CN113127826B - Verification method and related device - Google Patents

Verification method and related device Download PDF

Info

Publication number
CN113127826B
CN113127826B CN202110461812.6A CN202110461812A CN113127826B CN 113127826 B CN113127826 B CN 113127826B CN 202110461812 A CN202110461812 A CN 202110461812A CN 113127826 B CN113127826 B CN 113127826B
Authority
CN
China
Prior art keywords
network
accessed
application program
target
determining
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110461812.6A
Other languages
Chinese (zh)
Other versions
CN113127826A (en
Inventor
姚小川
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Futuo Network Technology Shenzhen Co ltd
Original Assignee
Futuo Network Technology Shenzhen Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Futuo Network Technology Shenzhen Co ltd filed Critical Futuo Network Technology Shenzhen Co ltd
Priority to CN202110461812.6A priority Critical patent/CN113127826B/en
Publication of CN113127826A publication Critical patent/CN113127826A/en
Application granted granted Critical
Publication of CN113127826B publication Critical patent/CN113127826B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication

Abstract

The application provides a verification method and a related device, which are applied to a server, wherein the method comprises the following steps: receiving a login authorization verification request sent by a vehicle-mounted application program, wherein the login authorization verification request is used for processing a target application program on electronic equipment to perform authorization authentication; judging whether a message channel is established with the target application program or not; if yes, the login authorization verification request is sent to the target application program; receiving a login authorization verification result sent by the target application program; and sending the login authorization verification result to the vehicle-mounted application program, wherein the login authorization verification result is used for indicating the vehicle-mounted application program to perform authorization verification, so that convenience in login authorization can be improved.

