Summary of the invention
The embodiment of the present invention provides a kind of login process apparatus, method and system, to solve in prior art the problem of giving the complex operation that password causes by the mode of email address or cell-phone number for change.
First aspect of the embodiment of the present invention provides a kind of login process apparatus, comprising:
Transceiver module, the interim logging request sending for receiving the first client, described interim logging request comprises the sign of user name and described the first client;
Interim Cipher Processing module, for the sign of described user name and described the first client is verified, if verify, user corresponding to described user name is successful logging status in the logging status of the first client of the sign correspondence of described the first client, generates first password;
Described transceiver module is also for sending to described first password described the first client; And receiving the logging request that the second client sends, described logging request comprises interim login mode, described user name and described first password;
Described interim Cipher Processing module also, for adopting described interim login mode, is verified described user name and described first password;
If described transceiver module is also verified according to described user name and described first password for described interim Cipher Processing module, the response message that transmission logins successfully is to described the second client.
In the first possibility implementation aspect first, before described transceiver module receives described in the interim logging request that the first client sends, the logging request that described transceiver module also sends for receiving described the first client, described logging request comprises described user name and the second password;
Described device also comprises:
Authentication module, for the described logging request receiving according to described transceiver module, described user name and first password are verified, if be verified, recording user corresponding to described user name is successful logging status in the logging status of described the first client;
If described transceiver module is also verified according to described username and password for described authentication module, the response message that transmission logins successfully is to described the first client.
In conjunction with the first possibility implementation of first aspect or first aspect, in the second possibility implementation aspect first, described interim Cipher Processing module is also for generating the Preset Time that described first password is corresponding;
Described transceiver module is specifically for sending to described the first client by described first password and described Preset Time, and receive the described logging request that described the second client sends, described logging request comprises interim login mode, described user name, described first password and described Preset Time;
Described interim Cipher Processing module, specifically for adopting interim login mode, first according to described first password and described Preset Time, verifies that whether described first password is effective, if effectively, described first password and described user name are being verified.
Second aspect of the embodiment of the present invention provides a kind of login process method, comprising:
Receive the interim logging request that the first client sends, described interim logging request comprises the sign of user name and described the first client;
Sign to described user name and described the first client verifies, if verify, user corresponding to described user name is successful logging status in the logging status of the first client of the sign correspondence of described the first client, generates first password;
Described first password is sent to described the first client; And receiving the logging request that the second client sends, described logging request comprises interim login mode, described user name and described first password;
Adopt described interim login mode, described user name and described first password are verified;
If be verified according to described user name and described first password, the response message that transmission logins successfully is to described the second client.
In the first possibility implementation aspect second, before the interim logging request sending in described reception the first client, described method also comprises:
Receive the logging request that described the first client sends, described logging request comprises described user name and the second password;
The described logging request receiving according to described transceiver module, verifies described user name and first password;
If be verified according to described username and password, recording user corresponding to described user name is successful logging status in the logging status of described the first client, and the response message that transmission logins successfully is to described the first client.
In conjunction with the first possibility implementation of second aspect or second aspect, in the second possibility implementation aspect second, also comprise:
Generate the Preset Time that described first password is corresponding;
Described described first password is sent to described the first client; And receive the logging request that the second client sends, and described logging request comprises interim login mode, described user name and described first password, comprising:
Described first password and described Preset Time are sent to described the first client, and receive the described logging request that described the second client sends, described logging request comprises interim login mode, described user name, described first password and described Preset Time;
The described interim login mode of described employing, verifies described user name and described first password, comprising:
Adopt described interim login mode, first according to described first password and described Preset Time, verify that whether described first password is effective, if effectively, described first password and described user name are being verified.
The 3rd aspect of the embodiment of the present invention provides a kind of login process system, comprising: the first client, the second client and login process apparatus as described above.
Embodiment of the present invention login process apparatus, method and system, the interim logging request sending by receiving the first client, this interim logging request comprises the sign of user name and the first client, if verify, user corresponding to this user name is successful logging status in the logging status of the first client of the sign correspondence of this first client, generates first password, this first password is sent to the first client, and receive the logging request that the second client sends, this logging request comprises interim login mode, this user name and first password, to adopt this interim login mode, this username and password is verified, and after being verified, the response message that transmission logins successfully is to described the second client, due to when user forgets login password, can obtain interim login password from the first client that success is logined, it is first password, and according to this first password, in the second client, realize login, therefore effectively solved in prior art the problem of giving the complex operation that password causes by the mode of email address or cell-phone number for change, other clients of simultaneously also effectively having avoided successful login need to reset automatic login mode and the problem of making troubles to user when giving password for change.
Embodiment
For making object, technical scheme and the advantage of the embodiment of the present invention clearer, below in conjunction with the accompanying drawing in the embodiment of the present invention, technical scheme in the embodiment of the present invention is clearly and completely described, obviously, described embodiment is the present invention's part embodiment, rather than whole embodiment.Embodiment based in the present invention, those of ordinary skills, not making the every other embodiment obtaining under creative work prerequisite, belong to the scope of protection of the invention.
