CN111970298A - Application access method and device, storage medium and computer equipment - Google Patents

Application access method and device, storage medium and computer equipment Download PDF

Info

Publication number
CN111970298A
CN111970298A CN202010872739.7A CN202010872739A CN111970298A CN 111970298 A CN111970298 A CN 111970298A CN 202010872739 A CN202010872739 A CN 202010872739A CN 111970298 A CN111970298 A CN 111970298A
Authority
CN
China
Prior art keywords
application
target
user
real
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010872739.7A
Other languages
Chinese (zh)
Other versions
CN111970298B (en
Inventor
程冉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN202010872739.7A priority Critical patent/CN111970298B/en
Publication of CN111970298A publication Critical patent/CN111970298A/en
Application granted granted Critical
Publication of CN111970298B publication Critical patent/CN111970298B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • H04L51/046Interoperability with other network applications or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The application discloses an application access method, an application access device, a storage medium and computer equipment, and belongs to the technical field of cloud. The method comprises the following steps: displaying a login prompt page of the target application, wherein the login prompt page comprises a target login option; responding to the triggering operation of the target login option, and displaying an authorization page; the authorization page comprises a first type of authorization option matched with the target real name level, wherein the first type of authorization option is used for prompting that the real name information of the user is authorized to the target application through the instant messaging application; the target real name level corresponds to user real name information required by accessing the target application; and responding to the triggering operation of the first-class authorization option, acquiring user real-name information corresponding to the target real-name level from the instant messaging application, and accessing the target application based on the user real-name information. According to the method and the device, cross-application user real-name information sharing is realized, the safety risk of privacy information leakage is reduced, and the operation complexity of the user is greatly reduced.

