Authentication method of application, terminal and computer readable storage medium

An application and authentication technology, applied in the information field, can solve the problems of increasing the risk of token exposure, waste of operating costs, hidden dangers of H5, etc., to reduce the risk of exposure and capture, and avoid hidden dangers.

Active Publication Date: 2018-10-02
NUBIA TECHNOLOGY CO LTD
View PDF15 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the embedded H5 page brings an authentication problem, because the App page does not have authentication. The current practice of the user center is to use the token issued by the server to the App to operate the activity page, sign-in page, and task page in the APP. , pass the token as a parameter to the server as information for identity verification, and realize the synchronization of App and H5 user status
[0005] However, due to the difficulty of encrypting the transmission parameters of the H5 interface, this method makes the token information easy to be captured. Some users can use the token for automatic processing, that is, automatically call the interface every day to log in, participate in activities, and draw information. The operation is similar to a plug-in program, which will cause a waste of operating costs
However, the Token used by general apps is valid from the first login to the account cancellation. At present, after a login on the mobile phone such as WeChat, QQ, Taobao, etc., the user will not be able to use it for a long period of time (for example, one or two years). There is no need to log in again, which will increase the risk of token exposure, which may lead to potential security risks in H5

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method of application, terminal and computer readable storage medium
  • Authentication method of application, terminal and computer readable storage medium
  • Authentication method of application, terminal and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0067] In this age of APP (Application, application program) flying around, for the entire product development team, high-speed iterations and explosive function additions have become the era label of the Internet industry, and the progress measurement in units of hours or even minutes has become the norm. In order to improve the functional richness of the APP, most of the APPs are full of web pages (such as H5 pages) or elements with a high proportion. Judging from the current mainstream non-tool and non-large-scale game applications, the use of hardware functions Some of the parts that remain unchanged throughout the year and have a high usage rate will use native apps, and other functions are almost all implemented in H5. At present, H5 pages generally send tokens to the corresponding server when authentication is required, and it is difficult to encrypt parameters transmitted by H5 pages. This approach makes token information easy to be captured. Some users can use this to...

no. 2 example

[0098] This embodiment proposes another authentication method for a web page in an application program. In this method, it is assumed that the application program is a user-centered APP, the user-center server and the server are the same terminal equipment, and the authentication information is valid for one day and time The segment is 0:00-24:00 every day, and the webpage embedded in the APP is an H5 page. The method includes the following steps:

[0099] Step A: User Center App login

[0100] The user enters the user name and password on the login interface of the APP, and the client sends the user name and password to the user center server. After passing the authentication, the user center server will generate an AccessToken (that is, the access user identity authentication in the first embodiment) Authorization information) and SecretKey (that is, the decryption key in the first embodiment) are issued and returned to the client, and the user center server will also store ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an authentication method of an application, a terminal and a computer readable storage medium. According to the method of the invention, when an application is in a foregroundrunning state, whether operation for opening a webpage occurs in the application is monitored; if the operation for opening a webpage occurs in the application, temporary user identity authenticationinformation during the current authentication information validity period of the application is obtained; when a preset condition is met, the temporary user identity authentication information is sentto a server providing the webpage; since the temporary user identity authentication information is only valid during the current authentication information validity period, and the duration of the authentication information validity period does not exceed a preset threshold, the effective duration of the temporary user identity authentication information can be effectively limited, a risk that the temporary user identity authentication information is exposed and captured can be decreased, and potential safety hazards in a webpage embedded in an application in the prior art can be avoided.

Description

technical field [0001] The present invention relates to the field of information technology, and more specifically, relates to an application program authentication method, a terminal and a computer-readable storage medium. Background technique [0002] Nowadays, the application range of various APPs in mobile phones is becoming more and more extensive, and people can quickly obtain information through APPs. Since the update of the APP is realized by downloading the installation package, it will consume a certain amount of traffic and time. If the APP is updated frequently, it will consume a lot of traffic and time for the user, greatly reducing the user experience. Therefore, for the user experience, the APP provider will control the update speed of the APP, but this control will make it difficult for the APP to update quickly, which makes it difficult for the operation to operate quickly, and makes it difficult to promote certain APPs that need to be updated quickly, such ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/068H04L63/0846H04L67/02
Inventor 刘孟焱
Owner NUBIA TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products