Description

Verification method and related device
Technical Field
The present disclosure relates to the field of data processing technologies, and in particular, to a verification method and a related device.
Background
When the application program of the vehicle-mounted terminal and the application program on the electronic equipment are in authentication interaction, the application needs to poll and detect whether the vehicle-mounted application initiates an authorization verification request or not in a timing mode, and the application cannot receive the authorization verification request in an inactive state, so that convenience in authorization login is low.
Disclosure of Invention
The application provides a verification method and a related device, which can improve convenience in login authorization.
The first aspect of the present application provides an authentication method, applied to a server, the method comprising:
receiving a login authorization verification request sent by a vehicle-mounted application program, wherein the login authorization verification request is used for processing a target application program on electronic equipment to perform authorization authentication;
judging whether a message channel is established with the target application program or not;
if yes, the login authorization verification request is sent to the target application program;
receiving a login authorization verification result sent by the target application program;
and sending the login authorization verification result to the vehicle-mounted application program, wherein the login authorization verification result is used for indicating the vehicle-mounted application program to perform authorization verification.
A second aspect of an embodiment of the present application provides an authentication method, applied to an electronic device, where the method includes:
receiving a login authorization verification request sent by a server;
if the target application program is in an active state, determining a verification page according to the login authorization verification request;
displaying the verification page through the target application program;
Receiving verification information through the verification page;
determining a login authorization verification result according to the verification information;
and sending the login authorization verification result to the server, wherein the login authorization verification result is used for indicating the vehicle-mounted application program to perform authorization verification.
A third aspect of embodiments of the present application provides an authentication apparatus, applied to a server, including a receiving unit, a judging unit, and a transmitting unit, where,
the receiving unit is used for receiving a login authorization verification request sent by the vehicle-mounted application program, and the login authorization verification request is used for processing a target application program on the electronic equipment to carry out authorization authentication;
the judging unit is used for judging whether a message channel is established with the target application program or not;
the sending unit is used for sending the login authorization verification request to the target application program if yes;
the receiving unit is used for receiving a login authorization verification result sent by the target application program;
the sending unit is used for sending the login authorization verification result to the vehicle-mounted application program, and the login authorization verification result is used for indicating the vehicle-mounted application program to perform authorization verification.
A fourth aspect of the embodiments of the present application provides an authentication apparatus, applied to an electronic device, where the apparatus includes a receiving unit, a determining unit, a transmitting unit, and a display unit,
the receiving unit is used for receiving a login authorization verification request sent by the server;
the determining unit is used for determining a verification page according to the login authorization verification request if the target application program is in an active state;
the display unit is used for displaying the verification page through the target application program;
the receiving unit is used for receiving verification information through the verification page;
the determining unit is used for determining a login authorization verification result according to the verification information;
the sending unit is used for sending the login authorization verification result to the server, and the login authorization verification result is used for indicating the vehicle-mounted application program to perform authorization verification.
A fifth aspect of the embodiments of the present application provides a terminal, comprising a processor, an input device, an output device and a memory, the processor, the input device, the output device and the memory being interconnected, wherein the memory is configured to store a computer program, the computer program comprising program instructions, the processor being configured to invoke the program instructions to perform the step instructions as in the second aspect of the embodiments of the present application.
A sixth aspect of the embodiments of the present application provides a computer-readable storage medium, wherein the computer-readable storage medium stores a computer program for electronic data exchange, wherein the computer program causes a computer to perform part or all of the steps as described in the first aspect or the second aspect of the embodiments of the present application.
A seventh aspect of the embodiments of the present application provides a computer program product, wherein the computer program product comprises a non-transitory computer readable storage medium storing a computer program operable to cause a computer to perform part or all of the steps as described in the first or second aspects of the embodiments of the present application. The computer program product may be a software installation package.
The implementation of the embodiment of the application has at least the following beneficial effects:
the method comprises the steps that a login authorization verification request sent by a vehicle-mounted application program is received through a server, the login authorization verification request is used for processing a target application program on the electronic device to conduct authorization verification, the server judges whether a message channel is established with the target application program, if so, the server sends the login authorization verification request to the target application program, the electronic device displays a verification page through the target application program, the electronic device receives verification information through the verification page, the electronic device determines a login authorization verification result according to the verification information, the server receives the login authorization verification result sent by the target application program and sends the login authorization verification result to the vehicle-mounted application program, the login authorization verification result is used for indicating the vehicle-mounted application program to conduct login authorization verification, compared with complex authorization modes in the existing scheme, such as a code scanning authorization mode, the login authorization verification result can be indicated by the vehicle-mounted application program to conduct login authorization verification through the verification page according to the verification information, and convenience of login authorization verification is improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described below, it being obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is an interactive schematic diagram of a verification method according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of a server according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of an electronic device according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of a verification device according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of a verification device according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are only some, but not all, of the embodiments of the present application. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the present disclosure, are within the scope of the present disclosure.
The terms first, second and the like in the description and in the claims of the present application and in the above-described figures, are used for distinguishing between different objects and not for describing a particular sequential order. Furthermore, the terms "comprise" and "have," as well as any variations thereof, are intended to cover a non-exclusive inclusion. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those listed steps or elements but may include other steps or elements not listed or inherent to such process, method, article, or apparatus.
Reference in the specification to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment may be included in at least one embodiment of the application. The appearances of such phrases in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Those of skill in the art will explicitly and implicitly understand that the embodiments described herein may be combined with other embodiments.
Referring to fig. 1, fig. 1 is an interaction schematic diagram of a verification method according to an embodiment of the present application. As shown in fig. 1, the device involved in the interaction method includes: the method comprises the steps that the vehicle-mounted terminal, the server and the electronic equipment are used for processing related application programs, wherein the related application programs comprise vehicle-mounted application programs and application programs on the electronic equipment, and the method comprises the following steps:
S101, a vehicle-mounted application program on the vehicle-mounted terminal sends a login authorization verification request to a server.
The in-vehicle application program on the in-vehicle terminal may be any application program that needs login authorization verification on the electronic device, for example, may be a stock application program, a life application program, a chat application program, and the like.
The vehicle-mounted application program can send a login authorization verification request to the server through a transceiver device of the vehicle-mounted terminal.
