CN111970298B - Application access method and device, storage medium and computer equipment - Google Patents

Application access method and device, storage medium and computer equipment Download PDF

Info

Publication number
CN111970298B
CN111970298B CN202010872739.7A CN202010872739A CN111970298B CN 111970298 B CN111970298 B CN 111970298B CN 202010872739 A CN202010872739 A CN 202010872739A CN 111970298 B CN111970298 B CN 111970298B
Authority
CN
China
Prior art keywords
application
target
user
information
instant messaging
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010872739.7A
Other languages
Chinese (zh)
Other versions
CN111970298A (en
Inventor
程冉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN202010872739.7A priority Critical patent/CN111970298B/en
Publication of CN111970298A publication Critical patent/CN111970298A/en
Application granted granted Critical
Publication of CN111970298B publication Critical patent/CN111970298B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • H04L51/046Interoperability with other network applications or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The application discloses an application access method, an application access device, a storage medium and computer equipment, and belongs to the technical field of clouds. Comprising the following steps: displaying a login prompt page of the target application, wherein the login prompt page comprises target login options; responding to the triggering operation of the target login option, and displaying an authorization page; the authorization page comprises a first type authorization option matched with the target real name level, wherein the first type authorization option is used for prompting the real name information of an authorized user to the target application through the instant messaging application; the target real name level corresponds to user real name information required by accessing the target application; and responding to the triggering operation of the first type authorization option, acquiring user real-name information corresponding to the target real-name level from the instant messaging application, and accessing the target application based on the user real-name information. The method and the device realize cross-application user real-name information sharing, not only reduce the security risk of privacy information disclosure, but also greatly reduce the operation complexity of users.

