Application program logging method and logging management system

A technology of application program and login method, applied in the electronic field, can solve problems such as cumbersome, meaningless application program login process, easy leakage of user information, etc.

Active Publication Date: 2011-10-19
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF5 Cites 91 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the application is designed to run only after logging in. The original intention is to protect the security of user information and avoid it being stolen by others. However, for the convenience of users, the method of automatically recording user login information is actually in exchange for user information security for operational convenience. Making the application's login process pointless
For example, in the existing solution, user login information is automatically recorded. When the user loses the mobile terminal, the user information is easily leaked. If the user replaces the mobile terminal, he needs to manually enter the information again, which is very cumbersome.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application program logging method and logging management system
  • Application program logging method and logging management system
  • Application program logging method and logging management system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The application program login method and the login management system provided by the present invention can help users log in various application programs conveniently and quickly on the premise of ensuring the security of user login information.

[0044] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0045] see figure 1 , which is a schematic flowchart of the first embodiment of the application login method provided by the present invention, as shown in figure 1 Shown:

[0046] In step S100, start the ap...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses an application program logging method and a logging management system. The method comprises the following steps: starting an application program by a terminal, and entering a logging interface of the application program; judging whether logging information of the application program is stored in a database or not; and if so, loading the corresponding logging information stored in the database into the logging interface of the application program. The application program logging method and the logging management system can help users conveniently and fast log in all kinds of application programs under the premise that the logging information of the users is ensured to be safe.

Description

technical field [0001] The invention relates to the electronic field, in particular to an application program login method and a login management system. Background technique [0002] With the development of mobile communication technology, various applications are widely used on mobile terminals, and many applications currently used on mobile terminals require login, that is, login names, passwords, etc. need to be filled in before running the program. [0003] In order to facilitate users and provide users with a better user experience, application developers generally can automatically record user login information in the application programs they develop, so that users can log in quickly. [0004] However, the application is designed to run only after logging in. The original intention is to protect the security of user information and avoid being stolen by others. However, for the convenience of users, the method of automatically recording user login information is actu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/22G06F9/445G06F21/31
Inventor 陈雯
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products