CN112272182B - Application login method, server, device, medium and computing device - Google Patents

Application login method, server, device, medium and computing device Download PDF

Info

Publication number
CN112272182B
CN112272182B CN202011173250.7A CN202011173250A CN112272182B CN 112272182 B CN112272182 B CN 112272182B CN 202011173250 A CN202011173250 A CN 202011173250A CN 112272182 B CN112272182 B CN 112272182B
Authority
CN
China
Prior art keywords
login
information
text information
equipment
voice
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011173250.7A
Other languages
Chinese (zh)
Other versions
CN112272182A (en
Inventor
刘佳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Netease Media Technology Beijing Co Ltd
Original Assignee
Netease Media Technology Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Netease Media Technology Beijing Co Ltd filed Critical Netease Media Technology Beijing Co Ltd
Priority to CN202011173250.7A priority Critical patent/CN112272182B/en
Publication of CN112272182A publication Critical patent/CN112272182A/en
Application granted granted Critical
Publication of CN112272182B publication Critical patent/CN112272182B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Telephonic Communication Services (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention provides an application login method, a server, equipment, media and computing equipment, wherein the method comprises the following steps: receiving a login request of a login target application sent by first equipment; transmitting target text information to the first device; and under the condition that the voice information collected by the second equipment of which the target application is in the login state is matched with the verification result of the target text information, updating the login state of the target application in the first equipment by using the login information of the target application in the second equipment.

