Tagged articles
69 articles
Page 1 of 1
macrozheng
macrozheng
Apr 25, 2026 · Backend Development

A 3‑Year‑Proven Universal Multi‑Account Login Architecture

The article details a comprehensive multi‑account unified login design—including phone‑number registration, optional password login, third‑party integrations, a split user‑basic and user‑auth data model, its pros and cons, and a one‑click mobile number authentication flow—offering practical insights from three years of production use.

AuthenticationDatabase designlogin
0 likes · 14 min read
A 3‑Year‑Proven Universal Multi‑Account Login Architecture
Top Architect
Top Architect
Apr 22, 2026 · Backend Development

Unify Multi-Channel Login with Spring Boot Factory & Strategy Patterns

Learn how to replace tangled if‑else login code with a clean, extensible architecture using Spring Boot, combining the Factory pattern to instantiate strategy beans and the Strategy pattern to encapsulate each login method (password, WeChat, SMS, etc.), enabling easy addition of new authentication types.

AuthenticationDesign PatternsFactory Pattern
0 likes · 14 min read
Unify Multi-Channel Login with Spring Boot Factory & Strategy Patterns
Top Architect
Top Architect
Feb 2, 2026 · Backend Development

How to Build an Extensible Multi‑Method Login System with Strategy & Factory Patterns in Spring Boot

This article walks through designing a flexible login module that supports password, WeChat, and SMS authentication by applying the Strategy and Factory patterns in a Spring Boot project, showing code examples, project structure, and best‑practice tips for clean, maintainable backend development.

Factory PatternSpring BootStrategy Pattern
0 likes · 14 min read
How to Build an Extensible Multi‑Method Login System with Strategy & Factory Patterns in Spring Boot
Code Ape Tech Column
Code Ape Tech Column
Dec 24, 2025 · Backend Development

Master Multi-Method Login in Spring Boot with Strategy & Factory Patterns

This guide walks you through designing a scalable login module that supports dozens of authentication methods by combining the Strategy and Factory patterns with Spring Boot, providing clean code, easy extensibility, and robust testing without the tangled if‑else spaghetti.

Design PatternsFactory PatternSpring Boot
0 likes · 12 min read
Master Multi-Method Login in Spring Boot with Strategy & Factory Patterns
Top Architect
Top Architect
Dec 7, 2025 · Backend Development

How QR‑Code Login Works: From Token Generation to Authentication

This article explains the technical principles behind QR‑code login, covering QR‑code basics, token‑based authentication, the complete client‑server workflow, state transitions, and implementation details such as token structures and polling mechanisms.

AuthenticationTokenbackend-development
0 likes · 13 min read
How QR‑Code Login Works: From Token Generation to Authentication
Ray's Galactic Tech
Ray's Galactic Tech
Nov 19, 2025 · Information Security

Mastering Modern Login Mechanisms: Cookies, Sessions, JWT, OAuth2 & SSO

This comprehensive guide explains why authentication is needed for stateless HTTP, walks through the workflows, advantages, and drawbacks of Cookies, Sessions, Tokens, JWTs, Refresh Tokens, blacklist strategies, and OAuth2/OAuth2.1, and provides practical security best‑practice recommendations for web, mobile, and micro‑service architectures.

AuthenticationJWTOAuth2
0 likes · 12 min read
Mastering Modern Login Mechanisms: Cookies, Sessions, JWT, OAuth2 & SSO
Su San Talks Tech
Su San Talks Tech
Nov 7, 2025 · Backend Development

Designing a Scalable Multi-Account Login System: From Phone Verification to One-Click Auth

This article outlines a comprehensive approach to building a flexible login architecture, covering self‑built phone‑based authentication, third‑party account integration, optimized account schemas, and one‑click mobile number verification, with detailed flow diagrams and database designs for backend developers.

AuthenticationMobileaccount‑design
0 likes · 14 min read
Designing a Scalable Multi-Account Login System: From Phone Verification to One-Click Auth
Java Architect Essentials
Java Architect Essentials
Oct 17, 2025 · Mobile Development

Master WeChat Mini‑Program Login: From Code to Token in 10 Steps

This guide walks you through the complete WeChat mini‑program login flow, covering front‑end wx.login usage, back‑end code2Session exchange for openId and unionId, phone number retrieval, database schema design, API contracts, token generation, interceptor validation, and environment configuration.

