站点工具

Hotfix release available: 2024-02-06a "Kaos". upgrade now! [55.1] (what's this?)
New release available: 2024-02-06 "Kaos". upgrade now! [55] (what's this?)
Hotfix release available: 2023-04-04a "Jack Jackrum". upgrade now! [54.1] (what's this?)
New release available: 2023-04-04 "Jack Jackrum". upgrade now! [54] (what's this?)
Hotfix release available: 2022-07-31b "Igor". upgrade now! [53.1] (what's this?)
Hotfix release available: 2022-07-31a "Igor". upgrade now! [53] (what's this?)
New release available: 2022-07-31 "Igor". upgrade now! [52.2] (what's this?)
New release candidate 2 available: rc2022-06-26 "Igor". upgrade now! [52.1] (what's this?)
New release candidate available: 2022-06-26 "Igor". upgrade now! [52] (what's this?)
Hotfix release available: 2020-07-29a "Hogfather". upgrade now! [51.4] (what's this?)
New release available: 2020-07-29 "Hogfather". upgrade now! [51.3] (what's this?)
New release candidate 3 available: 2020-06-09 "Hogfather". upgrade now! [51.2] (what's this?)
New release candidate 2 available: 2020-06-01 "Hogfather". upgrade now! [51.1] (what's this?)
New release candidate available: 2020-06-01 "Hogfather". upgrade now! [51] (what's this?)
Hotfix release available: 2018-04-22c "Greebo". upgrade now! [50.3] (what's this?)
Hotfix release available: 2018-04-22b "Greebo". upgrade now! [50.2] (what's this?)
Hotfix release available: 2018-04-22a "Greebo". upgrade now! [50.1] (what's this?)
New release available: 2018-04-22 "Greebo". upgrade now! [50] (what's this?)
Hotfix release available: 2017-02-19g "Frusterick Manners". upgrade now! [49.7] (what's this?)
Hotfix release available: 2017-02-19f "Frusterick Manners". upgrade now! [49.6] (what's this?)
Hotfix release available: 2017-02-19e "Frusterick Manners". upgrade now! [49.5] (what's this?)
Hotfix release available fixing CVE-2017-12979 and CVE-2017-12980: 2017-02-19d "Frusterick Manners". upgrade now! [49.4] (what's this?)
Hotfix release available fixing CVE-2017-12583: 2017-02-19c "Frusterick Manners". upgrade now! [49.3] (what's this?)
Hotfix release available fixing security token and media manager: 2017-02-19b "Frusterick Manners". upgrade now! [49.2] (what's this?)
Hotfix release available fixing install and media manager issues: 2017-02-19a "Frusterick Manners". upgrade now! [49.1] (what's this?)
New release available: 2017-02-19 "Frusterick Manners". upgrade now! [49] (what's this?)
Hotfix release available: 2016-06-26e "Elenor of Tsort". upgrade now! [48.5] (what's this?)
Hotfix release available fixing CVE-2017-12979 and CVE-2017-12980: 2016-06-26d "Elenor of Tsort". upgrade now! [48.4] (what's this?)
Hotfix release available fixing CVE-2017-12583: 2016-06-26c "Elenor of Tsort". upgrade now! [48.3] (what's this?)
Hotfix release available fixing security token: 2016-06-26b "Elenor of Tsort". upgrade now! [48.2] (what's this?)
Hotfix release available fixing authad issues: 2016-06-26a "Elenor of Tsort". upgrade now! [48.1] (what's this?)
New release available: 2016-06-26 "Elenor of Tsort". upgrade now! [48] (what's this?)
Hotfix release available: 2015-08-10a "Detritus". upgrade now! [47.1] (what's this?)
New release available: 2015-08-10 "Detritus". upgrade now! [47] (what's this?)
Hotfix release available: 2014-09-29d "Hrun". upgrade now! [46.4] (what's this?)
Hotfix release available: 2014-09-29c "Hrun". upgrade now! [46.3] (what's this?)
Hotfix release available to prevent XSS attack via SWF uploads: 2014-09-29b "Hrun". upgrade now! [46.2] (what's this?)
Hotfix release available: 2014-09-29a "Hrun". upgrade now! [46.1] (what's this?)
New release available: 2014-09-29 "Hrun". upgrade now! [46] (what's this?)
Hotfix release available: 2014-05-05e "Ponder Stibbons". upgrade now! [44.5] (what's this?)
Hotfix release available: 2014-05-05d "Ponder Stibbons". upgrade now! [44.4] (what's this?)
Hotfix release available to prevent XSS attack via SWF uploads: 2014-05-05c "Ponder Stibbons". upgrade now! [44.3] (what's this?)
Security Hotfix 2014-05-05b to prevent zero byte attacks on external auth systems is available. upgrade now! [44.2] (what's this?)
Security Hotfix 2014-05-05a for Issue 765 available. upgrade now! [44.1] (what's this?)

resetpass

这是本文档旧的修订版!