Description

Application access method and device, storage medium and computer equipment
Technical Field
The present application relates to the field of cloud technologies, and in particular, to an application access method, an application access device, a storage medium, and a computer device.
Background
The internet real-name system is a system which forces an internet user to use internet services only based on real-name information. The method aims to reduce bad information on the internet and promote internet users (users for short) to be responsible for network behaviors. In other words, the internet real-name system is a network management method based on the user real-name, which is not only an important means for protecting and guiding internet users, but also can prevent teenagers from being affected by network adverse factors.
Under the network management mechanism of real-name identity authentication, if a user wants to access a plurality of applications, the user is also required to submit real-name information respectively on a plurality of different application platforms. For example, if the user a accesses 8 applications within a period of time, the user a is required to submit the real-name information 8 times on 8 different application platforms.
However, the real-name information is submitted in a plurality of different application platforms, so that on one hand, the safety risk of information leakage exists, and on the other hand, the operation complexity is high because a user is required to repeatedly fill in the real-name information.
Disclosure of Invention
The embodiment of the application access method and device, the storage medium and the computer equipment realizes cross-application user real-name information sharing, reduces the security risk of privacy information disclosure, and greatly reduces the operation complexity of a user. The technical scheme is as follows:
in one aspect, an application access method is provided, and the method includes:
displaying a login prompt page of a target application, wherein the login prompt page comprises a target login option; the target login option is used for prompting the target application to be accessed by using an instant messaging account;
responding to the trigger operation of the target login option, and displaying an authorization page; the authorization page comprises a first type of authorization option matched with the target real name grade, and the first type of authorization option is used for prompting that the real name information of the user is authorized to the target application through the instant messaging application; the target real-name level corresponds to user real-name information required for accessing the target application;
and responding to the triggering operation of the first-class authorization option, acquiring user real-name information corresponding to the target real-name grade from the instant messaging application, and accessing the target application based on the user real-name information.
In another aspect, an application access apparatus is provided, the apparatus comprising:
the system comprises a first display module, a second display module and a third display module, wherein the first display module is configured to display a login prompt page of a target application, and the login prompt page comprises a target login option; the target login option is used for prompting the target application to be accessed by using an instant messaging account;
the second display module is configured to respond to the triggering operation of the target login option and display an authorization page; the authorization page comprises a first type of authorization option matched with the target real name grade, and the first type of authorization option is used for prompting that the real name information of the user is authorized to the target application through the instant messaging application; the target real-name level corresponds to user real-name information required for accessing the target application;
the first obtaining module is configured to respond to the triggering operation of the first type of authorization option, and obtain user real-name information corresponding to the target real-name level from the instant messaging application;
an execution module configured to access the target application based on the user real name information.
In one possible implementation manner, the first obtaining module is configured to:
acquiring encrypted data transmitted to the target application by the instant messaging application;
the encrypted data is the user real name information in a ciphertext form; the encrypted data includes: the user real name information, the current time and the application identifier of the target application.
In one possible implementation, the execution module is configured to:
sending the encrypted data to an instant messaging server;
wherein the encrypted data is used for instructing the instant messaging server to execute the following operations: responding to the encrypted data passing verification, and sending the user real name information in a plaintext form to a target server;
receiving a first notification message issued by the target server, wherein the first notification message is used for indicating that the target server has acquired the user real-name information;
the instant messaging server is a server for providing service for the instant messaging application; the target server is a server that provides a service for the target application.
In one possible implementation, the execution module is configured to:
sending the encrypted data to an instant messaging server;
receiving the user real name information in a plaintext form sent by the instant messaging server; wherein the encrypted data is used for instructing the instant messaging server to execute the following operations: responding to the encrypted data passing verification, and returning the user real name information in a plaintext form;
sending the user real name information to the target server;
receiving a first notification message issued by the target server, wherein the first notification message is used for indicating that the target server has acquired the user real-name information;
the instant messaging server is a server for providing service for the instant messaging application; the target server is a server that provides a service for the target application.
In one possible implementation, the apparatus further includes:
a third display module configured to display a first prompt message in response to receiving the first notification message; the first prompt message is used for prompting that the authorization is successful;
the receiving module is configured to receive a second notification message sent by the instant messaging server, wherein the second notification message is used for indicating that the encrypted data is not verified;
the third display module is further configured to display second prompt information, and the second prompt information is used for prompting to authorize again.
In a possible implementation manner, the first type authorization option is a real-name authentication information authorization option; the real-name authentication information is user certificate information;
the first obtaining module is further configured to:
responding to the trigger operation of the real-name authentication information authorization option, and acquiring encrypted data transmitted to the target application by the instant messaging application; and the encrypted data is user certificate information in a ciphertext form.
In a possible implementation manner, the first type authorization option is a real-name authentication information authorization option; the real-name authentication information is transaction card information;
the first obtaining module is further configured to:
responding to the triggering operation of the real-name authentication information authorization option, and displaying a transaction card selection page; the transaction card selection page comprises N card options, each card option is used for indicating one transaction card, and the value of N is a positive integer;
responding to the trigger operation of a target card option in the N card options, and acquiring encrypted data transmitted to the target application by the instant messaging application;
and the encrypted data is transaction card information in a ciphertext form, and the transaction card information corresponds to the transaction card indicated by the target card option.
In a possible implementation manner, the first type authorization option is a call number authorization option, and the first obtaining module is further configured to:
responding to the triggering operation of the call number authorization option, and displaying a verification information input box;
responding to the matching of the input verification information and the verification information issued by the instant communication server, and acquiring encrypted data transmitted to the target application by the instant communication application;
the encrypted data is a first call number in a ciphertext form; the first call number is a call number bound to the instant messaging application.
In a possible implementation manner, the first type authorization option is a call number authorization option, and the first obtaining module is further configured to:
responding to the triggering operation of the call number authorization option, and displaying a call number input box and a verification information input box;
responding to the matching of the input verification information and the verification information issued by the instant communication server, and acquiring encrypted data;
the encrypted data is a second call number in a ciphertext form; and the second call number is the call number acquired by inputting through the call number input box.
In a possible implementation manner, the authorization page further includes a second type of authorization option, and the apparatus further includes:
the second acquisition module is configured to respond to the triggering operation of the second type of authorization option and acquire the user basic information transmitted to the target application by the instant messaging application;
the execution module is further configured to access the target application based on the user basic information;
wherein, the user basic information is the personal data of the user stored by the instant communication application.
In a possible implementation manner, the authorization page further includes a second type of authorization option,
the second obtaining module is further configured to randomly generate user basic information in response to a triggering operation on the second type authorization option;
the execution module is further configured to access the target application based on the user basic information;
wherein, the user basic information is the personal data of the user stored by the instant communication application.
In one possible implementation, the apparatus further includes:
the fourth display module is configured to call the instant messaging application to display an authorization management page; the authorization management page comprises M information items, wherein one information item is used for showing an application identifier of an authorized application and authorized user real name information; m is a positive integer;
and the deleting module is configured to respond to the triggering operation of the information item where the target application is located and cancel the authorization of the target application.
In another aspect, a computer device is provided, the device comprising a processor and a memory, the memory having stored therein at least one program code, the at least one program code being loaded and executed by the processor to implement the application access method described above.
In another aspect, a storage medium is provided, in which at least one program code is stored, the at least one program code being loaded and executed by a processor to implement the application access method described above.
In another aspect, a computer program product or a computer program is provided, the computer program product or the computer program comprising computer program code, the computer program code being stored in a computer-readable storage medium, the computer program code being read by a processor of a computer device from the computer-readable storage medium, the computer program code being executed by the processor such that the computer device performs the application access method described above.
The technical scheme provided by the embodiment of the application has the following beneficial effects:
under a network management mechanism of real-name identity authentication, if a user triggers an access application operation, the instant messaging application can share self-stored user real-name information to an application to be accessed in an authorization mode, and then the user can complete application login based on the shared user real-name information. In other words, the user real-name information submitted by the user in the instant messaging application can be directly and transparently transmitted to other applications across the applications, so that other applications can directly obtain the user real-name information corresponding to the corresponding real-name levels from the instant messaging application, the trouble that the user repeatedly submits the real-name information on a plurality of application platforms is avoided, and the safety risk of privacy information leakage is reduced.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic diagram of an implementation environment related to an application access method provided in an embodiment of the present application;
fig. 2 is a schematic diagram of an implementation environment related to another application access method provided in an embodiment of the present application;
fig. 3 is a flowchart of an application access method provided in an embodiment of the present application;
FIG. 4 is a schematic diagram of a display page provided by an embodiment of the present application;
FIG. 5 is a schematic diagram of another display page provided by an embodiment of the present application;
FIG. 6 is a schematic diagram of another display page provided by an embodiment of the present application;
FIG. 7 is a schematic diagram of another display page provided by an embodiment of the present application;
FIG. 8 is a schematic diagram of another display page provided by an embodiment of the present application;
FIG. 9 is a flowchart of another application access method provided in an embodiment of the present application;
FIG. 10 is a schematic diagram of another display page provided by an embodiment of the present application;
FIG. 11 is a schematic diagram of another display page provided by an embodiment of the present application;
FIG. 12 is a flowchart of another application access method provided in an embodiment of the present application;
FIG. 13 is a flowchart of another application access method provided in an embodiment of the present application;
FIG. 14 is a schematic diagram of another display page provided by an embodiment of the present application;
FIG. 15 is a schematic diagram of another display page provided by an embodiment of the present application;
FIG. 16 is a schematic diagram of an overall execution flow of a product side according to an embodiment of the present application;
FIG. 17 is a schematic diagram of an overall execution flow of a technical side according to an embodiment of the present application;
fig. 18 is a schematic structural diagram of an application access device according to an embodiment of the present application;
FIG. 19 is a schematic structural diagram of a computer device according to an embodiment of the present application;
fig. 20 is a schematic structural diagram of another computer device provided in the embodiment of the present application.
Detailed Description
To make the objects, technical solutions and advantages of the present application more clear, embodiments of the present application will be described in further detail below with reference to the accompanying drawings.
It will be understood that the terms "first," "second," and the like as used herein may be used herein to describe various concepts, which are not limited by these terms unless otherwise specified. These terms are only used to distinguish one concept from another. For example, at least one user may be an integer number of users greater than or equal to one, such as one user, two users, three users, and the like. The plurality of users may be two or more, for example, the plurality of users may be two users, three users, or any integer number of users equal to or greater than two.
The embodiment of the application provides an application access method, an application access device, a storage medium and computer equipment. The application access method relates to cloud technology.
The Cloud technology (Cloud technology) is a hosting technology for unifying series resources such as hardware, software, network and the like in a wide area network or a local area network to realize calculation, storage, processing and sharing of data. The cloud technology is based on the general names of network technology, information technology, integration technology, management platform technology, application technology and the like applied in the cloud computing business model, can form a resource pool, is used as required, and is flexible and convenient. Cloud computing technology will become an important support. Background services of the technical network system require a large amount of computing and storage resources, such as video websites, picture-like websites and more web portals. With the high development and application of the internet industry, each article may have its own identification mark and needs to be transmitted to a background system for logic processing, data in different levels are processed separately, and various industrial data need strong system background support and can only be realized through cloud computing.
The application access method provided by the embodiment of the application relates to Cloud Security (Cloud Security) in the technical field of Cloud. Cloud security refers to the generic name of security software, hardware, users, organizations, and security cloud platforms applied based on cloud computing business models. The cloud security integrates emerging technologies and concepts such as parallel processing, grid computing and unknown virus behavior judgment, abnormal monitoring of software behaviors in the network is achieved through a large number of meshed clients, the latest information of trojans and malicious programs in the internet is obtained and sent to the server for automatic analysis and processing, and then the virus and trojan solution is distributed to each client.
In one possible implementation, the main research directions of cloud security include: 1. the cloud computing security mainly researches how to guarantee the security of the cloud and various applications on the cloud, including the security of a cloud computer system, the secure storage and isolation of user data, user access authentication, information transmission security, network attack protection, compliance audit and the like; 2. the cloud of the security infrastructure mainly researches how to adopt cloud computing to newly build and integrate security infrastructure resources and optimize a security protection mechanism, and comprises the steps of constructing a super-large-scale security event and an information acquisition and processing platform through a cloud computing technology, realizing the acquisition and correlation analysis of mass information, and improving the handling control capability and the risk control capability of the security event of the whole network; 3. the cloud security service mainly researches various security services, such as anti-virus services and the like, provided for users based on a cloud computing platform.
Some noun terms or abbreviations referred to in the embodiments of the present application are first described below.
The instant messaging application comprises the following steps: single person or multiple persons are supported to participate, and users are supported to send voice, video, pictures, characters and the like. In essence, instant messaging applications provide a platform for information interaction between people.
The information interaction platform specifically refers to a network architecture for connecting people by social relations and/or common interests, and users can perform daily communication and process daily matters through instant messaging applications. Wherein, each user can have a network identity recognized by other users on the information interaction platform. In the embodiment of the present invention, the network identity may also be referred to as a user identifier of the user.
On the information interaction platform, different users can establish a social relationship in a mutually confirmed manner, for example, friends are added to each other or concern each other. Each user maintains a chain of friend relationships. When two users establish a social relationship, they become social network contacts of each other. A group of users can form a social group by forming a social relationship with each other in a self-selection mode. Each member in the group is a social network contact of all other members in the group.
The instant messaging server: refers to a server that provides services for instant messaging applications.
The instant messaging account number is as follows: refers to a user account used by a user to log in to an instant messaging application.
User real name information: in the embodiment of the present application, the user real-name information may include user authentication information and a call number.
Real name authentication information: refers to the material used to confirm the true identity of a user. Illustratively, the real-name authentication information includes, but is not limited to, user credential information and transaction card information. In one possible implementation, the user certificate information may be a user identification card, and the transaction card information may be a bank card held by the user.
A third party application: refers to related software developed by other organizations or individuals than the software editor for deficiencies or vulnerabilities in functionality of applications. Wherein the third party application is typically developed by an independent technology company or individual.
A third-party server: refers to a server that provides services for third party applications.
The following describes an implementation environment related to an application access method provided by an embodiment of the present application.
The application access method provided by the embodiment of the application is applied to computer equipment. The computer equipment comprises a terminal and a server.
Illustratively, referring to FIG. 1, the implementation environment includes: a terminal 101 and a server 102.
In a possible implementation manner, the server 102 may be an independent physical server, a server cluster or a distributed system formed by a plurality of physical servers, or a cloud server providing basic cloud computing services such as a cloud service, a cloud database, cloud computing, a cloud function, cloud storage, a Network service, cloud communication, a middleware service, a domain name service, a security service, a Content Delivery Network (CDN), a big data and an artificial intelligence platform. The terminal 101 may be, but is not limited to, a smart phone, a tablet computer, a notebook computer, a desktop computer, a smart speaker, a smart watch, and the like. The terminal 101 and the server 102 may be directly or indirectly connected through wired or wireless communication, and the present application is not limited thereto.
In another possible implementation, referring to fig. 2, an instant messaging application 1011 and a third party application 1012 are installed on the terminal 101. The server 102 comprises an instant messaging server 1021 and a third party server 1022. In the implementation environment shown in fig. 2, in consideration of the problems of high information leakage risk and high user operation complexity caused by the fact that a user repeatedly submits real-name data on different application platforms, the embodiment of the present application provides an application authorization login scheme based on cross-application information sharing.
In the scheme, the instant messaging application can share the real-name data stored by the instant messaging application to the third-party application in an authorization mode, so that the safety risk of information leakage is reduced, and the operation complexity of a user is reduced. In other words, after the user logs in the third-party application by using the instant messaging account, the user does not need to submit the real-name data after the user logs in successfully, the real-name data submitted by the user in the instant messaging application can be directly transmitted to the third-party application, the trouble that the user submits the real-name data repeatedly can be avoided, and the risk of information leakage is reduced. For example, the authorized login between the applications may be implemented by OAuth protocol, which is not specifically limited in this embodiment of the present application.
The following embodiments are used to describe an application authorization login scheme based on cross-application information sharing provided in the embodiments of the present application in detail.
Fig. 3 is a flowchart of an application access method according to an embodiment of the present application. Referring to fig. 3, a method flow provided by the embodiment of the present application includes:
301. the terminal displays a login prompt page of the target application, wherein the login prompt page comprises a target login option; the target login option is used for prompting the target application to be accessed by using the instant messaging account.
In this embodiment of the application, the target application may be a third-party application installed on the terminal, such as a music playing application, a video application, a live application, a game application, and the like.
In one possible implementation, the login prompt page is displayed upon user request, for example, when the terminal detects that the user has clicked on the application icon of the target application, the login prompt page is displayed.
Referring to fig. 4, the login prompt page may include: login prompt information of "login is required to continue using", a registration option 401 for prompting the user to register, and a target login option 402.
The target login option 402 is used to prompt the user to access the target application using the instant messaging account, and as shown in fig. 4, the content presented by the target login option 402 may be "login using the instant messaging account".
302. Responding to the triggering operation of the user on the target login option, and calling an instant messaging application by the terminal to display an authorization page; the authorization page comprises a first type of authorization option matched with the target real name level, wherein the first type of authorization option is used for prompting that the real name information of the user is authorized to the target application through the instant messaging application; the target real name level corresponds to user real name information needed to access the target application.
In one possible implementation manner, the triggering operation of the target login option by the user may be: and clicking the target login option by the user, namely after clicking the target login option by the user, skipping the terminal from the third-party application to the instant messaging application by the terminal, and popping up an authorization page in the instant messaging application.
Referring to fig. 5, the authorization page may include: the first type authorization option and the authorization prompt message of the instant messaging account number login. The first type of authorization option may be a real-name authentication information authorization option 501 or a call number authorization option 503. Besides, the authorization page also includes a second type of authorization option 502, and the content presented by the second type of authorization option 502 may be "basic information of authorized user", for example.
As an example, invoking the instant messaging application to display the authorization page may be: the target Application calls the instant messaging Application to pop up an authorization page through a specific API (Application Programming Interface).
The real name grade can be divided into a call number real name, a user certificate information real name and a transaction card real name, which is not specifically limited in the embodiment of the present application. Illustratively, the real name level of the real name of the call number is low, the real name level of the real name of the user certificate information is medium, and the real name level of the real name of the transaction card is high.
303. And responding to the triggering operation of the first type of authorization option by the user, the terminal acquires the user real-name information corresponding to the target real-name level from the instant messaging application, and accesses the target application based on the acquired user real-name information.
In one possible implementation manner, the triggering operation of the first type authorization option by the user may be: the user clicks on the "authorize real-name authentication information" option 501 or the "authorize call number" option 503 in fig. 5.
In the embodiment of the present application, obtaining the user real name information from the instant messaging application includes: acquiring encrypted data transmitted to a target application by an instant messaging application; the encrypted data is user real name information in a ciphertext form. As an example, the encrypted data includes: user real name information, current time and application identification of the target application. That is, the instant messaging application shares the real-name information of the user to the target application, and the real-name information is not in a plaintext form, but is a one-way encryption character string. Illustratively, the encryption method adopted in the embodiment of the present application is as follows: and the ciphertext is the original text + the current time + the application identifier of the target application. The application identifier may be an application name or an application ID, which is not specifically limited in this embodiment of the present application. The encryption mode ensures that different third-party applications acquire different ciphertexts, and the ciphertexts of the same user acquired by the same application at different times are also different, so that the problem of library collision is avoided.
In one possible implementation manner, in response to a trigger operation of the user on the "authorized real-name authentication information" option 501, the real-name authentication information corresponding to the target real-name level is acquired from the instant messaging application, which includes the following two implementation manners.
Authorized user credential information
For the situation, the first type of authorization option is a real-name authentication information authorization option; the real-name authentication information is user certificate information; illustratively, in response to a trigger operation on the first-class authorization option, acquiring user real-name information corresponding to a target real-name level from the instant messaging application includes: responding to the trigger operation of the real-name authentication information authorization option, and acquiring encrypted data transmitted to a target application by the instant messaging application; the encrypted data is user certificate information in a ciphertext form.
In one possible implementation, the foregoing steps include:
303-1, responding to the triggering operation of the user on the real-name authentication information authorization option, and displaying a first selection page; the first selection page comprises a first authorization option.
In a possible implementation manner, the triggering operation of the user on the real-name authentication information authorization option may be: and clicking the real-name authentication information authorization option by the user. That is, after the user clicks the real-name authentication information authorization option, the terminal jumps from fig. 5 to the first selection page shown in fig. 6.
Referring to fig. 6, the first selection page may include: an authorization prompt for "authorization real-name authentication information type" and a first authorization option 601. The content presented by the first authorization option 601 may be "authorized user certificate information".
303-2, responding to the triggering operation of the user on the first authorization option, and acquiring encrypted data transmitted to the target application by the instant messaging application; the encrypted data is user certificate information in a ciphertext form.
If the user triggers the option 601 of 'authorized user certificate information', the target application acquires encrypted data transmitted to the target application by the instant messaging application; the encrypted data is user certificate information in a ciphertext form. And after the target application acquires the user certificate information in the form of the ciphertext, the user can be allowed to log in according to the user certificate information. At this point, the terminal may jump back to the target application and display an authorization success page as shown in fig. 7.
Authorizing transaction card information
For the situation, the first type of authorization option is a real-name authentication information authorization option; the real-name authentication information is transaction card information; illustratively, in response to a trigger operation on the first-class authorization option, acquiring user real-name information corresponding to a target real-name level from the instant messaging application includes: responding to the triggering operation of the real-name authentication information authorization option, and displaying a transaction card selection page; the transaction card selection page comprises N card options, and each card option is used for indicating a transaction card; responding to the trigger operation of a target card option in the N card options, and acquiring encrypted data transmitted to the target application by the instant messaging application; the encrypted data is transaction card information in a ciphertext form, and the transaction card information corresponds to the transaction card indicated by the target card option.
In one possible implementation, the foregoing steps include:
303-3, responding to the triggering operation of the second authorization option, and displaying a first selection page; and the first selection page also comprises a second authorization option.
As shown in fig. 6, a second authorization option 602 is also included in the first selection page. Wherein, the content presented by the second authorization option 602 may be "authorized transaction card information".
303-4, displaying a transaction card selection page in response to a user's triggering operation of the second authorization option.
The transaction card selection page comprises N card options, each card option is used for indicating one transaction card, and the value of N is a positive integer. For example, the value of N may be the number of all transaction cards bound by the user in the instant messaging application, or the number of partial transaction cards bound by the user, which is not specifically limited in this embodiment of the present application. As shown in fig. 8, two card options are shown on the transaction card selection page, an option 801 to indicate transaction card 1 and an option 802 to indicate transaction card 2.
303-5, responding to the trigger operation of a target card option in the N card options, and acquiring encrypted data transmitted to the target application by the instant messaging application; the encrypted data is transaction card information in a ciphertext form, and the transaction card information corresponds to the transaction card indicated by the target card option.
The number of the target card options can be one or multiple, and correspondingly, the obtained transaction card information can indicate one transaction card or multiple transaction cards. And after the target application acquires the transaction card information in the form of the ciphertext, the user can be allowed to log in according to the transaction card information. At this point, the terminal may jump back to the target application and display an authorization success page as shown in fig. 7.
Authorized number for calling
Aiming at the mode, the first-class authorization option is a call number authorization option, and the method for acquiring the user real-name information corresponding to the target real-name grade from the instant messaging application in response to the triggering operation of the first-class authorization option comprises the following steps:
901. responding to the triggering operation of the user on the call number authorization option, and displaying a second selection page by the terminal; the second selection page comprises a third authorization option and a fourth authorization option.
In a possible implementation manner, the triggering operation of the user on the call number authorization option may be: the user clicks on the "authorized call number" option 503 in fig. 5. I.e. after the user clicks the "authorized call number" option 503, the terminal jumps from fig. 5 to the second selection page shown in fig. 10.
Referring to fig. 10, the second selection page may include: an authorization prompt for "authorized call number type," a third authorization option 1001, and a fourth authorization option 1002. For example, the content presented by the third authorization option 1001 may be "call number authorized for instant messaging application binding", and the content presented by the fourth authorization option 1002 may be "new call number authorized".
In the embodiment of the application, the user can select the call number bound by the authorized instant messaging application and can also select to add a new call number. No matter which authorization type is selected, the target application can be authorized again after the short message verification is passed. In other words, the instant messaging application can be authorized to the target application through the call number verified by the short message.
902. And responding to the triggering operation of the user on the third authorization option, and displaying an authentication information input box by the terminal.
In one possible implementation manner, if the user performs a click operation on the option 1001 of "authorized instant messaging application binding" in fig. 10, the terminal displays a verification page as shown in fig. 11, and the verification page includes a verification information input box 1101 thereon.
903. Responding to the matching of the verification information input by the user and the verification information issued by the instant messaging server, and acquiring encrypted data transmitted to the target application by the instant messaging application by the terminal; the encrypted data is a first call number in a ciphertext form; the first call number is a call number bound to the instant messaging application.
904. And responding to the triggering operation of the user on the fourth authorization option, and displaying a call number input box and a verification information input box by the terminal.
In one possible implementation, if the user performs a click operation on the "authorize new call number" option 1002 in fig. 10, the terminal displays a verification page including a call number input box and a verification information input box.
905. Responding to the matching of the verification information input by the user and the verification information issued by the instant communication server, and acquiring encrypted data by the terminal; the encrypted data is a second call number in a ciphertext form; and the second call number is the call number input by the terminal through the call number input box.
According to the method provided by the embodiment of the application, under a network management mechanism of real-name identity authentication, if a user triggers an access application operation, the instant messaging application can share the user real-name information stored by the instant messaging application to the application to be accessed in an authorization mode, so that the user can complete application login based on the shared user real-name information. In other words, the user real-name information submitted by the user in the instant messaging application can be directly and transparently transmitted to other applications across the applications, so that other applications can directly obtain the user real-name information corresponding to the corresponding real-name levels from the instant messaging application, the trouble that the user repeatedly submits the real-name information on a plurality of application platforms is avoided, and the safety risk of privacy information leakage is reduced.
In another embodiment, after acquiring the user real-name information transferred to the target application by the instant messaging application, the target application (third-party application) needs to perform verification to the instant messaging server if the user real-name information needs to be used. In another expression, after the third-party application obtains the user real-name information in the form of the ciphertext, when submitting the user real-name information to the target server (third-party server), the third-party application needs to obtain the plaintext from the ciphertext to the instant messaging server.
Referring to fig. 12, the "accessing the target application based on the user real name information" in step 303 includes:
303-6, the terminal sends the encrypted data to the instant messaging server.
The encrypted data is user real name information in a ciphertext form. Illustratively, this step may be that the terminal-installed target application sends the encrypted data to the instant messenger server.
303-7, after receiving the encrypted data, the instant communication server verifies the encrypted data; and responding to the encrypted data passing the verification, and sending the user real name information in a plaintext form to the target server.
In the embodiment of the application, the encrypted data is checked, that is, whether the user authentication information in the form of the ciphertext is valid is verified. For example, when the encrypted data is verified, it may be verified whether the encrypted data corresponds to a legitimate user registered in the instant messaging application; and if the encrypted data corresponds to a legal user registered in the instant messaging application, determining that the encrypted data passes the verification. Or, the encrypted data can be decrypted, and whether the plaintext obtained after decryption is consistent with the stored corresponding user real name information or not is verified; if the encrypted data is consistent, the encrypted data is determined to pass the verification.
303-8, the target server sends a first notification message to the terminal after receiving the user real name information.
303-9, the terminal responding to the received first notification message and displaying the first prompt message; the first notification message is used for indicating that the target server acquires the user real name information; the first prompt message is used for prompting that the authorization is successful.
The first prompt message may be the word "authorize successfully" shown in fig. 7, which is not specifically limited in this embodiment of the application.
303-10, the terminal receiving a second notification message issued by the instant messaging server, the second notification message being used for indicating that the encrypted data is not verified; and the terminal displays second prompt information, and the second prompt information is used for prompting to authorize again.
Aiming at the step, if the encrypted data sent by the terminal to the instant communication server fails to pass the verification, the terminal prompts the user to execute the authorization process again.
In a possible implementation manner, the instant messaging server can directly send the user real-name information to the target server, and can also return the user real-name information to the terminal, and the terminal delivers the user real-name information to the target server. That is, the above-described steps 303-7 and 303-8 may be replaced with:
303-11, after receiving the encrypted data, the instant communication server verifies the encrypted data; and responding to the encrypted data passing the verification, and sending the user real name information in a plaintext form to the terminal.
303-12, after receiving the user real name information sent by the instant messaging server, sending the user real name information to the target server.
According to the method provided by the embodiment of the application, under a network management mechanism of real-name identity authentication, if a user triggers an access application operation, the instant messaging application can share the user real-name information stored by the instant messaging application to the application to be accessed in an authorization mode, so that the user can complete application login based on the shared user real-name information. In other words, the user real-name information submitted by the user in the instant messaging application can be directly and transparently transmitted to other applications across the applications, so that other applications can directly obtain the user real-name information corresponding to the corresponding real-name levels from the instant messaging application, the trouble that the user repeatedly submits the real-name information on a plurality of application platforms is avoided, and the safety risk of privacy information leakage is reduced.
In another embodiment, referring to fig. 5, the authorization page further includes: "second type authorization option 502. As shown in fig. 5, the content presented by the second type authorization option 502 may be "authorized user basic information". Wherein, the user basic information may include at least one of the following: head portrait, gender, region, nickname, openid, etc., which are not specifically limited in this embodiment.
It should be noted that, for different third-party applications, the user information required by the user to log in the third-party application may be different. For example, some third-party applications need to acquire basic information of a user to realize login access, such as an audio playing application; some third-party applications, such as game applications, require the user's real-name information to be obtained for login access. For example, for different requirements of different third-party applications on authorization types, only an authorization type option matching with an application to be currently accessed may be displayed on the authorization page, for example, only an "authorized call number" option 503 is displayed, which is not specifically limited in this embodiment of the application.
In a possible implementation manner, assuming that the user triggers the second type authorization option 502 in the authorization page, as shown in fig. 13, the method provided in the embodiment of the present application further includes:
1301. responding to the triggering operation of the user on the second type authorization option, and displaying a third selection page by the terminal; the third selection page includes a fifth authorization option and a sixth authorization option.
In one possible implementation manner, the triggering operation of the user on the second type authorization option may be: the user clicks on the "authorized user basic information" option 502 in fig. 5. That is, after the user clicks the second type authorization option, the terminal jumps from fig. 5 to the third selection page shown in fig. 14.
Referring to fig. 14, the third selection page may include: an authorization prompt of "basic information type of authorized user", a fifth authorization option 1401, and a sixth authorization option 1402. Illustratively, the content presented by the fifth authorization option 1401 may be "authorized real avatar", and the content presented by the sixth authorization option 1402 may be "authorized random avatar".
1302. Responding to the triggering operation of the user on the fifth authorization option, and acquiring user basic information transmitted to the target application by the instant messaging application by the terminal; and accessing the target application based on the acquired user basic information.
After the target application acquires the user basic information transmitted to the target application by the instant messaging application, the target application can directly submit the user basic information to the target server. Illustratively, the target server may issue a first notification message to the terminal after receiving the basic user information. The terminal responds to the received first notification message and displays first prompt information; the first notification message is used for indicating that the target server has acquired the user basic information; the first prompt message is used for prompting that the authorization is successful.
1303. Responding to the triggering operation of the user on the sixth authorization option, and randomly generating user basic information by the terminal; and accessing the target application based on the randomly generated user basic information.
For example, if the user triggers the sixth authorization option, the instant messaging application may randomly generate and deliver the user basic information to the target application. Furthermore, after the target application acquires the user basic information transmitted to the target application by the instant messaging application, the target application can directly submit the user basic information to the target server so as to realize user login.
In the embodiment of the application, the instant messaging application can share real user basic information or random user basic information to the third-party application in an authorization mode, so that diversification of the authorization mode is realized. In addition, the risk of true data leakage of the user is reduced.
In another embodiment, the user may view the authorized third-party application list in the instant messaging application, and may delete any one of the third-party applications in the third-party application list by performing an operation to cancel authorization of the third-party application. That is, the method provided by the embodiment of the present application further includes: the terminal calls an instant messaging application to display an authorization management page; illustratively, as shown in fig. 15, the authorization management page includes M information entries, and one information entry is used to show the application identifier of an authorized application and the real name information of an authorized user.
And responding to the triggering operation of the user on the information item where the target application is located, namely that the communication application cancels the authorization of the target application. Illustratively, the trigger operation of the user on the target application may be: the user presses the information item where the target application is located; or, the user clicks on a deletion option matched with the target application, which is not specifically limited in this embodiment of the application. In addition, the application identifier may be an application name of a third-party application.
The overall execution flow of the application authorization login scheme based on cross-application information sharing provided by the embodiment of the present application is described below with reference to fig. 16 and 17.
In one possible implementation, referring to fig. 16, the execution flow includes:
1601. the third party application triggers an authorization process based on the user's access request.
1602. And calling the instant messaging application by the third-party application to pop up an authorization page so that the user selects an authorization type in the instant messaging application.
1603. If the user selects an authorized call number, the following step 1607 is performed.
1604. If the user selects an authorized avatar, the following step 1608 is performed.
1605. If the user selects authorized user credential information, the following step 1611 is performed.
1606. If the user chooses to authorize the transaction card information, the following step 1612 is performed.
1607. The instant messaging application communicates the encrypted data and the authorization type to the third party application. The details of the data received by the third-party application are as follows: authorization type-call number real name; encrypted data-encrypted call number.
1608. The instant messaging application judges whether the user authorizes the real head portrait to the third party application; if so, go to step 1609; if not, step 1610 is performed.
1609. The instant messaging application communicates the unencrypted data and the authorization type to the third party application. The details of the data received by the third-party application are as follows: authorization type-openid account login; data-real head portrait picture.
1610. The instant messaging application communicates the unencrypted data and the authorization type to the third party application. The details of the data received by the third-party application are as follows: authorization type-openid account login; data-random head portrait pictures.
1611. The instant messaging application communicates the encrypted data and the authorization type to the third party application. The details of the data received by the third-party application are as follows: authorization type-user certificate real name; encryption data-encrypted user credential information.
1612. The instant messaging application communicates the encrypted data and the authorization type to the third party application. The details of the data received by the third-party application are as follows: authorization type-transaction card real name; encryption data-encrypted transaction card information.
It should be noted that, for the call number, the user certificate information, and the transaction card information, what the instant messaging application transmits to the third party application is encrypted information, that is, what the third party application takes is authorization type + encrypted information. In addition, after the third-party application takes the encrypted information, when the user real-name information is submitted to the third-party server, the user real-name information in a plaintext form needs to be acquired from the instant messaging server by the aid of the encrypted information.
Referring to fig. 17, the interaction flow is as follows:
1701. user real-name information is required for a user to access a third-party application.
1702. And the third party application forwards the ciphertext to the instant messaging server.
1703. The instant communication server verifies whether the ciphertext is valid.
1704. And if the ciphertext is valid, the instant messaging server directly sends the user real name information to a third-party server.
1705. And the third-party application receives a confirmation result fed back by the third-party server after acquiring the real-name information of the user.
1706. And if the ciphertext is valid, the instant messaging server returns a notification message requiring the user to re-authorize to the third-party application.
According to the method provided by the embodiment of the application, under a network management mechanism of real-name identity authentication, if a user triggers an access application operation, the instant messaging application can share the user real-name information stored by the instant messaging application to the application to be accessed in an authorization mode, so that the user can complete application login based on the shared user real-name information. In other words, the method and the device for the real-name information transmission can directly transmit the real-name information of the user submitted by the user in the instant messaging application to other applications in a cross-application mode, so that the trouble that the user repeatedly submits the real-name information is avoided, and the security risk of privacy information leakage is reduced.
Fig. 18 is a schematic structural diagram of an application access device according to an embodiment of the present application. Referring to fig. 18, the apparatus includes:
a first display module 1801, configured to display a login prompt page of a target application, where the login prompt page includes a target login option; the target login option is used for prompting the target application to be accessed by using an instant messaging account;
a second display module 1802 configured to display an authorization page in response to a trigger operation on the target login option; the authorization page comprises a first type of authorization option matched with the target real name grade, and the first type of authorization option is used for prompting that the real name information of the user is authorized to the target application through the instant messaging application; the target real-name level corresponds to user real-name information required for accessing the target application;
a first obtaining module 1803, configured to, in response to a trigger operation on the first type authorization option, obtain, from the instant messaging application, user real-name information corresponding to the target real-name level;
an execution module 1804 configured to access the target application based on the user real-name information.
According to the device provided by the embodiment of the application, under a network management mechanism of real-name identity authentication, if a user triggers an access application operation, the instant messaging application can share the user real-name information stored by the instant messaging application to the application to be accessed in an authorization mode, so that the user can complete application login based on the shared user real-name information. In other words, the user real-name information submitted by the user in the instant messaging application can be directly and transparently transmitted to other applications across the applications, so that other applications can directly obtain the user real-name information corresponding to the corresponding real-name levels from the instant messaging application, the trouble that the user repeatedly submits the real-name information on a plurality of application platforms is avoided, and the safety risk of privacy information leakage is reduced.
In one possible implementation manner, the first obtaining module is configured to:
acquiring encrypted data transmitted to the target application by the instant messaging application;
the encrypted data is the user real name information in a ciphertext form; the encrypted data includes: the user real name information, the current time and the application identifier of the target application.
In one possible implementation, the execution module is configured to:
sending the encrypted data to an instant messaging server;
wherein the encrypted data is used for instructing the instant messaging server to execute the following operations: responding to the encrypted data passing verification, and sending the user real name information in a plaintext form to a target server;
receiving a first notification message issued by the target server, wherein the first notification message is used for indicating that the target server has acquired the user real-name information;
the instant messaging server is a server for providing service for the instant messaging application; the target server is a server that provides a service for the target application.
In one possible implementation, the execution module is configured to:
sending the encrypted data to an instant messaging server;
receiving the user real name information in a plaintext form sent by the instant messaging server; wherein the encrypted data is used for instructing the instant messaging server to execute the following operations: responding to the encrypted data passing verification, and returning the user real name information in a plaintext form;
sending the user real name information to the target server;
receiving a first notification message issued by the target server, wherein the first notification message is used for indicating that the target server has acquired the user real-name information;
the instant messaging server is a server for providing service for the instant messaging application; the target server is a server that provides a service for the target application.
In one possible implementation, the apparatus further includes:
a third display module configured to display a first prompt message in response to receiving the first notification message; the first prompt message is used for prompting that the authorization is successful;
the receiving module is configured to receive a second notification message sent by the instant messaging server, wherein the second notification message is used for indicating that the encrypted data is not verified;
the third display module is further configured to display second prompt information, and the second prompt information is used for prompting to authorize again.
In a possible implementation manner, the first type authorization option is a real-name authentication information authorization option; the real-name authentication information is user certificate information;
the first obtaining module is further configured to:
responding to the trigger operation of the real-name authentication information authorization option, and acquiring encrypted data transmitted to the target application by the instant messaging application; and the encrypted data is user certificate information in a ciphertext form.
In a possible implementation manner, the first type authorization option is a real-name authentication information authorization option; the real-name authentication information is transaction card information;
the first obtaining module is further configured to:
responding to the triggering operation of the real-name authentication information authorization option, and displaying a transaction card selection page; the transaction card selection page comprises N card options, each card option is used for indicating one transaction card, and the value of N is a positive integer;
responding to the trigger operation of a target card option in the N card options, and acquiring encrypted data transmitted to the target application by the instant messaging application;
and the encrypted data is transaction card information in a ciphertext form, and the transaction card information corresponds to the transaction card indicated by the target card option.
In a possible implementation manner, the first type authorization option is a call number authorization option, and the first obtaining module is further configured to:
responding to the triggering operation of the call number authorization option, and displaying a verification information input box;
responding to the matching of the input verification information and the verification information issued by the instant communication server, and acquiring encrypted data transmitted to the target application by the instant communication application;
the encrypted data is a first call number in a ciphertext form; the first call number is a call number bound to the instant messaging application.
In a possible implementation manner, the first type authorization option is a call number authorization option, and the first obtaining module is further configured to:
responding to the triggering operation of the call number authorization option, and displaying a call number input box and a verification information input box;
responding to the matching of the input verification information and the verification information issued by the instant communication server, and acquiring encrypted data;
the encrypted data is a second call number in a ciphertext form; and the second call number is the call number acquired by inputting through the call number input box.
In a possible implementation manner, the authorization page further includes a second type of authorization option, and the apparatus further includes:
the second acquisition module is configured to respond to the triggering operation of the second type of authorization option and acquire the user basic information transmitted to the target application by the instant messaging application;
the execution module is further configured to access the target application based on the user basic information;
wherein, the user basic information is the personal data of the user stored by the instant communication application.
In a possible implementation manner, the authorization page further includes a second type authorization option, and the second obtaining module is further configured to randomly generate user basic information in response to a triggering operation on the second type authorization option;
the execution module is further configured to access the target application based on the user basic information;
wherein, the user basic information is the personal data of the user stored by the instant communication application.
In one possible implementation, the apparatus further includes:
the fourth display module is configured to call the instant messaging application to display an authorization management page; the authorization management page comprises M information items, wherein one information item is used for showing an application identifier of an authorized application and authorized user real name information; m is a positive integer;
and the deleting module is configured to respond to the triggering operation of the information item where the target application is located and cancel the authorization of the target application.
All the above optional technical solutions may be combined arbitrarily to form the optional embodiments of the present disclosure, and are not described herein again.
It should be noted that: in practical applications, the above functions may be distributed by different functional modules according to needs, that is, the internal structure of the device is divided into different functional modules to complete all or part of the above described functions. In addition, the application access device and the application access method provided by the above embodiments belong to the same concept, and specific implementation processes thereof are described in the method embodiments and are not described herein again.
Fig. 19 shows a block diagram of a computer device 1900 according to an exemplary embodiment of the present application. The computer device 1900 may be a portable mobile terminal, such as: a smart phone, a tablet computer, an MP3 player (Moving Picture Experts Group Audio Layer III, motion video Experts compression standard Audio Layer 3), an MP4 player (Moving Picture Experts Group Audio Layer IV, motion video Experts compression standard Audio Layer 4), a notebook computer, or a desktop computer. Computer device 1900 may also be referred to by other names such as user equipment, portable terminal, laptop terminal, desktop terminal, and the like.
Generally, computer device 1900 includes: a processor 1901 and a memory 1902.
The processor 1901 may include one or more processing cores, such as a 4-core processor, an 8-core processor, and so forth. The processor 1901 may be implemented in at least one hardware form of a DSP (Digital Signal Processing), an FPGA (Field-Programmable Gate Array), and a PLA (Programmable Logic Array). The processor 1901 may also include a main processor and a coprocessor, where the main processor is a processor for Processing data in an awake state, and is also called a Central Processing Unit (CPU); a coprocessor is a low power processor for processing data in a standby state. In one possible implementation, the processor 1901 may be integrated with a GPU (Graphics Processing Unit), and the GPU is responsible for rendering and drawing content required to be displayed by the display screen. In some embodiments, the processor 1901 may further include an AI (Artificial Intelligence) processor for processing computing operations related to machine learning.
The memory 1902 may include one or more computer-readable storage media, which may be non-transitory. The memory 1902 may also include high-speed random access memory, as well as non-volatile memory, such as one or more magnetic disk storage devices, flash memory storage devices. In one possible implementation, a non-transitory computer readable storage medium in the memory 1902 is used to store at least one program code for execution by the processor 1901 to implement the application access methods provided by the method embodiments of the present application.
In one possible implementation, the computer device 1900 may further include: a peripheral interface 1903 and at least one peripheral. The processor 1901, memory 1902, and peripheral interface 1903 may be connected by bus or signal lines. Various peripheral devices may be connected to peripheral interface 1903 via a bus, signal line, or circuit board. Specifically, the peripheral device includes: at least one of a radio frequency circuit 1904, a display screen 1905, a camera assembly 1906, an audio circuit 1907, a positioning assembly 1908, and a power supply 1909.
The peripheral interface 1903 may be used to connect at least one peripheral associated with an I/O (Input/Output) to the processor 1901 and the memory 1902. In one possible implementation, the processor 1901, memory 1902, and peripheral interface 1903 are integrated on the same chip or circuit board; in some other embodiments, any one or two of the processor 1901, the memory 1902, and the peripheral interface 1903 may be implemented on separate chips or circuit boards, which is not limited in this embodiment.
The Radio Frequency circuit 1904 is used for receiving and transmitting RF (Radio Frequency) signals, also called electromagnetic signals. The radio frequency circuit 1904 communicates with a communication network and other communication devices via electromagnetic signals. The rf circuit 1904 converts an electrical signal into an electromagnetic signal to transmit, or converts a received electromagnetic signal into an electrical signal. Optionally, the radio frequency circuit 1904 includes: an antenna system, an RF transceiver, one or more amplifiers, a tuner, an oscillator, a digital signal processor, a codec chipset, a subscriber identity module card, and so forth. The radio frequency circuit 1904 may communicate with other terminals via at least one wireless communication protocol. The wireless communication protocols include, but are not limited to: the world wide web, metropolitan area networks, intranets, generations of mobile communication networks (2G, 3G, 4G, and 5G), Wireless local area networks, and/or WiFi (Wireless Fidelity) networks. In a possible implementation manner, the radio frequency circuit 1904 may further include a circuit related to NFC (Near Field Communication), which is not limited in this application.
The display screen 1905 is used to display a UI (User Interface). The UI may include graphics, text, icons, video, and any combination thereof. When the display screen 1905 is a touch display screen, the display screen 1905 also has the ability to capture touch signals on or above the surface of the display screen 1905. The touch signal may be input to the processor 1901 as a control signal for processing. At this point, the display 1905 may also be used to provide virtual buttons and/or a virtual keyboard, also referred to as soft buttons and/or a soft keyboard. In one possible implementation, the display 1905 may be one, disposed on a front panel of the computer device 1900; in other embodiments, display 1905 may be at least two, each disposed on a different surface of computer device 1900 or in a folded design; in other embodiments, display 1905 may be a flexible display disposed on a curved surface or on a folding surface of computer device 1900. Even more, the display 1905 may be arranged in a non-rectangular irregular figure, i.e., a shaped screen. The Display 1905 may be made of LCD (Liquid Crystal Display), OLED (Organic Light-Emitting Diode), or the like.
The camera assembly 1906 is used to capture images or video. Optionally, camera assembly 1906 includes a front camera and a rear camera. Generally, a front camera is disposed at a front panel of the terminal, and a rear camera is disposed at a rear surface of the terminal. In a possible implementation manner, the number of the rear cameras is at least two, and the rear cameras are respectively any one of a main camera, a depth-of-field camera, a wide-angle camera and a telephoto camera, so that the main camera and the depth-of-field camera are fused to realize a background blurring function, and the main camera and the wide-angle camera are fused to realize panoramic shooting and a VR (Virtual Reality) shooting function or other fusion shooting functions. In one possible implementation, the camera assembly 1906 may also include a flash. The flash lamp can be a monochrome temperature flash lamp or a bicolor temperature flash lamp. The double-color-temperature flash lamp is a combination of a warm-light flash lamp and a cold-light flash lamp, and can be used for light compensation at different color temperatures.
The audio circuitry 1907 may include a microphone and a speaker. The microphone is used for collecting sound waves of a user and the environment, converting the sound waves into electric signals, and inputting the electric signals into the processor 1901 for processing, or inputting the electric signals into the radio frequency circuit 1904 for realizing voice communication. The microphones may be multiple and placed at different locations on the computer device 1900 for stereo sound capture or noise reduction purposes. The microphone may also be an array microphone or an omni-directional pick-up microphone. The speaker is used to convert electrical signals from the processor 1901 or the radio frequency circuitry 1904 into sound waves. The loudspeaker can be a traditional film loudspeaker or a piezoelectric ceramic loudspeaker. When the speaker is a piezoelectric ceramic speaker, the speaker can be used for purposes such as converting an electric signal into a sound wave audible to a human being, or converting an electric signal into a sound wave inaudible to a human being to measure a distance. In one possible implementation, the audio circuitry 1907 may also include a headphone jack.
The Location component 1908 is used to locate the current geographic Location of the computer device 1900 for navigation or LBS (Location Based Service). The Positioning component 1908 may be a Positioning component based on the Global Positioning System (GPS) in the united states, the beidou System in china, or the galileo System in russia.
Power supply 1909 is used to provide power to the various components in computer device 1900. The power source 1909 can be alternating current, direct current, disposable batteries, or rechargeable batteries. When power supply 1909 includes a rechargeable battery, the rechargeable battery can be a wired rechargeable battery or a wireless rechargeable battery. The wired rechargeable battery is a battery charged through a wired line, and the wireless rechargeable battery is a battery charged through a wireless coil. The rechargeable battery may also be used to support fast charge technology.
In one possible implementation, computer device 1900 also includes one or more sensors 1910. The one or more sensors 1910 include, but are not limited to: acceleration sensor 1911, gyro sensor 1912, pressure sensor 1913, fingerprint sensor 1914, optical sensor 1915, and proximity sensor 1916.
The acceleration sensor 1911 may detect the magnitude of acceleration on three coordinate axes of the coordinate system established with the computer apparatus 1900. For example, the acceleration sensor 1911 may be used to detect components of the gravitational acceleration in three coordinate axes. The processor 1901 may control the display screen 1905 to display a user interface in a landscape view or a portrait view according to the gravitational acceleration signal collected by the acceleration sensor 1911. The acceleration sensor 1911 may also be used for acquisition of motion data of a game or a user.
The gyro sensor 1912 may detect a body direction and a rotation angle of the computer device 1900, and the gyro sensor 1912 may cooperate with the acceleration sensor 1911 to acquire a 3D motion of the user with respect to the computer device 1900. From the data collected by the gyro sensor 1912, the processor 1901 may implement the following functions: motion sensing (such as changing the UI according to a user's tilting operation), image stabilization at the time of photographing, game control, and inertial navigation.
Pressure sensor 1913 may be disposed on a side bezel of computer device 1900 and/or on a lower layer of display 1905. When the pressure sensor 1913 is disposed on the side frame of the computer device 1900, the user can detect a holding signal of the computer device 1900, and the processor 1901 can perform right-left hand recognition or quick operation based on the holding signal collected by the pressure sensor 1913. When the pressure sensor 1913 is disposed at a lower layer of the display 1905, the processor 1901 controls the operability control on the UI interface according to the pressure operation of the user on the display 1905. The operability control comprises at least one of a button control, a scroll bar control, an icon control and a menu control.
The fingerprint sensor 1914 is configured to collect a fingerprint of the user, and the processor 1901 identifies the user according to the fingerprint collected by the fingerprint sensor 1914, or the fingerprint sensor 1914 identifies the user according to the collected fingerprint. Upon identifying that the user's identity is a trusted identity, the processor 1901 authorizes the user to perform relevant sensitive operations including unlocking a screen, viewing encrypted information, downloading software, paying for, and changing settings, etc. Fingerprint sensor 1914 may be disposed on the front, back, or side of computer device 1900. When a physical button or vendor Logo is provided on computer device 1900, fingerprint sensor 1914 may be integrated with the physical button or vendor Logo.
The optical sensor 1915 is used to collect the ambient light intensity. In one embodiment, the processor 1901 may control the display brightness of the display screen 1905 based on the ambient light intensity collected by the optical sensor 1915. Specifically, when the ambient light intensity is high, the display brightness of the display screen 1905 is increased; when the ambient light intensity is low, the display brightness of the display screen 1905 is adjusted down. In another embodiment, the processor 1901 may also dynamically adjust the shooting parameters of the camera assembly 1906 according to the intensity of the ambient light collected by the optical sensor 1915.
Proximity sensor 1916, also known as a distance sensor, is typically disposed on the front panel of computer device 1900. Proximity sensor 1916 is used to capture the distance between the user and the front of computer device 1900. In one embodiment, the display 1905 is controlled by the processor 1901 to switch from the bright screen state to the dark screen state when the proximity sensor 1916 detects that the distance between the user and the front of the computer device 1900 is gradually decreased; when the proximity sensor 1916 detects that the distance between the user and the front of the computer device 1900 is gradually increasing, the display 1905 is controlled by the processor 1901 to switch from the breath-screen state to the bright-screen state.
Those skilled in the art will appreciate that the architecture shown in FIG. 19 is not intended to be limiting of computer device 1900 and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components may be used.
Fig. 20 is a schematic structural diagram of a computer device provided in an embodiment of the present application, where the computer device may be represented as a server. The computer device 2000 may have a relatively large difference due to different configurations or performances, and may include one or more processors (CPUs) 2001 and one or more memories 2002, wherein at least one program code is stored in the memory 2002, and the at least one program code is loaded and executed by the processors 2001 to implement the application access method provided by the above-mentioned method embodiments. Of course, the server may also have components such as a wired or wireless network interface, a keyboard, and an input/output interface, so as to perform input/output, and the server may also include other components for implementing the functions of the device, which are not described herein again.
In an exemplary embodiment, there is also provided a computer readable storage medium, such as a memory, comprising program code executable by a processor in a terminal to perform the application access method in the above embodiments. For example, the computer-readable storage medium may be a Read-Only Memory (ROM), a Random Access Memory (RAM), a Compact Disc Read-Only Memory (CD-ROM), a magnetic tape, a floppy disk, an optical data storage device, and the like.
In an exemplary embodiment, a computer program product or a computer program is also provided, which comprises computer program code stored in a computer-readable storage medium, which is read by a processor of a computer device from the computer-readable storage medium, and which is executed by the processor such that the computer device performs the above-mentioned application access method.
It will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by hardware associated with program code, and the program may be stored in a computer readable storage medium, and the above mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
The above description is only exemplary of the present application and should not be taken as limiting, as any modification, equivalent replacement, or improvement made within the spirit and principle of the present application should be included in the protection scope of the present application.

Claims (15)

1. An application access method, characterized in that the method comprises:
displaying a login prompt page of a target application, wherein the login prompt page comprises a target login option; the target login option is used for prompting the target application to be accessed by using an instant messaging account;
responding to the trigger operation of the target login option, and displaying an authorization page; the authorization page comprises a first type of authorization option matched with the target real name grade, and the first type of authorization option is used for prompting that the real name information of the user is authorized to the target application through the instant messaging application; the target real-name level corresponds to user real-name information required for accessing the target application;
and responding to the triggering operation of the first-class authorization option, acquiring user real-name information corresponding to the target real-name grade from the instant messaging application, and accessing the target application based on the user real-name information.
2. The method according to claim 1, wherein the obtaining user real-name information corresponding to the target real-name level from the instant messaging application comprises:
acquiring encrypted data transmitted to the target application by the instant messaging application;
the encrypted data is the user real name information in a ciphertext form; the encrypted data includes: the user real name information, the current time and the application identifier of the target application.
3. The method of claim 2, wherein accessing the target application based on the user real name information comprises:
sending the encrypted data to an instant messaging server;
wherein the encrypted data is used for instructing the instant messaging server to execute the following operations: responding to the encrypted data passing verification, and sending the user real name information in a plaintext form to a target server;
receiving a first notification message issued by the target server, wherein the first notification message is used for indicating that the target server has acquired the user real-name information;
the instant messaging server is a server for providing service for the instant messaging application; the target server is a server that provides a service for the target application.
4. The method of claim 2, wherein accessing the target application based on the user real name information comprises:
sending the encrypted data to an instant messaging server;
receiving the user real name information in a plaintext form sent by the instant messaging server; wherein the encrypted data is used for instructing the instant messaging server to execute the following operations: responding to the encrypted data passing verification, and returning the user real name information in a plaintext form;
sending the user real name information to the target server;
receiving a first notification message issued by the target server, wherein the first notification message is used for indicating that the target server has acquired the user real-name information;
the instant messaging server is a server for providing service for the instant messaging application; the target server is a server that provides a service for the target application.
5. The method according to claim 3 or 4, characterized in that the method further comprises:
in response to receiving the first notification message, displaying first prompt information; the first prompt message is used for prompting that the authorization is successful; or the like, or, alternatively,
receiving a second notification message issued by the instant messaging server, wherein the second notification message is used for indicating that the encrypted data is not verified; and displaying second prompt information, wherein the second prompt information is used for prompting to authorize again.
6. The method of claim 1, wherein the first type authorization option is a real-name authentication information authorization option; the real-name authentication information is user certificate information;
the obtaining, in response to the triggering operation of the first type authorization option, user real-name information corresponding to the target real-name level from the instant messaging application includes:
responding to the trigger operation of the real-name authentication information authorization option, and acquiring encrypted data transmitted to the target application by the instant messaging application; and the encrypted data is user certificate information in a ciphertext form.
7. The method of claim 1, wherein the first type authorization option is a real-name authentication information authorization option; the real-name authentication information is transaction card information;
the obtaining, in response to the triggering operation of the first type authorization option, user real-name information corresponding to the target real-name level from the instant messaging application includes:
responding to the triggering operation of the real-name authentication information authorization option, and displaying a transaction card selection page; the transaction card selection page comprises N card options, each card option is used for indicating one transaction card, and the value of N is a positive integer;
responding to the trigger operation of a target card option in the N card options, and acquiring encrypted data transmitted to the target application by the instant messaging application;
and the encrypted data is transaction card information in a ciphertext form, and the transaction card information corresponds to the transaction card indicated by the target card option.
8. The method according to claim 1, wherein the first type authorization option is a call number authorization option, and the obtaining user real-name information corresponding to the target real-name level from the instant messaging application in response to the triggering operation of the first type authorization option comprises:
responding to the triggering operation of the call number authorization option, and displaying a verification information input box;
responding to the matching of the input verification information and the verification information issued by the instant communication server, and acquiring encrypted data transmitted to the target application by the instant communication application;
the encrypted data is a first call number in a ciphertext form; the first call number is a call number bound to the instant messaging application.
9. The method according to claim 1, wherein the first type authorization option is a call number authorization option, and the obtaining user real-name information corresponding to the target real-name level from the instant messaging application in response to the triggering operation of the first type authorization option comprises:
responding to the triggering operation of the call number authorization option, and displaying a call number input box and a verification information input box;
responding to the matching of the input verification information and the verification information issued by the instant communication server, and acquiring encrypted data;
the encrypted data is a second call number in a ciphertext form; and the second call number is the call number acquired by inputting through the call number input box.
10. The method of claim 1, wherein the authorization page further includes a second type of authorization option, the method further comprising:
responding to the triggering operation of the second type authorization option, and acquiring user basic information transmitted to the target application by the instant messaging application; accessing the target application based on the user basic information;
wherein, the user basic information is the personal data of the user stored by the instant communication application.
11. The method of claim 1, wherein the authorization page further includes a second type of authorization option, the method further comprising:
responding to the triggering operation of the second type authorization option, and randomly generating user basic information; accessing the target application based on the user basic information;
wherein, the user basic information is the personal data of the user stored by the instant communication application.
12. The method of claim 1, further comprising:
calling the instant messaging application to display an authorization management page; the authorization management page comprises M information items, wherein one information item is used for showing an application identifier of an authorized application and authorized user real name information; m is a positive integer;
and canceling the authorization of the target application in response to the triggering operation of the information item where the target application is located.
13. An application access apparatus, the apparatus comprising:
the system comprises a first display module, a second display module and a third display module, wherein the first display module is configured to display a login prompt page of a target application, and the login prompt page comprises a target login option; the target login option is used for prompting the target application to be accessed by using an instant messaging account;
the second display module is configured to respond to the triggering operation of the target login option and display an authorization page; the authorization page comprises a first type of authorization option matched with the target real name grade, and the first type of authorization option is used for prompting that the real name information of the user is authorized to the target application through the instant messaging application; the target real-name level corresponds to user real-name information required for accessing the target application;
the first obtaining module is configured to respond to the triggering operation of the first type of authorization option, and obtain user real-name information corresponding to the target real-name level from the instant messaging application;
an execution module configured to access the target application based on the user real name information.
14. A computer device, characterized in that the device comprises a processor and a memory, in which at least one program code is stored, which is loaded and executed by the processor to implement the application access method according to any of claims 1 to 12.
15. A storage medium having stored therein at least one program code, which is loaded and executed by a processor to implement the application access method according to any one of claims 1 to 12.
CN202010872739.7A 2020-08-26 2020-08-26 Application access method and device, storage medium and computer equipment Active CN111970298B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010872739.7A CN111970298B (en) 2020-08-26 2020-08-26 Application access method and device, storage medium and computer equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010872739.7A CN111970298B (en) 2020-08-26 2020-08-26 Application access method and device, storage medium and computer equipment

Publications (2)

Publication Number Publication Date
CN111970298A true CN111970298A (en) 2020-11-20
CN111970298B CN111970298B (en) 2024-01-05

Family

ID=73391003

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010872739.7A Active CN111970298B (en) 2020-08-26 2020-08-26 Application access method and device, storage medium and computer equipment

Country Status (1)

Country Link
CN (1) CN111970298B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113204724A (en) * 2021-04-30 2021-08-03 北京达佳互联信息技术有限公司 Method and device for creating interactive information, electronic equipment and storage medium
CN113377647A (en) * 2021-05-27 2021-09-10 北京达佳互联信息技术有限公司 Page processing method, device, server, terminal and readable storage medium
CN113204724B (en) * 2021-04-30 2024-05-14 北京达佳互联信息技术有限公司 Method, device, electronic equipment and storage medium for creating interaction information

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014105263A1 (en) * 2012-12-28 2014-07-03 Lookout, Inc. Multi-factor authentication and comprehensive login system for client-server networks
WO2017067227A1 (en) * 2015-10-22 2017-04-27 乐视控股(北京)有限公司 Third party account number authorisation method, device, server, and system
US20180097818A1 (en) * 2016-10-03 2018-04-05 Extreme Networks, Inc. Enhanced access security gateway
WO2018103559A1 (en) * 2016-12-08 2018-06-14 阿里巴巴集团控股有限公司 Method and device for authenticating login
CN110263525A (en) * 2018-03-07 2019-09-20 杭州海康威视数字技术股份有限公司 Equipment configuration method and device
CN110417723A (en) * 2019-03-29 2019-11-05 广州腾讯科技有限公司 A kind of application login method, device, terminal and storage medium
CN110706143A (en) * 2019-09-26 2020-01-17 中电万维信息技术有限责任公司 Identity authentication method and device based on government affair service
CN110990826A (en) * 2019-12-20 2020-04-10 北京百度网讯科技有限公司 Authentication method and device for login applet
CN111062024A (en) * 2019-11-25 2020-04-24 泰康保险集团股份有限公司 Application login method and device
US10698701B1 (en) * 2019-06-01 2020-06-30 Apple Inc. User interface for accessing an account
CN111385267A (en) * 2018-12-29 2020-07-07 金联汇通信息技术有限公司 Application authorization control method and device and electronic equipment
CN111399717A (en) * 2020-03-17 2020-07-10 腾讯科技(成都)有限公司 Method, device, equipment and storage medium for publishing contents

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014105263A1 (en) * 2012-12-28 2014-07-03 Lookout, Inc. Multi-factor authentication and comprehensive login system for client-server networks
WO2017067227A1 (en) * 2015-10-22 2017-04-27 乐视控股(北京)有限公司 Third party account number authorisation method, device, server, and system
US20180097818A1 (en) * 2016-10-03 2018-04-05 Extreme Networks, Inc. Enhanced access security gateway
WO2018103559A1 (en) * 2016-12-08 2018-06-14 阿里巴巴集团控股有限公司 Method and device for authenticating login
CN110263525A (en) * 2018-03-07 2019-09-20 杭州海康威视数字技术股份有限公司 Equipment configuration method and device
CN111385267A (en) * 2018-12-29 2020-07-07 金联汇通信息技术有限公司 Application authorization control method and device and electronic equipment
CN110417723A (en) * 2019-03-29 2019-11-05 广州腾讯科技有限公司 A kind of application login method, device, terminal and storage medium
US10698701B1 (en) * 2019-06-01 2020-06-30 Apple Inc. User interface for accessing an account
CN110706143A (en) * 2019-09-26 2020-01-17 中电万维信息技术有限责任公司 Identity authentication method and device based on government affair service
CN111062024A (en) * 2019-11-25 2020-04-24 泰康保险集团股份有限公司 Application login method and device
CN110990826A (en) * 2019-12-20 2020-04-10 北京百度网讯科技有限公司 Authentication method and device for login applet
CN111399717A (en) * 2020-03-17 2020-07-10 腾讯科技(成都)有限公司 Method, device, equipment and storage medium for publishing contents

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113204724A (en) * 2021-04-30 2021-08-03 北京达佳互联信息技术有限公司 Method and device for creating interactive information, electronic equipment and storage medium
CN113204724B (en) * 2021-04-30 2024-05-14 北京达佳互联信息技术有限公司 Method, device, electronic equipment and storage medium for creating interaction information
CN113377647A (en) * 2021-05-27 2021-09-10 北京达佳互联信息技术有限公司 Page processing method, device, server, terminal and readable storage medium
CN113377647B (en) * 2021-05-27 2023-04-07 北京达佳互联信息技术有限公司 Page processing method, device, server, terminal and readable storage medium

Also Published As

Publication number Publication date
CN111970298B (en) 2024-01-05

Similar Documents

Publication Publication Date Title
WO2021120793A1 (en) Face image transmission method and apparatus, numerical value transfer method and apparatus, and electronic device
CN109547495B (en) Sensitive operation processing method, device, server, terminal and storage medium
CN111523136B (en) Authority management method, device, equipment and storage medium of application program
CN110597924B (en) Block chain-based user identification processing method, device, equipment and storage medium
CN111506884A (en) User invitation method, device, computer equipment and computer readable storage medium
CN110933113B (en) Block chain-based interactive behavior detection method, device, equipment and storage medium
CN107959727B (en) Method and device for communication between webpage and client
CN112073421B (en) Communication processing method, communication processing device, terminal and storage medium
CN112583806B (en) Resource sharing method, device, terminal, server and storage medium
CN110598386B (en) Block chain-based data processing method, device, equipment and storage medium
CN110851823B (en) Data access method, device, terminal and storage medium
CN110581831B (en) Communication method, information acquisition method, electronic device, and storage medium
CN111866140A (en) Fusion management apparatus, management system, service calling method, and medium
CN110365501B (en) Method and device for group joining processing based on graphic code
CN111970298B (en) Application access method and device, storage medium and computer equipment
CN111694892B (en) Resource transfer method, device, terminal, server and storage medium
CN110738491A (en) Numerical value transferring method, system, device, terminal and storage medium
CN110597840A (en) Partner relationship establishing method, device, equipment and storage medium based on block chain
CN114816600B (en) Session message display method, device, terminal and storage medium
CN114826799B (en) Information acquisition method, device, terminal and storage medium
CN114124405B (en) Service processing method, system, computer equipment and computer readable storage medium
CN111131619B (en) Account switching processing method, device and system
CN111277608B (en) Block chain-based security risk information management method, device, equipment and storage medium
CN114900559A (en) Management system, terminal, management method, and storage medium
CN112764824B (en) Method, device, equipment and storage medium for triggering identity verification in application program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant