站点工具

Hotfix release available: 2024-02-06a "Kaos". upgrade now! [55.1] (what's this?)
New release available: 2024-02-06 "Kaos". upgrade now! [55] (what's this?)
Hotfix release available: 2023-04-04a "Jack Jackrum". upgrade now! [54.1] (what's this?)
New release available: 2023-04-04 "Jack Jackrum". upgrade now! [54] (what's this?)
Hotfix release available: 2022-07-31b "Igor". upgrade now! [53.1] (what's this?)
Hotfix release available: 2022-07-31a "Igor". upgrade now! [53] (what's this?)
New release available: 2022-07-31 "Igor". upgrade now! [52.2] (what's this?)
New release candidate 2 available: rc2022-06-26 "Igor". upgrade now! [52.1] (what's this?)
New release candidate available: 2022-06-26 "Igor". upgrade now! [52] (what's this?)
Hotfix release available: 2020-07-29a "Hogfather". upgrade now! [51.4] (what's this?)
New release available: 2020-07-29 "Hogfather". upgrade now! [51.3] (what's this?)
New release candidate 3 available: 2020-06-09 "Hogfather". upgrade now! [51.2] (what's this?)
New release candidate 2 available: 2020-06-01 "Hogfather". upgrade now! [51.1] (what's this?)
New release candidate available: 2020-06-01 "Hogfather". upgrade now! [51] (what's this?)
Hotfix release available: 2018-04-22c "Greebo". upgrade now! [50.3] (what's this?)
Hotfix release available: 2018-04-22b "Greebo". upgrade now! [50.2] (what's this?)
Hotfix release available: 2018-04-22a "Greebo". upgrade now! [50.1] (what's this?)
New release available: 2018-04-22 "Greebo". upgrade now! [50] (what's this?)
Hotfix release available: 2017-02-19g "Frusterick Manners". upgrade now! [49.7] (what's this?)
Hotfix release available: 2017-02-19f "Frusterick Manners". upgrade now! [49.6] (what's this?)
Hotfix release available: 2017-02-19e "Frusterick Manners". upgrade now! [49.5] (what's this?)
Hotfix release available fixing CVE-2017-12979 and CVE-2017-12980: 2017-02-19d "Frusterick Manners". upgrade now! [49.4] (what's this?)
Hotfix release available fixing CVE-2017-12583: 2017-02-19c "Frusterick Manners". upgrade now! [49.3] (what's this?)
Hotfix release available fixing security token and media manager: 2017-02-19b "Frusterick Manners". upgrade now! [49.2] (what's this?)
Hotfix release available fixing install and media manager issues: 2017-02-19a "Frusterick Manners". upgrade now! [49.1] (what's this?)
New release available: 2017-02-19 "Frusterick Manners". upgrade now! [49] (what's this?)
Hotfix release available: 2016-06-26e "Elenor of Tsort". upgrade now! [48.5] (what's this?)
Hotfix release available fixing CVE-2017-12979 and CVE-2017-12980: 2016-06-26d "Elenor of Tsort". upgrade now! [48.4] (what's this?)
Hotfix release available fixing CVE-2017-12583: 2016-06-26c "Elenor of Tsort". upgrade now! [48.3] (what's this?)
Hotfix release available fixing security token: 2016-06-26b "Elenor of Tsort". upgrade now! [48.2] (what's this?)
Hotfix release available fixing authad issues: 2016-06-26a "Elenor of Tsort". upgrade now! [48.1] (what's this?)
New release available: 2016-06-26 "Elenor of Tsort". upgrade now! [48] (what's this?)
Hotfix release available: 2015-08-10a "Detritus". upgrade now! [47.1] (what's this?)
New release available: 2015-08-10 "Detritus". upgrade now! [47] (what's this?)
Hotfix release available: 2014-09-29d "Hrun". upgrade now! [46.4] (what's this?)
Hotfix release available: 2014-09-29c "Hrun". upgrade now! [46.3] (what's this?)
Hotfix release available to prevent XSS attack via SWF uploads: 2014-09-29b "Hrun". upgrade now! [46.2] (what's this?)
Hotfix release available: 2014-09-29a "Hrun". upgrade now! [46.1] (what's this?)
New release available: 2014-09-29 "Hrun". upgrade now! [46] (what's this?)
Hotfix release available: 2014-05-05e "Ponder Stibbons". upgrade now! [44.5] (what's this?)
Hotfix release available: 2014-05-05d "Ponder Stibbons". upgrade now! [44.4] (what's this?)
Hotfix release available to prevent XSS attack via SWF uploads: 2014-05-05c "Ponder Stibbons". upgrade now! [44.3] (what's this?)
Security Hotfix 2014-05-05b to prevent zero byte attacks on external auth systems is available. upgrade now! [44.2] (what's this?)
Security Hotfix 2014-05-05a for Issue 765 available. upgrade now! [44.1] (what's this?)

loginout

差别

这里会显示出您选择的修订版和当前版本之间的差别。

到此差别页面的链接

后一修订版
前一修订版
loginout [2014/10/27 19:59]
123.126.29.78 创建
loginout [2014/10/28 12:11]
123.126.29.78
行 1: 行 1:
  
 ===== APP客户端用户退出登录接口 ===== ===== APP客户端用户退出登录接口 =====
 +
 +**登陆的用户在APP退出时,请先调用以下接口通知服务器退出登陆、解除手机设备与用户的绑定关系,再删除本地保存的access_token**
  
 ==== 1、客户端调用接口 ==== ==== 1、客户端调用接口 ====
  
-''​https://​m.repai.com/​user/​login_out_api/​appkey/​密钥编号/​phone/​十一位手机号/​password/​六位数字登陆密码/appoid/手机设备唯一编号/timestamp/1402307990/token/73191b75734ea67df90cbb824ff67811/​appversion/​应用版本号/​osversion/​系统版本号/​network/​网络类型/​screenwidth/​手机屏幕分辨率宽度/​screenheight/​手机屏幕分辨率高度/​phonetype/​手机类型''​+''​https://​m.repai.com/​user/​login_out_api/​appkey/​100002/appoid/7f4e73a9b7fcfe99044f4d4254abf9a8/access_token/rpat_ccab28ef88d441ef9e1f6cffe44f047c/token/1db9df6081c6fd69b2015bad90779e46''​
  
 === 输入参数说明: === === 输入参数说明: ===
  
   * appkey 【热拍卖家版Android客户端的appkey为100005,iOS为100004;热拍买家版HTML5为100001,iOS为100002,Android为100003;校园微店iOS为100042,Android为100043;】   * appkey 【热拍卖家版Android客户端的appkey为100005,iOS为100004;热拍买家版HTML5为100001,iOS为100002,Android为100003;校园微店iOS为100042,Android为100043;】
- 
-  * phone    【11位半角数字手机号,作为登陆名】 
- 
-  * password ​   【6位半角数字密码】 
  
   * appoid ​     【设备的唯一ID,android手机取网卡mac地址的md5值作为唯一ID;iOS手机取OpenUDID的md5值作为唯一ID】   * appoid ​     【设备的唯一ID,android手机取网卡mac地址的md5值作为唯一ID;iOS手机取OpenUDID的md5值作为唯一ID】
  
-  * timestamp ​  当前UNIX时间戳,时间戳有效期20分钟+  * access_token ​调用[[reg_login_api|一键注册登陆接口]]获取到access_token
  
-  * token    【防篡改验证串,token值的组成为,以PHP代码为例:md5("​RP"​.$appkey.$appsecret.$phone.$password.$timestamp) 由客户端生成,其中 $appsecret为密钥,每个appkey对应的不同的密钥,密钥请询问张宴】 +  * token    【防篡改验证串,token值的组成为,以PHP代码为例:md5("​RP"​.$appkey.$appsecret.$access_token) 由客户端生成,其中 $appsecret为密钥,每个appkey对应的不同的密钥,密钥请询问张宴】
- +
-  * appversion 【应用版本号,例如1.0.0】 +
- +
-  * osversion 【手机操作系统版本号,例如Android的版本号4.1.5,iOS的版本号7.1.1】 +
- +
-  * network 【网络类型,例如EDGE、HSDPA、HSPA、EVDOA等,此项参数传递时需要urlencode】 +
- +
-  * phonetype 【手机类型,例如Coolpad8050、GT-N5100、Lenovo A670t、ZTE N919等,此项参数传递时需要urlencode+
  
 ---- ----
行 35: 行 25:
  
  {  {
- "​reason":​ "时间戳注册登陆失败!",+ "​reason":​ "TOKEN验证未通过,非法请求!",
  "​status":​ false  "​status":​ false
  }  }
  
-  * JSON格式输出,正确时,status值为true,并输出手机号、用户rp_uid、rp_access_token等基础信息(其中rp_access_token非常重要,用于判断用户是否登录),示例如下:+  * JSON格式输出,正确时,status值为true,示例如下:
  
  {  {
- "​reason":​ "登录成功", + "​reason":​ "您已经在所有手机设备,退出!",
- "​rp_access_token":​ "​rpat_47be0653fe75e8ae3f3d4fa5de931c24",​ +
- "​rp_phone":​ "​15901283960",​ +
- "​rp_uid":​ "1",+
  "​status":​ true  "​status":​ true
  }  }
- 
- ​返回的rp_access_token相当于sessionid,用来查询登陆后的其他数据,以及做是否登陆判断,请APP客户端保持在本地。 
- 
-[[user_info_api|后续相关接口:APP客户端用户登陆状态判断及用户详情接口]] 
  
 [[start|返回首页]] [[start|返回首页]]
loginout.txt · 最后更改: 2014/10/28 12:11 由 123.126.29.78