Application login method and device, mobile terminal and storage medium

A mobile terminal, mobile communication technology, applied in the field of information security, can solve problems such as privacy leakage

Active Publication Date: 2020-10-02
E-SURFING DIGITAL LIFE TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, in the traditional password-free authentication login method, the operator's server can log in based on the terminal user clicking "mobile phone number password-free login", which has the risk of privacy leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application login method and device, mobile terminal and storage medium
  • Application login method and device, mobile terminal and storage medium
  • Application login method and device, mobile terminal and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0024] Reference in this application to an "embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the present application. The occurrences of this phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is understood explicitly and implicitly by those skilled in the art that the embodiments described in this application can be comb...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an application login method and device, a terminal and a medium, and the method comprises the steps: obtaining biological feature information, and triggering a biological feature information processing chip to feed back a biological feature code corresponding to the biological feature information; if the trigger is the first trigger, enabling the operator server to verify the communication feature code and send the biological feature code to a biological feature information verification server for verification; receiving a mobile communication identification code returned by the operator server when the communication feature code and the biological feature code pass the verification; if the trigger is not the first trigger, sending the biological feature code to thebiological feature information verification server, and when the biological feature code passes the verification of the biological feature information verification server, locally obtaining a mobile communication identification code from the mobile terminal or receiving the mobile communication identification code from the biological feature information verification server. The mobile communication identification code is used for logging in the application, so that the application login security of the user is improved.

Description

technical field [0001] The present application relates to the technical field of information security, in particular to a method, device, mobile terminal and storage medium for logging in to an application. Background technique [0002] When the application of the terminal device performs authentication and login, it can be performed based on the user name and user password, or based on the mobile phone number provided by the operator to perform one-key authentication and login. The latter method can also be called password-free authentication login, mainly relying on the mobile data network of the operator, using technologies such as "communication gateway number retrieval" and sim card (Subscriber Identity Module, user identification card) identification to achieve one-key authentication Login method; for example, after the user opens the short video application, click "Sign-in without password with mobile phone number" to realize one-click login with the local mobile phon...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06G06F21/32
CPCH04L63/0861G06F21/32
Inventor 陈鑫符永捷杨方维许孝东段金辉丁嘉嘉黄柑波马幸晖梁鹰林有宏
Owner E-SURFING DIGITAL LIFE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products