MiniProgramOpenIDSpringBoot
0 likes · 16 min read
Master WeChat Mini‑Program Login: From Code to Token in 10 Steps
Su San Talks Tech
Su San Talks Tech
Oct 4, 2025 · Mobile Development

Master WeChat Mini Program Login: From wx.login to Secure Token Authentication

This guide walks through the complete implementation of WeChat Mini Program login, covering front‑end wx.login calls, back‑end code2Session exchanges, database schema design, API specifications, environment configuration, token validation via interceptors, and key security considerations, all illustrated with code snippets and diagrams.

Mini ProgramOpenIDToken
0 likes · 18 min read
Master WeChat Mini Program Login: From wx.login to Secure Token Authentication
Selected Java Interview Questions
Selected Java Interview Questions
Apr 1, 2025 · Information Security

Understanding QR Code Login: Principles, Token Authentication, and Implementation Steps

This article explains the fundamentals of QR code login, detailing how QR codes work, the token‑based authentication mechanism, and the step‑by‑step process—including QR code generation, scanning, temporary token exchange, and final confirmation—that enables secure cross‑device login without exposing passwords.

QR codelogin
0 likes · 12 min read
Understanding QR Code Login: Principles, Token Authentication, and Implementation Steps
Code Ape Tech Column
Code Ape Tech Column
Mar 23, 2025 · Information Security

Understanding QR Code Login: Principles, Token Authentication, and Process Flow

This article explains the fundamentals of QR code login, covering QR code basics, token‑based authentication, the step‑by‑step process from QR generation to device polling, scanning, confirmation, and token exchange, and discusses security considerations and implementation details for web, PC, and mobile platforms.

MobileQR codeWeb Security
0 likes · 11 min read
Understanding QR Code Login: Principles, Token Authentication, and Process Flow
Architect's Guide
Architect's Guide
Dec 16, 2024 · Information Security

Understanding the Mechanics of QR Code Login and Token‑Based Authentication

This article explains how QR code login works by describing QR code fundamentals, token‑based authentication, and the step‑by‑step process—including QR generation, scanning, state transitions, and final confirmation—that enables a mobile device to securely authenticate a PC session.

AuthenticationMobileQR code
0 likes · 11 min read
Understanding the Mechanics of QR Code Login and Token‑Based Authentication
Java Tech Enthusiast
Java Tech Enthusiast
Jul 13, 2024 · Backend Development

Implementing Captcha Login with Spring Boot and Redis

The guide demonstrates how to build a front‑end/back‑end separated captcha login using Spring Boot, Kaptcha and Redis, showing Redis‑based captcha storage with a unique key, Base64 image delivery, and verification logic that replaces traditional session‑based approaches.

APICaptchaSpringBoot
0 likes · 12 min read
Implementing Captcha Login with Spring Boot and Redis
High Availability Architecture
High Availability Architecture
Apr 15, 2024 · Information Security

Evolution and Design of Login Authentication Systems

This article reviews the historical evolution of login authentication—from simple username/password in monolithic apps to token mechanisms, unified account centers, OAuth, and sub‑tokens—while also presenting modern one‑click, trusted‑device, and facial‑verification login methods and future AI‑driven security trends.

OAuthUser experienceidentity
0 likes · 13 min read
Evolution and Design of Login Authentication Systems
Goodme Frontend Team
Goodme Frontend Team
Mar 18, 2024 · Frontend Development

How to Implement Seamless, Secure Login in WeChat Mini‑Programs

This article explains why user authentication is essential for mobile mini‑programs, outlines security measures using AccessToken and RefreshToken, and provides step‑by‑step techniques—including automatic login, token refresh, request queuing, and user‑state handling—to achieve a frictionless user experience.

AuthenticationTokenWeChat
0 likes · 9 min read
How to Implement Seamless, Secure Login in WeChat Mini‑Programs
Java Tech Enthusiast
Java Tech Enthusiast
Mar 13, 2024 · Information Security

Understanding QR Code Login and Token-Based Authentication

QR‑code login lets a already‑authenticated mobile app scan a code shown on a PC, using a server‑issued token tied to the user’s account and device ID; the scan creates a temporary token, the user confirms, and a permanent token is issued to the PC, enabling password‑less, secure authentication.

AuthenticationBackendMobile
0 likes · 11 min read
Understanding QR Code Login and Token-Based Authentication
php Courses
php Courses
Feb 18, 2024 · Backend Development

Secure User Login and Logout Implementation in PHP

This article explains how to securely implement user login and logout functionality in PHP by using session management, server‑side validation, and CSRF token protection, providing sample code for authentication, session handling, and safe logout procedures.