Description

Application login method, server, device, medium and computing device
Technical Field
Embodiments of the present invention relate to the field of information processing, and more particularly, to an application login method, a server, a device, a medium, and a computing device.
Background
This section is intended to provide a background or context to the embodiments of the invention that are recited in the claims. The description herein is not admitted to be prior art by inclusion in this section.
In the related art, two methods for realizing cross-terminal synchronous login to a target application are mainly available, and one method is to realize cross-terminal login through manual input of own or third party account passwords. And the other is to realize cross-terminal login by scanning the two-dimensional code through the mobile terminal. However, how to enable the process of logging in two devices simultaneously by the same application to have a richer processing manner becomes a problem to be solved.
Disclosure of Invention
The present application is intended to provide an application login method, a server, a device, a medium and a computing device, so as to solve at least the above technical problems.
A first aspect of an embodiment of the present application provides an application login method, applied to a server, where the method includes:
receiving a login request of a login target application sent by first equipment;
transmitting target text information to the first device;
and under the condition that the voice information collected by the second equipment of which the target application is in the login state is matched with the verification result of the target text information, updating the login state of the target application in the first equipment by using the login information of the target application in the second equipment.
In one embodiment of the application, the method further comprises:
acquiring voice information acquired by the second equipment; converting the voice information into corresponding text information to be verified; verifying whether the text information to be verified corresponding to the voice information is matched with the target text information or not, and obtaining a verification result;
or,
receiving text information to be verified corresponding to the voice information sent by the second device, and verifying whether the text information to be verified corresponding to the voice information is matched with the target text information or not to obtain a verification result.
In one embodiment of the present invention, before updating the login state of the target application at the first device with the login information of the target application at the second device, the method further comprises:
transmitting a verification result representing that the voice information is matched with the target text information to the second equipment;
receiving login confirmation information sent by the second device and aiming at the first device; the login confirmation information is used for confirming that the first device is allowed to login the target application based on login information of the second device to login the target application.
In one embodiment of the present invention, before updating the login state of the target application at the first device with the login information of the target application at the second device, the method further comprises:
starting a timer when the target text information is sent to the first equipment;
acquiring voice information of the second equipment or text information to be verified corresponding to the voice information, and verifying whether the text information to be verified corresponding to the voice information is matched with the target text information;
in the case that the result of the verification is a match, and judging whether the timing duration of the timer exceeds a preset duration.
In one embodiment of the application, the method further comprises:
and selecting the target text information from a plurality of text information based on the historical operation record of the first equipment.
A second aspect of an embodiment of the present application provides an application login method, applied to a first device, where the method includes:
displaying an operation interface of a target application, and responding to the operation of clicking a login key in the operation interface by a user to send a login request for logging in the target application;
acquiring and displaying target text information;
and under the condition that the voice information collected by the second equipment of which the target application is in the login state is matched with the verification result of the target text information, updating the login state of the target application in the first equipment according to the login information of the target application in the second equipment.
In one embodiment of the present application, the method for obtaining the target text information includes:
target text information determined based on the historical operation record of the user is acquired from a server.
A third aspect of an embodiment of the present application provides an application login method, applied to a second device, where the method includes:
detecting an operation instruction for controlling first equipment to log in the target application under the condition that the target application is in a login state, and displaying a first operation interface;
Responding to the operation of a user on a key for collecting voice in the first operation interface, and collecting voice information; and the voice information is used for enabling the first equipment to log in the target application based on the login information of logging in the target application at the second equipment under the condition that the voice information is matched with the verification result of the target text information displayed by the first equipment.
In one embodiment of the present invention, after the collecting the voice information, the method further includes:
converting the voice information into corresponding text information to be verified; the text information to be verified corresponding to the voice information is sent to a server;
or,
and sending the voice information to a server.
In one embodiment of the invention, the method further comprises:
transmitting login confirmation information for the first device to the server under the condition that the verification result transmitted by the server represents that the voice information is matched with the target text information; the login confirmation information is used for confirming that the first device is allowed to login the target application based on login information of the second device to login the target application.
A fourth aspect of an embodiment of the present application provides a server, including:
the first receiving unit is used for receiving a login request of a login target application sent by the first equipment;
a first sending unit, configured to send target text information to the first device;
the first processing unit is used for sending login information of the target application on the second equipment to the first equipment under the condition that the voice information acquired by the second equipment in the login state of the target application is matched with the verification result of the target text information; the login information of the target application on the second device is used for updating the login state of the target application on the first device.
A fifth aspect of an embodiment of the present application provides a first apparatus, including:
the display unit is used for displaying an operation interface of the target application and displaying target text information;
the second sending unit is used for responding to the operation of clicking a login key in the operation interface by a user and sending a login request for logging in the target application;
the second receiving unit is used for acquiring target text information;
and the second processing unit is used for updating the login state of the target application in the first equipment according to the login information of the target application in the second equipment when the voice information acquired by the second equipment in the login state of the target application is matched with the verification result of the target text information.
A sixth aspect of an embodiment of the present application provides a second apparatus, including:
the third processing unit is used for detecting an operation instruction for controlling the first equipment to log in the target application under the condition that the target application is in a login state and displaying a first operation interface;
the acquisition unit is used for responding to the operation of the key for acquiring the voice in the first operation interface and acquiring voice information; and the voice information is used for enabling the first equipment to log in the target application based on the login information of logging in the target application at the second equipment under the condition that the voice information is matched with the verification result of the target text information displayed by the first equipment.
A seventh aspect of the embodiments of the present application provides a medium storing a computer program, characterized in that the program when executed by a processor implements a method as in the previous embodiments.
An eighth aspect of embodiments of the present application provides a computing device comprising:
one or more processors;
a storage means for storing one or more programs;
the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the methods as in the previous embodiments.
According to the embodiment of the invention, when the first device needs to log in the target application, the server controls to send the target text information to the first device, and controls the first device to update the login state based on the login information of the target application in the second device under the condition that the target text information is matched with the voice information sent by the second device. Therefore, the user can log in and verify through the voice information, so that the target application can log in at the same time of two devices, and a richer processing scene is provided for the two devices to log in the same target application at the same time.
Drawings
The above, as well as additional purposes, features, and advantages of exemplary embodiments of the present invention will become readily apparent from the following detailed description when read in conjunction with the accompanying drawings. Several embodiments of the present invention are illustrated by way of example, and not by way of limitation, in the figures of the accompanying drawings and in which:
FIG. 1 schematically illustrates an application login method flow diagram according to an embodiment of the invention;
FIG. 2 schematically illustrates a schematic diagram of the operation of a target application at a first device according to an embodiment of the invention;
FIG. 3 schematically illustrates a schematic diagram of the operation of a target application at a second device according to an embodiment of the invention;
FIG. 4 schematically illustrates a second schematic diagram of the operation of a target application at a first device in accordance with an embodiment of the invention;
FIG. 5 schematically illustrates a secondary validation operation interface of a second device according to an embodiment of the invention;
FIG. 6 schematically illustrates a system architecture diagram according to an embodiment of the invention;
FIG. 7 schematically illustrates an application login method flow chart II according to another embodiment of the invention;
FIG. 8 schematically illustrates an application login method flow diagram three according to yet another embodiment of the invention;
FIG. 9 schematically illustrates a media schematic according to an embodiment of the invention;
fig. 10 schematically shows a schematic view of a server composition structure according to an embodiment of the present invention;
fig. 11 schematically illustrates a first apparatus composition structure diagram according to an embodiment of the present invention;
fig. 12 schematically illustrates a second apparatus composition structure according to an embodiment of the present invention;
FIG. 13 schematically illustrates a computing device architecture diagram according to an embodiment of the invention.
In the drawings, the same or corresponding reference numerals indicate the same or corresponding parts.
Detailed Description
The principles and spirit of the present invention will be described below with reference to several exemplary embodiments. It should be understood that these embodiments are presented merely to enable those skilled in the art to better understand and practice the invention and are not intended to limit the scope of the invention in any way. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
Those skilled in the art will appreciate that embodiments of the invention may be implemented as a system, apparatus, device, method, or computer program product. Accordingly, the present disclosure may be embodied in the following forms, namely: complete hardware, complete software (including firmware, resident software, micro-code, etc.), or a combination of hardware and software.
According to an embodiment of the invention, an application login method, a server, equipment, media and computing equipment are provided.
Any number of elements in the figures are for illustration and not limitation, and any naming is used for distinction only, and not for any limiting sense.
The principles and spirit of the present invention are explained in detail below with reference to several representative embodiments thereof.
Summary of The Invention
The inventor discovers that two methods exist for realizing cross-terminal synchronous login of a target application, and one method is to realize cross-terminal login through manual input of own or third party account passwords. And the other is to realize cross-terminal login by scanning the two-dimensional code through the mobile terminal. However, how to enable the process of logging in two devices simultaneously by the same application to have a richer processing manner becomes a problem to be solved.
In view of the above, the present invention provides an application login method, a server, a device, a medium, and a computing device, where when a first device needs to log in a target application, the server controls to send target text information to the first device, and if the target text information matches with voice information sent by a second device, the first device is controlled to update a login state based on login information of the target application in the second device. Therefore, the user can log in and verify through the voice information, so that the target application can log in at the same time of two devices, and a richer processing scene is provided for the two devices to log in the same target application at the same time.