The login authorization verification request carries a routing table and the like, and the routing table and the like are sent to the server according to a fixed routing rule. The login authorization verification request carries an identifier of the target application program and the like, and carries information for requesting the target application program to perform login authorization verification.
S102, after receiving the login authorization verification request, the server judges whether a message channel is established between the server and a target application program in the electronic equipment.
The server may be a cloud server, a server cluster, or the like.
The message channel is a communication channel established between the server and the target application, and may be a TCP long connection channel.
If the message channel exists, it may be determined that the target application is in an active state, where the active state may be understood as that the target application may receive the transmitted message, perform other corresponding operations with the target application, and so on. The active state is opposite to the inactive state, and the inactive state may be understood as that the electronic device shuts down the target application program or causes the target application program to only keep in a background suspended state for energy saving, and so on.
And S103, if yes, the server sends a login authorization verification request to the electronic equipment.
The server forwards the login authorization verification request to the electronic device.
S104, the target application program in the electronic equipment determines a verification page according to the login authorization verification request.
According to the login authorization verification request, the method for determining the verification page can be as follows: and generating a template according to a preset verification page, and determining the verification page. The verification page generation template is a preset template, and specific setting rules can be set through experience data and the like.
The verification page is used for prompting the user to carry out authorized login verification, and verification prompt information such as whether login is allowed, whether authorization is allowed and the like is included in the verification page.
S105, the target application program displays the verification page.
When the target application program displays the verification page, the verification page is displayed after the window currently displayed on the electronic equipment is closed. After the currently displayed window is closed, the verification page is displayed, the situation that the windows are stacked can be avoided, and convenience in operation is improved.
S106, the electronic equipment receives the verification information, and the electronic equipment determines a login authorization verification result according to the verification information.
The method for receiving the verification message by the electronic device can be received by a manual input mode of a user, or can be received by voice recognition of a target user according to a voice mode.
The method for determining the login authorization verification result according to the verification information can be as follows: and obtaining keywords in the verification information, and determining login authorization verification results according to the keywords. Keywords may be, for example, "allow," "yes," "may," etc., words including but not limited to positive replies, or "disallow," "cannot," "may," etc., words including but not limited to negative replies. The login authorization verification result includes authorization indication information, which can be determined according to the keywords, and specifically, whether the login authorization verification result is authorized or not can be indicated according to the keywords. The keyword is a word which is affirmatively replied, and then the keyword represents authorization, and whether the keyword is a word which is affirmed to be replied or not, and then the keyword represents non-authorization. Of course, the authorization indication information may indicate whether the authorization is authorized by other means, for example, "0" indicates authorization, "1" indicates unauthorized, etc. Wherein, "0" corresponds to a word whose keyword is a positive reply and "1" corresponds to a word whose keyword is a negative reply.
And S107, the electronic equipment sends a login authorization verification result to the server.
S108, after receiving the login authorization verification result, the server sends the login authorization verification result to the vehicle-mounted terminal.
S109, the vehicle-mounted terminal performs authorization verification according to the login authorization verification result.
The vehicle-mounted terminal analyzes the login authorization verification result to obtain authorization indication information for authorization verification, which can be specifically: and if the keyword is the keyword of the positive reply, the login is carried out, and if the keyword is the keyword of the negative reply, the login is canceled.
In this example, a server receives a login authorization verification request sent by a vehicle-mounted application program, the login authorization verification request is used for processing a target application program on the electronic device to perform authorization verification, the server judges whether a message channel is established with the target application program, if so, the server sends the login authorization verification request to the target application program, the electronic device displays the verification page through the target application program, the electronic device receives verification information through the verification page, the electronic device determines a login authorization verification result according to the verification information, the server receives the login authorization verification result sent by the target application program, sends the login authorization verification result to the vehicle-mounted application program, the login authorization verification result is used for indicating the vehicle-mounted application program to perform login authorization verification, and compared with complex authorization modes in the existing scheme, such as a code scanning authorization mode, the like, the login authorization verification can be performed through the verification page displayed by the electronic device, the login authorization verification result is determined according to the verification information, the login authorization verification result indicates the vehicle-mounted application program to perform authorization verification, and convenience of login authorization verification is improved.
In one possible implementation manner, if the server determines that the message channel is not established with the target application program, a message is sent to the electronic device or the target application program, where the message is used to notify the target application program to establish the message channel. Specifically, when the target application program is in an active state, a message channel is established with the server. Sending a message to the electronic device may be understood as sending a short message to the electronic device, and the target application may be system information or the like.
In one possible implementation, when the server sends the login authorization verification message, the target application is in an active state, and after the electronic device receives the login authorization verification message, the electronic device may execute the following method when the target application is in an inactive state:
and if the target application program is in an inactive state, storing the login authorization verification request.
After the login authorization verification request is stored, pushing the login authorization verification request to the target application program when the target application program is in an active state, and pushing the login authorization verification request with the shortest storage time when the login authorization verification request is pushed.
In one possible implementation manner, the method can further comprise the steps of establishing a message channel, which is specifically as follows:
and if the target application program is in an active state, establishing a message channel between the target application program and the server, wherein the message channel is used for transmitting the login authorization verification request or feeding back the login authorization verification result.
In one possible implementation manner, the electronic device may further perform exception handling, specifically including:
a1, acquiring a page state of the target application program;
a2, if the page state is an abnormal page state, acquiring abnormal information;
a3, determining an abnormality type according to the abnormality information;
and A4, performing exception handling according to the exception type.
The page states include a normal page state, which can be understood as a page state when the target application is operating normally, and an abnormal page state.
The abnormal information may be understood as a cause of generating an abnormal page state, for example, the abnormal page state is a network-free state, and the abnormal information may be a network disconnection cause, specifically, for example, a mobile network is not turned on, the electronic device is in a flight state, the electronic device does not search for a mobile network signal, and the like.
The anomaly information corresponds to an anomaly type, e.g., the anomaly information is a cause of a network outage, and the anomaly type is a network anomaly.
The method for carrying out exception handling according to the exception type can be as follows: and obtaining an exception handling method corresponding to the exception type, and performing exception handling according to the method. The method for the abnormality type may be preset.
In this example, when the page state is an abnormal page state, the exception processing is performed, so that the reliability is improved.
In one possible implementation manner, when the anomaly type is a network anomaly, the method for performing anomaly processing according to the anomaly type includes:
b1, acquiring network quality of the N reference networks, wherein the reference networks are networks within a preset range of the electronic equipment, and N is a positive integer greater than or equal to 2;
b2, determining a first network to be accessed and a second network to be accessed from the N reference networks according to the network quality, wherein the network quality of the first network to be accessed is higher than that of the second network to be accessed;