APP客户端重置登录密码接口

1、客户端调用发送短信验证码接口

https://m.repai.com/user/resetpass_sendsms_api/appkey/密钥编号/phone/十一位手机号/timestamp/时间戳/token/防篡改验证串

输入参数说明:

  • appkey 【热拍卖家版Android客户端的appkey为100005,iOS为100004;买家版HTML5为100001,iOS为100002,Android为100003】
  • phone 【11位半角数字手机号,作为登陆名】
  • token 【防篡改验证串,token值的组成为,以PHP代码为例:md5(“RP”.$appkey.$appsecret.$phone.$timestamp) 由客户端生成,其中 $appsecret 为密钥,每个appkey对应的不同的密钥,密钥请询问张宴】

输出参数说明:

  • JSON格式输出,错误时,status值为false,reason值为错误原因文本信息,示例如下:

{ “reason”: “很抱歉,由于您频繁获取短信验证码,系统已冻结6小时,请6小时后重试。”, “status”: false }

备注:同一个手机账号,6小时内只能接收5次短信验证码。

  • JSON格式输出,正确时,status值为true,示例如下:

{ “reason”: “短信验证码已发送到您的手机,短信接收可能会有延迟,敬请等候!”, “status”: true }


2、客户端利用输入的短信验证码,重置密码的接口

https://m.repai.com/user/resetpass_newpass_api/appkey/密钥编号/phone/十一位手机号/password/六位数字登陆密码/appoid/手机设备唯一编号/timestamp/1402307990/token/73191b75734ea67df90cbb824ff67811/appversion/应用版本号/osversion/系统版本号/network/网络类型/screenwidth/手机屏幕分辨率宽度/screenheight/手机屏幕分辨率高度/phonetype/手机类型/authcode/短信验证码

输入参数说明:

  • appkey 【热拍卖家版Android客户端的appkey为100005,iOS为100004;买家版HTML5为100001,iOS为100002,Android为100003】
  • phone 【11位半角数字手机号,作为登陆名】
  • password 【6位半角数字密码】
  • appoid 【设备的唯一ID,android手机取网卡mac地址的md5值作为唯一ID;iOS手机取OpenUDID作为唯一ID】
  • timestamp 【当前的UNIX时间戳,时间戳有效期20分钟】
  • token 【防篡改验证串,token值的组成为,以PHP代码为例:md5(“RP”.$appkey.$appsecret.$phone.$password.$timestamp) 由客户端生成,其中 $appsecret 为密钥,每个appkey对应的不同的密钥,密钥请询问张宴】
  • appversion 【应用版本号,例如1.0.0】
  • osversion 【手机操作系统版本号,例如Android的版本号4.1.5,iOS的版本号7.1.1】
  • network 【网络类型,例如EDGE、HSDPA、HSPA、EVDOA等,此项参数传递时需要urlencode】
  • phonetype 【手机类型,例如Coolpad8050、GT-N5100、Lenovo A670t、ZTE N919等,此项参数传递时需要urlencode】
  • authcode 【用户手机接收到的四位数字短信验证码】

输出参数说明:

  • JSON格式输出,错误时,status值为false,reason值为错误原因文本信息,示例如下:

{ “reason”: “短信验证码无效或已过期,请重新获取!”, “status”: false }

  • JSON格式输出,正确时,status值为true,并输出手机号、用户rp_uid、rp_access_token等基础信息(其中rp_access_token非常重要,用于判断用户是否登录),示例如下:

{ “reason”: “登录成功!”, “rp_access_token”: “rpat_47be0653fe75e8ae3f3d4fa5de931c24”, “rp_phone”: “15901283960”, “rp_uid”: “1”, “status”: true }

此接口完成密码重置后,所有用旧密码登录的终端用户会被注销登录,本终端会自动登录,登录后的输出参数跟 APP客户端用户注册、登陆一体化接口 相同。

返回的rp_access_token相当于sessionid,用来查询登陆后的其他数据,以及做是否登陆判断,请APP客户端保持在本地。

相关接口:APP客户端用户注册、登陆一体化接口

返回首页

resetpass.1402570425.txt.gz · 最后更改: 2014/06/12 18:53 由 106.2.171.114