Fig. 1 is the structural representation of an embodiment of login process apparatus of the present invention, and as shown in Figure 1, the device of the present embodiment comprises:transceiver module 11 and interimCipher Processing module 12; Wherein, the interim logging request thattransceiver module 11 sends for receiving the first client, this interim logging request comprises the sign of user name and this first client; InterimCipher Processing module 12 is for verifying the sign of this user name and this first client, if verify, user corresponding to this user name is successful logging status in the logging status of the first client of the sign correspondence of this first client, generates first password; Thistransceiver module 11 is also for sending to this first password this first client; And receiving the logging request that the second client sends, this logging request comprises interim login mode, this user name and this first password; This interimCipher Processing module 12, also for adopting this interim login mode, is verified this user name and this first password; If thistransceiver module 11 is also verified according to this user name and this first password for this interimCipher Processing module 12, the response message that transmission logins successfully is to this second client.
In the present embodiment, this first client and the second client can be the subscriber equipmenies such as mobile phone or computer.
In addition, in the present embodiment, for instance, when user successfully logins microblogging software by the first client, and during from the second client login microblogging software, owing to having forgotten login password, therefore, can send interim logging request by the first client, to obtain first password from login process apparatus, it is interim login password, then by the second client, sending and carrying this first password, the logging request of user name and interim login mode is to login process apparatus, with after login process apparatus checking, success is logined this microblogging software by the second client.
In the present embodiment, the interim logging request sending by receiving the first client, this interim logging request comprises the sign of user name and the first client, if verify, user corresponding to this user name is successful logging status in the logging status of the first client of the sign correspondence of this first client, generates first password, this first password is sent to the first client, and receive the logging request that the second client sends, this logging request comprises interim login mode, this user name and first password, to adopt this interim login mode, this username and password is verified, and after being verified, the response message that transmission logins successfully is to described the second client, due to when user forgets login password, can obtain interim login password from the first client that success is logined, it is first password, and according to this first password, in the second client, realize login, therefore effectively solved in prior art the problem of giving the complex operation that password causes by the mode of email address or cell-phone number for change, other clients of simultaneously also effectively having avoided successful login need to reset automatic login mode and the problem of making troubles to user when giving password for change.
Fig. 2 is the structural representation of another embodiment of login process apparatus of the present invention, on above-mentioned basis embodiment illustrated in fig. 1, as shown in Figure 2, before the interim logging request that receives the first client transmission at thistransceiver module 11 is somebody's turn to do, the logging request that thistransceiver module 11 also sends for receiving this first client, this logging request comprises this user name and the second password.
This device also comprises:authentication module 13, for this logging request receiving according to thistransceiver module 11, this user name and first password are verified, if be verified, recording user corresponding to this user name is successful logging status in the logging status of this first client.
In addition, iftransceiver module 11 is also verified according to this username and password for thisauthentication module 13, the response message that transmission logins successfully is to this first client.
In the present embodiment, this second password may be comprised of numeral, character and English, therefore, can be very complicated while inputting this second password in the terminal of mobile phone, thus make troubles to user's use.In order to be user-friendly to, optional, first password can be numeral, or character, or English, thereby makes user not need to switch keyboard, inputs rapidly first password and logins.
In addition, in the present embodiment, before user forgets Password by the second client login software or system, user has successfully logined this software or system by the first client.Concrete, the implementation that user has successfully logined this software or system by the first client is: the first client sends logging request to login process apparatus, this logging request comprises this user name and the second password, and this second password is the password setting when user registers this software or system.Login process apparatus triggers this logging request thatauthentication module 13 receives according to thistransceiver module 11, this user name and first password are verified, if be proved to be successful, recording user corresponding to this user name is successful logging status in the logging status of this first client, and the response message logining successfully bytransceiver module 11 transmissions is to the first client.
Or, another implementation that user has successfully logined this software or system by the first client is: when initial, the first client sends logging request to login process apparatus, this logging request comprises this user name and the second password, and this second password is the password setting when user registers this software or system.Login process apparatus triggers this logging request thatauthentication module 13 receives according to thistransceiver module 11, this user name and first password are verified, if be proved to be successful, recording user corresponding to this user name is successful logging status in the logging status of this first client, and the response message logining successfully bytransceiver module 11 transmissions is to the first client.Simultaneously, the first client also receives the automatic logging request that user sends, and according to this automatic logging request, this login mode is set to automatic login mode, and record this user name and the second password,, when receive the logging request of user's transmission next time, can adopt automatic login mode, according to the user name of record and the second password, realize login, and re-entering username and password without user.