CSRFPHPSession
0 likes · 6 min read
Secure User Login and Logout Implementation in PHP
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Dec 8, 2023 · Mobile Development

Step-by-Step Guide to Building a HarmonyOS Demo App with Login, Register, and Home Pages

This tutorial walks through creating a complete HarmonyOS demo project without backend integration, covering project setup, constant files, login and registration pages, navigation tabs, home page components, search, list, refresh, and custom input components, all illustrated with code snippets and screenshots.

ArkUICodeLabsHarmonyOS
0 likes · 10 min read
Step-by-Step Guide to Building a HarmonyOS Demo App with Login, Register, and Home Pages
Java Architect Essentials
Java Architect Essentials
Nov 19, 2023 · Backend Development

Designing a Multi‑Account Unified Login System: From Phone Number Authentication to Third‑Party Integration

This article explains how to design a scalable multi‑account login system, covering self‑built phone‑number authentication, optimized password‑less flows, third‑party integrations such as Weibo and WeChat, a refactored user‑basic and authorization schema, and the steps for implementing one‑click carrier‑based login.

AuthenticationDatabase designlogin
0 likes · 14 min read
Designing a Multi‑Account Unified Login System: From Phone Number Authentication to Third‑Party Integration
Architecture Digest
Architecture Digest
Nov 2, 2023 · Backend Development

Designing a Scalable Multi‑Account Login System: From Phone Number Registration to One‑Click Login

This article outlines the design of a flexible multi‑account authentication system, covering self‑built phone‑number registration, optimized password‑less login, integration of third‑party providers such as Weibo and WeChat, a split user/base‑authorization database schema, and a carrier‑based one‑click login flow.

Authenticationaccount‑designlogin
0 likes · 10 min read
Designing a Scalable Multi‑Account Login System: From Phone Number Registration to One‑Click Login
Laravel Tech Community
Laravel Tech Community
Sep 14, 2023 · Backend Development

Implementing WeChat OAuth Login with PHP

This article explains how to implement WeChat OAuth login in a PHP web application, detailing required prerequisites, the authorization flow with URL endpoints, and providing a complete PHP function that exchanges the code for an access token, refreshes it if needed, and retrieves the user's nickname and avatar for storage.

OAuthPHPWeChat
0 likes · 5 min read
Implementing WeChat OAuth Login with PHP
Top Architecture Tech Stack
Top Architecture Tech Stack
Aug 31, 2023 · Information Security

Design of QR Code Login Functionality

This article explains the three-stage design of a QR code login system—including pending scan, scanned‑pending‑confirmation, and confirmed phases—detailing how unique QR IDs, token exchange, and user confirmation ensure secure authentication across PC and mobile devices.

AuthenticationBackendDesign
0 likes · 5 min read
Design of QR Code Login Functionality
php Courses
php Courses
Aug 29, 2023 · Backend Development

Implementing Phone Verification Login with PHP

This article explains how to implement a phone‑verification login system using PHP, covering front‑end page design, AJAX‑based code sending, and server‑side validation with example code snippets for HTML, JavaScript, and PHP integration.

PHPPhone VerificationSMS
0 likes · 6 min read
Implementing Phone Verification Login with PHP
Java Interview Crash Guide
Java Interview Crash Guide
Aug 29, 2023 · Backend Development

Designing a Scalable Multi‑Account Login System: Phone Verification to One‑Click Auth

This article outlines practical strategies for building a flexible multi‑account login architecture, covering traditional phone‑number/password registration, optimized password‑less flows, integration of third‑party providers such as Weibo, WeChat and QQ, a unified user‑base and authorization schema, and the implementation of carrier‑based one‑click authentication.

AuthenticationDatabase designlogin
0 likes · 14 min read
Designing a Scalable Multi‑Account Login System: Phone Verification to One‑Click Auth
php Courses
php Courses
Aug 19, 2023 · Backend Development

Implementing Email Verification for Login and Registration with PHP

This article explains how to build a secure email‑verification login and registration system using PHP and MySQL, covering database schema creation, user registration with verification code generation and email sending, verification link handling, and login validation, with full code examples.

Email VerificationPHPRegistration
0 likes · 5 min read
Implementing Email Verification for Login and Registration with PHP
Java High-Performance Architecture
Java High-Performance Architecture
Aug 8, 2023 · Information Security

Designing a Scalable Multi‑Account Login System: From Phone Verification to Third‑Party OAuth

This article examines the design of a flexible multi‑account authentication system, covering native phone‑code login, optimized password‑optional flows, third‑party OAuth integration, database schema separation, and one‑click carrier‑based login to improve extensibility and user experience.

