Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Login verification method and device for operation analysis service application

A technology of service application and login verification, applied in the direction of electrical components, transmission systems, etc., can solve problems such as difficulty in keeping up with the Internet, cumbersome login process, and affecting user enthusiasm for use

Active Publication Date: 2017-08-08
中国移动通信集团陕西有限公司
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The present invention provides a method and device for login verification of a sub-service application program, the purpose of which is to solve the problem that the existing login verification method of a sub-service has a long operation period, is difficult to keep up with the demand mode of the Internet, affects the user's enthusiasm for use and The login process is cumbersome, affecting work efficiency and other issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Login verification method and device for operation analysis service application
  • Login verification method and device for operation analysis service application
  • Login verification method and device for operation analysis service application

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0093] see figure 1 , the first embodiment of the present invention provides a login verification method via sub-service application, which is applied to the client, including:

[0094] Step 101: Receive a login request for a user to log in to the service application program, the login request includes user information for the user to log in to the service application program, and the user information includes at least the user name and password for the user to log in to the service application program.

[0095] Wherein, when a user logs in to the application client, the terminal device will send to the client a login request including at least a user name and a password for logging in to the sub-service application.

[0096] Step 102: According to the user information, it is judged whether the user logs in to the sub-service application for the first time using the terminal device that sends the login request.

[0097] Wherein, the client judges whether it is the first login...

no. 2 example

[0126] see figure 2 , the second embodiment of the present invention provides a login verification device via sub-service application, which is applied to the client, including:

[0127] The receiving module 201 is used to receive a login request for the user to log in to the service application program, the login request includes user information for the user to log in to the service application program, and the user information includes at least the user name and password for the user to log in to the service application program;

[0128] Judgment module 202, for judging whether the user is the first time to log in via the sub-service application using the terminal device that sends the log-in request according to the user information;

[0129] The first login module 203 is used to generate a first random code and save it when the judgment result is yes, and send the user information and the device identification code of the terminal device to the service end of the sub-ser...

no. 3 example

[0155] see image 3 , the third embodiment of the present invention provides a login verification method via a sub-service application, which is applied to the server, including:

[0156] Step 301, receiving the first user information sent by the client, the device identification code of the terminal device corresponding to the first user information, and the first random code, saving the device identification code and establishing a correspondence table, and storing the first user information, the second A random code and the device identification code of the terminal device are stored correspondingly.

[0157] Wherein, the first random code is randomly generated by the client; the device identification code is encrypted and generated by the client according to the IMEI and IMSI according to the first encryption method.

[0158] When the client confirms that it is the first login, it will send a first user information to the server, and when receiving the first user informat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a login verification method and device for an operation analysis service application. The method is applied to a client, and comprises the following steps: receiving a login request of a user for logging into the operation analysis service application, wherein the login request contains user information that the user logs into the operation analysis service application; judging whether the user logs into the operation analysis service application by adopting terminal equipment that sends the login request for the first time according to the user information; when the judgement result is yes, generating and storing a first random code to ensure that a server side establishes a correspondence table to correspondingly store the user information, an equipment identification code of the terminal equipment and the first random code; and when the judgment result is no, sending a login verification request to the server side, and enabling the server side to send the user information in the login request and the user information corresponding to a second random code to a verification platform of the operation analysis service application to perform verification. By adopting the login verification method and device provided by the invention, the problem that an existing login verification mode of the operation analysis service is complicated in process and affects the working efficiency can be solved.

Description

technical field [0001] The invention relates to the field of sub-services, in particular to a method and device for login verification of application programs of sub-services. Background technique [0002] Since its launch in 2013, the mobile business branch service system has improved the efficiency of system access through project construction and expansion around key market needs and core business indicators that business departments pay attention to, met the needs of indicator tracking, and improved enterprise operating capabilities. [0003] The original login verification method of the mobile phone service system uses the customer identification module (SIM) card number for verification. The system administrator needs to register the device numbers of all mobile phone service users in the service database in advance (the service database is stored on the server side) , when the user logs in, the system will obtain the user's SIM card information, and verify whether the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/083H04L63/0876
Inventor 陈涛李芳贺婷王鹏
Owner 中国移动通信集团陕西有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products