Login and verification method for application program

A technology of application program and application program list, applied in the field of verification and application program login, which can solve the problems of user loss, achieve the effect of improving security and preventing illegal login

Active Publication Date: 2013-05-08
GUANGDONG OPPO MOBILE TELECOMM CORP LTD
View PDF6 Cites 38 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the embodiment of the present invention is to provide a login method for an application program, which aims to solve t

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Login and verification method for application program
  • Login and verification method for application program
  • Login and verification method for application program

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0031] In order to make the objectives, technical solutions and advantages of the present invention clearer, the following further describes the present invention in detail with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are only used to explain the present invention, but not to limit the present invention.

[0032] In the embodiment of the present invention, a login request is sent to the application server, and the login request includes login information and a check code, so that the application server verifies the login information according to the check code and the check code stored in the application server. Since the identification of the mobile terminal is unique, and the generated check code is also unique, when the generated check code is different from the check code stored in the application server, the login information verification result is illegal. At this time, even if someone el...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of mobile terminals and provides a login and verification method for an application program. The login and verification method comprises the following steps: login information of the application program and identification of a mobile terminal are obtained, and the login information comprises a login account of the application program; according to the login account of the application program and the identification of the mobile terminal, a preset function is adopted to generate a check code; a login request is sent to an application program server, and the login request comprises the login information and the check code so that the application program server verifies the login information according to the check code and the check code stored in the application program server. In the login and verification method, when the generated check code and the check code stored in the application program server are different, the verification result of the login information proves to be illegal. Even when other people learn about the login account and the password, the people cannot succeed in login operation of the application program. Therefore, illegal login on a random mobile terminal is eliminated, and safety of multiple login accounts and the password is improved.

Description

technical field [0001] The invention belongs to the technical field of mobile terminals, and in particular relates to a method for logging in and verifying an application program. Background technique [0002] With the advent of the era of intelligent mobile terminals, the configuration of mobile terminals is becoming more and more powerful, and the functions are becoming more and more complete. There are also various and increasing applications for mobile terminals. Users can download and install their favorite applications through the Internet. , to enjoy the intelligent experience of mobile terminals. [0003] However, due to the increase of application programs, there will be many login accounts and passwords in the memory of the mobile terminal and the expansion memory card, and the record preservation of many login accounts and passwords in the prior art is to store many login accounts and passwords directly in the user's account. In the data files on the terminal, th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04W12/06H04M1/725
Inventor 曾元清舒进
Owner GUANGDONG OPPO MOBILE TELECOMM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products