Alternatively, interimCipher Processing module 12 is also for generating the Preset Time that this first password is corresponding; Thistransceiver module 11 is specifically for sending to this first client by this first password and this Preset Time, and receive this logging request that this second client sends, this logging request comprises interim login mode, this user name, this first password and this Preset Time; This interimCipher Processing module 12, specifically for adopting interim login mode, first, according to this first password and this Preset Time, verifies that whether this first password is effective, if effectively, this first password and this user name is being verified.
In the present embodiment, in order to make interim login password, it is ageing to be that first password has, interimCipher Processing module 12 is when generating first password, can also generate its corresponding Preset Time, with attransceiver module 11, receive that the second client sends carry the logging request of interim login module, user name, first password and this Preset Time time, interimCipher Processing module 12 can first verify that whether first password is effective, according to this Preset Time, verify, if first password is effective, verify this first password and this user name.
Fig. 3 is the flow chart of an embodiment of login process method of the present invention, and as shown in Figure 3, the method for the present embodiment comprises:
The interim logging request thatstep 101, reception the first client send, this interim logging request comprises the sign of user name and this first client.
Step 102, the sign of this user name and this first client is verified, if verify, user corresponding to this user name is successful logging status in the logging status of the first client of the sign correspondence of this first client, generates first password.
Step 103, this first password is sent to this first client; And receiving the logging request that the second client sends, this logging request comprises interim login mode, this user name and this first password.
Step 104, adopt this interim login mode, this user name and this first password are verified.
If step 105 is verified according to this user name and this first password, the response message that transmission logins successfully is to this second client.
In the present embodiment, the executive agent of the method is login process apparatus, and this login process apparatus can be the login process apparatus shown in above-mentioned Fig. 1 or Fig. 2, and it is similar that it realizes principle, repeats no more herein.
In the present embodiment, the interim logging request sending by receiving the first client, this interim logging request comprises the sign of user name and the first client, if verify, user corresponding to this user name is successful logging status in the logging status of the first client of the sign correspondence of this first client, generates first password, this first password is sent to the first client, and receive the logging request that the second client sends, this logging request comprises interim login mode, this user name and first password, to adopt this interim login mode, this username and password is verified, and after being verified, the response message that transmission logins successfully is to this second client, due to when user forgets login password, can obtain interim login password from the first client that success is logined, it is first password, and according to this first password, in the second client, realize login, therefore effectively solved in prior art the problem of giving the complex operation that password causes by the mode of email address or cell-phone number for change, other clients of simultaneously also effectively having avoided successful login need to reset automatic login mode and the problem of making troubles to user when giving password for change.
Fig. 4 is the flow chart of another embodiment of login process method of the present invention, and on above-mentioned basis embodiment illustrated in fig. 3, as shown in Figure 4, beforestep 101, the method also comprises:
Step 201, receive the logging request that this first client sends, this logging request comprises this user name and the second password.
Step 202, this logging request receiving according to this transceiver module, verify this user name and first password.
If step 203 is verified according to this username and password, recording user corresponding to this user name is successful logging status in the logging status of this first client, and the response message that transmission logins successfully is to this first client.
In addition, alternatively, a kind of specific implementation ofstep 102 is:
Step 204, the sign of this user name and this first client is verified, if verify, user corresponding to this user name is successful logging status in the logging status of the first client of the sign correspondence of this first client, generates first password and Preset Time corresponding to this first password.
A kind of specific implementation ofstep 103 is:
Step 205, this first password and this Preset Time are sent to this first client, and receive this logging request that this second client sends, this logging request comprises interim login mode, this user name, this first password and this Preset Time.
A kind of specific implementation ofstep 104 is:
Step 206, adopt this interim login mode, first, according to this first password and this Preset Time, verify that whether this first password is effective, if effectively, this first password and this user name are being verified.
Fig. 5 is the structural representation of an embodiment of login process system of the present invention, and as shown in Figure 5, this system comprises: thefirst client 21, thesecond client 22 andlogin process apparatus 23; Wherein,login process apparatus 23 can be the login process apparatus shown in above-mentioned Fig. 1 or Fig. 2, and can execution graph 3 or Fig. 4 shown in the technical scheme of embodiment of method, it is similar that it realizes principle, repeats no more herein.
One of ordinary skill in the art will appreciate that: all or part of step that realizes above-mentioned each embodiment of the method can complete by the relevant hardware of program command.Aforesaid program can be stored in a computer read/write memory medium.This program, when carrying out, is carried out the step that comprises above-mentioned each embodiment of the method; And aforesaid storage medium comprises: various media that can be program code stored such as ROM, RAM, magnetic disc or CDs.
Finally it should be noted that: each embodiment, only in order to technical scheme of the present invention to be described, is not intended to limit above; Although the present invention is had been described in detail with reference to aforementioned each embodiment, those of ordinary skill in the art is to be understood that: its technical scheme that still can record aforementioned each embodiment is modified, or some or all of technical characterictic is wherein equal to replacement; And these modifications or replacement do not make the essence of appropriate technical solution depart from the scope of various embodiments of the present invention technical scheme.