Application program login method, application program login device and mobile terminal
Technical Field
The present application belongs to the field of electronic technologies, and in particular, to an application login method, an application login apparatus, a mobile terminal, and a computer-readable storage medium.
Background
For most applications in a mobile terminal, in order to ensure privacy and security of a user, the user is required to log in a certain application before the user uses the application. The current common login method is as follows: the user fills in a login account (such as a phone number and a short message verification code) in a login interface, the application program verifies whether the login account filled in by the user is legal or not, if so, the application program is logged in, and otherwise, the application program is prohibited from logging in.
Disclosure of Invention
The application provides an application program login method, an application program login device, a mobile terminal and a computer readable storage medium, which can improve the login security of the application program to a certain extent.
A first aspect of the present application provides an application login method, applied to a mobile terminal, including:
reading a login account stored in a memory of a Trusted Execution Environment (TEE) in the mobile terminal;
sending the login account to a first server to instruct the first server to judge whether the login account is a registered account for logging in a target application program;
receiving a judgment result returned by the first server;
and if the judgment result indicates that the login account is a registered account for logging in the target application program, logging in the target application program.
A second aspect of the present application provides a mobile terminal, including a preset memory, a processor, and a computer program stored in the preset memory and executable on the processor, where the processor implements the following steps when executing the computer program:
reading a login account stored in a memory of a Trusted Execution Environment (TEE) in the mobile terminal;
sending the login account to a first server to instruct the first server to judge whether the login account is a registered account for logging in a target application program;
receiving a judgment result returned by the first server;
and if the judgment result indicates that the login account is a registered account for logging in the target application program, logging in the target application program.
A third aspect of the present application provides an application login apparatus, applied to a mobile terminal, including:
the account reading module is used for reading a login account stored in a memory of a Trusted Execution Environment (TEE) in the mobile terminal;
an account sending module, configured to send the login account to a first server, so as to instruct the first server to perform a determination of whether the login account is a registered account for logging in a target application;
a result receiving module, configured to receive a determination result returned by the first server;
and the first login module is used for logging in the target application program if the judgment result indicates that the login account is a registered account for logging in the target application program.
A fourth aspect of the present application provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of the method of the first aspect as described above.
A fifth aspect of the present application provides a computer program product comprising a computer program which, when executed by one or more processors, performs the steps of the method of the first aspect as described above.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the embodiments or the prior art descriptions will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise.
Fig. 1 is a schematic flowchart illustrating an implementation flow of an application login method according to an embodiment of the present application;
fig. 2 is a flowchart of an implementation method for writing a login account into a memory of a TEE according to an embodiment of the present application;
fig. 3 is a schematic flow chart illustrating an implementation of another application login method according to the second embodiment of the present application;
fig. 4 is a schematic structural diagram of an application login apparatus according to a third embodiment of the present application;
fig. 5 is a schematic structural diagram of a mobile terminal according to a fourth embodiment of the present application.
Detailed Description
In the following description, for purposes of explanation and not limitation, specific details are set forth, such as particular system structures, techniques, etc. in order to provide a thorough understanding of the embodiments of the present application. It will be apparent, however, to one skilled in the art that the present application may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present application with unnecessary detail.
The application program login method provided by the embodiment of the application is applicable to the mobile terminal, and the mobile terminal comprises but is not limited to: smart phones, palm computers, notebooks, wearable devices, etc.
It will be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It is also to be understood that the terminology used in the description of the present application herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in the specification of the present application and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be further understood that the term "and/or" as used in this specification and the appended claims refers to any and all possible combinations of one or more of the associated listed items and includes such combinations.
As used in this specification and the appended claims, the term "if" may be interpreted contextually as "when", "upon" or "in response to a determination" or "in response to a detection". Similarly, the phrase "if it is determined" or "if a [ described condition or event ] is detected" may be interpreted contextually to mean "upon determining" or "in response to determining" or "upon detecting [ described condition or event ]" or "in response to detecting [ described condition or event ]".
In addition, in the description of the present application, the terms "first", "second", and the like are used only for distinguishing the description, and are not intended to indicate or imply relative importance.