Description

Application access method and device, storage medium and computer equipment
Technical Field
The present application relates to the field of cloud technologies, and in particular, to an application access method, an application access device, a storage medium, and a computer device.
Background
The internet real-name system is a system for forcing an internet user to use internet services based on real-name information. The method aims to reduce bad information on the network and promote internet users (for short, users) to be responsible for network behaviors. In other words, the internet real name system is a network management manner based on the real name of the user, which not only protects and guides the internet user, but also prevents teenagers from being affected by network adverse factors.
Under the network management mechanism of real-name identity authentication, if a user wants to access a plurality of applications, the user is required to submit real-name information on a plurality of different application platforms respectively. For example, if the user a accesses 8 applications within a period of time, the user a is required to submit real-name information 8 times on 8 different application platforms.
However, real-name information is submitted on a plurality of different application platforms, so that on one hand, the security risk of information leakage exists, and on the other hand, the operation complexity is high because the real-name information needs to be repeatedly filled by a user.
Disclosure of Invention
The embodiment of the application provides an application access method, an application access device, a storage medium and computer equipment, which realize cross-application user real-name information sharing, reduce the security risk of privacy information disclosure and greatly reduce the operation complexity of users. The technical scheme is as follows:
In one aspect, an application access method is provided, the method including:
displaying a login prompt page of a target application, wherein the login prompt page comprises target login options; the target login option is used for prompting the user to access the target application by using the instant messaging account;
responding to the triggering operation of the target login option, and displaying an authorization page; the authorization page comprises a first type authorization option matched with a target real name level, and the first type authorization option is used for prompting the real name information of an authorized user to the target application through the instant messaging application; the target real name level corresponds to user real name information required for accessing the target application;
and responding to the triggering operation of the first type authorization option, acquiring user real name information corresponding to the target real name level from the instant messaging application, and accessing the target application based on the user real name information.
In another aspect, there is provided an application access apparatus, the apparatus comprising:
the first display module is configured to display a login prompt page of the target application, wherein the login prompt page comprises target login options; the target login option is used for prompting the user to access the target application by using the instant messaging account;
The second display module is configured to respond to the triggering operation of the target login option and display an authorization page; the authorization page comprises a first type authorization option matched with a target real name level, and the first type authorization option is used for prompting the real name information of an authorized user to the target application through the instant messaging application; the target real name level corresponds to user real name information required for accessing the target application;
the first acquisition module is configured to respond to the triggering operation of the first type authorization option and acquire the user real name information corresponding to the target real name level from the instant messaging application;
and the execution module is configured to access the target application based on the user real name information.
In one possible implementation manner, the first obtaining module is configured to:
acquiring encrypted data transmitted from the instant messaging application to the target application;
wherein the encrypted data is the user real-name information in a ciphertext form; the encrypted data includes: the user real name information, the current time and the application identification of the target application.
In one possible implementation, the execution module is configured to:
Sending the encrypted data to an instant messaging server;
the encrypted data is used for indicating the instant messaging server to execute the following operations: transmitting the user real-name information in a plaintext form to a target server in response to the encrypted data passing verification;
receiving a first notification message issued by the target server, wherein the first notification message is used for indicating that the target server has acquired the user real name information;
wherein, the instant messaging server is a server for providing service for the instant messaging application; the target server is a server that provides services for the target application.
In one possible implementation, the execution module is configured to:
sending the encrypted data to an instant messaging server;
receiving the user real-name information in a plaintext form issued by the instant messaging server; the encrypted data is used for indicating the instant messaging server to execute the following operations: responding to the encrypted data to pass verification, and returning the user real name information in a plaintext form;
transmitting the user real name information to the target server;
receiving a first notification message issued by the target server, wherein the first notification message is used for indicating that the target server has acquired the user real name information;
Wherein, the instant messaging server is a server for providing service for the instant messaging application; the target server is a server that provides services for the target application.
In one possible implementation, the apparatus further includes:
the third display module is configured to display first prompt information in response to receiving the first notification message; the first prompt message is used for prompting that the authorization is successful;
the receiving module is configured to receive a second notification message sent by the instant messaging server, wherein the second notification message is used for indicating that the encrypted data does not pass the verification;
the third display module is further configured to display second prompt information, and the second prompt information is used for prompting to re-authorize.
In one possible implementation manner, the first type of authorization option is a real-name authentication information authorization option; the real-name authentication information is user certificate information;
the first acquisition module is further configured to:
responding to the triggering operation of the real-name authentication information authorization option, and acquiring the encrypted data transmitted by the instant messaging application to the target application; the encrypted data is user certificate information in a ciphertext form.
In one possible implementation manner, the first type of authorization option is a real-name authentication information authorization option; the real-name authentication information is transaction card information;
the first acquisition module is further configured to:
responding to the triggering operation of the real-name authentication information authorization option, and displaying a transaction card selection page; the transaction card selection page comprises N card options, each card option is used for indicating one transaction card, and the value of N is a positive integer;
responding to the triggering operation of a target card option in the N card options, and acquiring encrypted data transmitted by the instant messaging application to the target application;
the encrypted data is transaction card information in a ciphertext form, and the transaction card information corresponds to the transaction card indicated by the target card option.
In one possible implementation, the first type of authorization option is a call number authorization option, and the first obtaining module is further configured to:
responding to the triggering operation of the call number authorization option, and displaying a verification information input box;
acquiring encrypted data transmitted by the instant messaging application to the target application in response to the matching of the input verification information and the verification information issued by the instant messaging server;
The encrypted data is a first call number in a ciphertext form; the first call number is a call number bound by the instant messaging application.
In one possible implementation, the first type of authorization option is a call number authorization option, and the first obtaining module is further configured to:
responding to the triggering operation of the call number authorization option, and displaying a call number input box and a verification information input box;
acquiring encrypted data in response to matching of the input verification information with the verification information issued by the instant messaging server;
wherein the encrypted data is a second telephone number in the form of ciphertext; the second call number is a call number obtained by inputting through the call number input box.
In a possible implementation manner, the authorization page further includes a second type of authorization option, and the apparatus further includes:
the second acquisition module is configured to respond to the triggering operation of the second type authorization option and acquire the user basic information transmitted by the instant messaging application to the target application;
the execution module is further configured to access the target application based on the user basic information;
The user basic information is user personal data stored in the instant messaging application.
In one possible implementation, the authorization page further includes a second type of authorization option,
the second acquisition module is further configured to respond to triggering operation of the second type of authorization options and randomly generate user basic information;
the execution module is further configured to access the target application based on the user basic information;
the user basic information is user personal data stored in the instant messaging application.
In one possible implementation, the apparatus further includes:
the fourth display module is configured to call the instant messaging application to display an authorization management page; the authorization management page comprises M information items, wherein one information item is used for displaying an application identifier of an authorized application and authorized user real name information; m is a positive integer;
and the deleting module is configured to respond to the triggering operation of the information item where the target application is located and cancel the authorization of the target application.
In another aspect, a computer device is provided, the device comprising a processor and a memory, the memory having stored therein at least one program code that is loaded and executed by the processor to implement the above-described application access method.
In another aspect, a storage medium having stored therein at least one piece of program code loaded and executed by a processor to implement the above-described application access method is provided.
In another aspect, a computer program product or a computer program is provided, the computer program product or computer program comprising computer program code stored in a computer readable storage medium, the computer program code being read from the computer readable storage medium by a processor of a computer device, the computer program code being executed by the processor, causing the computer device to perform the above-described application access method.
The beneficial effects that technical scheme that this application embodiment provided brought are:
under the network management mechanism of real-name identity authentication, if a user triggers an access application operation, the instant messaging application can share the user real-name information stored by the user to the application to be accessed in an authorized mode, so that the user can complete application login based on the shared user real-name information. In other words, the embodiment of the application can directly transmit the real-name information of the user submitted by the user in the instant messaging application to other applications across the applications, so that other applications can directly obtain the real-name information of the user corresponding to the corresponding real-name level from the instant messaging application, the trouble that the user repeatedly submits the real-name information in a plurality of application platforms is avoided, and the security risk of privacy information leakage is reduced.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic diagram of an implementation environment related to an application access method according to an embodiment of the present application;
FIG. 2 is a schematic diagram of an implementation environment involved in another method of application access provided by an embodiment of the present application;
FIG. 3 is a flowchart of an application access method provided in an embodiment of the present application;
FIG. 4 is a schematic diagram of a display page according to an embodiment of the present disclosure;
FIG. 5 is a schematic view of another display page provided in an embodiment of the present application;
FIG. 6 is a schematic diagram of another display page provided in an embodiment of the present application;
FIG. 7 is a schematic diagram of another display page according to an embodiment of the present application;
FIG. 8 is a schematic diagram of another display page provided in an embodiment of the present application;
FIG. 9 is a flowchart of another method for application access provided by an embodiment of the present application;
FIG. 10 is a schematic view of another display page provided in an embodiment of the present application;
FIG. 11 is a schematic diagram of another display page provided in an embodiment of the present application;
FIG. 12 is a flowchart of another method for application access provided by an embodiment of the present application;
FIG. 13 is a flowchart of another method for application access provided by an embodiment of the present application;
FIG. 14 is a schematic view of another display page provided in an embodiment of the present application;
FIG. 15 is a schematic view of another display page provided in an embodiment of the present application;
FIG. 16 is a schematic diagram of an overall execution flow of a product side according to an embodiment of the present disclosure;
FIG. 17 is a schematic diagram of an overall implementation procedure of a technical side provided in an embodiment of the present application;
fig. 18 is a schematic structural diagram of an application access device according to an embodiment of the present application;
FIG. 19 is a schematic diagram of a computer device according to an embodiment of the present application;
fig. 20 is a schematic structural diagram of another computer device according to an embodiment of the present application.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the present application more apparent, the embodiments of the present application will be described in further detail below with reference to the accompanying drawings.
It will be understood that the terms "first," "second," and the like, as used herein, may be used to describe various concepts, but are not limited by these terms unless otherwise specified. These terms are only used to distinguish one concept from another. Wherein at least one means one or more, for example, at least one user may be an integer number of users of one or more of any one user, two users, three users, and the like. The plurality means two or more, and for example, the plurality of users may be an integer number of two or more of any two users, three users, or the like.
The embodiment of the application provides an application access method, an application access device, a storage medium and computer equipment. The application access method relates to cloud technology.
Cloud technology (Cloud technology) refers to a hosting technology that unifies serial resources such as hardware, software, networks and the like in a wide area network or a local area network to realize calculation, storage, processing and sharing of data. The cloud technology is based on the general names of network technology, information technology, integration technology, management platform technology, application technology and the like applied by the cloud computing business mode, can form a resource pool, and is flexible and convenient as required. Cloud computing technology will become an important support. Background services of technical networking systems require a large amount of computing, storage resources, such as video websites, picture-like websites, and more portals. Along with the high development and application of the internet industry, each article possibly has an own identification mark in the future, the identification mark needs to be transmitted to a background system for logic processing, data with different levels can be processed separately, and various industry data needs strong system rear shield support and can be realized only through cloud computing.
The application access method provided by the embodiment of the application relates to Cloud Security (Cloud Security) in the field of Cloud technology. Cloud security refers to the general term of security software, hardware, users, institutions and security cloud platforms based on cloud computing business model application. Cloud security fuses emerging technologies and concepts such as parallel processing, grid computing, unknown virus behavior judgment and the like, acquires the latest information of Trojan horse and malicious programs in the Internet through abnormal monitoring of a large number of network clients on software behaviors, sends the latest information to a server for automatic analysis and processing, and distributes solutions of viruses and Trojan horse to each client.
In one possible implementation, the main directions of cloud security research include: 1. cloud computing security, namely, how to guarantee security of cloud and various applications on the cloud, including cloud computer system security, security storage and isolation of user data, user access authentication, information transmission security, network attack protection, compliance audit and the like; 2. clouding of a safety infrastructure, mainly researching how to build and integrate safety infrastructure resources by adopting cloud computing, and optimizing a safety protection mechanism, wherein the cloud computing technology is used for constructing a super-large-scale safety event and an information acquisition and processing platform, realizing acquisition and association analysis of mass information, and improving the control capability and risk control capability of the whole-network safety event; 3. cloud security services, mainly research on various security services provided for users based on cloud computing platforms, such as anti-virus services and the like.
Some terms or abbreviations referred to in the embodiments of the present application will be described first.
Instant messaging application: single or multiple people participation is supported, and a user is supported to send voice, video, pictures, characters and the like. In essence, instant messaging applications provide an information interaction platform from person to person.
The information interaction platform specifically refers to a network architecture for connecting people by social relationship and/or common interests, and users can conduct daily communication and process daily transactions through instant messaging application. Wherein each user may possess a network identity for identification by other users on the information interaction platform. In the embodiment of the invention, the network identity may also be referred to as a user identity of the user.
On the information interaction platform, different users can establish social relations through mutual confirmation, for example, friends are added to each other or people pay attention to each other. Each user maintains a chain of friend relations. When two users establish a social relationship, they become social network contacts of each other. A group of users may form a social group by self-selecting to form a social relationship with each other. Each member within the group is a social network contact for all other members within the group.
The instant messaging server: refers to a server that provides services for instant messaging applications.
Instant messaging account number: refers to a user account number used by a user to log into an instant messaging application.
User real name information: in the embodiment of the application, the user real name information may include user authentication information and a call number.
Real name authentication information: refer to the material used to confirm the true identity of the user. Illustratively, the real name authentication information includes, but is not limited to, user credentials information and transaction card information. In one possible implementation, the user credential information may be a user identification card and the transaction card information may be a bank card held by the user.
Third party application: is a pointer to related software that is developed by other organizations or individuals than the software composer, for example, to an application that is functionally deficient or vulnerable. Wherein the third party application is typically developed by an independent scientific and technological company or individual.
Third party server: refers to a server that provides services for third party applications.
The following describes an implementation environment related to an application access method provided in an embodiment of the present application.
The application access method provided by the embodiment of the application is applied to the computer equipment. The computer equipment comprises a terminal and a server.
Illustratively, referring to FIG. 1, the implementation environment includes: a terminal 101 and a server 102.
In one possible implementation, the server 102 may be a stand-alone physical server, a server cluster or a distributed system formed by a plurality of physical servers, or may be a cloud server that provides cloud services, cloud databases, cloud computing, cloud functions, cloud storage, network services, cloud communication, middleware services, domain name services, security services, content delivery networks (Content Delivery Network, CDN), and basic cloud computing services such as big data and artificial intelligence platforms. The terminal 101 may be, but is not limited to, a smart phone, a tablet computer, a notebook computer, a desktop computer, a smart speaker, a smart watch, etc. The terminal 101 and the server 102 may be directly or indirectly connected through wired or wireless communication, which is not limited herein.
In another possible implementation, referring to fig. 2, an instant messaging application 1011 and a third party application 1012 are installed on the terminal 101. The server 102 includes an instant messaging server 1021 and a third party server 1022. In the implementation environment shown in fig. 2, considering the problem that the user repeatedly submits real-name data on different application platforms, and further the high information leakage risk and the high complexity of user operation are caused, the embodiment of the application authorization login scheme based on cross-application information sharing is provided.
In the scheme, the instant messaging application can share the real-name data stored by the instant messaging application to the third party application in an authorized mode, so that the safety risk of information leakage is reduced, and the operation complexity of a user is reduced. In other words, after the user logs in the third party application by using the instant messaging account, the user does not need to submit real-name data after logging in successfully. By way of example, authorized login between applications may be implemented through OAuth protocol, which is not specifically limited in this embodiment of the present application.
The application authorization login scheme based on cross-application information sharing provided by the embodiment of the application is described in detail by the following embodiments.
Fig. 3 is a flowchart of an application access method provided in an embodiment of the present application. Referring to fig. 3, a method flow provided in an embodiment of the present application includes:
301. the terminal displays a login prompt page of the target application, wherein the login prompt page comprises target login options; the target login option is used for prompting the user to access the target application by using the instant messaging account.
In the embodiment of the application, the target application may be a third party application installed on the terminal, such as a music playing application, a video application, a live broadcast application, a game application, and the like.
In one possible implementation, the login prompt page is displayed upon user request, such as when the terminal detects that the user has clicked on an application icon of the target application.
Referring to fig. 4, the login prompt page may include: a login prompt message of "login is required to be used continuously", a registration option 401 for prompting the user to register, and a target login option 402.
The target login option 402 is used to prompt the user to access the target application using the instant messaging account, as shown in fig. 4, the content presented by the target login option 402 may be "login using the instant messaging account".
302. Responding to the triggering operation of the user on the target login option, and calling the instant messaging application to display an authorization page by the terminal; the authorization page comprises a first type authorization option matched with the target real name level, wherein the first type authorization option is used for prompting the real name information of an authorized user to the target application through the instant messaging application; the target real name level corresponds to user real name information required for accessing the target application.
In one possible implementation, the triggering operation of the target login option by the user may be: and the user clicks the target login option, namely after the user clicks the target login option, the terminal jumps to the instant messaging application from the third party application, and pops up an authorization page in the instant messaging application.
Referring to fig. 5, the authorization page may include: authorization prompt information and first type authorization options of instant messaging account login. The first type of authorization option may be a real name authentication information authorization option 501 or a call number authorization option 503. In addition, the authorization page further includes a second type of authorization option 502, and illustratively, the content presented by the second type of authorization option 502 may be "basic information of an authorized user".
As an example, invoking the instant messaging application to display the authorization page may be: the target application invokes the instant messaging application pop-up authorization page through a specific API (Application Programming Interface, application program interface).
The real name level may be divided into a real name of a call number, a real name of user certificate information, and a real name of a transaction card, which is not specifically limited in the embodiment of the present application. Illustratively, the real name level of the real name of the call number is low, the real name level of the real name of the user certificate information is medium, and the real name level of the real name of the transaction card is high.
303. And responding to the triggering operation of the user on the first type authorization option, the terminal acquires the user real name information corresponding to the target real name level from the instant messaging application, and accesses the target application based on the acquired user real name information.
In one possible implementation, the triggering operation of the first type of authorization option by the user may be: the user clicks on the "authorized real name authentication information" option 501 or the "authorized phone number" option 503 in fig. 5.
In the embodiment of the present application, obtaining real name information of a user from an instant messaging application includes: acquiring encrypted data transmitted from an instant messaging application to a target application; the encrypted data is user real-name information in a ciphertext form. As one example, the encrypted data includes: user real name information, current time and application identification of the target application. That is, the real-name information of the user shared by the instant messaging application to the target application is not in a plaintext form but is a one-way encrypted character string. Illustratively, the encryption manner adopted in the embodiment of the present application is as follows: ciphertext = original + current time + application identity of the target application. The application identifier may be an application name or an application ID, which is not specifically limited in the embodiments of the present application. The encryption mode ensures that the ciphertexts acquired by different third-party applications are different, and the ciphertexts of the same user acquired by the same application at different times are also different, so that the problem of library collision is avoided.
In one possible implementation, in response to a triggering operation of the "authorized real name authentication information" option 501 by a user, real name authentication information corresponding to the target real name level is obtained from the instant messaging application, including the following two implementations.
Authorized user credentials information
For this case, the first type of authorization option is a real-name authentication information authorization option; the real-name authentication information is user certificate information; illustratively, responding to the triggering operation of the first type authorization option, obtaining the user real name information corresponding to the target real name level from the instant messaging application comprises the following steps: responding to the triggering operation of the real-name authentication information authorization option, and acquiring the encrypted data transmitted by the instant messaging application to the target application; wherein the encrypted data is user certificate information in a ciphertext form.
In one possible implementation manner, the steps include:
303-1, responding to the triggering operation of the user on the real-name authentication information authorization option, and displaying a first selection page; wherein the first selection page comprises a first authorization option.
In one possible implementation, the triggering operation of the user on the real-name authentication information authorization option may be: the user authorizes the clicking operation of the option to the real-name authentication information. That is, after the user clicks the real-name authentication information authorization option, the terminal jumps from fig. 5 to the first selection page shown in fig. 6.
Referring to fig. 6, the first selection page may include: authorization prompt information of "authorization real name authentication information type" and a first authorization option 601. Wherein the content presented by the first authorization option 601 may be "authorized user credential information".
303-2, responding to the triggering operation of the user on the first authorization option, and acquiring the encrypted data transmitted by the instant messaging application to the target application; wherein the encrypted data is user certificate information in a ciphertext form.
If the user triggers the "authorized user certificate information" option 601, the target application will acquire the encrypted data transmitted from the instant messaging application to the target application; wherein the encrypted data is user certificate information in a ciphertext form. After the target application obtains the user certificate information in the ciphertext form, the target application can allow the user to log in accordingly. At this point, the terminal may jump back to the target application and display the authorization success page as shown in fig. 7.
Authorizing transaction card information
For this case, the first type of authorization option is a real-name authentication information authorization option; the real-name authentication information is transaction card information; illustratively, responding to the triggering operation of the first type authorization option, obtaining the user real name information corresponding to the target real name level from the instant messaging application comprises the following steps: responding to the triggering operation of the real-name authentication information authorization option, and displaying a transaction card selection page; the transaction card selection page comprises N card options, wherein each card option is used for indicating one transaction card; responding to the triggering operation of the target card option in the N card options, and acquiring the encrypted data transmitted from the instant messaging application to the target application; the encrypted data is transaction card information in a ciphertext form, and the transaction card information corresponds to the transaction card indicated by the target card option.
In one possible implementation manner, the steps include:
303-3, displaying a first selection page in response to a triggering operation of the second authorization option; wherein the first selection page also comprises a second authorization option.
As shown in fig. 6, a second authorization option 602 is also included in the first selection page. Wherein the content presented by the second authorization option 602 may be "authorized transaction card information".
303-4, displaying a transaction card selection page in response to a user triggering operation of the second authorization option.
The transaction card selection page comprises N card options, each card option is used for indicating one transaction card, and the value of N is a positive integer. The value of N may be, for example, not only the total number of transaction cards bound by the user in the instant messaging application, but also the number of partial transaction cards bound, which is not specifically limited in the embodiment of the present application. As shown in fig. 8, two card options are shown on the transaction card selection page, an option 801 indicating transaction card 1 and an option 802 indicating transaction card 2, respectively.
303-5, responding to the triggering operation of a target card option in the N card options, and acquiring encrypted data transmitted by the instant messaging application to the target application; the encrypted data is transaction card information in the form of ciphertext, and the transaction card information corresponds to the transaction card indicated by the target card option.
The number of the target card options can be one or a plurality of, and accordingly, the acquired transaction card information can indicate one transaction card or a plurality of transaction cards. After the target application obtains the transaction card information in the ciphertext form, the target application can allow the user to log in accordingly. At this point, the terminal may jump back to the target application and display the authorization success page as shown in fig. 7.
Authorized call number
For this manner, the first type of authorization option is a call number authorization option, and the step of acquiring user real name information corresponding to the target real name level from the instant messaging application in response to a triggering operation on the first type of authorization option includes:
901. responding to the triggering operation of the user on the call number authorization option, and displaying a second selection page by the terminal; the second selection page comprises a third authorization option and a fourth authorization option.
In one possible implementation, the triggering operation of the call number authorization option by the user may be: the user clicks on the "authorized phone number" option 503 in fig. 5. I.e. after the user clicks the "authorized talk number" option 503, the terminal jumps from fig. 5 to the second selection page shown in fig. 10.
Referring to fig. 10, the second selection page may include: authorization prompt information of "authorized phone number type", a third authorization option 1001, and a fourth authorization option 1002. Illustratively, the content presented by the third authorization option 1001 may be "authorize the instant messaging application-bound phone number", and the content presented by the fourth authorization option 1002 may be "authorize the new phone number".
In the embodiment of the application, the user can select the call number which authorizes the binding of the instant messaging application, and can also select to add a new call number. Whichever authorization type is selected, the party may be authorized to the target application after the short message authentication is required. In other words, the instant messaging application can be authorized to the target application only by the call number verified by the short message.
902. And responding to the triggering operation of the user on the third authorization option, and displaying a verification information input box by the terminal.
In one possible implementation, if the user performs a click operation on the "authorized instant messenger application bound phone number" option 1001 in fig. 10, the terminal displays a verification page as shown in fig. 11, which includes a verification information input box 1101 thereon.
903. Responding to the matching of the verification information input by the user and the verification information issued by the instant messaging server, and acquiring the encrypted data transmitted from the instant messaging application to the target application by the terminal; the encrypted data is a first call number in a ciphertext form; the first call number is a call number bound by the instant messaging application.
904. And responding to the triggering operation of the user on the fourth authorization option, and displaying a call number input box and a verification information input box by the terminal.
In one possible implementation, if the user performs a click operation on the "authorize new phone number" option 1002 in fig. 10, the terminal displays a verification page including a phone number input box and a verification information input box thereon.
905. Responding to the matching of the verification information input by the user and the verification information issued by the instant messaging server, and acquiring encrypted data by the terminal; the encrypted data is a second session number in the form of ciphertext; the second call number is the user input call number obtained by the terminal through the call number input box input.
According to the method provided by the embodiment of the application, under the network management mechanism of real-name identity authentication, if the user triggers the access application operation, the instant messaging application can share the user real-name information stored by the user to the application to be accessed in an authorized mode, so that the user can complete application login based on the shared user real-name information. In other words, the embodiment of the application can directly transmit the real-name information of the user submitted by the user in the instant messaging application to other applications across the applications, so that other applications can directly obtain the real-name information of the user corresponding to the corresponding real-name level from the instant messaging application, the trouble that the user repeatedly submits the real-name information in a plurality of application platforms is avoided, and the security risk of privacy information leakage is reduced.
In another embodiment, after the target application (third party application) obtains the user real-name information transferred from the instant messaging application to the target application, if the user real-name information needs to be used, verification needs to be performed to the instant messaging server. In another expression mode, after the third party application obtains the user real-name information in the ciphertext form, when the user real-name information is submitted to the target server (the third party server), the third party application also needs to obtain the plaintext by virtue of the ciphertext to the instant messaging server.
Referring to fig. 12, the "accessing the target application based on the user real name information" in the above step 303 includes:
303-6, the terminal sends the encrypted data to the instant messaging server.
The encrypted data is user real-name information in a ciphertext form. This step may be, for example, the terminal-installed target application sending the encrypted data to the instant messaging server.
303-7, after receiving the encrypted data, the instant messaging server verifies the encrypted data; and transmitting the user real name information in a plaintext form to the target server in response to the encrypted data passing the verification.
In the embodiment of the application, the encrypted data is verified, namely whether the user authentication information in the ciphertext form is valid or not is verified. Illustratively, when the encrypted data is verified, it may be verified whether the encrypted data corresponds to a legitimate user registered in the instant messaging application; and if the encrypted data corresponds to a legal user registered in the instant messaging application, determining that the encrypted data passes verification. Or, the encrypted data can be decrypted, and whether the plaintext obtained after decryption is consistent with the stored real name information of the corresponding user or not is verified; if so, it is determined that the encrypted data passes the verification.
303-8, the target server transmits a first notification message to the terminal after receiving the user real name information.
303-9, the terminal responds to the received first notification message and displays first prompt information; the first notification message is used for indicating that the target server has acquired real name information of the user; the first prompt message is used for prompting that the authorization is successful.
The first prompt information may be a word of "authorization success" shown in fig. 7, which is not specifically limited in the embodiment of the present application.
303-10, the terminal receives a second notification message issued by the instant messaging server, wherein the second notification message is used for indicating that the encrypted data fails to pass the verification; the terminal displays second prompt information, and the second prompt information is used for prompting to re-authorize.
Aiming at the step, if the encrypted data sent by the terminal to the instant messaging server fails to pass the verification, the terminal prompts the user to execute the authorization process again.
In one possible implementation manner, the instant messaging server may send the real name information of the user directly to the target server, and return the real name information of the user to the terminal, and the terminal submits the real name information of the user to the target server. That is, the above-described steps 303-7 and 303-8 may be replaced with:
303-11, after receiving the encrypted data, the instant messaging server verifies the encrypted data; and transmitting the user real-name information in a plaintext form to the terminal in response to the encrypted data passing the verification.
303-12, after receiving the user real name information issued by the instant messaging server, sending the user real name information to the target server.
According to the method provided by the embodiment of the application, under the network management mechanism of real-name identity authentication, if the user triggers the access application operation, the instant messaging application can share the user real-name information stored by the user to the application to be accessed in an authorized mode, so that the user can complete application login based on the shared user real-name information. In other words, the embodiment of the application can directly transmit the real-name information of the user submitted by the user in the instant messaging application to other applications across the applications, so that other applications can directly obtain the real-name information of the user corresponding to the corresponding real-name level from the instant messaging application, the trouble that the user repeatedly submits the real-name information in a plurality of application platforms is avoided, and the security risk of privacy information leakage is reduced.
In another embodiment, referring to fig. 5, the authorization page further includes: "second type authorization option 502. As shown in fig. 5, the second type of authorization option 502 presents content that may be "authorized user basic information". Wherein, the user basic information may include at least one of the following: head portraits, gender, region, nickname, openid, etc., to which embodiments of the present application are not specifically limited.
It should be noted that, for different third party applications, user information required for a user to log in to the third party application may be different. For example, some third party applications need to obtain user basic information to realize login access, such as an audio playing application; while some third party applications require access to the user's real name information to enable login access, such as gaming applications. For example, for different requirements of different third party applications on the authorization type, only an authorization type option matching with the application to be accessed currently may be displayed on the authorization page, for example, only an "authorized phone number" option 503 is displayed, which is not limited in detail in the embodiment of the present application.
In one possible implementation, assuming that the user triggers the second type of authorization option 502 in the authorization page, as shown in fig. 13, the method provided in the embodiment of the present application further includes:
1301. responding to the triggering operation of the user on the second type authorization option, and displaying a third selection page by the terminal; the third selection page comprises a fifth authorization option and a sixth authorization option.
In one possible implementation, the triggering operation of the second type of authorization option by the user may be: a user clicks on the "authorized user basic information" option 502 in fig. 5. I.e. after the user clicks on the second type of authorization option, the terminal jumps from fig. 5 to the third selection page shown in fig. 14.
Referring to fig. 14, the third selection page may include: authorization prompt information of "authorized user basic information type", a fifth authorization option 1401, and a sixth authorization option 1402. Illustratively, the content presented by the fifth authorization option 1401 may be an "authorization real avatar", and the content presented by the sixth authorization option 1402 may be an "authorization random avatar".
1302. Responding to the triggering operation of the user on the fifth authorization option, and acquiring user basic information transmitted by the instant messaging application to the target application by the terminal; and accessing the target application based on the acquired user basic information.
After the target application obtains the user basic information transferred from the instant messaging application to the target application, the target application can directly submit the user basic information to the target server. For example, the target server may issue a first notification message to the terminal after receiving the user basic information. The terminal responds to the first notification message and displays first prompt information; the first notification message is used for indicating that the target server has acquired the user basic information; the first prompt message is used for prompting that the authorization is successful.
1303. Responding to the triggering operation of the user on the sixth authorization option, and randomly generating user basic information by the terminal; the target application is accessed based on the randomly generated user basic information.
For example, if the user triggers the sixth authorization option, the instant messaging application may randomly generate user basic information and pass it to the target application. Furthermore, after the target application obtains the user basic information transferred from the instant messaging application to the target application, the target application can directly submit the user basic information to the target server so as to realize user login.
In the embodiment of the application, the instant messaging application can share the real user basic information or the random user basic information to the third party application in an authorization mode, so that the diversity of the authorization mode is realized. In addition, the risk of leakage of real data of the user is reduced.
In another embodiment, the user may view the list of authorized third party applications in the instant messaging application and may delete any one of the third party applications in the list of third party applications by performing an operation to cancel the authorization of the third party application. That is, the method provided by the embodiment of the application further includes: the terminal calls an instant messaging application to display an authorization management page; illustratively, as shown in fig. 15, the authorization management page includes M information entries, one for showing an application identifier of an authorized application and authorized user real name information.
And responding to the triggering operation of the user on the information item of the target application, namely the communication application cancels the authorization of the target application. Illustratively, the triggering operation of the target application by the user may be: the user performs long-press operation on the information item where the target application is located; or, the user clicks on the delete option matched with the target application, which is not specifically limited in the embodiment of the present application. In addition, the application identifier may be an application name of the third party application.
The overall execution flow of the application authorization login scheme based on cross-application information sharing provided in the embodiment of the present application is described below through fig. 16 and 17.
In one possible implementation, referring to fig. 16, the execution flow includes:
1601. the third party application triggers an authorization process based on the user's access request.
1602. The third party application invokes the instant messaging application pop-up authorization page to enable the user to select an authorization type within the instant messaging application.
1603. If the user selects the authorized phone number, then the following step 1607 is performed.
1604. If the user selects the authorization header, the following step 1608 is performed.
1605. If the user selects authorized user credential information, then step 1611, described below, is performed.
1606. If the user selects the authorization transaction card information, then step 1612, described below, is performed.
1607. The instant messaging application communicates the encrypted data and the authorization type to the third party application. The data details received by the third party application are as follows: authorization type-real name of call number; encrypted data-encrypted call number.
1608. The instant messaging application judges whether the user authorizes the real head portrait to the third party application; if so, then step 1609 is performed; if not, step 1610 is executed.
1609. The instant messaging application communicates the unencrypted data and the authorization type to the third party application. The data details received by the third party application are as follows: logging in an authorization type-openid account; data-real head portrait picture.
1610. The instant messaging application communicates the unencrypted data and the authorization type to the third party application. The data details received by the third party application are as follows: logging in an authorization type-openid account; data-random head portrait pictures.
1611. The instant messaging application communicates the encrypted data and the authorization type to the third party application. The data details received by the third party application are as follows: authorization type-user credentials real name; encrypted data-encrypted user credentials information.
1612. The instant messaging application communicates the encrypted data and the authorization type to the third party application. The data details received by the third party application are as follows: authorization type-transaction card real name; encrypted data-encrypted transaction card information.
It should be noted that, for the call number, the user certificate information and the transaction card information, the instant messaging application transmits the encrypted information to the third party application, that is, the third party application receives the authorization type+the encrypted information. In addition, after the third party application obtains the encrypted information, when the third party application submits the user real-name information to the third party server, the user real-name information in a plaintext form needs to be obtained from the encrypted information to the instant messaging server.
Referring to fig. 17, the interaction flow is as follows:
1701. user access to third party applications requires user real name information.
1702. And the third party application forwards the ciphertext to the instant communication server.
1703. The instant messaging server verifies whether the ciphertext is valid.
1704. And if the ciphertext is valid, the instant communication server directly sends the real-name information of the user to the third-party server.
1705. And the third party application receives a confirmation result fed back by the third party server after the third party server acquires the real name information of the user.
1706. If the ciphertext is valid, the instant messaging server returns a notification message to the third party application that requires re-authorization by the user.
According to the method provided by the embodiment of the application, under the network management mechanism of real-name identity authentication, if the user triggers the access application operation, the instant messaging application can share the user real-name information stored by the user to the application to be accessed in an authorized mode, so that the user can complete application login based on the shared user real-name information. In other words, the embodiment of the application can directly transmit the real-name information of the user submitted by the user in the instant messaging application to other applications in a transparent way, so that the trouble that the user repeatedly submits the real-name information is avoided, and the security risk of privacy information disclosure is reduced.
Fig. 18 is a schematic structural diagram of an application access device according to an embodiment of the present application. Referring to fig. 18, the apparatus includes:
a first display module 1801 configured to display a login prompt page of the target application, where the login prompt page includes a target login option; the target login option is used for prompting the user to access the target application by using the instant messaging account;
a second display module 1802 configured to display an authorization page in response to a trigger operation on the target login option; the authorization page comprises a first type authorization option matched with a target real name level, and the first type authorization option is used for prompting the real name information of an authorized user to the target application through the instant messaging application; the target real name level corresponds to user real name information required for accessing the target application;
A first obtaining module 1803, configured to obtain, in response to a triggering operation on the first type authorization option, user real name information corresponding to the target real name level from the instant messaging application;
an execution module 1804 is configured to access the target application based on the user real name information.
According to the device provided by the embodiment of the application, under the network management mechanism of real-name identity authentication, if the user triggers the access application operation, the instant messaging application can share the user real-name information stored by the user to the application to be accessed in an authorized mode, so that the user can complete application login based on the shared user real-name information. In other words, the embodiment of the application can directly transmit the real-name information of the user submitted by the user in the instant messaging application to other applications across the applications, so that other applications can directly obtain the real-name information of the user corresponding to the corresponding real-name level from the instant messaging application, the trouble that the user repeatedly submits the real-name information in a plurality of application platforms is avoided, and the security risk of privacy information leakage is reduced.
In one possible implementation manner, the first obtaining module is configured to:
Acquiring encrypted data transmitted from the instant messaging application to the target application;
wherein the encrypted data is the user real-name information in a ciphertext form; the encrypted data includes: the user real name information, the current time and the application identification of the target application.
In one possible implementation, the execution module is configured to:
sending the encrypted data to an instant messaging server;
the encrypted data is used for indicating the instant messaging server to execute the following operations: transmitting the user real-name information in a plaintext form to a target server in response to the encrypted data passing verification;
receiving a first notification message issued by the target server, wherein the first notification message is used for indicating that the target server has acquired the user real name information;
wherein, the instant messaging server is a server for providing service for the instant messaging application; the target server is a server that provides services for the target application.
In one possible implementation, the execution module is configured to:
sending the encrypted data to an instant messaging server;
receiving the user real-name information in a plaintext form issued by the instant messaging server; the encrypted data is used for indicating the instant messaging server to execute the following operations: responding to the encrypted data to pass verification, and returning the user real name information in a plaintext form;
Transmitting the user real name information to the target server;
receiving a first notification message issued by the target server, wherein the first notification message is used for indicating that the target server has acquired the user real name information;
wherein, the instant messaging server is a server for providing service for the instant messaging application; the target server is a server that provides services for the target application.
In one possible implementation, the apparatus further includes:
the third display module is configured to display first prompt information in response to receiving the first notification message; the first prompt message is used for prompting that the authorization is successful;
the receiving module is configured to receive a second notification message sent by the instant messaging server, wherein the second notification message is used for indicating that the encrypted data does not pass the verification;
the third display module is further configured to display second prompt information, and the second prompt information is used for prompting to re-authorize.
In one possible implementation manner, the first type of authorization option is a real-name authentication information authorization option; the real-name authentication information is user certificate information;
The first acquisition module is further configured to:
responding to the triggering operation of the real-name authentication information authorization option, and acquiring the encrypted data transmitted by the instant messaging application to the target application; the encrypted data is user certificate information in a ciphertext form.
In one possible implementation manner, the first type of authorization option is a real-name authentication information authorization option; the real-name authentication information is transaction card information;
the first acquisition module is further configured to:
responding to the triggering operation of the real-name authentication information authorization option, and displaying a transaction card selection page; the transaction card selection page comprises N card options, each card option is used for indicating one transaction card, and the value of N is a positive integer;
responding to the triggering operation of a target card option in the N card options, and acquiring encrypted data transmitted by the instant messaging application to the target application;
the encrypted data is transaction card information in a ciphertext form, and the transaction card information corresponds to the transaction card indicated by the target card option.
In one possible implementation, the first type of authorization option is a call number authorization option, and the first obtaining module is further configured to:
Responding to the triggering operation of the call number authorization option, and displaying a verification information input box;
acquiring encrypted data transmitted by the instant messaging application to the target application in response to the matching of the input verification information and the verification information issued by the instant messaging server;
the encrypted data is a first call number in a ciphertext form; the first call number is a call number bound by the instant messaging application.
In one possible implementation, the first type of authorization option is a call number authorization option, and the first obtaining module is further configured to:
responding to the triggering operation of the call number authorization option, and displaying a call number input box and a verification information input box;
acquiring encrypted data in response to matching of the input verification information with the verification information issued by the instant messaging server;
wherein the encrypted data is a second telephone number in the form of ciphertext; the second call number is a call number obtained by inputting through the call number input box.
In a possible implementation manner, the authorization page further includes a second type of authorization option, and the apparatus further includes:
The second acquisition module is configured to respond to the triggering operation of the second type authorization option and acquire the user basic information transmitted by the instant messaging application to the target application;
the execution module is further configured to access the target application based on the user basic information;
the user basic information is user personal data stored in the instant messaging application.
In a possible implementation manner, the authorization page further includes a second type of authorization option, and the second acquisition module is further configured to randomly generate user basic information in response to a triggering operation on the second type of authorization option;
the execution module is further configured to access the target application based on the user basic information;
the user basic information is user personal data stored in the instant messaging application.
In one possible implementation, the apparatus further includes:
the fourth display module is configured to call the instant messaging application to display an authorization management page; the authorization management page comprises M information items, wherein one information item is used for displaying an application identifier of an authorized application and authorized user real name information; m is a positive integer;
And the deleting module is configured to respond to the triggering operation of the information item where the target application is located and cancel the authorization of the target application.
Any combination of the above-mentioned optional solutions may be adopted to form an optional embodiment of the present disclosure, which is not described herein in detail.
It should be noted that: in the application accessing device provided in the above embodiment, when accessing an application, only the division of the above functional modules is used as an example, in practical application, the above functional allocation may be performed by different functional modules according to needs, that is, the internal structure of the device is divided into different functional modules, so as to perform all or part of the functions described above. In addition, the application access device and the application access method provided in the foregoing embodiments belong to the same concept, and specific implementation processes of the application access device and the application access method are detailed in the method embodiments, which are not repeated herein.
Fig. 19 shows a block diagram of a computer device 1900 according to an exemplary embodiment of the present application. The computer device 1900 may be a portable mobile terminal such as: a smart phone, a tablet computer, an MP3 player (Moving Picture Experts Group Audio Layer III, motion picture expert compression standard audio plane 3), an MP4 (Moving Picture Experts Group Audio Layer IV, motion picture expert compression standard audio plane 4) player, a notebook computer, or a desktop computer. Computer device 1900 may also be referred to as a user device, portable terminal, laptop terminal, desktop terminal, or the like.
Generally, the computer device 1900 includes: a processor 1901 and a memory 1902.
Processor 1901 may include one or more processing cores, such as a 4-core processor, an 8-core processor, and the like. The processor 1901 may be implemented in at least one hardware form of DSP (Digital Signal Processing ), FPGA (Field-Programmable Gate Array, field programmable gate array), PLA (Programmable Logic Array ). The processor 1901 may also include a main processor, which is a processor for processing data in the awake state, also called a CPU (Central Processing Unit ), and a coprocessor; a coprocessor is a low-power processor for processing data in a standby state. In one possible implementation, the processor 1901 may be integrated with a GPU (Graphics Processing Unit, image processor) for taking care of rendering and rendering of content that the display screen is required to display. In some embodiments, the processor 1901 may also include an AI (Artificial Intelligence ) processor for processing computing operations related to machine learning.
Memory 1902 may include one or more computer-readable storage media, which may be non-transitory. Memory 1902 may also include high-speed random access memory, as well as non-volatile memory, such as one or more magnetic disk storage devices, flash memory storage devices. In one possible implementation, a non-transitory computer readable storage medium in memory 1902 is used to store at least one program code for execution by processor 1901 to implement the application access methods provided by the method embodiments in the present application.
In one possible implementation, the computer device 1900 may optionally further include: a peripheral interface 1903 and at least one peripheral. The processor 1901, memory 1902, and peripheral interface 1903 may be connected by a bus or signal line. The individual peripheral devices may be connected to the peripheral device interface 1903 via buses, signal lines, or circuit boards. Specifically, the peripheral device includes: at least one of radio frequency circuitry 1904, display 1905, camera assembly 1906, audio circuitry 1907, positioning assembly 1908, and power supply 1909.
Peripheral interface 1903 may be used to connect at least one Input/Output (I/O) related peripheral to processor 1901 and memory 1902. In one possible implementation, the processor 1901, memory 1902, and peripheral interface 1903 are integrated on the same chip or circuit board; in some other embodiments, either or both of the processor 1901, memory 1902, and peripheral interface 1903 may be implemented on separate chips or circuit boards, which is not limited in this embodiment.
The Radio Frequency circuit 1904 is configured to receive and transmit RF (Radio Frequency) signals, also referred to as electromagnetic signals. The radio frequency circuit 1904 communicates with a communication network and other communication devices via electromagnetic signals. The radio frequency circuit 1904 converts an electrical signal into an electromagnetic signal for transmission, or converts a received electromagnetic signal into an electrical signal. Optionally, the radio frequency circuit 1904 includes: antenna systems, RF transceivers, one or more amplifiers, tuners, oscillators, digital signal processors, codec chipsets, subscriber identity module cards, and so forth. The radio frequency circuit 1904 may communicate with other terminals via at least one wireless communication protocol. The wireless communication protocol includes, but is not limited to: the world wide web, metropolitan area networks, intranets, generation mobile communication networks (2G, 3G, 4G, and 5G), wireless local area networks, and/or WiFi (Wireless Fidelity ) networks. In one possible implementation, the radio frequency circuit 1904 may also include NFC (Near Field Communication ) related circuits, which are not limited in this application.
The display 1905 is used to display a UI (User Interface). The UI may include graphics, text, icons, video, and any combination thereof. When display 1905 is a touch display, display 1905 also has the ability to collect touch signals at or above the surface of display 1905. The touch signal may be input as a control signal to the processor 1901 for processing. At this point, the display 1905 may also be used to provide virtual buttons and/or a virtual keyboard, also referred to as soft buttons and/or a soft keyboard. In one possible implementation, the display 1905 may be one, disposed on a front panel of the computer device 1900; in other embodiments, the display 1905 may be at least two, each disposed on a different surface of the computer device 1900 or in a folded configuration; in other embodiments, display 1905 may be a flexible display disposed on a curved surface or a folded surface of computer device 1900. Even more, the display screen 1905 may be arranged in a non-rectangular irregular pattern, i.e., a shaped screen. The display 1905 may be made of LCD (Liquid Crystal Display ), OLED (Organic Light-Emitting Diode), or other materials.
The camera assembly 1906 is used to capture images or video. Optionally, camera assembly 1906 includes a front camera and a rear camera. Typically, the front camera is disposed on the front panel of the terminal and the rear camera is disposed on the rear surface of the terminal. In one possible implementation manner, the number of the rear cameras is at least two, and the rear cameras are any one of a main camera, a depth camera, a wide-angle camera and a tele camera respectively, so that the main camera and the depth camera are fused to realize a background blurring function, the main camera and the wide-angle camera are fused to realize a panoramic shooting function and a Virtual Reality (VR) shooting function or other fusion shooting functions. In one possible implementation, the camera assembly 1906 may also include a flash. The flash lamp can be a single-color temperature flash lamp or a double-color temperature flash lamp. The dual-color temperature flash lamp refers to a combination of a warm light flash lamp and a cold light flash lamp, and can be used for light compensation under different color temperatures.
The audio circuit 1907 may include a microphone and a speaker. The microphone is used for collecting sound waves of a user and the environment, converting the sound waves into electric signals, inputting the electric signals to the processor 1901 for processing, or inputting the electric signals to the radio frequency circuit 1904 for realizing voice communication. For purposes of stereo acquisition or noise reduction, multiple microphones may be provided at different locations of computer device 1900, respectively. The microphone may also be an array microphone or an omni-directional pickup microphone. The speaker is used to convert electrical signals from the processor 1901 or the radio frequency circuit 1904 into sound waves. The speaker may be a conventional thin film speaker or a piezoelectric ceramic speaker. When the speaker is a piezoelectric ceramic speaker, not only the electric signal can be converted into a sound wave audible to humans, but also the electric signal can be converted into a sound wave inaudible to humans for ranging and other purposes. In one possible implementation, the audio circuit 1907 may also include a headphone jack.
The location component 1908 is used to locate the current geographic location of the computer device 1900 for navigation or LBS (Location Based Service), a location-based service. The positioning component 1908 may be a positioning component based on the united states GPS (Global Positioning System ), the beidou system of china, or the galileo system of russia.
A power supply 1909 is used to power the various components in the computer device 1900. The power supply 1909 may be an alternating current, a direct current, a disposable battery, or a rechargeable battery. When the power supply 1909 includes a rechargeable battery, the rechargeable battery may be a wired rechargeable battery or a wireless rechargeable battery. The wired rechargeable battery is a battery charged through a wired line, and the wireless rechargeable battery is a battery charged through a wireless coil. The rechargeable battery may also be used to support fast charge technology.
In one possible implementation, computer device 1900 also includes one or more sensors 1910. The one or more sensors 1910 include, but are not limited to: acceleration sensor 1911, gyroscope sensor 1912, pressure sensor 1913, fingerprint sensor 1914, optical sensor 1915, and proximity sensor 1916.
Acceleration sensor 1911 may detect the magnitude of acceleration on three coordinate axes of a coordinate system established with computer device 1900. For example, the acceleration sensor 1911 may be used to detect components of gravitational acceleration in three coordinate axes. The processor 1901 may control the display screen 1905 to display a user interface in either a landscape view or a portrait view based on gravitational acceleration signals acquired by the acceleration sensor 1911. Acceleration sensor 1911 may also be used for the acquisition of motion data of a game or user.
The gyro sensor 1912 may detect the body direction and the rotation angle of the computer device 1900, and the gyro sensor 1912 may cooperate with the acceleration sensor 1911 to collect 3D actions of the user on the computer device 1900. The processor 1901 may implement the following functions based on the data collected by the gyro sensor 1912: motion sensing (e.g., changing UI according to a tilting operation by a user), image stabilization at shooting, game control, and inertial navigation.
Pressure sensor 1913 may be disposed on a side border of computer device 1900 and/or on an underlying layer of display 1905. When the pressure sensor 1913 is disposed on a side frame of the computer device 1900, a user's grip signal on the computer device 1900 may be detected, and the processor 1901 may perform left-right hand recognition or shortcut operation based on the grip signal collected by the pressure sensor 1913. When the pressure sensor 1913 is disposed at the lower layer of the display screen 1905, the processor 1901 controls the operability control on the UI interface according to the pressure operation of the user on the display screen 1905. The operability controls include at least one of a button control, a scroll bar control, an icon control, and a menu control.
The fingerprint sensor 1914 is used to collect a fingerprint of the user, and the processor 1901 identifies the identity of the user based on the fingerprint collected by the fingerprint sensor 1914, or identifies the identity of the user based on the collected fingerprint by the fingerprint sensor 1914. Upon recognizing that the user's identity is a trusted identity, the processor 1901 authorizes the user to perform relevant sensitive operations including unlocking the screen, viewing encrypted information, downloading software, paying for and changing settings, and the like. The fingerprint sensor 1914 may be disposed on the front, back, or side of the computer device 1900. When a physical key or vendor Logo is provided on the computer device 1900, the fingerprint sensor 1914 may be integrated with the physical key or vendor Logo.
The optical sensor 1915 is used to collect ambient light intensity. In one embodiment, the processor 1901 may control the display brightness of the display screen 1905 based on ambient light intensity collected by the optical sensor 1915. Specifically, when the intensity of the ambient light is high, the display luminance of the display screen 1905 is turned high; when the ambient light intensity is low, the display brightness of the display screen 1905 is turned down. In another embodiment, the processor 1901 may also dynamically adjust the shooting parameters of the camera assembly 1906 based on the ambient light intensity collected by the optical sensor 1915.
A proximity sensor 1916, also referred to as a distance sensor, is typically provided on the front panel of the computer device 1900. The proximity sensor 1916 is used to capture the distance between the user and the front of the computer device 1900. In one embodiment, when the proximity sensor 1916 detects a gradual decrease in the distance between the user and the front of the computer device 1900, the processor 1901 controls the display 1905 to switch from the bright screen state to the off screen state; when the proximity sensor 1916 detects that the distance between the user and the front of the computer device 1900 gradually increases, the processor 1901 controls the display 1905 to switch from the off-screen state to the on-screen state.
Those skilled in the art will appreciate that the architecture shown in fig. 19 is not limiting and that more or fewer components than shown may be included or that certain components may be combined or that a different arrangement of components may be employed.
Fig. 20 is a schematic structural diagram of a computer device provided in an embodiment of the present application, where the computer device may be represented as a server. The computer device 2000 may vary widely depending on configuration or performance, and may include one or more processors (Central Processing Units, CPU) 2001 and one or more memories 2002, where the memories 2002 store at least one program code that is loaded and executed by the processors 2001 to implement the application access methods provided by the various method embodiments described above. Of course, the server may also have a wired or wireless network interface, a keyboard, an input/output interface, and other components for implementing the functions of the device, which are not described herein.
In an exemplary embodiment, a computer readable storage medium, e.g. a memory comprising program code executable by a processor in a terminal to perform the application access method of the above embodiments is also provided. For example, the computer readable storage medium may be Read-Only Memory (ROM), random-access Memory (Random Access Memory, RAM), compact disc Read-Only Memory (Compact Disc Read-Only Memory, CD-ROM), magnetic tape, floppy disk, optical data storage device, and the like.
In an exemplary embodiment, a computer program product or a computer program is also provided, the computer program product or computer program comprising computer program code stored in a computer readable storage medium, the computer program code being read from the computer readable storage medium by a processor of a computer device, the computer program code being executed by the processor, causing the computer device to perform the above-mentioned application access method.
It will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by program code related hardware, where the program may be stored in a computer readable storage medium, and the above storage medium may be a read only memory, a magnetic disk or an optical disk, etc.
The foregoing description of the preferred embodiments is merely exemplary in nature and is in no way intended to limit the invention, since it is intended that all modifications, equivalents, improvements, etc. that fall within the spirit and scope of the invention.

Claims (15)

1. An application access method, the method comprising:
displaying a login prompt page of a target application, wherein the login prompt page comprises target login options; the target login option is used for prompting the user to access the target application by using the instant messaging account;
responding to the triggering operation of the target login option, and displaying an authorization page; the authorization page comprises a first type authorization option matched with a target real name level, and the first type authorization option is used for prompting the real name information of an authorized user to the target application through the instant messaging application; the target real name level corresponds to user real name information required for accessing the target application;
and responding to the triggering operation of the first type authorization option, acquiring user real name information corresponding to the target real name level from the instant messaging application, and accessing the target application based on the user real name information.
2. The method of claim 1, wherein the obtaining, from the instant messaging application, the user real name information corresponding to the target real name level comprises:
acquiring encrypted data transmitted from the instant messaging application to the target application;
wherein the encrypted data is the user real-name information in a ciphertext form; the encrypted data includes: the user real name information, the current time and the application identification of the target application.
3. The method of claim 2, wherein accessing the target application based on the user real name information comprises:
sending the encrypted data to an instant messaging server;
the encrypted data is used for indicating the instant messaging server to execute the following operations: transmitting the user real-name information in a plaintext form to a target server in response to the encrypted data passing verification;
receiving a first notification message issued by the target server, wherein the first notification message is used for indicating that the target server has acquired the user real name information;
wherein, the instant messaging server is a server for providing service for the instant messaging application; the target server is a server that provides services for the target application.
4. The method of claim 2, wherein accessing the target application based on the user real name information comprises:
sending the encrypted data to an instant messaging server;
receiving the user real-name information in a plaintext form issued by the instant messaging server; the encrypted data is used for indicating the instant messaging server to execute the following operations: responding to the encrypted data to pass verification, and returning the user real name information in a plaintext form;
transmitting the user real name information to a target server;
receiving a first notification message issued by the target server, wherein the first notification message is used for indicating that the target server has acquired the user real name information;
wherein, the instant messaging server is a server for providing service for the instant messaging application; the target server is a server that provides services for the target application.
5. The method according to claim 3 or 4, characterized in that the method further comprises:
responding to the received first notification message, and displaying first prompt information; the first prompt message is used for prompting that the authorization is successful; or alternatively, the first and second heat exchangers may be,
Receiving a second notification message issued by the instant messaging server, wherein the second notification message is used for indicating that the encrypted data fails to pass verification; and displaying second prompt information, wherein the second prompt information is used for prompting to re-authorize.
6. The method of claim 1, wherein the first type of authorization option is a real-name authentication information authorization option; the real-name authentication information is user certificate information;
the responding to the triggering operation of the first type authorization option obtains the user real name information corresponding to the target real name level from the instant messaging application, and the method comprises the following steps:
responding to the triggering operation of the real-name authentication information authorization option, and acquiring the encrypted data transmitted by the instant messaging application to the target application; the encrypted data is user certificate information in a ciphertext form.
7. The method of claim 1, wherein the first type of authorization option is a real-name authentication information authorization option; the real-name authentication information is transaction card information;
the responding to the triggering operation of the first type authorization option obtains the user real name information corresponding to the target real name level from the instant messaging application, and the method comprises the following steps:
Responding to the triggering operation of the real-name authentication information authorization option, and displaying a transaction card selection page; the transaction card selection page comprises N card options, each card option is used for indicating one transaction card, and the value of N is a positive integer;
responding to the triggering operation of a target card option in the N card options, and acquiring encrypted data transmitted by the instant messaging application to the target application;
the encrypted data is transaction card information in a ciphertext form, and the transaction card information corresponds to the transaction card indicated by the target card option.
8. The method of claim 1, wherein the first type of authorization option is a phone number authorization option, and wherein the obtaining, from the instant messaging application, the user real name information corresponding to the target real name level in response to a triggering operation of the first type of authorization option comprises:
responding to the triggering operation of the call number authorization option, and displaying a verification information input box;
acquiring encrypted data transmitted by the instant messaging application to the target application in response to the matching of the input verification information and the verification information issued by the instant messaging server;
The encrypted data is a first call number in a ciphertext form; the first call number is a call number bound by the instant messaging application.
9. The method of claim 1, wherein the first type of authorization option is a phone number authorization option, and wherein the obtaining, from the instant messaging application, the user real name information corresponding to the target real name level in response to a triggering operation of the first type of authorization option comprises:
responding to the triggering operation of the call number authorization option, and displaying a call number input box and a verification information input box;
acquiring encrypted data in response to matching of the input verification information with the verification information issued by the instant messaging server;
wherein the encrypted data is a second telephone number in the form of ciphertext; the second call number is a call number obtained by inputting through the call number input box.
10. The method of claim 1, wherein the authorization page further includes a second type of authorization option, the method further comprising:
responding to the triggering operation of the second type authorization option, and acquiring user basic information transmitted by the instant messaging application to the target application; accessing the target application based on the user basic information;
The user basic information is user personal data stored in the instant messaging application.
11. The method of claim 1, wherein the authorization page further includes a second type of authorization option, the method further comprising:
responding to the triggering operation of the second type authorization option, and randomly generating user basic information; accessing the target application based on the user basic information;
the user basic information is user personal data stored in the instant messaging application.
12. The method according to claim 1, wherein the method further comprises:
calling the instant messaging application to display an authorization management page; the authorization management page comprises M information items, wherein one information item is used for displaying an application identifier of an authorized application and authorized user real name information; m is a positive integer;
and responding to the triggering operation of the information item where the target application is located, and canceling the authorization of the target application.
13. An application access device, the device comprising:
the first display module is configured to display a login prompt page of the target application, wherein the login prompt page comprises target login options; the target login option is used for prompting the user to access the target application by using the instant messaging account;
The second display module is configured to respond to the triggering operation of the target login option and display an authorization page; the authorization page comprises a first type authorization option matched with a target real name level, and the first type authorization option is used for prompting the real name information of an authorized user to the target application through the instant messaging application; the target real name level corresponds to user real name information required for accessing the target application;
the first acquisition module is configured to respond to the triggering operation of the first type authorization option and acquire the user real name information corresponding to the target real name level from the instant messaging application;
and the execution module is configured to access the target application based on the user real name information.
14. A computer device, characterized in that it comprises a processor and a memory in which at least one program code is stored, said at least one program code being loaded and executed by said processor to implement the application access method according to any of claims 1 to 12.
15. A storage medium having stored therein at least one piece of program code that is loaded and executed by a processor to implement the application access method of any one of claims 1 to 12.
CN202010872739.7A 2020-08-26 2020-08-26 Application access method and device, storage medium and computer equipment Active CN111970298B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010872739.7A CN111970298B (en) 2020-08-26 2020-08-26 Application access method and device, storage medium and computer equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010872739.7A CN111970298B (en) 2020-08-26 2020-08-26 Application access method and device, storage medium and computer equipment

Publications (2)

Publication Number Publication Date
CN111970298A CN111970298A (en) 2020-11-20
CN111970298B true CN111970298B (en) 2024-01-05

Family

ID=73391003

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010872739.7A Active CN111970298B (en) 2020-08-26 2020-08-26 Application access method and device, storage medium and computer equipment

Country Status (1)

Country Link
CN (1) CN111970298B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113377647B (en) * 2021-05-27 2023-04-07 北京达佳互联信息技术有限公司 Page processing method, device, server, terminal and readable storage medium

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014105263A1 (en) * 2012-12-28 2014-07-03 Lookout, Inc. Multi-factor authentication and comprehensive login system for client-server networks
WO2017067227A1 (en) * 2015-10-22 2017-04-27 乐视控股(北京)有限公司 Third party account number authorisation method, device, server, and system
WO2018103559A1 (en) * 2016-12-08 2018-06-14 阿里巴巴集团控股有限公司 Method and device for authenticating login
CN110263525A (en) * 2018-03-07 2019-09-20 杭州海康威视数字技术股份有限公司 Equipment configuration method and device
CN110417723A (en) * 2019-03-29 2019-11-05 广州腾讯科技有限公司 A kind of application login method, device, terminal and storage medium
CN110706143A (en) * 2019-09-26 2020-01-17 中电万维信息技术有限责任公司 Identity authentication method and device based on government affair service
CN110990826A (en) * 2019-12-20 2020-04-10 北京百度网讯科技有限公司 Authentication method and device for login applet
CN111062024A (en) * 2019-11-25 2020-04-24 泰康保险集团股份有限公司 Application login method and device
US10698701B1 (en) * 2019-06-01 2020-06-30 Apple Inc. User interface for accessing an account
CN111385267A (en) * 2018-12-29 2020-07-07 金联汇通信息技术有限公司 Application authorization control method and device and electronic equipment
CN111399717A (en) * 2020-03-17 2020-07-10 腾讯科技(成都)有限公司 Method, device, equipment and storage medium for publishing contents

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10084797B2 (en) * 2016-10-03 2018-09-25 Extreme Networks, Inc. Enhanced access security gateway

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014105263A1 (en) * 2012-12-28 2014-07-03 Lookout, Inc. Multi-factor authentication and comprehensive login system for client-server networks
WO2017067227A1 (en) * 2015-10-22 2017-04-27 乐视控股(北京)有限公司 Third party account number authorisation method, device, server, and system
WO2018103559A1 (en) * 2016-12-08 2018-06-14 阿里巴巴集团控股有限公司 Method and device for authenticating login
CN110263525A (en) * 2018-03-07 2019-09-20 杭州海康威视数字技术股份有限公司 Equipment configuration method and device
CN111385267A (en) * 2018-12-29 2020-07-07 金联汇通信息技术有限公司 Application authorization control method and device and electronic equipment
CN110417723A (en) * 2019-03-29 2019-11-05 广州腾讯科技有限公司 A kind of application login method, device, terminal and storage medium
US10698701B1 (en) * 2019-06-01 2020-06-30 Apple Inc. User interface for accessing an account
CN110706143A (en) * 2019-09-26 2020-01-17 中电万维信息技术有限责任公司 Identity authentication method and device based on government affair service
CN111062024A (en) * 2019-11-25 2020-04-24 泰康保险集团股份有限公司 Application login method and device
CN110990826A (en) * 2019-12-20 2020-04-10 北京百度网讯科技有限公司 Authentication method and device for login applet
CN111399717A (en) * 2020-03-17 2020-07-10 腾讯科技(成都)有限公司 Method, device, equipment and storage medium for publishing contents

Also Published As

Publication number Publication date
CN111970298A (en) 2020-11-20

Similar Documents

Publication Publication Date Title
WO2021120793A1 (en) Face image transmission method and apparatus, numerical value transfer method and apparatus, and electronic device
WO2021208615A1 (en) User invitation method and apparatus, computer device, and computer readable storage medium
CN109688147B (en) Application login method, device, terminal, server, system and storage medium
CN109547495B (en) Sensitive operation processing method, device, server, terminal and storage medium
CN110597924B (en) Block chain-based user identification processing method, device, equipment and storage medium
CN111523136B (en) Authority management method, device, equipment and storage medium of application program
CN110933113B (en) Block chain-based interactive behavior detection method, device, equipment and storage medium
CN112583806B (en) Resource sharing method, device, terminal, server and storage medium
CN110851823B (en) Data access method, device, terminal and storage medium
CN111866140B (en) Fusion management device, management system, service calling method and medium
CN110598386B (en) Block chain-based data processing method, device, equipment and storage medium
CN111404991A (en) Method, device, electronic equipment and medium for acquiring cloud service
CN110581831B (en) Communication method, information acquisition method, electronic device, and storage medium
CN111212074B (en) Blockchain-based qualification identification method, device, equipment and storage medium
CN111970298B (en) Application access method and device, storage medium and computer equipment
CN112967043A (en) Resource transfer method, device, equipment and storage medium
CN111694892B (en) Resource transfer method, device, terminal, server and storage medium
CN110738491A (en) Numerical value transferring method, system, device, terminal and storage medium
CN110727894A (en) Target material setting method, device, equipment and storage medium
CN114816600B (en) Session message display method, device, terminal and storage medium
CN114124405B (en) Service processing method, system, computer equipment and computer readable storage medium
CN111131619B (en) Account switching processing method, device and system
CN112764824B (en) Method, device, equipment and storage medium for triggering identity verification in application program
CN113689206A (en) Resource transfer method, device, system, electronic equipment and storage medium
CN111831385A (en) Business credit information processing method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant