Method, device, mobile terminal and storage medium for logging in application

A mobile terminal and mobile communication technology, applied in the field of information security, can solve problems such as privacy leakage, and achieve the effects of improving security, reducing the number of interactive authentications, and shortening the login time.

Active Publication Date: 2022-05-17
E-SURFING DIGITAL LIFE TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, in the traditional password-free authentication login method, the operator's server can log in based on the terminal user clicking "mobile phone number password-free login", which has the risk of privacy leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device, mobile terminal and storage medium for logging in application
  • Method, device, mobile terminal and storage medium for logging in application
  • Method, device, mobile terminal and storage medium for logging in application

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0024] Reference in this application to an "embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the present application. The occurrences of this phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is understood explicitly and implicitly by those skilled in the art that the embodiments described in this application can be comb...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This application provides a login application method, device, terminal, and medium, including: obtaining biometric information, triggering the biometric information processing chip to feed back the biometric code corresponding to the biometric information; if the trigger is the first trigger, the communication signature and The biometric code is sent to the operator server, the operator server verifies the communication signature code, and sends the biometric code to the biometric information verification server for verification; when the received communication signature code and the biometric code are verified, the operator server returns If the trigger is not the first trigger, the biometric code is sent to the biometric information verification server. When the biometric code is verified by the biometric information verification server, the mobile communication identification code is obtained from the mobile terminal locally or from the The biometric information verification server receives the mobile communication identification code; uses the mobile communication identification code to log into the application, thereby improving the security of the user logging into the application.

Description

technical field [0001] The present application relates to the technical field of information security, in particular to a method, device, mobile terminal and storage medium for logging in to an application. Background technique [0002] When the application of the terminal device performs authentication and login, it can be performed based on the user name and user password, or based on the mobile phone number provided by the operator to perform one-key authentication and login. The latter method can also be called password-free authentication login, mainly relying on the mobile data network of the operator, using technologies such as "communication gateway number retrieval" and sim card (Subscriber Identity Module, user identification card) identification to achieve one-key authentication Login method; for example, after the user opens the short video application, click "Sign-in without password with mobile phone number" to realize one-click login with the local mobile phon...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40G06F21/32
CPCH04L63/0861G06F21/32
Inventor 陈鑫符永捷杨方维许孝东段金辉丁嘉嘉黄柑波马幸晖梁鹰林有宏
Owner E-SURFING DIGITAL LIFE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products