In order to explain the technical solution of the present application, the following description will be given by way of specific examples.
Example 1
Referring to fig. 1, a description is given below of an application login method provided in an embodiment of the present application, where the application login method is applied to a mobile terminal, and a target application is installed in the mobile terminal, and the application login method in the embodiment of the present application includes:
in step S101, a login account stored in a memory of the trusted execution environment TEE in the mobile terminal is read;
the login account in step S101 is specifically a login account for logging in the target application program. The login account in step S101 may be a login account in the form of "username + password", for example, the username is sunshine, and the password is 12345; alternatively, the login account in step S101 may be a phone number, such as 13588888888; alternatively, the account number may be an identification number, such as 411XXX19950808XXXX, and the specific form of the login account is not limited in this application.
At present, for many mobile terminals, Rich Execution Environment (REE) and Trusted Execution Environment (TEE) can be simultaneously supported, and programs running based on the REE share the same hardware resources when running, so that data in the programs running based on the REE can be easily stolen. The TEE is another operation environment different from the REE, hardware resources occupied by code of the TEE during operation are completely different from hardware resources occupied by code of the REE during operation, and for the hardware resources that the code of the TEE can access during operation, the code of the REE cannot be accessed during operation, in step S101, the memory of the TEE in the trusted execution environment is a memory which can only be accessed by the code of the TEE, and a program operated based on the TEE is often a program specified by a mobile terminal manufacturer, and not any program installed in the mobile terminal can be operated based on the TEE. Thus, programs running based on TEE are less prone to data theft than programs running based on REE.
In general, in a mobile terminal, data reading and writing from and to a memory of a TEE in the mobile terminal are often performed only by a program specified by a mobile terminal manufacturer of the mobile terminal, and therefore, data in the memory of the TEE is difficult to read by an illegal program and difficult to write by an illegal program. Therefore, if the login account of a certain application is saved in the memory of the TEE, the login account is very difficult to steal and modify. For a traditional login method, a user needs to actively memorize login accounts of different application programs, the user often records the login accounts in a paper file or an electronic file, and compared with the recording mode of recording the login accounts in a memory of a TEE, the recording mode is obviously lower in security level, so that the application provides a safer login account recording mode.
In the technical scheme provided by the application, a login account for logging in the target application program needs to be stored in a memory of a TEE in a mobile terminal in advance, and since data read-write of the memory of the TEE can only be executed by a program specified by a mobile terminal manufacturer, in order to write the login account into the memory of the TEE, a preset program can be developed in advance, wherein the preset program is a program which is authenticated by the mobile terminal manufacturer and can write data into the memory of the TEE, a user fills the login account for logging in the target application program on an interface provided by the preset program by opening the preset program, and after receiving the login account filled by the user, the preset program writes the login account filled by the user into the memory of the TEE (any user can be allowed to write data into the memory of the TEE through the preset program, so that an illegal user steals the login account for logging in the target application program for a legal user And then, the stolen login account for logging in the target application program can be written into a memory of a TEE of a certain mobile terminal X through the preset program, so that an illegal user can pretend to be a legal user to log in the target application program in the mobile terminal X, therefore, when the user is allowed to write data into the memory of the TEE through the preset program, the user can be firstly reminded to upload information such as an identity card number and a photo, then, the identity of the user is verified according to the information such as the identity card number and the photo uploaded by the user, and after the verification is passed, the user is allowed to write data into the memory of the TEE). In addition, in order to prevent the preset program from stealing the login account by an illegal program in the process of writing the login account into the memory of the TEE, after the preset program receives the login account, the preset program firstly encrypts the received login account, then transmits the encrypted login account into the memory of the TEE and decrypts the encrypted login account by a decryption program operated based on the TEE, so that the login account is encrypted in the process of transmitting the login account into the memory of the TEE, and therefore, the possibility that the login account is stolen by the illegal program in the process of writing the login account into the memory of the TEE can be reduced to a certain extent; in addition, in order to prevent the preset program from being stolen by an illegal program in the process of writing the login account into the memory of the TEE, the preset program can also be a program operated based on the TEE.
In the embodiment of the present application, in order to write the login account into the memory of the TEE, in addition to the way in which the user fills in the login account through the preset program, the login account for logging in the target application program may be written into the memory of the TEE in the way shown in fig. 2. As shown in fig. 2, the mobile terminal writes a login account for logging in the target application into the memory of the TEE by performing steps S201 to S203.
In step S201, sending login account request information to a second server, where the login account request information is used to instruct the second server to search for the login account;
in step S202, receiving login account feedback information returned by the second server, where the login account feedback information includes the login account;
in step S203, writing the login account into the memory of the TEE according to the login account feedback information;
that is, the second server stores the login account for logging in the target application program, and the mobile terminal realizes acquisition of the login account through communication with the second server and writes the acquired login account into the memory of the TEE. Furthermore, it is obvious to those skilled in the art that the procedures for implementing the above steps S201-S203 need to write data into the memory of the TEE, and therefore, the procedures for implementing the above steps S201-S203 also need to be authenticated by the manufacturer of the mobile terminal. In addition, in order to prevent the login account from being stolen by an illegal program during the execution of the steps S201 to S203, the steps S201 to S203 may also be a program operated based on TEE; or, in the process of writing the login account into the memory of the TEE, the login account is encrypted and decrypted by a decryption program operated based on the TEE, so that the login account is encrypted in the process of transferring to the memory of the TEE, and the possibility that the login account is stolen by an illegal program in the process of writing the login account into the memory of the TEE can be reduced to a certain extent.
It will be apparent to those skilled in the art that when the mobile terminal obtains the login account of the login target application through the above steps S201 to S203, it needs to communicate with the second server, and in order to avoid illegal interception of data communicated between the mobile terminal and the second server, the data communicated with each other may be encrypted. For example, in order to prevent the login account returned by the second server from being intercepted illegally, the login account feedback information is obtained by encrypting the login account returned by the second server by using a preset first encryption rule; accordingly, the step S203 includes: and according to a decryption rule corresponding to the first encryption rule, decrypting the login account feedback information to obtain a login account, and writing the login account into a memory of the TEE.
Furthermore, the step S101 may be executed when the user starts the target application, for example, when the user clicks an icon of the target application on the desktop of the mobile terminal, the mobile terminal executes the step S101 to obtain a login account for logging in the target application stored in the memory of the TEE. In addition, in the embodiment of the application, if the login account for logging in the target application program is not acquired from the memory of the TEE, the user may be prompted to start the preset program or the mobile terminal automatically starts the preset program, and the login account for logging in the target application program manually input by the user is acquired; or, the steps S201 to S203 are executed to acquire a login account for logging in the target application program.
In step S102, sending the login account to a first server to instruct the first server to determine whether the login account is a registered account for logging in a target application;
in this embodiment of the application, after the login account for logging in the target application program is read in step S101, the login account read in step S101 is sent to a first server, where the first server may be a server corresponding to the target application program, and each registered account for logging in the target application program is stored in the first server.
The mobile terminal sends the login account read in step S101 to the first server to indicate the first server to verify the login account, and the first server determines whether the login account is a registered account for logging in the target application program, and returns a determination result to the mobile terminal.
In addition, in order to avoid intercepting the login account when the mobile terminal communicates with the first server, the step S102 may include:
encrypting the login account by using a preset second encryption rule to obtain an encrypted login account after encryption;
and sending the encrypted login account to a first server to instruct the first server to judge whether the login account is a registered account for logging in a target application program.
In step S103, receiving a determination result returned by the first server;
in the embodiment of the present application, the step S103 may include: after the login account is sent to the first server, detecting whether a judgment result returned by the first server is received within a preset time period (for example, 5 milliseconds); if the judgment result returned by the first server is received within a preset time period, executing the subsequent step S104; if the judgment result returned by the first server is not received within a preset time period, judging whether the number of times of sending the login account to the first server reaches a preset number of times; if not, returning to the step S102, and sending the login account read in the step S101 to the first server again; and if the preset times are reached, reminding the user that the target application program can not be logged in because the user can not connect the network.
In step S104, if the determination result indicates that the login account is a registered account for logging in the target application program, logging in the target application program;
in this embodiment of the application, if the determination result returned by the first server indicates that the login account read in step S101 is a registered account for logging in the target application, the target application is automatically logged in; otherwise, if the judgment result indicates that the login account is not the registered account for logging in the target application program, generating prompt information for prompting that the user cannot log in the target application program.
The application program login method provided by the first embodiment of the application needs to read the login account number stored in the TEE memory, so that the program for realizing each step of the first embodiment of the application can be authenticated by a mobile terminal manufacturer, and the method provided by the first embodiment of the application can read data in the TEE memory.
In addition, each step described in the first embodiment of the present application may also be completely implemented by the target application, and the mobile terminal may provide a preset interface function for the target application, and when the target application is started, the target application may call the preset interface function to read data from the memory of the TEE.
The embodiment of the application provides an application program login method, when a target application program is logged in, a login account is automatically read from a memory of a trusted execution environment TEE, and when the login account is legal, the target application program is automatically logged in, because data read-write of the memory of the TEE can only be executed by a program specified by a mobile terminal manufacturer, data in the memory of the TEE is difficult to read (i.e. difficult to steal) by an illegal program and difficult to write (even if being stealed by an illegal user, difficult to write into the memory of the TEE in a mobile terminal of the illegal user), so the login account stored in the memory of the TEE in the mobile terminal has high credibility, once the login account stored in the memory of the TEE is verified successfully, the fact that a user using the target application program is a legal user (because the login account is stored in the memory of the TEE is confirmed, therefore, the possibility of being stolen is low, and even if it is stolen, it is difficult to write into the TEE memory of the mobile terminal of the illegal user). In the traditional login method, the login account is easily obtained by an illegal user (as exemplified by a login method of a telephone number and a short message authentication code, the illegal user can obtain the international mobile subscriber identity IMSI of a legal user in a broadcasting manner, further obtain the telephone number of the legal user through the IMSI of the legal user, and simultaneously intercept the short message authentication code to obtain the telephone number and the short message authentication code of the legal user), and the traditional login method requires the user to manually input the login account, the manual input process is very unsafe, and the login account input by the user can be easily stolen by the illegal user by using tools such as a camera, so the traditional login account is easily stolen, and in addition, for the traditional login method, once the login account of the legal user is stolen, the illegal user can manually input the stolen login account, the target application program is impersonated as a legal user to log in, so that, for the traditional login mode, even if the login account authentication is successful, the user using the target application program cannot be described as a legal user (because the possibility that the login account is stolen exists). In summary, compared with the traditional login method, the login method provided by the application is safer, and the login security can be improved to a certain extent. In addition, the login method provided by the application avoids manual input of the login account number, so that compared with the traditional login method, the operation steps of the user can be reduced to a certain extent, and the user experience can be improved.
Example 2
The following describes another application program login method provided in the second embodiment of the present application, which is the same as the first embodiment, and the application program login method is applied to a mobile terminal, and a target application program is installed in the mobile terminal.
In the technical solution provided in the second embodiment of the present application, the login account in the technical solution provided in the first embodiment is specifically limited to the phone number corresponding to the mobile terminal. Referring to fig. 3, an application login method according to a second embodiment of the present application includes:
in step S301, acquiring an international mobile equipment identity IMEI of the mobile terminal or an international mobile subscriber identity IMSI of a subscriber identity module SIM card of the mobile terminal;
generally, a phone number of a Mobile terminal corresponds to an IMEI (International Mobile Equipment identity) of the Mobile terminal or an IMSI (International Mobile Subscriber identity) of an SIM (Subscriber identity Module) card installed in the Mobile terminal, and therefore, the IMEI of the Mobile terminal or the IMSI of the SIM card in the Mobile terminal may be first acquired to subsequently acquire the phone number of the Mobile terminal through the IMEI or the IMSI.
In step S302, generating login account request information according to the IMEI or the IMSI, where the login account request information includes the IMEI or the IMSI;
after obtaining the IMEI of the mobile terminal and the IMSI of the SIM card in the mobile terminal, the mobile terminal generates login account request information by using the IMEI or the IMSI.
In step S303, sending the login account request information to a second server, where the login account request information is used to instruct the second server to search for a phone number corresponding to the IMEI or the IMSI;
the second server may store a preset correspondence table, where correspondence information between each different IMEI and phone number or correspondence information between each different IMSI and phone number is recorded in the correspondence table. And after receiving the login account request information, the second server extracts the IMEI or IMSI in the login account request information, searches a corresponding telephone number in a preset corresponding relation table according to the IMEI or IMSI, and returns the searched telephone number to the mobile terminal.
In step S304, receiving login account feedback information returned by the second server, where the login account feedback information includes the phone number;
in order to avoid stealing of the communication data between the mobile terminal and the second server, the encryption processing may be performed on the communication data between the mobile terminal and the second server. For example, in step S303, the second server encrypts the login account feedback information to ensure that the phone number in the login account feedback information is not intercepted by an illegal user.
In step S305, writing the phone number into a memory of a trusted execution environment TEE in the mobile terminal according to the login account feedback information;
in this step S305, the telephone number needs to be written into the TEE memory of the mobile terminal, and therefore, the procedure for implementing the above steps S301-S305 needs to be authenticated by the manufacturer of the mobile terminal. In addition, in order to prevent the login account number from being stolen by an illegal program when the steps S301 to S305 are executed, the steps S301 to S305 may be a program operated based on TEE; or, in the process of writing the telephone number into the memory of the TEE, the telephone number is encrypted and decrypted by a decryption program operated based on the TEE, so that the telephone number is encrypted in the process of transferring to the memory of the TEE, and the possibility that the login account number is stolen by an illegal program in the process of writing the telephone number into the memory of the TEE can be reduced to a certain extent.
It should be understood by those skilled in the art that the above steps S301-S305 are not performed with the subsequent steps S306-S309 each time, and the steps S301-S305 may be performed only when the user changes the phone number, for example, when a trigger signal indicating that the user has changed the SIM card is detected, the IMEI of the mobile terminal or the IMSI of the SIM card in the mobile terminal is acquired (for example, when the mobile terminal detects that the user pulls the SIM card and inserts the SIM card again, a trigger signal is generated to make the mobile terminal re-acquire the IMEI of the mobile terminal or the IMSI of the changed SIM card). In addition, in some cases, even if the user changes the SIM card, the IMEI of the mobile terminal may not bind to the mobile phone number after the change, and therefore, the correct phone number may not be obtained through the IMEI of the mobile terminal, so in this embodiment of the application, in order to ensure that the changed phone number can be obtained through the IMEI when the user changes the SIM card, the operator should update the correspondence between the IMEI of the mobile terminal and the phone number in the second server in time before delivering a new SIM of the user.
In step S306, the telephone number stored in the memory of the TEE is read;
in step S307, the phone number is sent to a first server to instruct the first server to determine whether the phone number is a registered account for logging in a target application;
in step S308, receiving a determination result returned by the first server;
in step S309, if the determination result indicates that the phone number is a registered account for logging in the target application, the target application is logged in.
In general, most applications support a phone number based login method, and therefore, in the second embodiment of the present invention, it is determined whether the phone number of the mobile terminal is a registered account for logging in the target application, and if so, the target application is logged in.
In addition, compared to the first embodiment, the second embodiment of the present application only limits the login account to be a phone number, except that the steps S306 to S309 are exactly the same as the specific implementation manners of the steps S101 to S104 in the first embodiment, which may specifically refer to the description of the first embodiment, and will not be described again here.
In general, in a memory of a TEE in a mobile terminal, not only a login account of one application program but also login accounts of a plurality of application programs are often stored. If the login account number described in the first embodiment is limited to the user name and the password, a larger memory space of the TEE is occupied for the following reasons: for the same user, the user names and passwords corresponding to different applications during login are often different, for example, the user name of the xiaoming login WeChat is: xiaoming, password: 123, but the name of the user who logs in the Taobao is: xiaomifeneg, code: since 123, if the login account in the technical solution described in the first embodiment of the present application is limited to the user name and the password, a large amount of storage space of the memory of the TEE will be occupied. However, for the same user, there is often only one phone number or several phone numbers, and most application programs support a phone number-based login method, so that, in order to avoid saving too many login accounts of application programs in a memory of a TEE in a mobile terminal and to avoid occupying a large amount of storage space of the memory of the TEE, the login account in the first embodiment of the present application is limited to a phone number. In addition, the second embodiment of the present application is the same as the first embodiment, and can also improve the security of login to a certain extent, and can reduce the operation steps of the user when logging in the application program to a certain extent.
It should be understood that, the sequence numbers of the steps in the foregoing embodiments do not imply an execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present application.
Example 3
A third embodiment of the present application provides an application login apparatus, where the application login apparatus is applied to a mobile terminal, and as shown in fig. 4, the application login apparatus 400 includes:
an account reading module 401, configured to read a login account stored in a memory of the trusted execution environment TEE in the mobile terminal;
an account sending module 402, configured to send the login account to a first server, so as to instruct the first server to perform a determination of whether the login account is a registered account for logging in a target application;
a result receiving module 403, configured to receive a determination result returned by the first server;
a first login module 404, configured to log in the target application program if the determination result indicates that the login account is a registered account for logging in the target application program.
Optionally, the application login device 400 further includes:
the account request module is used for sending login account request information to a second server, wherein the login account request information is used for indicating the second server to search the login account;
the account receiving module is used for receiving login account feedback information returned by the second server, wherein the login account feedback information comprises the login account;
and the account number writing module is used for writing the login account number into the memory of the TEE according to the login account number feedback information.
Optionally, the login account feedback information is obtained by encrypting the second server by using a preset first encryption rule;
correspondingly, the account number writing module is specifically configured to: and decrypting the login account feedback information according to a decryption rule corresponding to the first encryption rule to obtain the login account, and writing the login account into a memory of the TEE.
Optionally, the login account is a phone number corresponding to the mobile terminal;
correspondingly, the account request module includes:
an identification code obtaining unit, configured to obtain an international mobile equipment identification code IMEI of the mobile terminal or an international mobile subscriber identification code IMSI of a subscriber identity mode SIM card in the mobile terminal;
a request information generating unit, configured to generate the login account request information according to the IMEI or the IMSI, where the login account request information includes the IMEI or the IMSI;
a request information sending unit, configured to send the login account request information to the second server, where the login account request information is used to instruct the second server to search for a phone number corresponding to the IMEI or the IMSI.
Optionally, the identification code obtaining unit is specifically configured to: and when detecting a trigger signal for indicating that the user has replaced the SIM card, acquiring the international mobile equipment identification code IMEI of the mobile terminal or the international mobile subscriber identification code IMSI of the SIM card.
Optionally, the account sending module 402 includes:
the account encryption unit is used for encrypting the login account by using a preset second encryption rule to obtain an encrypted login account after encryption;
and the encrypted account sending unit is used for sending the encrypted login account to a first server so as to instruct the first server to judge whether the login account is a registered account for logging in a target application program.
Optionally, the application login device 400 further includes:
and a second login module, configured to generate a prompt message if the determination result indicates that the login account is not a registered account for logging in the target application program, where the prompt message is used to prompt a user that the user cannot log in the target application program.
Optionally, the account reading module 401 is specifically configured to: and when detecting that the user starts the target application program, reading a login account stored in a memory of the TEE in the mobile terminal.
Optionally, the account reading module 401 is specifically configured to: and when detecting that the user starts the target application program, reading a login account stored in a memory of the TEE in the mobile terminal by calling a preset interface function.
It should be noted that, for the information interaction, execution process, and other contents between the above-mentioned devices/units, the specific functions and technical effects thereof are based on the same concept as those of the embodiment of the method of the present application, and specific reference may be made to the part of the embodiment of the method, which is not described herein again.
Example 4
Fig. 5 is a schematic diagram of a mobile terminal according to a fourth embodiment of the present application. As shown in fig. 5, the mobile terminal 5 of this embodiment includes: a processor 50, a predetermined memory 51, and a computer program 52 stored in the predetermined memory 51 and operable on the processor 50. The processor 50, when executing the computer program 52, implements the steps of the various method embodiments described above, such as the steps 101 to 104 shown in fig. 1. Alternatively, the processor 50 executes the computer program 52 to implement the functions of the modules/units in the device embodiments, such as the modules 401 to 404 shown in fig. 4.
For example, the computer program 52 may be divided into one or more modules/units, and the one or more modules/units are stored in the preset memory 51 and executed by the processor 50 to complete the present application. The one or more modules/units may be a series of computer program instruction segments capable of performing specific functions, which are used to describe the execution process of the computer program 52 in the mobile terminal 5. For example, the computer program 52 may be divided into an account reading module, an account sending module, a result receiving module, and a first login module, where the specific functions of the modules are as follows:
reading a login account stored in a memory of a Trusted Execution Environment (TEE) in the mobile terminal;
sending the login account to a first server to instruct the first server to judge whether the login account is a registered account for logging in a target application program;
receiving a judgment result returned by the first server;
and if the judgment result indicates that the login account is a registered account for logging in the target application program, logging in the target application program.
The mobile terminal may include, but is not limited to, a processor 50 and a default memory 51. Those skilled in the art will appreciate that fig. 5 is merely an example of a mobile terminal 5 and is not intended to be limiting of the mobile terminal 5 and may include more or less components than those shown, or some of the components may be combined, or different components, for example, the mobile terminal may also include input output devices, network access devices, buses, etc.
The Processor 50 may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic, discrete hardware components, etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The preset memory 51 may be an internal storage unit of the mobile terminal 5, such as a hard disk or a memory of the mobile terminal 5. The default memory 51 may also be an external storage device of the mobile terminal 5, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, which are provided on the mobile terminal 5. Further, the preset memory 51 may include both an internal storage unit and an external storage device of the mobile terminal 5. The preset memory 51 is used for storing the computer program and other programs and data required by the mobile terminal. The above-mentioned preset memory 51 may also be used to temporarily store data that has been output or is to be output.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-mentioned division of the functional units and modules is illustrated, and in practical applications, the above-mentioned functions may be distributed as different functional units and modules according to needs, that is, the internal structure of the apparatus may be divided into different functional units or modules to implement all or part of the above-mentioned functions. Each functional unit and module in the embodiments may be integrated in one processing unit, or each unit may exist alone physically, or two or more units are integrated in one unit, and the integrated unit may be implemented in a form of hardware, or in a form of software functional unit. In addition, specific names of the functional units and modules are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the present application. The specific working processes of the units and modules in the system may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and reference may be made to the related descriptions of other embodiments for parts that are not described or illustrated in a certain embodiment.
Those of ordinary skill in the art would appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of external device software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described system embodiments are merely illustrative, and for example, the division of the above-described modules or units is only one logical functional division, and in actual implementation, there may be another division, for example, multiple units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
The integrated unit may be stored in a computer-readable storage medium if it is implemented in the form of a software functional unit and sold or used as a separate product. Based on such understanding, all or part of the flow in the method of the embodiments described above may be implemented by a computer program, which may be stored in a computer readable storage medium and used by a processor to implement the steps of the embodiments of the methods described above. The computer program includes computer program code, and the computer program code may be in a source code form, an object code form, an executable file or some intermediate form. The computer-readable storage medium may include: any entity or device capable of carrying the above-described computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer readable Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signal, telecommunication signal, software distribution medium, etc. It should be noted that the computer readable storage medium may contain other contents which can be appropriately increased or decreased according to the requirements of the legislation and the patent practice in the jurisdiction, for example, in some jurisdictions, the computer readable storage medium does not include an electrical carrier signal and a telecommunication signal according to the legislation and the patent practice.
The above embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present application and are intended to be included within the scope of the present application.