BackendDatabase designOAuth
0 likes · 14 min read
Designing a Scalable Multi‑Account Login System: From Phone Verification to Third‑Party OAuth
Su San Talks Tech
Su San Talks Tech
Jul 3, 2023 · Backend Development

How to Implement WeChat Public Account QR Code Login with Phone Binding

This guide walks you through the complete backend workflow, from preparing a verified WeChat service account and configuring server settings to generating parameterized QR codes, polling user status, handling follow and scan events, and binding phone numbers for seamless automatic login.

APIQR codeWeChat
0 likes · 9 min read
How to Implement WeChat Public Account QR Code Login with Phone Binding
php Courses
php Courses
May 29, 2023 · Backend Development

Implementing a Browser Login Limit with PHP

This article explains how to restrict the number of concurrent browser logins for a user account by storing login details in a database or Redis, comparing browser agent strings, and returning appropriate error messages, with full PHP code examples.

Backendlogin
0 likes · 8 min read
Implementing a Browser Login Limit with PHP
Alibaba Cloud Developer
Alibaba Cloud Developer
Jan 28, 2023 · Backend Development

Designing a Scalable User Authentication Model: From Simple Login to Real‑Person Verification

This article walks through the evolution of a user system—from a basic email/phone login to third‑party OAuth, multi‑type user accounts, diversified password schemes, and real‑person (entity) verification—showcasing a flexible, extensible backend design that can handle rapid business growth.

AuthenticationSystem DesignUser Management
0 likes · 13 min read
Designing a Scalable User Authentication Model: From Simple Login to Real‑Person Verification
KooFE Frontend Team
KooFE Frontend Team
Dec 18, 2022 · Backend Development

How to Build a WeChat Bridge API for Login Using Node.js & TypeScript

This guide explains how to create a bridge API that enables login and message interaction with WeChat by reverse‑engineering client and server protocols, covering UUID acquisition, QR code handling, login status polling, cookie management, and data initialization using Node.js, TypeScript, and Axios.

Bridge APINode.jsTypeScript
0 likes · 19 min read
How to Build a WeChat Bridge API for Login Using Node.js & TypeScript
MaGe Linux Operations
MaGe Linux Operations
Nov 21, 2022 · Backend Development

Build a Python-Based Electronic Attendance System: Step-by-Step Guide

This article outlines a student project to create a Python-powered electronic attendance system, detailing required CSV data formats, core functions such as loading data, login, record writing, and querying, along with task requirements, additional features, and complete code examples.

CSVStudent Projectattendance system
0 likes · 8 min read
Build a Python-Based Electronic Attendance System: Step-by-Step Guide
Java Captain
Java Captain
May 12, 2022 · Artificial Intelligence

Implementing Face Recognition Login with Baidu AI and SpringBoot

This article details a step‑by‑step guide to building a face‑recognition based login system using Baidu Cloud AI services, SpringBoot, Thymeleaf, and jQuery, covering API integration, Maven dependencies, code examples for registration, detection, search, and deployment considerations.

APIBaidu AISpringBoot
0 likes · 12 min read
Implementing Face Recognition Login with Baidu AI and SpringBoot
Java Architect Essentials
Java Architect Essentials
May 4, 2022 · Backend Development

Implementing WeChat QR Code Login with Spring Boot and OAuth2

This article explains how to integrate WeChat QR code login using OAuth2.0 in a Spring Boot backend, covering the authorization flow, required configuration, Java code examples for obtaining the code and access token, user login handling, and AOP-based login verification.

OAuth2QR codeSpring Boot
0 likes · 13 min read
Implementing WeChat QR Code Login with Spring Boot and OAuth2
Top Architect
Top Architect
Mar 30, 2022 · Backend Development

Designing a Multi‑Account Unified Login System and Optimized Account Architecture

This article presents a comprehensive design of a unified multi‑account login system, covering self‑built phone‑number authentication, password‑less login, third‑party integrations (Weibo, WeChat, QQ), database schema separation for user basics and authorizations, and a one‑click mobile number login flow, while discussing advantages, drawbacks, and implementation details.