b3, acquiring a first distance between the electronic equipment and the access equipment of the first network to be accessed, and acquiring a second distance between the electronic equipment and the access equipment of the second network to be accessed;
B4, determining a first access probability of the first network to be accessed and a second access probability of the second generation access network according to the first distance and the second distance;
b5, acquiring a first network type of the first network to be accessed and acquiring a second network type of the second network to be accessed;
b6, acquiring network access tendency of a target user, wherein the target user is a user operating the target application program;
b7, determining a third access probability of the first network to be accessed and a fourth access probability of the second network to be accessed according to the first network type, the second network type and the network access tendency;
b8, determining a first target access probability of the first network to be accessed according to the first access probability and the third access probability, and determining a second target access probability of the first network to be accessed according to the second access probability and the fourth access probability;
b9, determining a target network to be accessed from the first network to be accessed and the second network to be accessed according to the first target access probability and the second target access probability;
And B10, accessing the electronic equipment to the target network to be accessed.
The reference network is a network within a preset range of the electronic device and can be understood as: the distance between the access device and the electronic device of the reference network is smaller than a preset distance, and the preset distance is set through an empirical value or historical data. The reference network is a network that the electronic device can access, such as a WIFI network, a mobile network, and the like.
The network quality may be understood as that the higher the energy value, the better the network quality, and the lower the energy value, the worse the network quality, when the electronic device receives energy of a probe frame or the like transmitted by the reference network.
The method for determining the first network to be accessed and the second network to be accessed from the N reference networks may be to sequence the N reference networks according to the network quality from high to low, determine the network with the highest network quality as the first network to be accessed, and determine the network sequenced as the third position as the second network to be accessed. The network ordered to the third position is determined to be the second network to be accessed, so that the situation that the network quality ordered to the first position and the network quality ordered to the second position are very close and cannot be selected (the situation usually adopts a random selection mode and adopts random selection to have uncertainty) can be avoided, and the accuracy of selecting the network to be accessed is improved.
The first access probability is high if the first distance is short, and the first access probability is lower if the first distance is longer. The second distance determines the second access probability by referring to the first distance.
The network access propensity of the target user may be understood as the preference of the target user to the type of network accessing the network. The discrimination can be performed specifically by the number of times the target user accesses the network type, and the higher the number of times, the more prone the network type is.
And determining the similarity between the network type to which the target user tends to access and the first network type, and determining a third access probability according to the similarity. The method of determining the fourth probability is the same as the method of determining the third probability. The higher the similarity, the larger the third access probability, and the lower the similarity, the smaller the third access probability. The similarity between network types can be understood as: and if the network type to which the target user tends to access is a first merchant WIFI network and the first network type is a second merchant WIFI network, determining the similarity between the network types according to the similarity between commodities of the first merchant and the second merchant. For example, the first merchant and the second merchant are both apparel, so that the similarity is high, the first merchant is apparel, and the second merchant is catering, so that the similarity is low.
The average of the first access probability and the third access probability may be determined as the first target access probability. The minimum value between the second access probability and the fourth access probability may be determined as the second target access probability.
And determining the network corresponding to the maximum value in the first target access probability and the second target access probability as a target network to be accessed.
In the example, when the network is abnormal, the target network to be accessed is determined through the distance between the first network to be accessed and the second network to be accessed and the network type, so that the accuracy of the target network to be accessed in determining is improved.
In one possible implementation, a voice control message may also be received to play the corresponding information, as follows:
c1, if the authorization verification is successful, receiving a voice control message;
c2, determining information audio to be played according to the voice control message;
and C3, playing the information audio to be played.
If the authorization verification of the vehicle-mounted application program is successful, the message intercommunication between the vehicle-mounted application program and the terminal equipment can be realized, and the terminal equipment can receive the voice control message sent by the user. The voice control message may be received by a microphone or the like, and the voice control message carries information of the information audio to be played, where the information may be, for example, a name of the information audio to be played, a price identifier (for example, price or the like) included in the information audio to be played, and switching information, and may specifically be, for example, information including "listen+stock name+price", "stock name", and the like. The switching information may be, for example, a switching action, for example, switching to the previous piece of information and switching to the next piece of information.
The corresponding information audio to be played can be determined according to the name carried in the voice control message. The information audio to be played can also be determined according to the information play list and the switching information. For example, the switching information is to switch to the next information, and then the next information of the currently played information audio can be determined according to the information playlist and the currently played information audio.
If the information audio currently played is not the last information audio of the information playlist, determining that the information audio to be played is empty, and displaying prompt information, wherein the prompt information can be 'no more information', 'no more information'. If there is no information play list, it is determined that the information audio to be played is empty, and the processing mode is the same as the processing mode of the last information audio of the information audio non-information play list.
Of course, the voice control message may also carry a trigger time of the information audio to be played, and the information audio to be played may be determined according to the trigger time. The trigger timing may be, for example: play headline information, play headline, play fast news information, etc.
The method for determining the information audio to be played according to the triggering time can be as follows: according to the specific trigger time, determining the corresponding information audio to be played, for example, playing the text information, then determining the text information as the information audio to be played, and the like.
The voice control message may further carry a play instruction, where the play instruction includes: play, pause, close, etc. The audio may be play controlled according to the play instruction.
In one possible implementation manner, the player type may also be indicated to play the information according to the corresponding player type, and the method specifically includes:
d1, if the authorization verification is successful, receiving playing indication information;
d2, determining the type of the player according to the play indication information;
and D3, playing information according to the player type.
The play indication information may be received through an indication button, for example, the play indication information may be received through a player indication button, and the button may specifically include: the close button of the widget player, the stow button of the widget player, the return button of the widget player, which can be understood as switching the widget player to a big window player. The indication information may be user-triggered.
The play indication information may carry a player type, where the player type includes a small window player and a large window player, the small window player may be understood as a player whose play window is smaller than a preset area, or may be a player whose play window is smaller than a preset proportion of a display screen, and the large window player may be understood as a player whose play window is larger than a preset area, or may be a player whose play window is larger than a preset proportion of a display screen, for example, a full screen player. The preset ratio is set by empirical values or historical data.
In this example, the player type of the information can be determined through the received play indication information, so that a user can adjust the player type by sending the play indication information, and convenience in playing the information is improved.
In one possible implementation manner, if an application program corresponding to the vehicle-mounted application program does not exist on the terminal device, the vehicle-mounted application program may be acquired before receiving a login authorization verification request sent by the vehicle-mounted application program, which specifically includes:
e1, displaying target downloading information on a vehicle-mounted terminal where a vehicle-mounted application program is located;
e2, the terminal equipment acquires an installation package of the target vehicle-mounted application program according to the target download message;
And E3, installing the vehicle-mounted application program according to the installation package.
The target download information may be a two-dimensional code including a download address of the in-vehicle application. For example, the two-dimensional code may be displayed on a display of the in-vehicle terminal.
The terminal equipment can scan the code through the camera to obtain the download address stored in the two-dimensional code, download the installation package according to the download address, and install the vehicle-mounted application program after the download is completed.
In the example, the terminal equipment acquires the vehicle-mounted application program by displaying the target downloading information, so that the convenience in acquiring the vehicle-mounted application program is improved.
In one possible implementation manner, there may be multiple sending login authorization verification requests by the vehicle application program, where the multiple sending login authorization verification requests may be sent by the same device or may be sent by multiple different devices, and specifically the multiple sending login authorization verification requests may be processed by the following manner:
the electronic equipment receives a plurality of login authorization verification requests sent by a server, judges whether a target application program is in an active state after receiving the login authorization verification requests, if the target application program is in an inactive state, the electronic equipment pushes notification messages in a notification column, the number of the notification messages is the same as the number of the authorization login verification requests, for example, after receiving one login authorization verification request, one notification message is pushed. The notification bar can have a plurality of notification messages at the same time, after a user clicks any notification message in the plurality of notification messages, the verification page displayed after opening the target application program is the verification page corresponding to the latest login authorization verification request, and the latest login authorization verification request can be understood as the login authorization verification request finally received in the plurality of login authorization verification requests.
If the target application program is in an active state, the verification page adopts a repeated refreshing method to ensure that the verification page which is currently displayed is the verification page corresponding to the latest login authorization verification request.
In one possible implementation, the user may also log in the vehicle application, for example, if the user does not log in, an operation button for authorizing the login is displayed on the vehicle application, so that the user may log in according to clicking the operation button. When the user logs in, if the user does not register in the vehicle-mounted application program, the user can log in through the mobile phone number and the like, specifically, the vehicle-mounted application program can acquire the mobile phone number associated with the user or the user inputs the mobile phone number to log in, and the operation of registering in the vehicle-mounted application program is not required to be triggered, so that the operation of logging in on the vehicle-mounted application program can be completed. The mobile phone number used by the user can be the same as or different from the mobile phone number used by the user for logging in the target application program. Of course, the user may log in through other identifiers, which are the same as the identifiers used in the target application when the user logs in, and the present invention is not limited in detail herein.
After the user logs in, a login authorization verification request is sent to the server, the server sends the login authorization verification request to the target application program, the target application program displays a verification page corresponding to the authorization login verification request, and the like, and specific operations of the server, the vehicle-mounted application program and the electronic device can be the same as those of the method for processing the login authorization verification request in the previous embodiment.
In a specific example, a user triggers a login button in a vehicle-mounted application program, the vehicle-mounted application program judges whether the user has logged in, if so, the login button is triggered to acquire the mobile phone number of the user, and a login verification window is displayed, wherein the login verification window is used for triggering whether to send a login authorization verification request, a confirmation button and a cancel button are displayed on the login verification window, if the user triggers the confirmation button, the login authorization verification request is sent, and if the user triggers the cancel button, the login authorization verification request is not sent. If the login authorization verification request is triggered, the login authorization verification request is sent to the server, the server sends the login authorization verification request to the target application program, the target application program displays a verification page corresponding to the login authorization verification request, and the like, and the specific operation of the server, the vehicle-mounted application program and the electronic equipment can be the same as the method for processing the login authorization verification request in the previous embodiment.
If the user does not log in, judging whether the user logs in by using the electronic equipment to scan the code (for example, the vehicle-mounted application program displays a login two-dimensional code, the user uses the electronic equipment to scan the code to log in), if the user logs in, triggering a login button to acquire the mobile phone number of the user, displaying a login verification window, wherein the login verification window is used for triggering whether to send a login authorization verification request, displaying a confirmation button and a cancel button on the login verification window, if the user triggers the confirmation button, sending the login authorization verification request, and if the user triggers the cancel button, not sending the login authorization verification request. If the login authorization verification request is triggered, the login authorization verification request is sent to the server, the server sends the login authorization verification request to the target application program, the target application program displays a verification page corresponding to the login authorization verification request, and the like, and the specific operation of the server, the vehicle-mounted application program and the electronic equipment can be the same as the method for processing the login authorization verification request in the previous embodiment.
In accordance with the foregoing embodiments, referring to fig. 2, fig. 2 is a schematic structural diagram of a server provided in an embodiment of the present application, where the server includes a processor and a memory, and the processor and the memory are connected to each other, where the memory is configured to store a computer program, the computer program includes program instructions, the processor is configured to call the program instructions, and the program includes instructions for performing the following steps;
Receiving a login authorization verification request sent by a vehicle-mounted application program, wherein the login authorization verification request is used for processing a target application program on electronic equipment to perform authorization authentication;
judging whether a message channel is established with the target application program or not;
if yes, the login authorization verification request is sent to the target application program;
receiving a login authorization verification result sent by the target application program;
and sending the login authorization verification result to the vehicle-mounted application program, wherein the login authorization verification result is used for indicating the vehicle-mounted application program to perform authorization verification.
In accordance with the foregoing embodiments, referring to fig. 3, fig. 3 is a schematic structural diagram of an electronic device provided in an embodiment of the present application, where the electronic device includes a processor, an input device, an output device, and a memory, and the processor, the input device, the output device, and the memory are connected to each other, where the memory is configured to store a computer program, the computer program includes program instructions, the processor is configured to invoke the program instructions, and the program includes instructions for performing the following steps;
receiving a login authorization verification request sent by a server;
If the target application program is in an active state, determining a verification page according to the login authorization verification request;
displaying the verification page through the target application program;
receiving verification information through the verification page;
determining a login authorization verification result according to the verification information;
and sending the login authorization verification result to the server, wherein the login authorization verification result is used for indicating the vehicle-mounted application program to perform authorization verification.
The foregoing description of the embodiments of the present application has been presented primarily in terms of a method-side implementation. It will be appreciated that, in order to achieve the above-mentioned functions, the terminal includes corresponding hardware structures and/or software modules for performing the respective functions. Those of skill in the art will readily appreciate that the elements and algorithm steps described in connection with the embodiments disclosed herein may be embodied as hardware or a combination of hardware and computer software. Whether a function is implemented as hardware or computer software driven hardware depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
The embodiment of the application may divide the functional units of the terminal according to the above method example, for example, each functional unit may be divided corresponding to each function, or two or more functions may be integrated in one processing unit. The integrated units may be implemented in hardware or in software functional units. It should be noted that, in the embodiment of the present application, the division of the units is schematic, which is merely a logic function division, and other division manners may be implemented in actual practice.
In accordance with the foregoing, referring to fig. 4, fig. 4 is a schematic structural diagram of a verification apparatus according to an embodiment of the present application. As shown in fig. 4, the apparatus is applied to a server, and the apparatus includes a receiving unit 401, a judging unit 402, and a transmitting unit 403, wherein,
the receiving unit 401 is configured to receive a login authorization verification request sent by a vehicle-mounted application, where the login authorization verification request is used to process authorization authentication of a target application on an electronic device;
a judging unit 402, configured to judge whether to establish a message channel with the target application program;
the sending unit 403 is configured to send the login authorization verification request to the target application if yes;
The receiving unit 401 is configured to receive a login authorization verification result sent by the target application program;
the sending unit is configured to send 403 the login authorization verification result to the vehicle-mounted application, where the login authorization verification result is used to instruct the vehicle-mounted application to perform authorization verification.
In one possible implementation, the apparatus is further configured to:
and if the message channel is not established with the target application program, sending a message to the electronic equipment or the target application program, wherein the message is used for informing the target application program to establish the message channel.
In accordance with the foregoing, referring to fig. 5, fig. 5 is a schematic structural diagram of a verification apparatus according to an embodiment of the present application. As shown in fig. 5, the apparatus is applied to an electronic device, and the apparatus includes a receiving unit 501, a determining unit 502, a transmitting unit 503, and a presenting unit 504, wherein,
the receiving unit 501 is configured to receive a login authorization verification request sent by a server;
the determining unit 502 is configured to determine a verification page according to the login authorization verification request if the target application is in an active state;
the displaying unit 504 is configured to display the verification page through the target application program;
The receiving unit 501 is configured to receive verification information through the verification page;
the determining unit 502 is configured to determine a login authorization verification result according to the verification information;
the sending unit 503 is configured to send the login authorization verification result to the server, where the login authorization verification result is used to instruct the vehicle-mounted application program to perform authorization verification.
In one possible implementation, the apparatus is further configured to:
and if the target application program is in an inactive state, storing the login authorization verification request.
In one possible implementation, the apparatus is further configured to:
and if the target application program is in an active state, establishing a message channel between the target application program and the server, wherein the message channel is used for transmitting the login authorization verification request or feeding back the login authorization verification result.
In one possible implementation, the apparatus is further configured to:
acquiring the page state of the target application program;
if the page state is an abnormal page state, acquiring abnormal information;
determining an abnormality type according to the abnormality information;
and performing exception handling according to the exception type.
In one possible implementation, the exception type includes a network exception, and in the aspect of exception handling according to the exception type, the apparatus is further configured to:
acquiring network quality of the N reference networks, wherein the reference networks are networks within a preset range of the electronic equipment, and N is a positive integer greater than or equal to 2;
determining a first network to be accessed and a second network to be accessed from the N reference networks according to the network quality, wherein the network quality of the first network to be accessed is higher than that of the second network to be accessed;
acquiring a first distance between the electronic equipment and access equipment of the first network to be accessed, and acquiring a second distance between the electronic equipment and the access equipment of the second network to be accessed;
determining a first access probability of the first network to be accessed and a second access probability of the second generation access network according to the first distance and the second distance;
acquiring a first network type of the first network to be accessed and acquiring a second network type of the second network to be accessed;
acquiring network access tendency of a target user, wherein the target user is a user for operating the target application program;
Determining a third access probability of the first network to be accessed and a fourth access probability of the second network to be accessed according to the first network type, the second network type and the network access tendency;
determining a first target access probability of the first network to be accessed according to the first access probability and the third access probability, and determining a second target access probability of the first network to be accessed according to the second access probability and the fourth access probability;
determining a target network to be accessed from the first network to be accessed and the second network to be accessed according to the first target access probability and the second target access probability;
and accessing the electronic equipment to the target network to be accessed.
The present application also provides a computer storage medium storing a computer program for electronic data exchange, the computer program causing a computer to execute some or all of the steps of any one of the authentication methods described in the above method embodiments.
Embodiments of the present application also provide a computer program product comprising a non-transitory computer-readable storage medium storing a computer program that causes a computer to perform some or all of the steps of any one of the verification methods described in the method embodiments above.
It should be noted that, for simplicity of description, the foregoing method embodiments are all expressed as a series of action combinations, but it should be understood by those skilled in the art that the present application is not limited by the order of actions described, as some steps may be performed in other order or simultaneously in accordance with the present application. Further, those skilled in the art will also appreciate that the embodiments described in the specification are all preferred embodiments, and that the acts and modules referred to are not necessarily required in the present application.
In the foregoing embodiments, the descriptions of the embodiments are emphasized, and for parts of one embodiment that are not described in detail, reference may be made to related descriptions of other embodiments.
In the several embodiments provided in this application, it should be understood that the disclosed apparatus may be implemented in other ways. For example, the apparatus embodiments described above are merely illustrative, such as the division of the units, merely a logical function division, and there may be additional manners of dividing the actual implementation, such as multiple units or components may be combined or integrated into another system, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, or may be in electrical or other forms.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in each embodiment of the present invention may be integrated in one processing unit, each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units described above may be implemented either in hardware or in software program modules.
The integrated units, if implemented in the form of software program modules, may be stored in a computer-readable memory for sale or use as a stand-alone product. Based on such understanding, the technical solution of the present application may be embodied in essence or a part contributing to the prior art or all or part of the technical solution in the form of a software product stored in a memory, including several instructions for causing a computer device (which may be a personal computer, a server or a network device, etc.) to perform all or part of the steps of the method described in the embodiments of the present application. And the aforementioned memory includes: a U-disk, a read-only memory (ROM), a random access memory (random access memory, RAM), a removable hard disk, a magnetic disk, or an optical disk, or other various media capable of storing program codes.
Those of ordinary skill in the art will appreciate that all or a portion of the steps in the various methods of the above embodiments may be implemented by a program that instructs associated hardware, and the program may be stored in a computer readable memory, which may include: flash disk, read-only memory, random access memory, magnetic or optical disk, etc.
The foregoing has outlined rather broadly the more detailed description of embodiments of the present application, wherein specific examples are provided herein to illustrate the principles and embodiments of the present application, the above examples being provided solely to assist in the understanding of the methods of the present application and the core ideas thereof; meanwhile, as those skilled in the art will have modifications in the specific embodiments and application scope in accordance with the ideas of the present application, the present description should not be construed as limiting the present application in view of the above.

Claims (10)

1. A method of authentication, for use with a server, the method comprising:
receiving a login authorization verification request sent by a vehicle-mounted application program, wherein the login authorization verification request is used for processing a target application program on electronic equipment to perform authorization authentication;
judging whether a message channel is established with the target application program or not;
If yes, the login authorization verification request is sent to the target application program;
receiving a login authorization verification result sent by the target application program;
the login authorization verification result is sent to the vehicle-mounted application program, and the login authorization verification result is used for indicating the vehicle-mounted application program to perform authorization verification;
the target application is further configured to:
acquiring the page state of the target application program; if the page state is an abnormal page state, acquiring abnormal information; determining an abnormality type according to the abnormality information; performing exception handling according to the exception type; when the anomaly type is network anomaly, the method for carrying out anomaly processing according to the anomaly type comprises the following steps: acquiring network quality of N reference networks, wherein the reference networks are networks within a preset range of the electronic equipment, and N is a positive integer greater than or equal to 2; determining a first network to be accessed and a second network to be accessed from the N reference networks according to the network quality, wherein the network quality of the first network to be accessed is higher than that of the second network to be accessed; acquiring a first distance between the electronic equipment and access equipment of the first network to be accessed, and acquiring a second distance between the electronic equipment and the access equipment of the second network to be accessed; determining a first access probability of the first network to be accessed and a second access probability of the second network to be accessed according to the first distance and the second distance; acquiring a first network type of the first network to be accessed and acquiring a second network type of the second network to be accessed; acquiring network access tendency of a target user, wherein the target user is a user for operating the target application program; determining a third access probability of the first network to be accessed and a fourth access probability of the second network to be accessed according to the first network type, the second network type and the network access tendency; determining a first target access probability of the first network to be accessed according to the first access probability and the third access probability, and determining a second target access probability of the first network to be accessed according to the second access probability and the fourth access probability; determining a target network to be accessed from the first network to be accessed and the second network to be accessed according to the first target access probability and the second target access probability; and accessing the electronic equipment to the target network to be accessed.
2. The method according to claim 1, wherein the method further comprises:
and if the message channel is not established with the target application program, sending a message to the electronic equipment or the target application program, wherein the message is used for informing the target application program to establish the message channel.
3. A method of authentication, for application to an electronic device, the method comprising:
receiving a login authorization verification request sent by a server;
if the target application program is in an active state, determining a verification page according to the login authorization verification request;
displaying the verification page through the target application program;
receiving verification information through the verification page;
determining a login authorization verification result according to the verification information;
the login authorization verification result is sent to the server, and the login authorization verification result is used for the server to instruct the vehicle-mounted application program to carry out authorization verification;
the method further comprises the steps of:
acquiring the page state of the target application program;
if the page state is an abnormal page state, acquiring abnormal information;
determining an abnormality type according to the abnormality information;
Performing exception handling according to the exception type;
when the anomaly type is network anomaly, the method for carrying out anomaly processing according to the anomaly type comprises the following steps:
acquiring network quality of N reference networks, wherein the reference networks are networks within a preset range of the electronic equipment, and N is a positive integer greater than or equal to 2;
determining a first network to be accessed and a second network to be accessed from the N reference networks according to the network quality, wherein the network quality of the first network to be accessed is higher than that of the second network to be accessed;
acquiring a first distance between the electronic equipment and access equipment of the first network to be accessed, and acquiring a second distance between the electronic equipment and the access equipment of the second network to be accessed;
determining a first access probability of the first network to be accessed and a second access probability of the second network to be accessed according to the first distance and the second distance;
acquiring a first network type of the first network to be accessed and acquiring a second network type of the second network to be accessed;
acquiring network access tendency of a target user, wherein the target user is a user for operating the target application program;
Determining a third access probability of the first network to be accessed and a fourth access probability of the second network to be accessed according to the first network type, the second network type and the network access tendency;
determining a first target access probability of the first network to be accessed according to the first access probability and the third access probability, and determining a second target access probability of the first network to be accessed according to the second access probability and the fourth access probability;
determining a target network to be accessed from the first network to be accessed and the second network to be accessed according to the first target access probability and the second target access probability;
and accessing the electronic equipment to the target network to be accessed.
4. A method according to claim 3, characterized in that the method further comprises:
and if the target application program is in an inactive state, storing the login authorization verification request.
5. The method according to claim 3 or 4, characterized in that the method further comprises:
and if the target application program is in an active state, establishing a message channel between the target application program and the server, wherein the message channel is used for transmitting the login authorization verification request or feeding back the login authorization verification result.
6. The method of claim 5, wherein the method further comprises:
if the authorization verification is successful, receiving a voice control message;
determining information audio to be played according to the voice control message;
and playing the information audio to be played.
7. The method of claim 6, wherein the method further comprises:
if the authorization verification is successful, receiving playing indication information;
determining the type of the player according to the play indication information;
and playing information according to the player type.
8. An authentication device, characterized in that it is applied to a server, said device comprising a receiving unit, a judging unit and a transmitting unit, wherein,
the receiving unit is used for receiving a login authorization verification request sent by the vehicle-mounted application program, and the login authorization verification request is used for processing a target application program on the electronic equipment to carry out authorization authentication;
the judging unit is used for judging whether a message channel is established with the target application program or not;
the sending unit is used for sending the login authorization verification request to the target application program if yes;
the receiving unit is used for receiving a login authorization verification result sent by the target application program;
The sending unit is used for sending the login authorization verification result to the vehicle-mounted application program, and the login authorization verification result is used for indicating the vehicle-mounted application program to perform authorization verification; the target application is further configured to:
acquiring the page state of the target application program; if the page state is an abnormal page state, acquiring abnormal information; determining an abnormality type according to the abnormality information; performing exception handling according to the exception type; when the anomaly type is network anomaly, the method for carrying out anomaly processing according to the anomaly type comprises the following steps: acquiring network quality of N reference networks, wherein the reference networks are networks within a preset range of the electronic equipment, and N is a positive integer greater than or equal to 2; determining a first network to be accessed and a second network to be accessed from the N reference networks according to the network quality, wherein the network quality of the first network to be accessed is higher than that of the second network to be accessed; acquiring a first distance between the electronic equipment and access equipment of the first network to be accessed, and acquiring a second distance between the electronic equipment and the access equipment of the second network to be accessed; determining a first access probability of the first network to be accessed and a second access probability of the second network to be accessed according to the first distance and the second distance; acquiring a first network type of the first network to be accessed and acquiring a second network type of the second network to be accessed; acquiring network access tendency of a target user, wherein the target user is a user for operating the target application program; determining a third access probability of the first network to be accessed and a fourth access probability of the second network to be accessed according to the first network type, the second network type and the network access tendency; determining a first target access probability of the first network to be accessed according to the first access probability and the third access probability, and determining a second target access probability of the first network to be accessed according to the second access probability and the fourth access probability; determining a target network to be accessed from the first network to be accessed and the second network to be accessed according to the first target access probability and the second target access probability; and accessing the electronic equipment to the target network to be accessed.
9. An authentication apparatus, characterized in that it is applied to an electronic device, comprises a receiving unit, a determining unit, a transmitting unit, and a display unit, wherein,
the receiving unit is used for receiving a login authorization verification request sent by the server;
the determining unit is used for determining a verification page according to the login authorization verification request if the target application program is in an active state;
the display unit is used for displaying the verification page through the target application program;
the receiving unit is used for receiving verification information through the verification page;
the determining unit is used for determining a login authorization verification result according to the verification information;
the sending unit is used for sending the login authorization verification result to the server, and the login authorization verification result is used for indicating the vehicle-mounted application program to perform authorization verification;
the device is also for:
acquiring the page state of the target application program;
if the page state is an abnormal page state, acquiring abnormal information;
determining an abnormality type according to the abnormality information;
performing exception handling according to the exception type;
when the anomaly type is network anomaly, the method for carrying out anomaly processing according to the anomaly type comprises the following steps:
Acquiring network quality of N reference networks, wherein the reference networks are networks within a preset range of the electronic equipment, and N is a positive integer greater than or equal to 2;
determining a first network to be accessed and a second network to be accessed from the N reference networks according to the network quality, wherein the network quality of the first network to be accessed is higher than that of the second network to be accessed;
acquiring a first distance between the electronic equipment and access equipment of the first network to be accessed, and acquiring a second distance between the electronic equipment and the access equipment of the second network to be accessed;
determining a first access probability of the first network to be accessed and a second access probability of the second network to be accessed according to the first distance and the second distance;
acquiring a first network type of the first network to be accessed and acquiring a second network type of the second network to be accessed;
acquiring network access tendency of a target user, wherein the target user is a user for operating the target application program;
determining a third access probability of the first network to be accessed and a fourth access probability of the second network to be accessed according to the first network type, the second network type and the network access tendency;
Determining a first target access probability of the first network to be accessed according to the first access probability and the third access probability, and determining a second target access probability of the first network to be accessed according to the second access probability and the fourth access probability;
determining a target network to be accessed from the first network to be accessed and the second network to be accessed according to the first target access probability and the second target access probability;
and accessing the electronic equipment to the target network to be accessed.
10. A computer readable storage medium, characterized in that the computer readable storage medium stores a computer program comprising program instructions which, when executed by a processor, cause the processor to perform the method of any of claims 1-7.
CN202110461812.6A 2021-04-27 2021-04-27 Verification method and related device Active CN113127826B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110461812.6A CN113127826B (en) 2021-04-27 2021-04-27 Verification method and related device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110461812.6A CN113127826B (en) 2021-04-27 2021-04-27 Verification method and related device

Publications (2)

Publication Number Publication Date
CN113127826A CN113127826A (en) 2021-07-16
CN113127826B true CN113127826B (en) 2023-05-23

Family

ID=76780206

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110461812.6A Active CN113127826B (en) 2021-04-27 2021-04-27 Verification method and related device

Country Status (1)

Country Link
CN (1) CN113127826B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101399713A (en) * 2008-09-28 2009-04-01 腾讯科技(深圳)有限公司 Method for measuring proximity of network node
CN110753067A (en) * 2014-07-01 2020-02-04 谷歌有限责任公司 Wireless local area network access
CN111163533A (en) * 2019-12-31 2020-05-15 Oppo广东移动通信有限公司 Network connection method and related product

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105656922A (en) * 2016-02-04 2016-06-08 腾讯科技(深圳)有限公司 Login method and device of application program and intelligent equipment
CN107659573B (en) * 2017-10-09 2021-06-08 深圳市沃特沃德股份有限公司 Control method and device of vehicle-mounted system
CN108320744B (en) * 2018-02-07 2020-06-23 Oppo广东移动通信有限公司 Voice processing method and device, electronic equipment and computer readable storage medium
CN110018920A (en) * 2018-12-25 2019-07-16 阿里巴巴集团控股有限公司 A kind of detection method, device and the equipment of page presentation exception
CN110830263B (en) * 2019-11-06 2023-07-25 南京酷沃智行科技有限公司 Automatic login method and device for vehicle-mounted system
CN110958234B (en) * 2019-11-22 2020-11-17 腾讯科技(深圳)有限公司 Application login control method and device and storage medium
CN112653769A (en) * 2021-01-08 2021-04-13 青岛海尔科技有限公司 Message pushing method and system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101399713A (en) * 2008-09-28 2009-04-01 腾讯科技(深圳)有限公司 Method for measuring proximity of network node
CN110753067A (en) * 2014-07-01 2020-02-04 谷歌有限责任公司 Wireless local area network access
CN111163533A (en) * 2019-12-31 2020-05-15 Oppo广东移动通信有限公司 Network connection method and related product

Also Published As

Publication number Publication date
CN113127826A (en) 2021-07-16

Similar Documents

Publication Publication Date Title
US9703971B2 (en) Sensitive operation verification method, terminal device, server, and verification system
US8959234B2 (en) Method and system for providing online services corresponding to multiple mobile devices, server, mobile device, and computer program product
US10148650B2 (en) Method, device and system for user authentication
US20140025780A1 (en) Across-Application Network Communication Method And Device
US11070505B2 (en) Group chat initiating method on basis of shared document, device and apparatus therefor, and storage medium
BR112012003248B1 (en) method and server for instant messaging
WO2016148934A1 (en) On demand passwords
CN104253861A (en) Terminal control method, terminal control device and terminal control system
CN107248995B (en) Account verification method and device
CN111093159A (en) Message pushing method and device, server and computer readable storage medium
US20110111737A1 (en) Method of registering a mobile station with a social networking site
CN108096838B (en) Gift package receiving method, device, server, mobile terminal and storage medium
CN111092904B (en) Network connection method and device
CN112492611A (en) Network configuration method, network configuration device, electronic equipment and readable storage medium
US20060031334A1 (en) Methods and systems for forwarding electronic communications to remote users
CN104980420A (en) Business processing method, device, terminal and server
CN111835772A (en) User identity authentication method and device based on edge calculation
US20060031337A1 (en) Methods and systems for broadcasting offers over electronic networks
CN109086595B (en) Service account switching method, system, device and server
CN113127826B (en) Verification method and related device
US20220050687A1 (en) Method of booting electronic device and electronic device control system, methods of operating and controlling electronic device, electronic device, control terminal, and electronic device control system
CN108156071B (en) Method for adding members to community, terminal device and computer readable storage medium
EP4310407A1 (en) Control right switching method and apparatus for virtual remote control, device, and storage medium
CN107613496B (en) Queuing method, system and authentication server
CN107995150B (en) Identity verification method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant