mark of third-party application and described token value being sent to server.
Wherein in an embodiment, described token value comprises PKI, private key.
The registration of the registration of third-party application of the present invention and login system and third-party application of the present invention and login method are one to one, in the registration that correlation technique feature in the registration of above-mentioned third-party application and login method embodiment and technique effect thereof are all applicable to third-party application and login system embodiment, do not repeat them here.
The above embodiment only have expressed several execution mode of the present invention, and it describes comparatively concrete and detailed, but therefore can not be interpreted as the restriction to the scope of the claims of the present invention.It should be pointed out that for the person of ordinary skill of the art, without departing from the inventive concept of the premise, can also make some distortion and improvement, these all belong to protection scope of the present invention.Therefore, the protection range of patent of the present invention should be as the criterion with claims.

Claims (10)

1. the registration of third-party application and a login method, is characterized in that, comprising:
After third-party application registration starts, gather the biological information of registered user, and authentication is carried out to described biological information, if authentication is passed through, then send register instruction to server;
After server receives register instruction, obtain the mark of described third-party application and the user profile of correspondence thereof, user account corresponding to the 3rd application is generated according to described user profile, token value is generated according to described user account, mapping relations between the mark three storing described token value, user account, third-party application, and described token value is sent to third-party application;
After third-party application receives and stores described token value, confirm to succeed in registration;
When third-party application receives the login triggering command of login user, gather the biological information of login user, and carry out authentication, if authentication is passed through, the mark of third-party application and described token value are sent to server; Described server by utilizing mark and described token value find out user account corresponding to this third-party application, and are sent to described third-party application and log in.
2. the registration of third-party application according to claim 1 and login method, it is characterized in that, described biological information comprises fingerprint identification information, face recognition information, voice identification information.
3. the registration of third-party application according to claim 1 and 2 and login method, is characterized in that, when receiving a key registration triggering command of registered user, starts third-party application registration.
4. the registration of third-party application according to claim 1 and 2 and login method, is characterized in that, describedly carries out authentication to described biological information, if authentication is passed through, then sends register instruction step to server, comprising:
Judge that whether the biological information of described registered user is identical with the biological information prestored, if so, then send register instruction to server;
The biological information of described collection login user, and carry out authentication, if authentication is passed through, the mark of third-party application and described token value are sent to server step, comprise:
Gather the biological information of login user, judge that whether the biological information of login user is identical with the described biological information prestored, if so, then the mark of third-party application and described token value are sent to server.
5. the registration of third-party application according to claim 1 and 2 and login method, it is characterized in that, described token value comprises PKI, private key.
6. the registration of third-party application and a login system, is characterized in that, comprising:
Register and authentication module, for after third-party application registration starts, gathers the biological information of registered user, and carries out authentication to described biological information, if authentication is passed through, then sends register instruction to server;
Mapping relations memory module, for after server receives register instruction, obtain the mark of described third-party application and the user profile of correspondence thereof, user account corresponding to the 3rd application is generated according to described user profile, token value is generated according to described user account, mapping relations between the mark three storing described token value, user account, third-party application, and described token value is sent to third-party application;
Accreditation verification module, for receiving at third-party application and after storing described token value, confirming to succeed in registration;
Log in authentication module, during for receiving the login triggering command of login user at third-party application, gather the biological information of login user, and carry out authentication, if authentication is passed through, the mark of third-party application and described token value are sent to server;
User account searches module, finds out user account corresponding to this third-party application, and be sent to described third-party application for described server by utilizing mark and described token value;
Login module, for when third-party application receives user account, logs in.
7. the registration of third-party application according to claim 6 and login system, it is characterized in that, described biological information comprises fingerprint identification information, face recognition information, voice identification information.
8. the registration of the third-party application according to claim 6 or 7 and login system, is characterized in that, also comprises startup module, when the key for receiving registered user registers triggering command, starts third-party application registration.
9. the registration of the third-party application according to claim 6 or 7 and login system, it is characterized in that, described register and authentication module, whether identical with the biological information prestored for judging the biological information of described registered user, if so, then register instruction is sent to server;
Described login authentication module, for gathering the biological information of login user, judging that whether the biological information of login user is identical with the described biological information prestored, if so, then the mark of third-party application and described token value being sent to server.
10. the registration of the third-party application according to claim 6 or 7 and login system, is characterized in that, described token value comprises PKI, private key.
CN201410840953.9A 2014-12-29 2014-12-29 The registering and logging method and system of third-party application Active CN104540129B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410840953.9A CN104540129B (en) 2014-12-29 2014-12-29 The registering and logging method and system of third-party application

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410840953.9A CN104540129B (en) 2014-12-29 2014-12-29 The registering and logging method and system of third-party application

Publications (2)

Publication Number Publication Date
CN104540129A true CN104540129A (en) 2015-04-22
CN104540129B CN104540129B (en) 2018-08-03

Family

ID=52855564

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410840953.9A Active CN104540129B (en) 2014-12-29 2014-12-29 The registering and logging method and system of third-party application

Country Status (1)

Country Link
CN (1) CN104540129B (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105100047A (en) * 2015-05-19 2015-11-25 努比亚技术有限公司 Method and device for authentication of terminal application program
CN105262754A (en) * 2015-10-28 2016-01-20 广东欧珀移动通信有限公司 Eyeball registration method and device
CN106899546A (en) * 2015-12-17 2017-06-27 阿里巴巴集团控股有限公司 The acquisition methods and device of user profile
CN106911634A (en) * 2015-12-22 2017-06-30 北京奇虎科技有限公司 A kind of login method and equipment
CN107147647A (en) * 2017-05-11 2017-09-08 腾讯科技(深圳)有限公司 A kind of webpage authorization method and device
WO2017162112A1 (en) * 2016-03-25 2017-09-28 阿里巴巴集团控股有限公司 Identity registration method and device
CN107911363A (en) * 2017-11-14 2018-04-13 福建中金在线信息科技有限公司 User information store method, device and server
CN108269168A (en) * 2017-12-29 2018-07-10 明博教育科技股份有限公司 User's registration identification method and system are applied in a kind of platform docking more
CN109416713A (en) * 2016-08-22 2019-03-01 帕斯罗基株式会社 Verifying system and non-transient information recording carrier
CN109858219A (en) * 2018-12-22 2019-06-07 深圳市珍爱捷云信息技术有限公司 User registering method, device, electronic equipment and computer readable storage medium
CN110430202A (en) * 2019-08-09 2019-11-08 百度在线网络技术(北京)有限公司 Authentication method and device
CN111031052A (en) * 2019-12-17 2020-04-17 掌阅科技股份有限公司 Data processing method based on multiple application programs, computing equipment and storage medium
CN112417413A (en) * 2020-11-23 2021-02-26 平安普惠企业管理有限公司 Method and related device for managing recognition mode

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1936972A (en) * 2005-09-20 2007-03-28 富士通株式会社 Biometrics authentication method and biometrics authentication system
US20080221885A1 (en) * 2007-03-09 2008-09-11 Arachnoid Biometrics Identification Group Corp Speech Control Apparatus and Method
CN101442407A (en) * 2007-11-22 2009-05-27 杭州中正生物认证技术有限公司 Method and system for identification authentication using biology characteristics
CN102378170A (en) * 2010-08-27 2012-03-14 中国移动通信有限公司 Method, device and system of authentication and service calling
CN102523213A (en) * 2011-12-13 2012-06-27 华为终端有限公司 Server and terminal authenticating method and server and terminal
CN103152331A (en) * 2013-02-07 2013-06-12 百度在线网络技术(北京)有限公司 Method and system for logging in/registering through mobile terminal and cloud server

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1936972A (en) * 2005-09-20 2007-03-28 富士通株式会社 Biometrics authentication method and biometrics authentication system
US20080221885A1 (en) * 2007-03-09 2008-09-11 Arachnoid Biometrics Identification Group Corp Speech Control Apparatus and Method
CN101442407A (en) * 2007-11-22 2009-05-27 杭州中正生物认证技术有限公司 Method and system for identification authentication using biology characteristics
CN102378170A (en) * 2010-08-27 2012-03-14 中国移动通信有限公司 Method, device and system of authentication and service calling
CN102523213A (en) * 2011-12-13 2012-06-27 华为终端有限公司 Server and terminal authenticating method and server and terminal
CN103152331A (en) * 2013-02-07 2013-06-12 百度在线网络技术(北京)有限公司 Method and system for logging in/registering through mobile terminal and cloud server

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105100047B (en) * 2015-05-19 2019-03-08 努比亚技术有限公司 A kind of method for authenticating and device of end application
CN105100047A (en) * 2015-05-19 2015-11-25 努比亚技术有限公司 Method and device for authentication of terminal application program
CN105262754A (en) * 2015-10-28 2016-01-20 广东欧珀移动通信有限公司 Eyeball registration method and device
CN106899546A (en) * 2015-12-17 2017-06-27 阿里巴巴集团控股有限公司 The acquisition methods and device of user profile
CN106899546B (en) * 2015-12-17 2021-05-07 阿里巴巴集团控股有限公司 User information acquisition method and device
CN106911634B (en) * 2015-12-22 2020-08-07 北京奇虎科技有限公司 Login method and device
CN106911634A (en) * 2015-12-22 2017-06-30 北京奇虎科技有限公司 A kind of login method and equipment
WO2017162112A1 (en) * 2016-03-25 2017-09-28 阿里巴巴集团控股有限公司 Identity registration method and device
US11012238B2 (en) 2016-03-25 2021-05-18 Alibaba Group Holding Limited Identity registration method and device
US10833862B2 (en) 2016-03-25 2020-11-10 Alibaba Group Holding Limited Identity registration method and device
CN109416713B (en) * 2016-08-22 2021-06-29 帕斯罗基株式会社 Authentication system and non-transitory information recording medium
CN109416713A (en) * 2016-08-22 2019-03-01 帕斯罗基株式会社 Verifying system and non-transient information recording carrier
CN107147647B (en) * 2017-05-11 2021-01-08 腾讯科技(深圳)有限公司 Webpage authorization method and device
CN107147647A (en) * 2017-05-11 2017-09-08 腾讯科技(深圳)有限公司 A kind of webpage authorization method and device
CN107911363A (en) * 2017-11-14 2018-04-13 福建中金在线信息科技有限公司 User information store method, device and server
CN108269168A (en) * 2017-12-29 2018-07-10 明博教育科技股份有限公司 User's registration identification method and system are applied in a kind of platform docking more
CN108269168B (en) * 2017-12-29 2023-07-04 明博教育科技股份有限公司 Platform docking multi-application user registration identification method and system
CN109858219A (en) * 2018-12-22 2019-06-07 深圳市珍爱捷云信息技术有限公司 User registering method, device, electronic equipment and computer readable storage medium
CN110430202A (en) * 2019-08-09 2019-11-08 百度在线网络技术(北京)有限公司 Authentication method and device
CN111031052A (en) * 2019-12-17 2020-04-17 掌阅科技股份有限公司 Data processing method based on multiple application programs, computing equipment and storage medium
CN111031052B (en) * 2019-12-17 2021-09-21 掌阅科技股份有限公司 Data processing method based on multiple application programs, computing equipment and storage medium
CN112417413A (en) * 2020-11-23 2021-02-26 平安普惠企业管理有限公司 Method and related device for managing recognition mode

Also Published As

Publication number Publication date
CN104540129B (en) 2018-08-03

Similar Documents

Publication Publication Date Title
CN104540129A (en) Registration and login method and system for third party application
US10798081B2 (en) Method, apparatus, and system for providing a security check
US10050952B2 (en) Smart phone login using QR code
KR102242766B1 (en) Identity registration method and device
EP2929479B1 (en) Method and apparatus of account login
EP3053080B1 (en) Systems and methods for credential management between electronic devices
AU2013205396B2 (en) Methods and Systems for Conducting Smart Card Transactions
CN104902028B (en) A kind of a key login authentication method, apparatus and system
KR101970123B1 (en) Dual channel identity authentication
US20210266171A1 (en) Method and system for operating internet of things device
CN104144419A (en) Identity authentication method, device and system
CN106506433A (en) Login authentication method, certificate server, Authentication Client and login client
MY189293A (en) Identity authentication method, server, and storage medium
WO2014106422A1 (en) Method and apparatus for user authentication
CN104519108A (en) Account information pushing and relation chain importing methods, devices and systems
CN104967586A (en) User identity authentication method, user identity authentication apparatus and user identity authentication system
CN105141427A (en) Login authentication method, device and system based on voiceprint recognition
WO2015179640A1 (en) Method, apparatus, and system for providing a security check
CN103973652A (en) Login method and login system
US20150180851A1 (en) Method, device, and system for registering terminal application
CN103414560A (en) Starting method of application, device thereof, system thereof and application server
EP3079329B1 (en) Terminal application registration method, device and system
TW201901520A (en) Use biometrics to validate user methods, systems, and media
CN106161365B (en) Data processing method and device and terminal
WO2016202045A1 (en) Card exchange method, device and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20171215

Address after: 510000 Guangzhou City, Guangzhou, Guangdong, Fangcun Avenue, one of the 314 self compiled

Applicant after: Guangzhou Pinwei Software Co., Ltd.

Address before: 510370 Guangdong, Guangzhou, Fangcun, No., No. 20 Huahai street, building 1-5

Applicant before: Guangzhou VIPSHOP Information and Technology Co., Ltd.

TA01 Transfer of patent application right
GR01 Patent grant