Backendaccount‑designlogin
0 likes · 17 min read
Designing a Multi‑Account Unified Login System and Optimized Account Architecture
Top Architect
Top Architect
Feb 22, 2022 · Backend Development

Designing a Multi‑Account Unified Login System and Optimized Authentication Flow

This article explains how to design a scalable multi‑account login architecture—including self‑built phone‑number registration, optimized password‑optional flows, third‑party integrations such as Weibo, and a unified user‑basic and user‑auth table schema—while also covering one‑click carrier‑based login and its advantages and drawbacks.

Account ManagementBackendDatabase design
0 likes · 16 min read
Designing a Multi‑Account Unified Login System and Optimized Authentication Flow
Top Architect
Top Architect
Jan 9, 2022 · Backend Development

Designing a Multi‑Account Unified Login System: Schemas, Flows, and Optimizations

This article explains how to design a scalable multi‑account login system by describing self‑built phone‑number authentication, optimized password‑less registration, third‑party OAuth integration, database schema separation, and one‑click carrier‑based login, while highlighting advantages, drawbacks, and implementation details.

AuthenticationBackendDatabase design
0 likes · 16 min read
Designing a Multi‑Account Unified Login System: Schemas, Flows, and Optimizations
Architecture Digest
Architecture Digest
Jan 2, 2022 · Backend Development

Designing a Unified Multi‑Account Login System: Schemas, Flows, and One‑Click Authentication

This article explains how to design a flexible multi‑account login system—including self‑built mobile‑number registration, optimized password‑less login, third‑party OAuth integration, database schema separation, and carrier‑based one‑click login—while weighing the advantages and drawbacks of each approach.

Account ManagementDatabase designlogin
0 likes · 16 min read
Designing a Unified Multi‑Account Login System: Schemas, Flows, and One‑Click Authentication
Java Architect Essentials
Java Architect Essentials
Oct 17, 2021 · Backend Development

Unified Multi-Account Login: Architecture, Flow, and Database Design

This article explains the concept of multi‑account login using third‑party identities, describes early‑stage username/password and mobile‑number authentication flows, presents a detailed database schema, and outlines the integration process for services like QQ‑SDK following OAuth2.0 principles.

AuthenticationOAuth2login
0 likes · 9 min read
Unified Multi-Account Login: Architecture, Flow, and Database Design
MaGe Linux Operations
MaGe Linux Operations
Sep 7, 2021 · Information Security

How QR Code Login Works: From Scanning to Secure Token Authentication

QR code login lets users authenticate on a PC by scanning a code with a pre‑logged‑in mobile app, using a token‑based system that verifies identity without transmitting passwords, and involves QR generation, status polling, temporary tokens, and final confirmation to securely log in.

AuthenticationMobileQR code
0 likes · 12 min read
How QR Code Login Works: From Scanning to Secure Token Authentication
Top Architect
Top Architect
May 6, 2021 · Backend Development

Unified Multi-Account Login Architecture and Design

This article explains the concept, technical solutions, workflow diagrams, and database schema for implementing unified multi‑account login using username/password, mobile verification, and third‑party OAuth2 integrations, providing practical design guidance without detailed source code.

BackendDatabase designOAuth2
0 likes · 11 min read
Unified Multi-Account Login Architecture and Design
Programmer DD
Programmer DD
May 4, 2021 · Information Security

How QR Code Login Works: From Token Generation to Secure Authentication

This article explains the underlying principles of QR code login, detailing how the system identifies users, proves their identity through token‑based authentication, and manages the state transitions from scanning to confirmation, while also covering the role of QR code generation and temporary tokens.

AuthenticationQR codeToken
0 likes · 12 min read
How QR Code Login Works: From Token Generation to Secure Authentication
Open Source Linux
Open Source Linux
Mar 31, 2021 · Information Security

How QR Code Login Works: From Tokens to Secure Authentication

This article explains the principles behind QR codes, how they are used for secure login by transmitting identity and proof through token‑based authentication, and walks through each step of the QR‑code login flow from generation to confirmation.

AuthenticationBackendMobile
0 likes · 11 min read
How QR Code Login Works: From Tokens to Secure Authentication
Java Captain
Java Captain
Dec 7, 2020 · Backend Development

Spring Boot QQ Email Registration and Login Tutorial with Postman Testing

This tutorial explains how to create a Spring Boot project that implements QQ email‑based user registration and login, covering POP3/SMTP setup, Maven dependencies, MySQL schema, core Java classes, configuration files, and step‑by‑step Postman testing procedures.

Email VerificationPostmanRegistration
0 likes · 11 min read
Spring Boot QQ Email Registration and Login Tutorial with Postman Testing
Java Captain
Java Captain
Nov 26, 2020 · Backend Development

Java Console Application for User Login, Registration, and Lottery System

This article presents a Java console program that implements user login, registration, and a lottery feature, detailing the functional requirements, data storage using files, key data structures like ArrayList and HashMap, and provides the complete source code with usage notes.

FileIOLotteryRegistration
0 likes · 12 min read
Java Console Application for User Login, Registration, and Lottery System
Tencent Cloud Developer
Tencent Cloud Developer
Oct 22, 2020 · Mobile Development

Design and Implementation of Login and Authorization in WeChat Mini Programs

This article presents a comprehensive design for WeChat Mini Program login and authorization, detailing business scenarios, silent‑login flow with token management, fault‑tolerant session handling, step‑wise UI components for user and phone permissions, and a clear front‑end/back‑end API contract within a layered architecture.

AuthorizationBackendSession Management
0 likes · 25 min read
Design and Implementation of Login and Authorization in WeChat Mini Programs
Python Crawling & Data Mining
Python Crawling & Data Mining
Sep 11, 2020 · Backend Development

How to Fully Automate Taobao Login with Selenium in Python

This article demonstrates a step‑by‑step Python Selenium solution for completely automating Taobao login, covering dependency setup, class design, handling the sliding captcha, and alternative login via Sina Weibo, complete with full source code and usage instructions.

PythonScrapingSelenium
0 likes · 14 min read
How to Fully Automate Taobao Login with Selenium in Python
macrozheng
macrozheng
Apr 9, 2020 · Information Security

How QR Code Login Works: Token‑Based Authentication Explained

This article demystifies QR code login by covering what QR codes are, how mobile token‑based authentication works, and the step‑by‑step flow that enables secure PC login via scanning, confirming, and token exchange.

MobileOAuthQR code
0 likes · 8 min read
How QR Code Login Works: Token‑Based Authentication Explained
FunTester
FunTester
Feb 16, 2020 · Operations

Load Testing Proportional Login Methods with Java Concurrency and AtomicInteger

The article presents a detailed solution for load‑testing two login mechanisms—username/password and phone‑code—by creating a thread‑safe user pool, using AtomicInteger for proportion control, marking each request, and providing complete Java scripts for the test framework, login APIs, and password encryption.

AtomicIntegerjavalogin
0 likes · 8 min read
Load Testing Proportional Login Methods with Java Concurrency and AtomicInteger
58 Tech
58 Tech
Jan 10, 2020 · Backend Development

Design and Implementation of the Cloud Account PASSPORT SDK

This article details the background, goals, architecture, implementation, and future plans of the PASSPORT SDK developed to unify account systems across 58 Group apps, emphasizing a layered backend design, simple interfaces, black‑box service flows, and extensible features for mobile developers.

Backendarchitecturelogin
0 likes · 11 min read
Design and Implementation of the Cloud Account PASSPORT SDK
Architecture Digest
Architecture Digest
Sep 16, 2019 · Backend Development

Designing a Unified Multi-Account Login System: Schemas, Flows, and One-Click Authentication

This article outlines the design of a unified multi‑account login system, covering self‑built phone‑number authentication, optimized password‑less login, third‑party integrations, database schema separation, and a one‑click carrier‑based login to improve user experience and scalability.

Authenticationaccount‑designdatabase
0 likes · 16 min read
Designing a Unified Multi-Account Login System: Schemas, Flows, and One-Click Authentication
FunTester
FunTester
Aug 3, 2019 · Mobile Development

Recursive Login Handling in Android UiAutomator for Automated Testing

To avoid test failures caused by being logged into an unintended account, the author implements a recursive login routine in an Android UiAutomator script that checks the current user, logs out if necessary, and re‑logs in with the correct credentials, illustrating a concise and reusable testing solution.

AndroidRecursive FunctionUI automation
0 likes · 2 min read
Recursive Login Handling in Android UiAutomator for Automated Testing
Hujiang Technology
Hujiang Technology
Jun 1, 2017 · Mobile Development

Kotlin Android Login Screen with Inheritance and Extension Functions

This tutorial demonstrates how to build an Android login interface using Kotlin, covering class inheritance, nullable variable declarations, lambda listeners, network requests, and an extension function that adds a toast method to all Activity subclasses, with full source code examples.

AndroidExtension FunctionsInheritance
0 likes · 5 min read
Kotlin Android Login Screen with Inheritance and Extension Functions