Having described the basic principles of the present invention, various non-limiting embodiments of the invention are described in detail below.
Exemplary method
A first aspect of the present application provides an application login method, applied to a server, as shown in fig. 1, including:
s101: receiving a login request of a login target application sent by first equipment;
s102: transmitting target text information to the first device;
s103: and under the condition that the voice information collected by the second equipment of which the target application is in the login state is matched with the verification result of the target text information, updating the login state of the target application in the first equipment by using the login information of the target application in the second equipment.
In the embodiment of the present application, the first device and the second device may be electronic devices, and in one example, the first device is a PC or a notebook, and the second device is a smart phone or a tablet, etc.
In S101, the target should be an application that the user can log in to at the second device. In addition, the target application may be any one of a plurality of applications that can log in simultaneously in two terminals, such as a cellular phone and a personal computer (PC, personal Computer).
In the case that the user has logged in to the target application at the second device, for convenience of use, it is often necessary to log in to the target application at the first device simultaneously by means of cross-end login. In order to realize cross-end login, a user needs to operate through an operation interface of a target application in first equipment after the first equipment opens the target application, for example, the user can click a login key in the operation interface, and the first equipment generates a corresponding login request for logging in the target application in response to the click operation; correspondingly, the server can receive a login request of a login target application sent by the first device.
In one example, as shown in fig. 2, when the user opens the target application, the style above fig. 2 may be displayed, and a "login" button is displayed in the operation interface of the target application; after clicking the "login" button, the operation interface below fig. 2 may be displayed, where the login mode provided by the operation interface is "second device voice login", and it should be understood that, besides the option of "second device voice login", other options may be included, for example, "other login modes", and other login modes may include two-dimensional code scanning login, input login information login, and the like, which are not shown in the figure, and the embodiment will not be described in detail.
Correspondingly, at this time, the server executes step S101, and the server receives a login request of the login target application sent by the first device, and in addition, the server may also receive a login mode (such as the above-mentioned second device voice login mode) of the first device.
In an example, after receiving a login request for logging in a target application from a first device, the server performs step S102, extracts text information from a database as target text information, and sends the target text information to the first device, and correspondingly, the first device obtains the target text information extracted by the server and displays the target text information in a page, as shown in the lower part of fig. 2, for example: the first device presents "13579asdf" in the operation interface.
In yet another example, the server may further execute step S102 to select target text information and send the target text information to the first device, where the first device sends a login request for logging in to a target application and determines that its login mode is a voice login mode; correspondingly, the first device can acquire the target text information from the server, and display the target text information in the current operation interface of the target application.
Wherein, a plurality of text information can be saved in the database of the server, and the plurality of text information includes but is not limited to: ancient poetry, dialect police sentences, music lyrics, movie lines or custom advertisement words, etc.
The method for determining the target text information by the server specifically comprises the following steps: and selecting the target text information from a plurality of text information based on the historical operation record of the first equipment.
Wherein the historical operating record of the first device may be a historical operating record of the first device (or a user of the first device) for a certain period of time. The certain period of time may be set according to practical situations, for example, may be 1 month, or may be 1 week. The history operation record may be at least one of a title record of browsing web pages, a record of search information, a record of interaction information, and the like.
Further, the history of operation record of the first device may be sent to the server by the first device; still alternatively, the operation record of the first device may be pre-saved in a server, for example, the server may save the operation record of the first device as a historical operation record of the first device, where the time length of the saved operation record may be a preset time length, for example, may be about 1 month, or half year, and the like, which is not exhaustive.
The historical operation record of the first device may be processed, for example, keyword extraction, keyword clustering and other processes are performed, so as to obtain at least one keyword corresponding to the historical operation record of the first device, and further, a piece of text information with the highest similarity with the at least one keyword is obtained from a database of the server based on the at least one keyword and is used as the target text information. Of course, other ways of determining the target text information may be used, which is not intended to be exhaustive.
For example, a large amount of text information of different types may be pre-stored in the database of the server, a specific user image may be drawn based on the historical operation record of the user at the PC (i.e., the first device), and target text information conforming to the use habit of the user may be accurately called from the database, and meanwhile, advertisement content may be added into the target text information for popularization. For example, when it is recognized that the user frequently accesses a record of shopping website through the first device, the server may call information about shopping website class as the target text information.
In yet another example, when the server performs S102, the method may further include: and the server sends the preset duration corresponding to the target text information to the first device. The preset time length is used for representing the time length from sending out to invalidating of the target text information, or can be called as the effective time length of the target text information; the length of the preset time period (or effective time period) may be 10s or 30s, and the like, and may be specifically set according to practical situations. Or the length of the preset time (or the effective time) can be determined according to the number of characters of the target text information, for example, different text information can be preconfigured with different preset time or effective time, and when one of the target text information is selected, the corresponding preset time or effective time can be directly determined, which is not exhaustive.
Before executing step S103, the user first needs to input voice information to the second device by means of voice input according to the target text information provided by the first device.
As shown in fig. 3, the user clicks a "login web-side" button on the interface of the target application of the second device on the left side of fig. 3; entering an operation interface shown in the middle of the figure 3, wherein a key for pressing the speaking button is arranged below the interface, and meanwhile, although not shown in the figure, the page also comprises text content for prompting a user to enter voice, for example, the key for pressing the voice button and reading information displayed at the webpage end; then, the interface shown on the right side of fig. 3 is entered, at this time, a key in the figure may be kept pressed, where the current state may be shown in the key, such as "in voice input" shown on the right side of fig. 3, or may be other word patterns, such as "voice input", etc., where the user inputs voice information corresponding to the target text information "abcds" shown in the first device.
The second device may directly send the voice information to the server, or alternatively, convert the voice information into text information to be verified, and send the text information to be verified to the server. Accordingly, before S103 is performed, the processing of the server may include the following two cases:
acquiring voice information acquired by the second equipment; converting the voice information into corresponding text information to be verified; verifying whether the text information to be verified corresponding to the voice information is matched with the target text information or not, and obtaining a verification result;
and 2, receiving text information to be verified, which corresponds to the voice information and is sent by the second equipment, and verifying whether the text information to be verified, which corresponds to the voice information, is matched with the target text information or not to obtain a verification result.
In case 1, the server converts the voice information into text information, and uses the converted text information as the text information to be verified; and then verifying whether the text information to be verified is matched with the target text, and obtaining a verification result.
The verification result can include matching or not matching of the text information to be verified with the target text.
The method of converting the voice information into the text to be verified may be a processing method such as voice recognition (ASR, automatic Speech Recognition), which is not described in detail in this embodiment.
Wherein, can also include:
starting a timer when the target text information is sent to the first equipment;
acquiring voice information of the second equipment, and verifying whether the text information to be verified corresponding to the voice information is matched with the target text information;
in the case that the result of the verification is a match, and judging whether the timing duration of the timer exceeds a preset duration.
The preset duration is already described, and the description is not repeated here.
In case 1, the server acquires the voice information of the second device, and verifies whether the text information to be verified corresponding to the voice information is matched with the target text information; and under the condition that the verification result is matched, stopping the timer, and judging whether the timing duration of the timer exceeds the preset duration.
Further, in the case where the time period of the timer exceeds the preset time period, the processing may be stopped; or, a prompt message may be sent to the first device, for example, prompt "please re-login" is that the user presses the login key again, initiate a login request, and the server returns to execute S101; still alternatively, the server may re-select the target text, i.e., re-execute S102.
In the case where the counted time period of the timer does not exceed the preset time period, S103 may be performed.
In this case, the second device does not convert the voice information, and the server converts and completes the verification, which can reduce the processing resources required by the second device, such as the smart phone.
In case 2, because the second device has already converted the voice information into the text information to be verified, the server may directly determine whether the text information to be verified and the target text information are matched, so as to obtain a corresponding verification result.
In case 2, it may further include:
starting a timer when the target text information is sent to the first equipment;
acquiring text information to be verified corresponding to voice information of the second equipment, and verifying whether the text information to be verified corresponding to the voice information is matched with the target text information;
in the case that the result of the verification is a match, and judging whether the timing duration of the timer exceeds a preset duration.
The setting of the preset duration is the same as that described above, and will not be described in detail.
In case 2, when the server acquires the text information to be verified sent by the second device, verifying whether the text information to be verified corresponding to the voice information is matched with the target text information; and under the condition that the verification result is matched, stopping the timer, and judging whether the timing duration of the timer exceeds the preset duration.
Further, in the case where the time period of the timer exceeds the preset time period, the processing may be stopped; or, a prompt message may be sent to the first device, for example, prompt "please re-login" is that the user presses the login key again, initiate a login request, and the server returns to execute S101; still alternatively, the server may re-select the target text, i.e., re-execute S102.
Referring to fig. 4, an exemplary illustration is made, and the target text information is displayed above fig. 4, and the effective duration (or preset duration) of the current target text information, such as "effective in x seconds" shown in fig. 4, is displayed; if the server determines that the time duration of the timer exceeds the preset time duration, a "failure" word as shown in the lower part of fig. 4 may be displayed in the interface of the first device, or other words may be displayed, for example, "time-out, please re-enter" or "exceed the effective time duration, please re-enter" and so on, so as to prompt the user to log in for time-out currently, so that the user may refresh to re-acquire the target text information, and display the target text information again in the first device, which is not described in detail.
It should also be noted that a refresh key may be included in the operation interface above fig. 4, which may be used to retrieve the target text information. For example, in one example, when a user who has a rare word in the currently displayed target text information does not pronounce, or when there is unrecognizable word in the currently displayed target text information, the target text information may be retrieved. The refresh key of the operation interface below in fig. 4 has similar functions, and may be clicked to retrieve the target text information when the original target text information fails, which is not repeated here.
In another case, the refresh key is not required to be displayed, but the target application of the first device may automatically perform refresh processing, for example, when the first device determines that the current target text information reaches the preset duration but the verification result information is not polled, the first device may automatically refresh to reacquire the target text information, that is, send an instruction for reacquiring the target text information to the server, and the corresponding server may execute S102 again.
In the case where the counted time period of the timer does not exceed the preset time period, S103 may be performed.
This may also include: when the second device sends voice information or text information to be verified corresponding to the voice information, login information of the user on the second device is also sent to the server; correspondingly, the server receives login information sent by the second device when receiving voice information or text information to be verified corresponding to the voice information sent by the second device.
The login information may be sent together with the voice information or the text information to be verified corresponding to the voice information, that is, sent together in the same voice information or the same text information to be verified; alternatively, the login information may be sent after the voice information, or after the text information to be verified corresponding to the voice information, which is not limited herein.
The login information may include at least one of: account information, password information, mobile phone equipment information and the like of a user.
In S103, before updating the login state of the target application in the first device with the login information of the target application in the second device, the method further includes:
transmitting a verification result representing that the voice information is matched with the target text information to the second equipment; receiving login confirmation information sent by the second device and aiming at the first device; the login confirmation information is used for confirming that the first device is allowed to login the target application based on login information of the second device to login the target application.
Specifically, after the server sends the verification result that the voice information is matched with the target text information to the second device, the second device may display prompt information that passes verification on an interface, or the second device may display prompt information, through which the user is prompted to determine whether to log in the first device through the login information, if the user confirms that the user logs in the first device, the login confirmation information for the first device may be generated by clicking a confirmation key (or a "login" key) of the second device, and the login confirmation information is sent to the server. For example, referring to fig. 5, a "confirm that your current login information is logged in at the first device? And the second equipment sends login confirmation information to the server if the user clicks a login button in the interface.
Or after the server sends the verification result that the voice information is matched with the target text information to the second device, the second device does not need to be clicked by a user, and only the second device receives the verification matching result, the login confirmation information is directly sent to the server.
The login confirmation information may include only confirmation information that allows the first device to log in the first device with login information of the second device. Or, on the basis of the confirmation information that the first device is allowed to log in the first device with the login information of the second device, the login confirmation information may further include login information, for example, information such as a login account number and a password of the user. Of course, if the login information of the user logged in the second device is obtained in advance by the server side, the login information need not be included here, for example, the login information is received when the server receives the voice information or the text information to be verified corresponding to the voice information, so that the second device does not need to send the login information again, and specific processing can be determined according to practical situations.
Further, after receiving the login confirmation information sent by the second device, the server updates the login state of the target application in the first device according to the login information of the target application in the second device, for example, in the server, the login state of the target application in the first device is modified to be a logged-in state.
The timing of the server sending login information to the first device may be one of:
receiving voice information or text information to be verified, which corresponds to the voice information, sent by a second device, and sending login information of the target application to the first device when the text information to be verified, which corresponds to the voice information, is matched with the target text information; it will be appreciated that in such a process, the login control logic of the first device may be increased, e.g. after the server has sent login confirmation information, the first device may be allowed or triggered to update based on the login information. That is, in this process, although the first device may receive the login information in advance, the first device does not perform the update process by the login control logic set in advance, but may perform the update or the like based on the login information only after receiving the login confirmation information.
Or after receiving login confirmation information sent by the second device, sending login information of the target application to the first device; in this processing, the login confirmation information may be carried in the login information, and the corresponding first device may perform update processing according to the login information after receiving the login confirmation information.
An exemplary description is made of the scheme provided by this embodiment with reference to a system architecture shown in fig. 6, where in this example, the first device is a notebook computer, and the second device is a smart phone, specifically:
the user clicks a login button (shown in the upper part of fig. 2) on the notebook computer, and the server extracts unique target text information and corresponding effective duration (or the preset duration) from the database and returns the unique target text information and the corresponding effective duration to the notebook computer for display. Here, the display content of the notebook computer may be as shown in the upper part of fig. 5; the target application displayed by the notebook computer can also support an automatic refreshing function or a manual refreshing function; the contents of the target text information include, but are not limited to: ancient poetry, dialect police sentences, music lyrics, movie lines or custom advertisement words, etc. The notebook computer can begin to poll the verification result of the target text information by the query server at the time.
The user clicks and opens the page of the "login web page end" in the target application of the smart phone side shown in fig. 6, the user can click the key of the "login web page end" therein (as shown in the left diagram of fig. 3), then presses the "press talk" key (as shown in the middle diagram of fig. 3) to start voice input, after the smart phone receives voice information, the voice is converted into characters through the voice recognition technology, and meanwhile, the login information of the user, such as an account number, a password and equipment information of the mobile phone, can be sent to the server. The smart phone may not convert the voice information after receiving the voice information, but send the voice information and login information of the user to the server.
The server matches and correlates the information returned by the smart phone (voice information or text information to be verified corresponding to the voice information) with the target text information extracted from the database, and judges whether the information is within the effective time, if the condition is met, a verification result representing that the voice information is matched with the target text information is returned to the smart phone so as to prompt a user to confirm for the second time. In addition, in the case that the above condition is satisfied, the notebook computer also polls the verification result.
After receiving the verification result sent by the server, the user can display the operation interface shown in fig. 5, and if the user clicks a login key in the operation interface, the user completes secondary confirmation and generates login confirmation information, and the smart phone sends the login confirmation information to the server; the server can send the login confirmation information to the notebook computer; according to the verification result of the polled target text information and the voice information, the notebook computer can update the login state of the notebook computer according to the acquired login information of the user in the smart phone under the condition that the verification result is matched and the login confirmation information forwarded by the server is received, so that login is completed.
Therefore, through the above processing, when the first device needs to log in the target application, the server controls to send the target text information to the first device, and controls the first device to update the login state based on the login information of the target application in the second device only when the target text information is matched with the voice information sent by the second device. Therefore, the user can log in and verify through the voice information, so that the target application can log in at the same time of two devices, and a richer processing scene is provided for the two devices to log in the same target application at the same time.
In addition, the problem that more abundant display information cannot be provided for a user in the process that two devices can log in one application at the same time only by scanning is avoided through the method, or the problem of complicated operation caused by the fact that login information must be correctly input to log in the same application at the same time in two devices is also avoided.
In still another embodiment, after the server performs the foregoing S101-S102, the server may not perform verification processing on the target text information and the voice information, or the target text information and the text information to be verified corresponding to the voice information, but forward the voice information sent by the second device or the text information to be verified corresponding to the voice information to the first device; correspondingly, the first device can obtain the verification result based on the voice information or the text information to be verified corresponding to the voice information and whether the text information is matched with the target text information.
In this embodiment, the server may also obtain login information of the user on the second device when receiving the voice information or the text information to be verified of the voice information sent by the second device.
In addition, after the first device obtains the verification result, the verification result can be sent to the server, the server judges whether the verification result is within a preset time length or not under the condition that the verification result is matched with the first device, and if the verification result is within the preset time length, the verification result representing that the voice information is matched with the target text information can be sent to the second device; and then receiving login confirmation information sent by the second device and aiming at the first device. This part of the processing is the same as the previous embodiment, and a repetitive description will not be made.
Furthermore, when the voice information collected by the second device in the login state of the target application is matched with the verification result of the target text information, the login state of the target application in the first device is updated by using the login information of the target application in the second device, and the processing is the same as that of the previous embodiment, and is not repeated.
A second aspect of the present invention provides an application login method, applied to a first device, as shown in fig. 7, including:
s201: displaying an operation interface of a target application, and responding to the operation of clicking a login key in the operation interface by a user to send a login request for logging in the target application;
s202: acquiring and displaying target text information;
s203: and under the condition that the verification result of the voice information collected by the second equipment and the target text information is matched, updating the login state of the target application on the first equipment according to the login information of the target application on the second equipment.
In S201, the operation interface for displaying the target application may be as shown in the upper part of fig. 2, if the user wants to log in the target application, the user may click a "login" button shown in the upper part of fig. 2, and in response to the operation of clicking the login button in the operation interface by the user, a login request for logging in the target application may be generated, and the first device may send the login request to the server.
Here, the login request sent by the first device may further include an IP address of the first device. Accordingly, the processing on the server side is the same as that of the foregoing embodiment, and will not be described in detail.
Still alternatively, while (or after) performing S201 to send the login request to the server, it may further include: and responding to the login mode selection of the voice login of the second equipment selected by the user, and sending the login mode to the server. For example, as shown in the lower part of fig. 2, if the user selects "second device voice login", the login mode may be transmitted to the server.
In S202, the acquiring and displaying the target text information may specifically be: and the first equipment acquires the target text information from the server and displays the target text information in a current operation interface of a target application.
In one example, a first device sends the target text information to a server upon sending a login request to login to the target application. In another example, when the first device sends a login request for logging in the target application or after sending the login request for logging in the target application, a login mode is sent to the server, and the server determines that the first device is a mode based on voice login of the second device according to the login mode, and then selects and sends the target text information for the first device.
The first device receives the target text information sent from the server, as shown in "13579asdf" below in fig. 2.
The method for the first device to obtain the target text information may specifically be: target text information determined based on the historical operation record of the user is acquired from a server. That is, the server may acquire the matched target text information based on the history of the user, and the specific acquisition manner is the same as that of the foregoing embodiment, for example, may be: and processing the historical operation record of the first device, for example, extracting keywords, clustering the keywords and the like to obtain at least one keyword corresponding to the historical operation record of the first device, and further acquiring a piece of text information with the highest similarity with the at least one keyword from a database of the server based on the at least one keyword as target text information. Of course, other ways of determining the target text information may be used, which is not intended to be exhaustive.
In the process of S202, it may further include: and acquiring a preset time length (or an effective time length) corresponding to the target text information, and displaying the preset time length or the effective time length while displaying the target text information. For example, as shown in the upper diagram of fig. 4, the target text information is displayed, and meanwhile, the "valid in x seconds" is displayed, so that the user can be prompted to input voice as soon as possible through the information. In addition, the effective duration displayed by the first device can be counted down, the received preset duration or the effective duration is used as an initial duration, and the initial duration is reduced by one every second to display, so that a user can acquire the current remaining duration.
After the first device completes S202, polling the authentication result may be started; here, the polling may be performed periodically, for example, a period of 10ms or a period of 20ms may be set, or may be longer or shorter, which will not be described here. Until the verification result is polled, executing S203 at the first equipment side, and updating the login state of the target application at the first equipment by using the login information of the target application at the second equipment under the condition that the verification result of the voice information collected by the second equipment and the target text information is matched; or if the verification result of the voice information collected by the second device and the target text information is not matched, ending the processing.
In addition, after S202 is executed to acquire and display the target text information, until the verification result of S203 is acquired, it may also be determined whether to update the target text information according to the operation of the user, specifically: if the user clicks the refresh key, the first device sends a request for updating the target text information to the server, and the target text information is re-acquired from the server, and the preset duration or the effective duration is re-acquired. For example, the "refresh" key shown in fig. 4 is a presentation interface style before the verification result is obtained in the upper diagram of fig. 4, and if the user clicks the refresh key, the first device sends a request for re-obtaining the target text information to the server. Accordingly, the operation of the server is the same as that of the foregoing embodiment, and will not be described in detail.
There may also be processes to: and acquiring whether the current timing time length exceeds the preset time length from the server, if so, displaying a failure word in an operation interface to prompt the user that the original target text information is failed, and at the moment, the user can acquire the target text information again by clicking a refreshing key so as to execute S202 again. For example, in the lower diagram of fig. 4, when the target text information fails, the user may click the refresh key, and the first device sends a request for re-acquiring the target text information to the server. Accordingly, the operation of the server is the same as that of the foregoing embodiment, and will not be described in detail.
In the step S203, the determining manner of the verification result of the voice information and the target text information collected by the second device may be performed by the server, and the specific performing manner is the same as that of the foregoing embodiment, which is not described herein. Since the first device can start polling of the authentication result after executing S202, the current authentication result can be acquired from the server by polling here.
In S203, the login state of the target application in the first device is updated with the login information of the target application in the second device, and when the login confirmation information of the second device forwarded by the server is received, the login update of the target application may be executed based on the login information.
Wherein, the login information can be sent by a server. The time for the first device to acquire the login information may be:
and when the server receives the voice information or text information to be verified corresponding to the voice information sent by the second device and verifies that the text information to be verified corresponding to the voice information is matched with the target text information, the first device receives login information of the target application sent by the server. It should be noted that, in this case, a corresponding login control logic may be further added, for example, the login information may be stored when the login information is received, and when the login confirmation information of the second device forwarded by the server is received, the login update is controlled based on the login information.
Or after receiving the login confirmation information sent by the second device, the server receives the login information of the target application sent by the server by the first device; in this process, the login information may be carried in login confirmation information.
The specific process is the same as the description of the method for executing the application login by the server, and will not be repeated.
In addition, in S203, the login state of the target application in the first device may include two states, one being an unregistered state and one being a logged-in state. In the execution of S201 to S202, the login state of the target application in the first device is an unregistered state.
By the above processing, when the first device needs to log in the target application, the server controls to send the target text information to the first device, and under the condition that the target text information is matched with the voice information sent by the second device, the first device updates the login state based on the login information of the target application in the second device. Therefore, the user can log in and verify through the voice information, so that the target application can log in at the same time of two devices, and a richer processing scene is provided for the two devices to log in the same target application at the same time.
In addition, the problem that more abundant display information cannot be provided for a user in the process that two devices can log in one application at the same time only by scanning is avoided through the method, or the problem of complicated operation caused by the fact that login information must be correctly input to log in the same application at the same time in two devices is also avoided.
In yet another embodiment, after the foregoing S201 to S202 are executed, the first device receives the voice information collected by the second device and forwarded by the server, or the text information to be verified corresponding to the voice information is forwarded to the first device; correspondingly, the first device may determine whether the target text information is matched with the target text information based on the voice information or the text information to be verified corresponding to the voice information, so as to obtain a verification result.
After the first device obtains the verification result, the verification result may also be sent to the server. The server can acquire login confirmation information of the second device and send the login confirmation information to the first device when the verification result is that the voice information is matched with the target text information and the timing duration does not exceed the preset duration; and after receiving the login confirmation information, the first equipment performs login updating processing according to the login information.
A third aspect of the present invention provides an application login method, applied to a second device, as shown in fig. 8, including:
s301: detecting an operation instruction for controlling the first equipment to log in the target application under the condition that the target application is in a login state, and displaying a first operation interface;
s302: responding to the operation of a user on a key for collecting voice in the first operation interface, and collecting voice information; and the voice information is used for enabling the first equipment to log in the target application based on the login information of logging in the target application at the second equipment under the condition that the voice information is matched with the verification result of the target text information displayed by the first equipment.
In S301, the target application of the second device is in a logged-in state (or logged-in state), which may specifically be based on login information of the user, such as account information, password, etc., of the user, which has logged into the target application.
After the user sees the target text information displayed in the first device, the user can click a key of the target application on the first device end in the operation interface of the second device, and the user responds to the click operation of the key on the first device end to determine that the operation instruction for controlling the first device to log in the target application is detected, and then displays the first operation interface.
For example, referring to fig. 3, the user may enter the first operation interface by clicking the key control of "login web-side" in the left diagram of fig. 3, and the first operation interface may be as shown in the middle diagram of fig. 3.
In S302, voice information is collected in response to the operation of the user on the key for collecting voice in the first operation interface. When the user clicks the voice collecting key of the first operation interface, the microphone is controlled to start collecting the voice until the voice collecting key of the first operation interface is detected to stop being clicked, the voice collecting is finished, and the voice collected this time is used as the voice information.
For example, as shown in the middle diagram of fig. 3, the user clicks the "press talk" button, then the content displayed on the interface may be changed into "in-speech input" as shown in the right diagram of fig. 3, and the speech is collected until the user does not click the button any more, and it is determined that the collection of the speech is finished, so as to obtain the speech information.
Further, after S302, the method may further include:
the second equipment can convert the voice information into corresponding text information to be verified; and sending the text information to be verified corresponding to the voice information to a server.
Here, the process of conversion may be a process performed according to a speech recognition technology, such as ASR or the like.
In addition, the text information to be verified of the voice information can be sent, and meanwhile, login information of the target application can be sent to the server.
Or, the second device may send the voice information directly to the server without conversion.
Further, the voice information can be sent, and meanwhile, login information of the target application can be sent to the server.
The present embodiment may further include:
transmitting login confirmation information for the first device to the server under the condition that the verification result transmitted by the server represents that the voice information is matched with the target text information; the login confirmation information is used for confirming that the first device is allowed to login the target application based on login information of the second device to login the target application.
That is, the second device may display a second operation interface when receiving the verification result sent by the server and indicating that the voice information matches the target text information, and prompt the user in the second operation interface to confirm whether to allow the first device to log in the target application based on the login information of logging in the target application at the second device. If the user confirms that login is possible, a confirmation key or a login key may be clicked, login confirmation information is generated in response to a clicking operation of the confirmation key or the login key, and then the login confirmation information for the first device is transmitted to the server.
Referring to fig. 5, a schematic diagram is provided for the user to perform secondary confirmation at the second device, where the second device may display "confirm that your current login information is logged in at the first device? And the second equipment sends login confirmation information to the server if the user clicks a login button in the interface.
By the above processing, when the first device needs to log in the target application, the server controls to send the target text information to the first device, and under the condition that the target text information is matched with the voice information sent by the second device, the first device updates the login state based on the login information of the target application in the second device. Therefore, the user can log in and verify through the voice information, so that the target application can log in at the same time of two devices, and a richer processing scene is provided for the two devices to log in the same target application at the same time.
In addition, the problem that more abundant display information cannot be provided for a user in the process that two devices can log in one application at the same time only by scanning is avoided through the method, or the problem of complicated operation caused by the fact that login information must be correctly input to log in the same application at the same time in two devices is also avoided.
Exemplary Medium
Having described the method of an exemplary embodiment of the present invention, next, a medium of an exemplary embodiment of the present invention will be described with reference to fig. 9.
In some possible embodiments, the aspects of the present invention may also be implemented as a computer-readable medium having a program stored thereon, which when executed by a processor is configured to implement the steps in the application login method according to the various exemplary embodiments of the present invention described in the "exemplary method" section of the present specification.
Specifically, the processor is configured to implement the following steps when executing the program:
receiving a login request of a login target application sent by first equipment;
transmitting target text information to the first device;
and under the condition that the voice information collected by the second equipment of which the target application is in the login state is matched with the verification result of the target text information, updating the login state of the target application in the first equipment by using the login information of the target application in the second equipment.
Or:
displaying an operation interface of a target application, and responding to the operation of clicking a login key in the operation interface by a user to send a login request for logging in the target application;
Acquiring and displaying target text information;
and under the condition that the voice information collected by the second equipment of which the target application is in the login state is matched with the verification result of the target text information, updating the login state of the target application in the first equipment according to the login information of the target application in the second equipment.
Or:
detecting an operation instruction for controlling first equipment to log in the target application under the condition that the target application is in a login state, and displaying a first operation interface;
responding to the operation of a user on a key for collecting voice in the first operation interface, and collecting voice information; and the voice information is used for enabling the first equipment to log in the target application based on the login information of logging in the target application at the second equipment under the condition that the voice information is matched with the verification result of the target text information displayed by the first equipment.
It should be noted that: the medium may be a readable signal medium or a readable storage medium. The readable storage medium may be, for example, but not limited to: an electrical, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium would include the following: an electrical connection having one or more wires, a portable disk, a hard disk, random Access Memory (RAM), read-only memory (ROM), erasable programmable read-only memory (EPROM or flash memory), optical fiber, portable compact disk read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
As shown in fig. 9, a medium 50 is depicted that may employ a portable compact disc read only memory (CD-ROM) and that includes a program and that may run on a device, in accordance with an embodiment of the present invention. However, the present invention is not limited thereto, and in this document, a readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
The readable signal medium may include a data signal propagated in baseband or as part of a carrier wave with readable program code embodied therein. Such a propagated data signal may take many forms, including, but not limited to: electromagnetic signals, optical signals, or any suitable combination of the preceding. A readable signal medium may also be any readable medium that is not a readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code for carrying out operations of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C++ or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on a remote computing device, or entirely on the remote computing device or server. In the context of remote computing devices, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN).
Exemplary apparatus
Having described the method of an exemplary embodiment of the present invention, an apparatus of an exemplary embodiment of the present invention is described next.
A fourth aspect of the present invention provides a server, as shown in fig. 10, comprising:
a first receiving unit 601, configured to receive a login request of a login target application sent by a first device;
a first sending unit 602, configured to send target text information to the first device;
and the first processing unit 603 is configured to update the login state of the target application in the first device with the login information of the target application in the second device if the verification result of the voice information collected by the second device in the login state of the target application and the target text information is a match.
The server further includes: a first voice conversion unit 604; wherein,
a first receiving unit 601, configured to obtain voice information collected by the second device; the first voice conversion unit 604 is configured to convert the voice information into corresponding text information to be verified; the first processing unit 603 is configured to verify whether the text information to be verified corresponding to the voice information is matched with the target text information, so as to obtain a verification result;
Or,
a first receiving unit 601, configured to receive text information to be verified, which corresponds to the voice information sent by the second device; the first processing unit 603 is configured to verify whether the text information to be verified corresponding to the voice information is matched with the target text information, so as to obtain a verification result.
The first sending unit 602 is further configured to send, to the second device, a verification result that characterizes that the voice information matches the target text information;
a first receiving unit 601, configured to receive login confirmation information for the first device sent by the second device; the login confirmation information is used for confirming that the first device is allowed to login the target application based on login information of the second device to login the target application.
The first processing unit 603 is configured to start a timer when sending the target text information to the first device; the first receiving unit 601 is configured to obtain voice information of the second device or text information to be verified corresponding to the voice information; the first processing unit 603 is further configured to verify whether the text information to be verified corresponding to the voice information is matched with the target text information; in the case that the result of the verification is a match, and judging whether the timing duration of the timer exceeds a preset duration.
The first processing unit 603 is further configured to select the target text information from a plurality of text information based on a history of operation of the first device.
A fourth aspect of the present invention provides a first apparatus, as shown in fig. 11, comprising:
the display unit 701 is configured to display an operation interface of the target application and display target text information;
a second sending unit 702, configured to send a login request for logging in the target application in response to an operation of clicking a login key in the operation interface by a user;
a second receiving unit 703, configured to acquire target text information;
and the second processing unit 704 is configured to update the login state of the target application in the first device according to the login information of the target application in the second device when the voice information collected by the second device in the login state of the target application is matched with the verification result of the target text information.
The second receiving unit 703 is further configured to obtain, from a server, target text information determined based on the history of operation records of the user.
A fourth aspect of the invention provides a second apparatus, as shown in fig. 12, comprising:
A third processing unit 801, configured to, when a target application is in a login state, detect an operation instruction for controlling a first device to login to the target application, and display a first operation interface;
a collecting unit 802, configured to collect voice information in response to an operation on a key for collecting voice in the first operation interface; and the voice information is used for enabling the first equipment to log in the target application based on the login information of logging in the target application at the second equipment under the condition that the voice information is matched with the verification result of the target text information displayed by the first equipment.
The second device further comprises:
a second voice conversion unit 803, configured to convert the voice information into corresponding text information to be verified; a third sending unit 804, configured to send the text information to be verified corresponding to the voice information to a server;
or,
a third sending unit 804, configured to send the voice information to a server.
A third sending unit 804, configured to send login confirmation information for the first device to the server when the verification result sent by the server indicates that the voice information matches the target text information; the login confirmation information is used for confirming that the first device is allowed to login the target application based on login information of the second device to login the target application.
Exemplary computing device
Having described the methods, media, and apparatus of exemplary embodiments of the present invention, a computing device of exemplary embodiments of the present invention is next described with reference to FIG. 13.
Those skilled in the art will appreciate that the various aspects of the invention may be implemented as a system, method, or program product. Accordingly, aspects of the invention may be embodied in the following forms, namely: an entirely hardware embodiment, an entirely software embodiment (including firmware, micro-code, etc.) or an embodiment combining hardware and software aspects may be referred to herein as a "circuit," module "or" system.
In some possible implementations, a computing device according to embodiments of the present invention may include at least one processing unit and at least one memory unit. Wherein the storage unit stores program code which, when executed by the processing unit, causes the processing unit to perform the steps in the application login method according to various exemplary embodiments of the present invention described in the section "exemplary method" above in the present specification.
A computing device 90 according to such an embodiment of the invention is described below with reference to fig. 13. The computing device 90 shown in fig. 13 is merely an example and should not be taken as limiting the functionality and scope of use of embodiments of the present invention.
As shown in fig. 13, the computing device 90 is in the form of a general purpose computing device. Components of computing device 90 may include, but are not limited to: the at least one processing unit 901, the at least one storage unit 902, and a bus 903 connecting different system components (including the processing unit 901 and the storage unit 902).
Bus 903 includes a data bus, a control bus, and an address bus.
The storage unit 902 may include readable media in the form of volatile memory, such as Random Access Memory (RAM) 9021 and/or cache memory 9022, and may further include readable media in the form of non-volatile memory, such as Read Only Memory (ROM) 9023.
The storage unit 902 may also include a program/utility 9025 having a set (at least one) of program modules 9024, such program modules 9024 including, but not limited to: an operating system, one or more application programs, other program modules, and program data, each or some combination of which may include an implementation of a network environment.
The computing device 90 may also communicate with one or more external devices 904 (e.g., keyboard, pointing device, etc.). Such communication may occur through an input/output (I/O) interface 905. Moreover, the computing device 90 may also communicate with one or more networks such as a Local Area Network (LAN), a Wide Area Network (WAN) and/or a public network, such as the Internet, through the network adapter 906. As shown in fig. 13, the network adapter 906 communicates with other modules of the computing device 90 over the bus 903. It should be appreciated that although not shown, other hardware and/or software modules may be used in connection with computing device 90, including, but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, data backup storage systems, and the like.
It should be noted that although in the above detailed description a number of units/modules or sub-units/sub-modules of a first device, a second device, a server are mentioned, such a division is merely exemplary and not mandatory. Indeed, the features and functionality of two or more units/modules described above may be embodied in one unit/module in accordance with embodiments of the present invention. Conversely, the features and functions of one unit/module described above may be further divided into ones that are embodied by a plurality of units/modules.
Furthermore, although the operations of the methods of the present invention are depicted in the drawings in a particular order, this is not required to either imply that the operations must be performed in that particular order or that all of the illustrated operations be performed to achieve desirable results. Additionally or alternatively, certain steps may be omitted, multiple steps combined into one step to perform, and/or one step decomposed into multiple steps to perform.
While the spirit and principles of the present invention have been described with reference to several particular embodiments, it is to be understood that the invention is not limited to the disclosed embodiments nor does it imply that features of the various aspects are not useful in combination, nor are they useful in any combination, such as for convenience of description. The invention is intended to cover various modifications and equivalent arrangements included within the spirit and scope of the appended claims.

Claims (10)

1. An application login method applied to a server, the method comprising:
receiving a login request of a login target application sent by first equipment and a voice login mode; the first equipment comprises a PC end or a notebook;
transmitting target text information to the first equipment based on the voice login mode so as to enable the first equipment to display the target text information; the target text information accords with the use habit of a user and comprises advertisement content;
updating the login state of the target application in the first device by using the login information of the target application in the second device under the condition that the verification result of the voice information acquired by the second device in the login state of the target application and the target text information is matched; the second device comprises a smart phone or a tablet computer.
2. The method according to claim 1, wherein the method further comprises:
acquiring voice information acquired by the second equipment; converting the voice information into corresponding text information to be verified; verifying whether the text information to be verified corresponding to the voice information is matched with the target text information or not, and obtaining a verification result;
Or,
receiving text information to be verified corresponding to the voice information sent by the second device, and verifying whether the text information to be verified corresponding to the voice information is matched with the target text information or not to obtain a verification result.
3. The method of claim 1, wherein updating the login status of the target application at the first device with the login information of the target application at the second device further comprises:
starting a timer when the target text information is sent to the first equipment;
acquiring voice information of the second equipment or text information to be verified corresponding to the voice information, and verifying whether the text information to be verified corresponding to the voice information is matched with the target text information;
in the case that the result of the verification is a match, and judging whether the timing duration of the timer exceeds a preset duration.
4. An application login method applied to a first device, the method comprising:
displaying an operation interface of a target application, and responding to the operation of clicking a login key in the operation interface by a user, and sending a login request and a voice login mode for logging in the target application; the first equipment comprises a PC end or a notebook;
Acquiring and displaying target text information; the target text information is sent to the first equipment by the server based on the voice login mode; the target text information accords with the use habit of a user and comprises advertisement content;
updating the login state of the target application in the first device according to the login information of the target application in the second device under the condition that the verification result of the voice information acquired by the second device in the login state of the target application is matched with the verification result of the target text information; the second device comprises a smart phone or a tablet computer.
5. An application login method applied to a second device, the method comprising:
detecting an operation instruction for controlling first equipment to log in the target application under the condition that the target application is in a login state, and displaying a first operation interface; the first equipment comprises a PC end or a notebook;
responding to the operation of a user on a key for collecting voice in the first operation interface, and collecting voice information;
the voice information is used for enabling the first equipment to log in the target application based on login information of logging in the target application at the second equipment under the condition that the voice information is matched with a verification result of target text information displayed by the first equipment; the second device comprises a smart phone or a tablet computer;
The target text information is sent to the first equipment after the server receives a login request and a voice login mode sent by the first equipment; the target text information accords with the use habit of the user and comprises advertisement content.
6. A server, comprising:
the first receiving unit is used for receiving a login request and a voice login mode of a login target application sent by the first equipment; the first equipment comprises a PC end or a notebook;
the first sending unit is used for sending target text information to the first equipment based on the voice login mode so as to enable the first equipment to display the target text information; the target text information accords with the use habit of a user and comprises advertisement content;
the first processing unit is used for updating the login state of the target application in the first equipment according to the login information of the target application in the second equipment when the voice information acquired by the second equipment in the login state of the target application is matched with the verification result of the target text information; the second device comprises a smart phone or a tablet computer.
7. A first device, comprising:
The display unit is used for displaying an operation interface of the target application and displaying target text information; the target text information accords with the use habit of a user and comprises advertisement content;
the second sending unit is used for responding to the operation of clicking a login key in the operation interface by a user and sending a login request for logging in the target application and a voice login mode; the first equipment comprises a PC end or a notebook;
the second receiving unit is used for acquiring and displaying the target text information; the target text information is sent to the first equipment by the server based on the voice login mode;
the second processing unit is used for updating the login state of the target application in the first device according to the login information of the target application in the second device when the voice information acquired by the second device in the login state of the target application is matched with the verification result of the target text information; the second device comprises a smart phone or a tablet computer.
8. A second device, comprising:
the third processing unit is used for detecting an operation instruction for controlling the first equipment to log in the target application under the condition that the target application is in a login state and displaying a first operation interface; the first equipment comprises a PC end or a notebook;
The acquisition unit is used for responding to the operation of the key for acquiring the voice in the first operation interface and acquiring voice information; the voice information is used for enabling the first equipment to log in the target application based on login information of logging in the target application at the second equipment under the condition that the voice information is matched with a verification result of target text information displayed by the first equipment; the second device comprises a smart phone or a tablet computer; the target text information is sent to the first equipment by the server after receiving a login request and a voice login mode sent by the first equipment; the target text information accords with the use habit of the user and comprises advertisement content.
9. A computer readable storage medium storing a computer program, which when executed by a processor implements the method of any one of claims 1-5.
10. A computing device, comprising:
one or more processors;
a storage means for storing one or more programs;
the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the method of any of claims 1-5.
CN202011173250.7A 2020-10-28 2020-10-28 Application login method, server, device, medium and computing device Active CN112272182B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011173250.7A CN112272182B (en) 2020-10-28 2020-10-28 Application login method, server, device, medium and computing device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011173250.7A CN112272182B (en) 2020-10-28 2020-10-28 Application login method, server, device, medium and computing device

Publications (2)

Publication Number Publication Date
CN112272182A CN112272182A (en) 2021-01-26
CN112272182B true CN112272182B (en) 2023-11-21

Family

ID=74345231

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011173250.7A Active CN112272182B (en) 2020-10-28 2020-10-28 Application login method, server, device, medium and computing device

Country Status (1)

Country Link
CN (1) CN112272182B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114442872B (en) * 2020-10-19 2023-10-27 聚好看科技股份有限公司 Layout and interaction method of virtual user interface and three-dimensional display equipment

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106209763A (en) * 2016-05-27 2016-12-07 北京畅游天下网络技术有限公司 A kind of login method and system
CN106302339A (en) * 2015-05-25 2017-01-04 腾讯科技(深圳)有限公司 Login validation method and device, login method and device
CN106686016A (en) * 2017-03-20 2017-05-17 上海卓易科技股份有限公司 Identity confirmation method and apparatus
CN106921650A (en) * 2016-12-21 2017-07-04 阿里巴巴集团控股有限公司 The login method of striding equipment, system and device
CN107026829A (en) * 2016-02-02 2017-08-08 深圳岂凡技术开发有限公司 A kind of cross-terminal carries out the interactive system and method for voice typing
CN108154020A (en) * 2017-12-20 2018-06-12 珠海市魅族科技有限公司 A kind of identifying code input and display methods and equipment
CN111726328A (en) * 2019-03-22 2020-09-29 阿里巴巴集团控股有限公司 Method, system and related device for remotely accessing a first device
CN112580014A (en) * 2020-12-24 2021-03-30 维沃移动通信有限公司 Verification code obtaining method and device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104348777B (en) * 2013-07-24 2019-04-09 腾讯科技(深圳)有限公司 The access control method and system of a kind of mobile terminal to third-party server

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106302339A (en) * 2015-05-25 2017-01-04 腾讯科技(深圳)有限公司 Login validation method and device, login method and device
CN107026829A (en) * 2016-02-02 2017-08-08 深圳岂凡技术开发有限公司 A kind of cross-terminal carries out the interactive system and method for voice typing
CN106209763A (en) * 2016-05-27 2016-12-07 北京畅游天下网络技术有限公司 A kind of login method and system
CN106921650A (en) * 2016-12-21 2017-07-04 阿里巴巴集团控股有限公司 The login method of striding equipment, system and device
CN106686016A (en) * 2017-03-20 2017-05-17 上海卓易科技股份有限公司 Identity confirmation method and apparatus
CN108154020A (en) * 2017-12-20 2018-06-12 珠海市魅族科技有限公司 A kind of identifying code input and display methods and equipment
CN111726328A (en) * 2019-03-22 2020-09-29 阿里巴巴集团控股有限公司 Method, system and related device for remotely accessing a first device
CN112580014A (en) * 2020-12-24 2021-03-30 维沃移动通信有限公司 Verification code obtaining method and device

Also Published As

Publication number Publication date
CN112272182A (en) 2021-01-26

Similar Documents

Publication Publication Date Title
EP3671731B1 (en) Discovering capabilities of third-party voice-enabled resources
EP3035652B1 (en) Processing method and system for automatic login based on mobile terminal
CN107111516B (en) Headless task completion in a digital personal assistant
US11288303B2 (en) Information search method and apparatus
US10347246B2 (en) Method and apparatus for executing a user function using voice recognition
US20220206994A1 (en) Method and Apparatus for Generating Multimedia File
CN106971009B (en) Voice database generation method and device, storage medium and electronic equipment
CN103456296A (en) Method for providing voice recognition function and electronic device thereof
CN103841268A (en) Information processing method and information processing device
US10853564B2 (en) Operation for copied content
WO2020038145A1 (en) Service data processing method and apparatus, and related device
CN111479250A (en) File sharing method, device and system and terminal equipment
CN101945178A (en) Method, system and mobile terminal for viewing news information
CN112272182B (en) Application login method, server, device, medium and computing device
US20140136196A1 (en) System and method for posting message by audio signal
CN104144199A (en) Information processing method, device and system
CN111627438A (en) Voice recognition method and device
US20220374618A1 (en) Interaction information processing method and apparatus, device, and medium
KR20180021152A (en) Information push method and apparatus
CN112491690A (en) Method for transmitting voice information, mobile terminal, computer storage medium and system
US7962963B2 (en) Multimodal resource management system
CN113672154B (en) Page interaction method, medium, device and computing equipment
CN112153430B (en) Device and method for controlling bank transfer of television edition application program by voice
CN111626684B (en) Intelligent tax processing method, device, terminal and medium
CN113421565A (en) Search method, search device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant