CN109314711A - A kind of open authorization method, device and terminal - Google Patents

A kind of open authorization method, device and terminal Download PDF

Info

Publication number
CN109314711A
CN109314711A CN201780037019.5A CN201780037019A CN109314711A CN 109314711 A CN109314711 A CN 109314711A CN 201780037019 A CN201780037019 A CN 201780037019A CN 109314711 A CN109314711 A CN 109314711A
Authority
CN
China
Prior art keywords
application
terminal
authorization
information
open
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201780037019.5A
Other languages
Chinese (zh)
Other versions
CN109314711B (en
Inventor
王思善
杨帆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Publication of CN109314711A publication Critical patent/CN109314711A/en
Application granted granted Critical
Publication of CN109314711B publication Critical patent/CN109314711B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The invention relates to a kind of open authorization login methods, the described method includes: terminal determines the second application according to the historical log information of the first application, the historical log information is the information that the terminal receives, the historical log information includes the information of the second application, and the second application is the application that history carries out open authorization to the first application;The terminal sends the authorization requests for open to first application authorization login to the authorization server of the second application of the determination, the permission of shielded user resources in the Resource Server to request the determine described in first application access second application.

Description

A kind of open authorization method, device and terminal Technical field
This application involves field of communication technology more particularly to a kind of open authorization methods, device and terminal.
Background technique
Under classic client-server authentication model, user accesses user's locked resource of A application server for storage by A applications client (Client).A application server generally passes through the user credential (credentials) of the A application of user, such as account number cipher, authenticates the identity of user.If user wants that the client applied by B accesses the user's locked resource stored on A application server, it is also desirable to the account number cipher of A application.User can generate the risk of leakage of information to the account password that B Application share account number cipher A is applied.
Open authorization (Open Authorization, O-Auth) 2.0 agreements are a safety, opening and the easy user resources authorization criteria that Internet engineering task force (Internet Engineering Task Force, IETF) is formulated.In the agreement, the client of B application can access user's locked resource of A application server for storage without the A of the user account password applied.
Currently, some large-scale applications, such as Tencent QQ, Alipay, Taobao, wechat, microblogging etc., it can support O-Auth2.0 agreement.User can use the account for the application that it supports O-Auth2.0 agreement, such as microblog account, log in third-party application, user's locked resource of the micro blog server storage of the accessible user of third-party application, such as the microblogging head portrait of user, the pet name.
Aforesaid way there are the problem of have, under the scenes such as terminal replacement, terminal factory reset, terminal refitting system, lost there are logging on authentication or invalid, application historical log record the problems such as losing, user is needed to log in third-party application again.
When user logs on third-party application, may have forgotten its last time is using the Account Logon of which application third-party application.It goes to log in the third-party application using the account number of each application for supporting O-Auth2.0 agreement to log in the third-party application or successively attempt at this time, it may be necessary to which user re-starts open authorization, so that poor user experience.
Summary of the invention
The embodiment of the present application provides a kind of open authorization login method, device and terminal, the authorization relationship between the second application can be applied from received data or from acquisition first in the data locally saved, and then can use and applied opened authorization second to apply in this login again to first using open authorization is carried out to first, the experience that authorization logs in application is opened so as to further reduce the risk of user information leakage and promote user.
First aspect, the embodiment of the present application provides a kind of open authorization login method, the described method includes: terminal determines the second application according to the historical log information of the first application, the historical log information is the information that the terminal receives, the historical log information includes the information of the second application, and the second application is the application that history carries out open authorization to the first application;The terminal sends the authorization requests for open to first application authorization login to the authorization server of the second application of the determination, the permission of shielded user resources in the Resource Server to request the determine described in first application access second application.
In one possible implementation; in the Resource Server of the second application determined described in the terminal request to first application access after the permission of shielded user resources, the method also includes: the terminal is according to the second of the determination using the historical log information for updating first application to described this opening Authorized operation carried out of first application.
In one possible implementation, the historical log information that the terminal receives is specially the terminal from Cloud Server, from other terminals except the terminal or the information received from least one of external memory.
In one possible implementation, the terminal according to the historical log information of the first application determine the second application include: the terminal from historical information logging modle, the store path of the first application, the second application at least one of store path described in historical log information;Wherein, the historical information logging modle is in the terminal for recording and/or saving the module of the historical log information of multiple applications.
In one possible implementation, the historical log information includes the time of origin that the open authorization of history logs in;If the information of second application is the information of at least two applications, the historical log information that the terminal is applied according to first determines that the second application includes: the terminal determining one second application from least two application according to the time of origin of the open authorization of the history.
In one possible implementation, if the information of second application is the information of at least two applications, the terminal determines that the second application includes: the terminal and show that at least two apply according to the information of at least two application according to the historical log information of the first application;The terminal receives selection operation instruction;The terminal instructs according to the selection operation and determines one second application from least two application.
In one possible implementation, before the terminal carries out opening the authorization requests that authorization logs in the authorization server transmission of the second application of the determination to first application, the method also includes: the terminal shows the second application of the determination;The terminal receives the operational order that second application of the confirmation using the determination carries out open authorization to first application;The terminal sends open the authorization requests that authorization logs in first application to include: the terminal sent according to the confirmation using the operational order that the second application of the determination open authorization to first application to the authorization server of the second application of the determination and described carries out opening the authorization requests for authorizing login to first application.
In one possible implementation, the method also includes: the terminals shows that the first interface, first interface include the mark of second application according to the historical log information.
In one possible implementation, first interface further includes the mark of the first application corresponding with the second application.
In one possible implementation, the method also includes: the terminal receives the register instruction for the first application on first interface;The authorization server that the terminal is applied to the second of the determination is sent to carry out opening the authorization requests that authorization logs in including: that register of the terminal according to for the first application on first interface instructs the second authorization server applied on first interface to send the authorization requests for open to first application authorization login to first application.
In one possible implementation, the method also includes: the terminal receives the displaying operational order for the second application on first interface;The terminal shows that second contact surface, the second contact surface include the mark of the first application corresponding with the second application according to the displaying operational order.
In one possible implementation, the method also includes: the terminal receives the register instruction for the first application on the second contact surface;The terminal is sent to the authorization server of the second application of the determination open the authorization requests that authorization logs in first application to include: the terminal sends to described first according to the authorization server that the register for the first application on first interface instructs second on first interface apply using carrying out opening the authorization requests for authorizing login.
Second aspect, the embodiment of the present application provides a kind of open authorization login method, the described method includes: the terminal determines the second application according to the historical log information of the first application, the historical log information is the information that the terminal carries out open authorization according to the history saved in the terminal to first application, the historical log information includes the information of the second application, and the second application is the application that history carries out open authorization to the first application;The terminal sends the authorization requests for open to first application authorization login to the authorization server of the second application of the determination, the permission of shielded user resources in the Resource Server to request the determine described in first application access second application.
In one possible implementation; in the Resource Server of the second application determined described in the terminal request to first application access after the permission of shielded user resources, the method also includes: the terminal is according to the second of the determination using the historical log information for updating first application to described this opening Authorized operation carried out of first application.
In one possible implementation, the terminal determines that the second application includes: the terminal and obtains the historical log information from least one of historical information logging modle, the store path of the first application, the store path of the second application according to the historical log information of the first application.
In one possible implementation, the historical log information includes the time of origin that the open authorization of history logs in;If the information of second application is the information of at least two applications, the historical log information that the terminal is applied according to first determines that the second application includes: the terminal determining one second application from least two application according to the time of origin of the open authorization of the history.
In one possible implementation, the method also includes: the terminals shows that the first interface, first interface include the mark of second application according to the historical log information.
In one possible implementation, first interface further includes the mark of the first application corresponding with the second application.
In one possible implementation, the method also includes: the terminal receives the register instruction for the first application on first interface;The authorization server that the terminal is applied to the second of the determination is sent to carry out opening the authorization requests that authorization logs in including: that register of the terminal according to for the first application on first interface instructs the second authorization server applied on first interface to send the authorization requests for open to first application authorization login to first application.
In one possible implementation, the method also includes: the terminal receives the displaying operational order for the second application on first interface;The terminal shows that second contact surface, the second contact surface include the mark of the first application corresponding with the second application according to the displaying operational order.
In one possible implementation, the method also includes: the terminal receives the register instruction for the first application on the second contact surface;The authorization server that the terminal is applied to the second of the determination is sent to carry out opening the authorization requests that authorization logs in including: that register of the terminal according to for the first application on first interface instructs the second authorization server applied on first interface to send the authorization requests for open to first application authorization login to first application.
The third aspect, a kind of open authorization entering device, described device includes: processing unit, for determining the second application according to the historical log information of the first application, the historical log information is the information that the terminal receives, the historical log information includes the information of the second application, and the second application is the application that history carries out open authorization to the first application;Communication unit; authorization server for from the second application to the determination sends the authorization requests for open to first application authorization login, the permission of shielded user resources in the Resource Server to request the determine described in first application access second application.
In one possible implementation, the processing unit is also used to according to the second of the determination the application to described first The historical log information of first application is updated using this opening Authorized operation carried out.
In one possible implementation, the historical log information that the terminal receives is specially the communication unit from Cloud Server, from other terminals except the terminal or the information received from least one of memory.
In one possible implementation, the processing unit is also used to described from least one of historical information logging modle, the store path of the first application, the second store path applied the acquisition historical log information.
In one possible implementation, the historical log information includes the time of origin that the open authorization of history logs in;If the information of second application is the information of at least two applications, the processing unit is also used to determine one second application from least two application according to the time of origin of the open authorization of the history.
In one possible implementation, if the information of second application is the information of at least two applications, the processing unit is also used to show at least two application according to the information of at least two application;The processing unit is also used to receive selection operation instruction;The processing unit, which is also used to be instructed according to the selection operation, determines one second application from least two application.
In one possible implementation, the processing unit is also used to show the second application of the determination;The processing unit is also used to receive the operational order that second application of the confirmation using the determination carries out open authorization to first application;The communication unit is also used to send the authorization requests logged in described first using open authorization is carried out using the operational order that the second application of the determination carries out open authorization to first application according to the confirmation.
In one possible implementation, the processing unit is also used to show that the first interface, first interface include the mark of corresponding second application of information of second application according to the historical log information.
In one possible implementation, first interface further includes the mark of the first application corresponding with the second application.
In one possible implementation, the processing unit is also used to receive the register instruction for the first application on first interface;Register of the communication unit according to for the first application on first interface instructs the second authorization server applied on first interface to send the authorization requests for open to first application authorization login.
In one possible implementation, the processing unit is also used to receive the displaying operational order for the second application on first interface;The processing unit is also used to the displaying operational order and shows that second contact surface, the second contact surface include the mark of the first application corresponding with the second application.
In one possible implementation, the processing unit is also used to receive the register instruction for the first application on the second contact surface;The authorization server that the communication unit is also used to instruct second on first interface to apply according to the register of first application being directed on first interface sends the authorization requests for open to first application authorization login.
Fourth aspect, the embodiment of the present application provides a kind of open authorization entering device, described device includes: processing unit, for determining the second application according to the historical log information of the first application, the historical log information is the information of terminal record, the historical log information of first application includes the information of the second application, and the second application is the application that history carries out open authorization to the first application;Communication unit; authorization server for from the second application to the determination sends the authorization requests for open to first application authorization login, the permission of shielded user resources in the Resource Server to request the determine described in first application access second application.
In one possible implementation, the processing unit is also used to update described this opening Authorized operation carried out of first application according to the second of the determination the application the historical log information of first application.
In one possible implementation, the processing unit is also used to deposit from what historical information logging modle, first were applied Store up the historical log information that at least one of path, the store path of the second application obtain the first application.
In one possible implementation, the historical log information includes the time of origin that the open authorization of history logs in;If the information of second application is the information of at least two applications, the time of origin that the processing unit is also used to the open authorization of the history determines one second application from least two application.
In one possible implementation, the processing unit is also used to show that the first interface, first interface include the mark of corresponding second application of information of second application according to the historical log information.
In one possible implementation, first interface further includes the mark of the first application corresponding with the second application.
In one possible implementation, the processing unit is also used to receive the register instruction for the first application on first interface;The register that the communication device is also used to according to for the first application on first interface instructs the second authorization server applied on first interface to send the authorization requests for open to first application authorization login.
In one possible implementation, the processing unit is also used to receive the displaying operational order for the second application on first interface;The processing unit is also used to show that second contact surface, the second contact surface include the mark of the first application corresponding with the second application according to the displaying operational order.
In one possible implementation, the processing unit is also used to receive the register instruction for the first application on the second contact surface;The register that the communication unit is also used to according to for the first application on first interface instructs the second authorization server applied on first interface to send the authorization requests for open to first application authorization login.
5th aspect, the embodiment of the present application also provides a kind of terminal, the terminal includes processor and reservoir;The memory store code;The processor executes the code, the second application is determined according to the historical log information of the first application for executing, the historical log information is the information that the terminal receives, the historical log information includes the information of the second application, and the second application is the application that history carries out open authorization to the first application;The authorization server for being also used to execute the second application to the determination sends the authorization requests for open to first application authorization login, the permission of shielded user resources in the Resource Server to request the determine described in first application access second application.
In one possible implementation, the historical log information that the terminal receives is specially the terminal from Cloud Server, from other terminals except the terminal or the information received from least one of memory.
In one possible implementation, the processor, which is also used to execute from least one of historical information logging modle, the store path of the first application, the store path of the second application, obtains the historical log information;Wherein, the historical information logging modle is in the terminal for recording and/or saving the module of the historical log information of multiple applications.
In one possible implementation, the historical log information includes the time of origin that the open authorization of history logs in;If the information of second application is the information of at least two applications, the processor, which is also used to execute, determines one second application from least two application according to the time of origin of the open authorization of the history.
In one possible implementation, if the information of second application is the information of at least two applications, the processor, which is also used to execute, shows at least two application according to the information of at least two application;The processor, which is also used to execute, receives selection operation instruction;The processor is also used to execute determines second application according to selection operation instruction from least two application.
In one possible implementation, the processor is also used to execute the second application of the display determination;The processor, which is also used to execute, receives second application of the confirmation using the determination to described first using the operational order for carrying out open authorization;The processor, which is also used to execute, carries out first application using the second application of the determination according to the confirmation The operational order of open authorization sends the authorization requests logged in described first using open authorization is carried out.
In one possible implementation, the processor, which is also used to execute, shows that the first interface, first interface include the mark of second application according to the historical log information.
In one possible implementation, first interface further includes the mark of the first application corresponding with the second application.
In one possible implementation, the processor is also used to execute the register instruction received for the first application on first interface;The register that the processor is also used to execute according to for the first application on first interface instructs the second authorization server applied on first interface to send the authorization requests for open to first application authorization login.
In one possible implementation, the processor is also used to execute the displaying operational order received for the second application on first interface;The processor, which is also used to execute, shows that second contact surface, the second contact surface include the mark of the first application corresponding with the second application according to the expansion operational order.
In one possible implementation, the processor is also used to execute the register instruction received for the first application on the second contact surface;The processor is also used to execute the authorization requests for sending according to the authorization server that the register of first application being directed on the second contact surface instructs second on first interface to apply and open to first application authorization login.
In one possible implementation, the processor is also used to execute the historical log information for updating first application to described this opening Authorized operation carried out of first application according to the second of the determination the application.
6th aspect, the embodiment of the present application provide a kind of terminal, and the terminal includes: processor and memory;The memory store code;The processor executes the code, for executing any method of second aspect.
7th aspect, the embodiment of the present application provide a kind of computer readable storage medium for storing program, and described program includes instruction, when described instruction is executed by terminal, the terminal are made to execute any any method of the method or second aspect of first aspect.
The embodiment of the present application provides a kind of computer program product comprising instruction, when the computer program product is run at the terminal, the terminal is made to execute any any method of the method or second aspect of first aspect.
Open authorization login method, device and terminal provided by the embodiments of the present application, the authorization relationship between the second application can be applied from received data or from acquisition first in the data locally saved, it helps user fast and accurately to determine and applied the opened authorization second application to first, and then user can be allowed to carry out open authorization to the first application using second application again in this login, so as to further reduce the risk of user information leakage and promote user using the experience for logging in application by the way of open authorize.
Detailed description of the invention
Fig. 1 is a kind of application architecture figure of open authorization login method provided by the embodiments of the present application;
Fig. 2 is a kind of flow chart of the open authorization of open authorization login method provided by the embodiments of the present application;
Fig. 3 is a kind of flow chart of open authorization login method provided by the embodiments of the present application;
Fig. 4 is a kind of effect display diagram of open authorization login method provided by the embodiments of the present application;
Fig. 5 is a kind of effect display diagram of open authorization login method provided by the embodiments of the present application;
Fig. 6 is a kind of effect display diagram of open authorization login method provided by the embodiments of the present application;
Fig. 7 a is a kind of effect display diagram of open authorization login method provided by the embodiments of the present application;
Fig. 7 b is a kind of effect display diagram of open authorization login method provided by the embodiments of the present application;
Fig. 7 c is a kind of effect display diagram of open authorization login method provided by the embodiments of the present application;
Fig. 8 is a kind of flow chart of open authorization login method provided by the embodiments of the present application;
Fig. 9 a is a kind of effect display diagram of open authorization login method provided by the embodiments of the present application;
Fig. 9 b is a kind of effect display diagram of open authorization login method provided by the embodiments of the present application;
Fig. 9 c is a kind of effect display diagram of open authorization login method provided by the embodiments of the present application;
Figure 10 is a kind of structural schematic diagram of open authorization entering device provided by the embodiments of the present application;
Figure 11 is a kind of structural schematic diagram of open authorization entering device provided by the embodiments of the present application;
Figure 12 is a kind of structural schematic diagram of terminal provided by the embodiments of the present application;
Figure 13 is a kind of structural schematic diagram of terminal provided by the embodiments of the present application.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present application, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiments are only a part of embodiments of the present application, instead of all the embodiments.Based on the embodiment in the application, those skilled in the art's all other embodiment obtained, shall fall in the protection scope of this application.
Terminal in the embodiment of the present application is specifically as follows smartwatch, mobile phone (mobile phone), tablet computer (Pad), computer with radio transmission-receiving function, virtual reality (Virtual Reality, VR) terminal device, augmented reality (Augmented Reality, AR) terminal device, wireless terminal in Industry Control (industrial control), wireless terminal in unmanned (self driving), wireless terminal in tele-medicine (remote medical), wireless terminal in smart grid (smart grid), wireless end in transportation safety (transportation safety) End, the wireless terminal in smart city (smart city), the wireless terminal in wisdom family (smart home) etc..
Fig. 1 shows a kind of possible application architecture for the method that open authorization provided by the embodiments of the present application logs in.The client of one or more application can be installed in terminal.Authorization server can be that the application server of access token (Access Token) can be provided after the license of acquisition user after success identity user identity.Resource Server can refer to the application server for being stored with shielded user resources, can receive and respond the request of the shielded user resources of access using access token.In one example, authorization server and Resource Server can be the same server.
By taking the first application as an example, terminal can receive the historical log information of the first application from network, and the historical log information of the first application can be perhaps received from other terminals or can obtain the historical log information of the first application from the data that the terminal local stores.It may include the relevant information of the second application in the historical log information of first application.Second application can once carry out the application of open authorization for user to the first application, and the relevant information of the second application can carry out the information of open authorization for the second application to the first application.Terminal has carried out the second application that open authorization logs in the first application before can determining according to the information of the second application;And then the authorization server transmission that terminal can be applied to determining second carries out opening the authorization requests for authorizing and logging in the first application; to request the authorization server of the second determining application to authorize the first application, so that shielded user resources in the Resource Server of the second application of the first accessible determination of application.
It should be noted that unless otherwise specified, first is authorized to use the application that the information of other application is logged in using expression in embodiments herein;Second application indicates that user can use the application of the information registration other application of the application, and the second application can carry out open authorization to the first application, so that the Resource Server of accessible second application of the first application.
Fig. 2 shows a kind of possible processes of the resource of the shielded user stored in the Resource Server of the first application access second application.Step 201, authorization logging request.Terminal shows the authorization login interface that the second application is applied to first, Second application message that user can be used, such as the second application account number of user etc. are shown to user, are logged in the first application, i.e., are shown logging request to user.Step 202, authorization log in license.User's license logs in first using its second application message and applies, and terminal is received for indicating that user's license logs in the first voucher applied, i.e. authorization code using its second application message.Step 203, authorization requests.Terminal can send authorization requests to the authorization server of the second application by license is logged in, the access token of the shielded user resources in Resource Server to request the application of the first application access second.Step 204, authorization.Authorization server can authenticate the identity of the first application and verify authorization code, then send authorization to terminal, the permission of shielded user resources in the Resource Server to permit the in terminal first the second application of client access applied.In one example, authorization can be access token.Step 205, resource access.Terminal can be by authorization by the Resource Server of the second application of client access of the first application, to request the shielded user resources in Resource Server.Step 206, resource are sent.After the Resource Server verifying authorization of second application, so that first applies the accessible resource.
By Fig. 2 shows resource access process, can realize that the Resource Server of the second application opens the resource of some shielded users to the first application in the case where the privacy informations such as account, password for not needing to apply to the first application exposure user second.
In one example, open authorization is logged in so that the second application is Sina weibo as an example and is specifically described.Sina weibo can support the opening authorization function based on O-Auth2.0 agreement, and user is allowed to log in other application, such as the first application using Sina weibo account number.In the case where user logs in the first application using Sina weibo; the open authorization interface that first application can call Sina weibo to provide carries out open authorization and logs in; after first application obtains access token, the basic resources such as head portrait, pet name of shielded user in the Resource Server of accessible and acquisition Sina weibo.Registration is completed in the first application automatically to realize user using Sina weibo account information, and calls basic user resource in the Resource Server of Sina weibo, the operation that user logs in the first application is simplified, improves user experience.It should be noted that, actually, when user logs in the first application using Sina weibo account, the account of the first application has been generated for user in first application, registration is completed in the first application automatically, this process is generally not necessarily to user's perception, and user still carries out open authorization to the first application using Sina weibo account in subsequent login and logs in.
Also the function that there is similar open authorization to log in for many large-scale applications such as wechat, Tencent QQ, Taobao, Alipay, can be used as the second application and carries out open authorization to the first application.It opens authorization and logs in rapid and convenient, and registration and memory account, password etc. when login first is applied without user reduce the risks such as account password leakage to reduce the use of account, password, improve the safety that user uses network service.Therefore, the mode that more and more users select open authorization to log in goes to log in the first application.
Some applications can provide the function of Data Migration, for example the mobile phone of Huawei's mobile phone clones application.It is cloned and is applied by mobile phone, data, system set-up parameters and the application etc. in old terminal can be moved into new terminal.In addition, the data in terminal can be backuped to Cloud Server by the backup functionality that terminal own system provides.The backup functionality of application and system with Data Migration function greatlies simplify the operation of user data backup under the scenes such as terminal replacement, terminal factory reset, terminal refitting system, the migration that data can be completed by shirtsleeve operation removes applications client from and the operation such as reinstalls.But the safety of terminal side is increasingly taken seriously, and is also increasingly stringenter to the management of terminal side data.Such as the sensitive informations such as logging on authentication, it can be stored in safer storage environment, when carrying out Data Migration, possibly new terminal can not be moved to applications client etc., alternatively, the sensitive informations such as logging on authentication may be bound with terminal, make new terminal that can not reuse logging on authentication.Therefore, it under the scenes such as terminal replacement, terminal factory reset, terminal refitting system, the client of the first application of terminal refitting, is lost there are logging on authentication or invalid, application historical log records the problems such as losing, need user Again application is logged in.When need to log in again using the mode that open authorization logs in it is logged first in application, there is still a need for log in the first application in a manner of open and authorize the second application.
At this point, user may have forgotten its once seleced the second application for carrying out open authorization to the first application, at this point, user needs to select an application as the second application from numerous applications for providing open authorization function, to log in the first application.In this case, user needs to attempt to provide in turn the application of open authorization, to find the second application used in its last time.When it is existing provide open authorization function using it is more when, the experience of user can be poor;Or; one application is re-started open authorization to the first application as the second new application again by user, at this point, the user sensitive information for the acquisition other application for making the first application excessive; it is unfavorable for the protection of user information, increases the risk of privacy of user leakage.
The embodiment of the present application provides a kind of method that open authorization logs in, it can be under the scenes such as the client of terminal replacement, terminal factory reset, terminal refitting system or the first application, when user logs in the first application again, it quickly determines the second application for carrying out open authorization to the first application in history, is successively attempted and bring troublesome operation and the risk for reselecting the second application and bring leakage of information from numerous applications so as to avoid user.
Fig. 3 shows a kind of possible process of open authorization login method provided by the embodiments of the present application.This approach includes the following steps.
Step 301, terminal determine the second application according to the historical log information of the first application, the historical log information is the information that the terminal receives, the historical log information includes the information of the second application, and the second application is the application that history carries out open authorization to the first application.
Before step 301, user can log in the first application by the way of open authorization in A terminal, the opening authorization relationship of the secondary login can be saved, as the historical log information of the first application, i.e., the historical log information of the first application includes opening authorization relationship of second application to the first application.Historical log information can store under itself store path of the first application, can also be managed concentratedly and be saved by the historical information logging modle of terminal system.Historical information logging modle can be the module that can be used for recording multiple application messages in terminal system, or the module of multiple application messages can be saved in terminal system, historical information logging modle can be used for managing the information of multiple applications;Wherein, application message may include the historical log information of application.The historical log information of first application can be sent to Cloud Server, other terminals and external memory etc. by A terminal.
B terminal for new terminal used in after user's replacement terminal or can carry out A terminal after factory reset, or A terminal after system has been reset, B terminal can be any terminal for having forgotten which application having used and having carried out open authorization.B terminal can by wireless communication and/or the mode of wire communication receives the historical log information of the first application.B terminal can receive the historical log information of the first application from Cloud Server, the historical log information of the first application can also be received from other terminals, i.e., by the historical log information of the first application from other terminal transfers to the terminal.B terminal can also receive the historical log information of the first application from storage device.
After B terminal receives the historical log information of the first application, historical information logging modle can be transferred to manage concentratedly and save the historical log information of the first application, can also be placed under itself store path of the first application and be saved.
The log-on message before the first application is had recorded in historical log information, may include the information that history carries out the application of open authorization to the first application, that is, includes opening authorization relationship of second application to the first application.
The information of the second application in the historical log information of first application can be the information that title, icon, identity of application of application of application etc. can be used for directly or indirectly determining application.Terminal can determine the second application according to the information of the second application, and once to apply the application for being opened authorization to first, terminal can determine the second application according to the information that second in historical log information is applied for second application.In the next steps using determine second application to first application into The open authorization of row.
Step 302, the terminal send the authorization requests for open to first application authorization login to the authorization server of the second application of the determination, the permission of shielded user resources in the Resource Server to request the determine described in first application access second application.
In one example, in the Resource Server of the second application determined described in the terminal request to first application access after the permission of shielded user resources, the method for open authorization login provided by the embodiments of the present application further include:
The terminal updates the historical log information of first application according to the second of the determination the application to described this opening Authorized operation carried out of first application.After the second application carries out open authorization to the first application, terminal can be updated the historical log information of the first application.
In one example, the historical log information that the terminal is applied according to first determines that corresponding second application of first application includes: historical log information of the terminal from the first application of acquisition of at least one of historical information logging modle, the store path of the first application, the second store path applied.
In one example, the historical log information includes the time of origin that the open authorization of history logs in;If the information of second application is at least two information applied, the terminal determines that corresponding second application of first application includes: that the terminal determines corresponding second application of first application according to the open time of origin authorized of the history from least two application according to the information of second application.Specifically, it can be assumed that include the information of A, B two applications in historical log information.Wherein, it is T1 using the time that open authorization logs in is carried out to first that A application is the last;The last B application is T2 using the time that open authorization logs in is carried out to first.It assume that T1 compares T2 closer to the current time.In one example, terminal can determine that A applies to carry out the second application that open authorization logs in the first application in subsequent step.In one example, terminal can determine that B applies to carry out the second application that open authorization logs in the first application in subsequent step.
In one example, if the information of the second application in the historical log information of first application is the information of at least two applications, the terminal determines that corresponding second application of first application includes: the terminal and show that described at least two apply according to the information of at least two application according to the information of second application;The terminal receives selection operation instruction;The terminal instructs according to the selection operation and determines one second application from least two application.It specifically, can be as shown in Figure 4, it can be assumed that the information of the second application in historical log message includes the information of A, B two applications.Terminal can be prompted user A, B once to apply to first in a manner of pop-up or text etc. and be opened authorization after having received historical log message in the login interface of the first application.User can independently select A or B to carry out open authorization again to the first application.Terminal can determine A or B as the application for carrying out open authorization to the first application by operational order according to the user's choice.
In one example, before step 302, the method also includes: the terminal shows the second application of the determination;The terminal receives the operational order that second application of the confirmation using the determination carries out open authorization to first application;The terminal is sent to the authorization server of the second application of the determination open the authorization requests that authorization logs in first application to include: the terminal initiates described to carry out opening the authorization requests for authorizing login to first application according to the confirmation using the operational order that the second application of the determination open authorization to first application., can be without user's confirmation after terminal has determined corresponding second application of the first application according to historical log information, terminal, which is automatically initiated, authorizes the open of the first application using the second determining application;Can also be by user's confirmation, then initiate to authorize the open of the first application using the second determining application.This example describes latter situation, specifically, can as shown in Figure 5 terminal after the second application has been determined, the login interface that can be applied first shows the instruction information for whether carrying out open authorization to the first application using the second application, such as, indicate that information is " authorization A is logged in ", request user's confirmation It is logged in using the mode of the instruction information instruction;User, which can be confirmed, carries out open authorization again to the first application using the second application to log in the first application;Terminal can initiate the process using the second application to the open authorization of the first application according to the confirmation instruction of user.
In one example, method provided by the embodiments of the present application further include: the information that the terminal is recorded according to historical information logging modle shows that the first interface, first interface include the mark of second application.Specifically, the information of historical information logging modle record may include the historical log information of the first application, first application can be one or more application, the historical log information of corresponding first application is the historical log information of one or more application, may include at least one the second applications in the historical log information of each application to the record of the record of the open authorization of the first application or at least one the first open authorizations of the application of application request second.In one example, it can be assumed that, the first application can be a, b, c;The information of the second application in the historical log information of a application is the information of A application, and the information of the second application in the historical log information of b application is the information of B application, and the information of the second application in the historical log information of c application is A application message;Terminal can show to include that the interfaces of A, B application identities facilitates user's selection to carry out the second application of open authorization to the first application can inform that user A, B apply once to be opened the application of authorization excessively to other application on an interface.
In one example, the first interface of the mark of the second application of display can also include the mark of the first application corresponding with the second application.Fig. 6 shows an exemplary example, and in this example embodiment, A, B are the second application, and A application was once opened authorization to using a, c excessively;B application was once opened authorization to using b excessively.In this example, the corresponding relationship between the application of user second and the first application can be informed on an interface, facilitate the operation of user.
In one example, before the terminal carries out opening the authorization requests that authorization logs in the authorization server transmission of the second application of the determination to first application, the method also includes: the terminal receives the register instruction of the be directed on first interface first application;It includes: that the terminal is applied according to for second on determining first interface of register instruction of the first application on first interface, and sends the authorization requests for open to first application authorization login to the authorization server of the second determining application that the authorization server that the terminal is applied to the second of the determination, which sends the authorization requests for carrying out opening authorization login to first application,.It is A application with the second application, for the first application corresponding with A is a, shows the corresponding relationship that A is applied and a is applied on the first interface;User can be by the mark of click a application or the login banner of a application to indicate login a application, then terminal can apply the open authorization applied to a according to the initiation A that clicks of user.Specifically, the login that log-in instruction triggering of the terminal according to user at the first interface generates a applicating history log-on message determined comprising user indicates information, and it is sent to a application, determine that carrying out open authorization using A application logs in indicate that a is applied according to the A application message logged in instruction information.The server that a application login instruction information that then basis receives is applied to A is sent to carry out opening the authorization requests for authorizing and logging in a application.
In one example, the method also includes: the terminal receives the displaying operational order for the second application on first interface;The terminal shows that second contact surface, the second contact surface include the mark of the first application corresponding with the second application according to the displaying operational order.Specifically, first interface of the mark of the second application of display can not include the mark of the first application corresponding with the second application, the corresponding region around mark or mark that user passes through the second application of click, it includes the mark applied with second application corresponding first that terminal, which can be shown,.Fig. 6 a and Fig. 6 b show the example that a terminal shows the first interface and second contact surface, in this example embodiment, first interface includes second using A, B, and user can click the mark using A, and it includes the second contact surface using a, c corresponding with A is applied that terminal, which is shown,.In this example embodiment, second contact surface is shown in the first interface.Second contact surface can show in a manner of covering the first interface, can be as shown in Figure 7 c, and the mark or its peripheral region of A can be applied by clicking, and terminal shows to include using the corresponding interface using a, c A.
In one example, before the terminal carries out opening the authorization requests that authorization logs in the authorization server transmission of the second application of the determination to first application, the method also includes: the terminal receives the register instruction of the be directed on the second contact surface first application;The terminal is sent to the authorization server of the second application of the determination open the authorization requests that authorization logs in first application to include: the terminal sends to described first according to the authorization server that the register for the first application on first interface instructs second on first interface apply using carrying out opening the authorization requests for authorizing login.Specifically, still by taking the example shown in Fig. 7 c as an example, user can click the mark of a application, then terminal can initiate A using the open authorization applied to a according to clicking for user.
Pass through open authorization login method provided by the embodiments of the present application, in the case where logging in application by the way of user needs to log in using open authorization, terminal can be according to it from extraneous received data, fast and accurately determine that history is opened the application of authorization to the application that user will log in excessively, and the application that the open authorization of history can be used carries out open authorization to the application that user will log in again, to facilitate the operation of user, the experience of user is improved, the risk of user sensitive information leakage is reduced.
The embodiment of the present application provides another open authorization login method, when user logs in the first application again, terminal can obtain the historical log information of the first application from terminal local storage, and then can quickly determine the second application for carrying out open authorization to the first application in history, it is successively attempted and bring troublesome operation and the risk for reselecting the second application and bring leakage of information from numerous applications so as to avoid user.
Fig. 8 shows a kind of possible process of another open authorization login method provided by the embodiments of the present application, and this approach includes the following steps.
Step 801, terminal determine the second application according to the historical log information of the first application, the historical log information is the information that the terminal carries out open authorization according to the history saved in the terminal to first application, the historical log information includes the information of the second application, and the second application is the application that history carries out open authorization to the first application.
Step 802, the terminal send the authorization requests for open to first application authorization login to the authorization server of the second application of the determination, the permission of shielded user resources in the Resource Server to request the determine described in first application access second application.
In one example, in the Resource Server of the second application determined described in the terminal request to first application access after the permission of shielded user resources, the method for open authorization login provided by the embodiments of the present application further include:
The terminal updates the historical log information of first application according to the second of the determination the application to described this opening Authorized operation carried out of first application.After the second application carries out open authorization to the first application, terminal can be updated the historical log information of the first application.
In one example, the terminal determines that the second application includes: historical log information of the terminal from the first application of acquisition of at least one of historical information logging modle, the store path of the first application, the second store path applied according to the historical log information of the first application.
In one example, the historical log information includes the time of origin that the open authorization of history logs in;If the information of second application is the information of at least two applications, the historical log information that the terminal is applied according to first determines that the second application includes: the terminal determining one second application from least two application according to the time of origin of the open authorization of the history.
In one example, the method also includes: the terminals shows that the first interface, first interface include the mark of second application according to the historical log information.
In one example, first interface further includes the mark of the first application corresponding with the second application.
In one example, the method also includes: the terminal receives the register instruction for the first application on first interface;The authorization server that the terminal is applied to the second of the determination is sent to carry out opening the authorization requests that authorization logs in including: that register of the terminal according to for the first application on first interface instructs the second authorization server applied on first interface to send the authorization requests for open to first application authorization login to first application.
In one example, the method also includes: the terminal receives the displaying operational order for the second application on first interface;The terminal shows that second contact surface, the second contact surface include the mark of the first application corresponding with the second application according to the displaying operational order.
In one example, before the terminal carries out opening the authorization requests that authorization logs in the authorization server transmission of the second application of the determination to first application, the method also includes: the terminal receives the register instruction of the be directed on the second contact surface first application;The authorization server that the terminal is applied to the second of the determination is sent to carry out opening the authorization requests that authorization logs in including: that register of the terminal according to for the first application on first interface instructs the second authorization server applied on first interface to send the authorization requests for open to first application authorization login to first application.
Open authorization login method provided by the embodiments of the present application, it can recorde and save the authorization relationship between the first application and the second application, when logging in the first application by the way of user is logged in using open authorization again, it helps user fast and accurately to determine and applied the opened authorization second application to first, and then user can be allowed to carry out open authorization to the first application using second application again, so as to further reduce the risk of user information leakage and promote user using the experience for logging in application by the way of open authorize.
In a specific example, open authorization login method provided by the embodiments of the present application is specifically described.In the previous step for the method that the open authorization of the embodiment of the present application logs in, it is logged under the first applicable cases using the login mode of open authorization for the first time in user, or in the case that terminal is not received by the first historical log information applied of the information for also containing the second application in the historical log information and being locally stored of terminal of the first application of the information for containing the second application without storage, user can support one application of selection in the application of open authorization function from least one, carry out open authorization to the first application as the second application.After first goes out to successfully obtain access token or the second application to the open authorization of the first application success and logging in the first application using the authorization server applied from second, terminal can recorde the historical log information of the first application, the information applied including second.
The implementation that terminal records and saves the historical log information of the first application can have following several.
1, the first application can record and save the historical log information of the first application under the store path of its own, including the information for the second application for carrying out open authorization to the first application.The store path of storage historical log information can migrate, such as the historical log information of storage can move in other terminals or external access device, can also upload in Cloud Server.
2, system can be applied monitoring second and carry out open authorization to the first application to log in first in application, the historical log information of the first application is recorded and saved, including the information for the second application for carrying out open authorization to the first application.In one example, system can use the historical log information of historical information logging modle unified record and management one or more application.In one example, system judges that the second application mode for authorizing and having logged in the first application open to the first application success can be, monitor open the first application of authorization of the second application, and jump back to the first application, there is no the secondary behavior for jumping open authorization page in the preset time hereafter, then judge successfully to log in the first application.
3, the first application can be after having recorded the historical log information of the first application, should to the registration of historical information logging modle Historical log information, so that historical information logging modle carries out concentration preservation and management to the historical log information of the first application.
4, the second application also can recorde the open authorization message of history, and the information of the first application of authorization is opened including it.Second application can save the open authorization message of history under the store path of its own, the open authorization message of history can also be registered to historical information logging modle to carry out concentration preservation and management to the historical log information of the first application.
5, system can be applied monitoring second and carry out open authorization to the first application to log in first in application, can recorde and save the open authorization message of history of the second application.
Terminal can upload to the historical log information of application in Cloud Server.Specifically, under the scene using the historical log information of historical information logging modle centralized management one or more application, the historical log information of one or more application can be concentrated and be uploaded in Cloud Server by terminal.
The historical log information of application can also be sent first using the historical log information of historical log information and/or the system record saved under itself store path or be backuped in other terminals and external memory by way of Data Migration by terminal.
The open authorization message of the history of the historical log information of save in historical information logging modle first application and/or the second application can also be sent or be backuped in other terminals and external memory by terminal.
The open authorization message of history for the second application that system can also be recorded and be saved by terminal sends or backups in other terminals and external memory.
It in one example, may include the account of one or more user first application and the corresponding relationship that second applies in the historical log information of the first application.It may be supposed, for example, that user possesses two accounts of A, B for the first application, Sina weibo, wechat had all once carried out open authorization to the first application, and wherein Sina weibo and A account are bound, and wechat and B account are bound.So that user selects the second application according to the account of its first application.
After above-mentioned previous step has occurred, user is logged in the first application by the way of open authorization and may comprise steps of:
Step 0, terminal can receive the historical log information of the first application from least one of Cloud Server, other terminals, external storage.The historical log information of receive first application can be stored in itself store path of historical information logging modle and/or the first application by terminal.The local of terminal also can store the historical log information of the first application, and storage location can be itself store path or historical information logging modle of the first application.It should be noted that step 0 be not be together with subsequent step it is each execute and execute, can execute one or many.Step 0 its when being finished, without being immediately performed subsequent step, subsequent step can execute again when needed.
When step 1, the first application at the terminal log in, terminal extracts the historical log information of first application.In one example, before the historical log information that the terminal extracts first application, terminal can receive user and make a determination the instruction logged in using open authorization.
Specifically, terminal obtains the information of the second application when the first application is logged in from the historical log information of the first application, and acquisition modes can pass through following methods:
1.1, terminal reads the historical log information of the first application from itself store path of the first application, and obtains the information of the second application therein.Wherein, historical log information can carry out the information being recorded in the storage catalogue of the first application when open authorization for the application of last time second to the first application;Historical log information may be to be stored after terminal receives historical log information from other terminals or Cloud Server into the storage catalogue of the first application;Historical log information can be written in the storage catalogue of the first application by historical information logging modle by synchronous or importing instruction.
1.2, first apply initiate logging request preparation process in historical information logging modle issue inquiry request, from The historical log information of the first application is obtained in the response that historical information logging modle returns, and then obtains the information of the second application.
1.3, terminal from historical information logging modle obtain first application historical log information, and then from wherein obtain second application information.Specifically, the first application reception historical information logging modle in terminal indicates information according to the login that the historical log information that user determines generates, and described log in indicates that information contains the information for the second application for including in the historical log information and/or historical log information
Step 2, terminal can determine that carrying out the second of open authorization to the first application in this opening authorization logs in applies according to the information of the second application in the historical log information of the first application, then request user confirmation carries out open authorization to the first application using second application or terminal calls second application to carry out open authorization to the first application automatically.
In one example, user may temporarily use others' terminal or public terminals has been used to log in the first application, therefore, user may be not desired to save the historical log information of the first application at the terminal, or the information for the second application that open authorization logs in has been carried out to the first application.Therefore, after user log off is to the login of the first application, terminal can delete the historical log information of the first application, or delete the information of the second application in the historical log information that first applies.So as to further promote the experience of user.
In one example, in step 2, terminal determines that the second application fails according to the information of the second application in historical log information, illustrate the information failure of the second application in historical log message, terminal can delete the historical log information of the first application, or delete the information of the second application in the historical log information that first applies.
In one example, in step 2, determine the second application to the opening authorization failure of the first application, illustrate that second application may no longer support the open function of authorizing, or other reasons, cause it that cannot carry out open authorization to the first application, terminal can delete the historical log information of the first application, or delete the information of the second application in the historical log information that first applies.
In one example, after the second application determined has carried out open authorization to the first application success, the second application that terminal can use this is updated the open authorization of the first application to the information of the second application in the historical log information of the first application.
In one example, the information of the second application in the historical log information of first application can be the information of two or more applications, terminal can be shown to user according to the historical log information of first application generate include this two or more application interface identification so that user is from the second application for wherein determining this and carrying out to the first application open authorization.In one example, when the historical log information is stored in historical information logging modle, the historical information logging modle generates according to the historical log information that user determines and logs in instruction information, so that first application indicates that information executes step 2 according to the login.
In one example, the information of the second application in the historical log information of first application can be the information of two or more applications, historical log information further include this two or more the first application was carried out the time that open authorization logs in using last time, terminal can carry out time that open authorization logs in from the second application for wherein determining this and carrying out to the first application open authorization according to them.
In an example, in conjunction with Fig. 9 a, 9b, 9c, with the first application for a, there is the application of open authorization function for open authorization login method provided by the embodiments of the present application is illustrated for A, B, C, D.
As illustrated in fig. 9, in A terminal, according to previous step described above, user has logged in a application by the way of the open authorization a application of A application.A terminal has recorded the log-on message of this application, and which includes the information of A application.
As shown in figure 9b, for applying a, open authorization function can be provided for it using A, B, C, D.B terminal can receive the log-on message that a that A terminal records is applied, i.e. the historical log information of a application from A terminal.The information independence of A application in the historical log information that B terminal can be applied according to a determines that A is applied, so that A, which is applied, carries out open authorization to a application;B terminal can also show that the confirmation request for open to a application authorization is applied in request user confirmation using A according to historical log information to user in a manner of pop-up or text, and the confirmation then in conjunction with user instructs the application for determining and A basing on practicality time open authorization a applying.
If shown in 9c, when A is applied to a using open authorization is carried out, B terminal can show open authorization page, the information stored in the Resource Server that the A that family selection a application, which can be used, to be authorized to is applied.
In one example, after A has been carried out in B terminal using the open authorization applied to a, B terminal can recorde the log-on message of this application, to update the historical log information for a application that B terminal is received from A terminal.
In one example, application message in the historical log information of a application can be multiple, for example the information using A1, A2, A3, the information of application can also include using the history applied to a open authorization time, the information of application can also include the incidence relation using the account with a application.
The time that assume that the open authorization a of A1 is T1, and the time of the open authorization a of A2 is T2, and the time of the open authorization a of A3 is T3.When B terminal determines the second application, it can be shown to user and apply A1, A2, A3 and time T1, T2, T3, and can also show confirmation, delete or no longer display etc. options so that user selection second application and to a application historical log information edit, show setting etc. processing.
It assume that a application account of user has a1, a2, a3 etc., wherein being associated with respectively with account a1, a2, a3 using A1, A2, A3.When B terminal determines the second application, it can be shown to user and apply A1, A2, A3 and account a1, a2, a3, and can also show confirmation, delete or no longer display etc. options so that user selection second application and to a application historical log information edit, show setting etc. processing.
In an example, with the first application for a, b, c, the second application is illustrated for the method logged in for A, B to open authorization provided by the embodiments of the present application.
The historical log information using a, b, c that terminal can be recorded or be received transfers to historical information logging modle to be managed collectively, it assume that the information applied include in a historical log information using A, using including information using B in b historical log information, using including information using A in c historical log information.Terminal has determined that using A be using corresponding second application of a, c, is using corresponding second application of b using B.Terminal can show include using A mark, using B mark interface, and the mark using a, c can be shown on application A mark periphery, the mark using b can be shown on the periphery of application B mark, to indicate to be under the jurisdiction of using a, c using A, be under the jurisdiction of using b using B.
The mark applied using a, user can make the register instruction for a application, be instructed according to the register, and terminal can call A to carry out open authorization to a.
In one example, terminal provided by the embodiments of the present application can show the mark of application in the case where being fitted without the client of application.It assume that, although terminal shows the mark using a, A, but terminal is installed without the client of client and/or application A using a, after user makes for the register instruction of a application, terminal can recall application market, automatic downloading is using a and/or using the client of A, or prompt user downloading is using the client of a and/or application A.
In one example, terminal has determined that using A be using corresponding second application of a, c, is using corresponding second application of b using B.Terminal can show to include the mark for applying a, the interface of the mark using b, the mark using c, and can show the mark using A on the mark periphery of application a, can show on the periphery of the mark of application b using B Mark, the mark using A can be shown on the periphery of mark of application c, to indicate using the open authorization application of history of a, using b, to be using A using the open authorization application of the history of c using the open authorization application of the history of b using A.
The embodiment of the present application provides a kind of open authorization entering device 1000, and as shown in Figure 10, open authorization entering device 1000 includes processing unit 1001 and communication unit 1002.Wherein, processing unit 1001, for determining the second application according to the historical log information of the first application, the historical log information is the information that the terminal receives, the historical log information includes the information of the second application, and the second application is the application that history carries out open authorization to the first application.Communication unit 1002; authorization server for from the second application to the determination sends the authorization requests for open to first application authorization login, the permission of shielded user resources in the Resource Server to request the determine described in first application access second application.
The other function of processing unit 1001 and communication unit 1002 can refer to the content introduction of above method, not repeat herein.
The beneficial effect of open authorization entering device 1000 can refer to the content introduction of above method, not repeat herein.
The embodiment of the present application provides a kind of open authorization entering device 1100, and as shown in figure 11, open authorization entering device 1100 includes processing unit 1101 and communication unit 1102.Wherein, processing unit 1101, for determining the second application according to the historical log information of the first application, the historical log information is the information of terminal record, the historical log information includes the information of the second application, and the second application is the application that history carries out open authorization to the first application.Communication unit 1102; authorization server for from the second application to the determination sends the authorization requests for open to first application authorization login, the permission of shielded user resources in the Resource Server to request the determine described in first application access second application.
The other function of processing unit 1101 and communication unit 1102 can refer to the content introduction of above method, not repeat herein.
The beneficial effect of open authorization entering device 1100 can refer to the content introduction of above method, not repeat herein.
The embodiment of the present application provides a kind of terminal 1200, and as shown in figure 12, terminal 1200 includes processor 1201 and memory 1202.1202 store code of memory.Processor 1201 executes the code and determines the second application according to the historical log information of the first application for executing, the historical log information is the information that the terminal receives, the historical log information includes the information of the second application, and the second application is the application that history carries out open authorization to the first application;Processor 1201 executes the code and is also used to execute the authorization requests that the authorization server transmission applied to the second of the determination open to first application authorization login, to request the permission of shielded user resources in the second Resource Server applied determining described in first application access.
Processor 1201, which executes the code that memory 1202 stores, can refer to the content introduction of above method for other optinal plans of execution, not repeat herein.
The beneficial effect of terminal 1200 can refer to the content introduction of above method, not repeat herein.
The embodiment of the present application provides a kind of terminal 1300, and as shown in figure 13, terminal 1300 includes processor 1301 and memory 1302.1302 store code of memory.Processor 1301 executes the code and determines the second application according to the historical log information of the first application for executing, the historical log information is the information that the terminal carries out open authorization according to the history saved in the terminal to first application, the historical log information includes the information of the second application, and the second application is the application that history carries out open authorization to the first application;The authorization server for being also used to execute the second application to the determination is sent The authorization requests that open authorization logs in are carried out to first application, the permission of shielded user resources in the Resource Server to request the determine described in first application access second application.
Processor 1301, which executes the code that memory 1302 stores, can refer to the content introduction of above method for other optinal plans of execution, not repeat herein.
The beneficial effect of terminal 1300 can refer to the content introduction of above method, not repeat herein.
It can be understood that, processor in embodiments herein can be central processing unit (Central Processing Unit, CPU), it can also be other general processors, digital signal processor (Digital Signal Processor, DSP), specific integrated circuit (Application Specific Integrated Circuit, ASIC), field programmable gate array (Field Programmable Gate Array, ) or other programmable logic device FPGA, transistor logic, hardware component or any combination thereof.General processor can be microprocessor, be also possible to any conventional processor.
Method and step in embodiments herein can be realized by way of hardware, can also execute the mode of software instruction by processor to realize.Software instruction can be made of corresponding software module, software module can be stored on random access memory (Random Access Memory, RAM), flash memory, read-only memory (Read-Only Memory, ROM), programmable read only memory (Programmable ROM, PROM), Erasable Programmable Read Only Memory EPROM (Erasable PROM, EPROM), electrically erasable programmable read-only memory (Electrically EPROM, EEPROM), register, hard disk, mobile hard disk, in CD-ROM or the storage medium of any other form well known in the art.A kind of illustrative storage medium is coupled to processor, to enable a processor to from the read information, and information can be written to the storage medium.Certainly, storage medium is also possible to the component part of processor.Pocessor and storage media can be located in ASIC.In addition, the ASIC can be located in terminal.
In the above-described embodiments, it can be realized wholly or partly by software, hardware, firmware or any combination thereof.When implemented in software, it can entirely or partly realize in the form of a computer program product.The computer program product includes one or more computer instructions.When loading on computers and executing the computer program instructions, entirely or partly generate according to process or function described in the embodiment of the present application.The computer can be general purpose computer, special purpose computer, computer network or other programmable devices.The computer instruction may be stored in a computer readable storage medium, or be transmitted by the computer readable storage medium.The computer instruction can be transmitted from a web-site, computer, server or data center by wired (such as coaxial cable, optical fiber, Digital Subscriber Line (DSL)) or wireless (such as infrared, wireless, microwave etc.) mode to another web-site, computer, server or data center.The computer readable storage medium can be any usable medium that computer can access or include the data storage devices such as one or more usable mediums integrated server, data center.The usable medium can be magnetic medium, (for example, floppy disk, hard disk, tape), optical medium (for example, DVD) or semiconductor medium (such as solid state hard disk (Solid State Disk, SSD)) etc..
It is understood that the differentiation that the various digital numbers involved in embodiments herein only carry out for convenience of description, is not intended to limit the range of embodiments herein.
It can be understood that, in embodiments herein, magnitude of the sequence numbers of the above procedures are not meant that the order of the execution order, and the execution sequence of each process should be determined by its function and internal logic, and the implementation process without coping with embodiments herein constitutes any restriction.
The above, the only specific embodiment of embodiments herein, anyone skilled in the art is in the technical scope that the application discloses exposure, and any changes or substitutions that can be easily thought of, should all cover in embodiments herein Within protection scope.

Claims (26)

  1. A kind of open authorization login method, it is characterized in that, the described method includes: terminal determines the second application according to the historical log information of the first application, the historical log information is the information that the terminal receives, the historical log information includes the information of the second application, and the second application is the application that history carries out open authorization to the first application;
    The terminal sends the authorization requests for open to first application authorization login to the authorization server of the second application of the determination, the permission of shielded user resources in the Resource Server to request the determine described in first application access second application.
  2. The method according to claim 1, wherein the historical log information that the terminal receives is specially the terminal from Cloud Server, from other terminals except the terminal or the information received from least one of memory.
  3. The method according to any one of claims 1 and 2, which is characterized in that the terminal determines that the second application includes: according to the historical log information of the first application
    The terminal obtains the historical log information from least one of historical information logging modle, the store path of the first application, the store path of the second application;
    Wherein, the historical information logging modle is in the terminal for recording and/or saving the module of the historical log information of multiple applications.
  4. Method according to claim 1 to 3, which is characterized in that the historical log information includes the time of origin that the open authorization of history logs in;
    If the information of second application is the information of at least two applications, the terminal determines that the second application includes: according to the historical log information of the first application
    The terminal determines one second application from least two application according to the time of origin of the open authorization of the history.
  5. According to the method described in claim 4, it is characterized in that, the terminal determines that the second application includes: according to the historical log information of the first application if the information of second application is the information of at least two applications:
    The terminal shows at least two application according to the information of at least two application;
    The terminal receives selection operation instruction;
    The terminal instructs according to the selection operation and determines second application from least two application.
  6. Method according to claim 1-5, which is characterized in that before the terminal carries out opening the authorization requests that authorization logs in the authorization server transmission of the second application of the determination to first application, the method also includes:
    The terminal shows the second application of the determination;
    The terminal receives the operational order that second application of the confirmation using the determination carries out open authorization to first application;
    The terminal sends the authorization requests for open authorization login to first application to the authorization server of the second application of the determination
    The terminal sends the authorization requests logged in described first using open authorization is carried out using the operational order that the second application of the determination carries out open authorization to first application according to the confirmation.
  7. Method according to claim 1-6, which is characterized in that the method also includes:
    The terminal shows that the first interface, first interface include the mark of second application according to the historical log information Know.
  8. The method according to the description of claim 7 is characterized in that first interface further includes the mark of the first application corresponding with the second application.
  9. According to the method described in claim 8, it is characterized in that, the method also includes:
    The terminal receives the register instruction for the first application on first interface;
    The terminal sends the authorization requests for open authorization login to first application to the authorization server of the second application of the determination
    Register of the terminal according to for the first application on first interface instructs the second authorization server applied on first interface to send the authorization requests for open to first application authorization login.
  10. The method according to the description of claim 7 is characterized in that the method also includes:
    The terminal receives the displaying operational order for the second application on first interface;
    The terminal shows that second contact surface, the second contact surface include the mark of the first application corresponding with the second application according to the expansion operational order.
  11. According to the method described in claim 10, it is characterized in that, the method also includes:
    The terminal receives the register instruction for the first application on the second contact surface;
    The terminal sends the authorization requests for open authorization login to first application to the authorization server of the second application of the determination
    The terminal sends the authorization requests for open to first application authorization login according to the authorization server that the register of first application being directed on the second contact surface instructs second on first interface to apply.
  12. - 11 described in any item methods according to claim 1, which is characterized in that in the Resource Server of the terminal request to one second application of first application access after the permission of shielded user resources, the method also includes:
    The terminal updates the historical log information of first application according to the second of the determination the application to described this opening Authorized operation carried out of first application.
  13. A kind of open authorization login method, which is characterized in that the described method includes:
    Terminal determines the second application according to the historical log information of the first application, the historical log information is the information that the terminal carries out open authorization according to the history saved in the terminal to first application, the historical log information includes the information of the second application, and the second application is the application that history carries out open authorization to the first application;
    The terminal sends the authorization requests for open to first application authorization login to the authorization server of the second application of the determination, the permission of shielded user resources in the Resource Server to request the determine described in first application access second application.
  14. According to the method for claim 13, it is characterized in that, the terminal determines that the second application includes: the terminal and obtains the historical log information from least one of historical information logging modle, the store path of the first application, the store path of the second application according to the historical log information of the first application.
  15. Method described in 3 or 14 according to claim 1, which is characterized in that the historical log information includes the time of origin that the open authorization of history logs in;
    If the information of second application is the information of at least two applications, the terminal determines that the second application includes: according to the historical log information of the first application
    The terminal determines one second from least two application according to the time of origin of the open authorization of the history and answers With.
  16. The described in any item methods of 3-15 according to claim 1, which is characterized in that the method also includes:
    The terminal shows that the first interface, first interface include the mark of second application according to the historical log information.
  17. According to the method for claim 16, which is characterized in that first interface further includes the mark of the first application corresponding with the second application.
  18. According to the method for claim 17, which is characterized in that the method also includes:
    The terminal receives the register instruction for the first application on first interface;
    The terminal sends the authorization requests for open authorization login to first application to the authorization server of the second application of the determination
    Register of the terminal according to for the first application on first interface instructs the second authorization server applied on first interface to send the authorization requests for open to first application authorization login.
  19. According to the method for claim 16, which is characterized in that the method also includes:
    The terminal receives the displaying operational order for the second application on first interface;
    The terminal shows that second contact surface, the second contact surface include the mark of the first application corresponding with the second application according to the displaying operational order.
  20. According to the method for claim 19, which is characterized in that the method also includes:
    The terminal receives the register instruction for the first application on the second contact surface;
    The terminal sends the authorization requests for open authorization login to first application to the authorization server of the second application of the determination
    Register of the terminal according to for the first application on first interface instructs the second authorization server applied on first interface to send the authorization requests for open to first application authorization login.
  21. The described in any item methods of 3-20 according to claim 1, which is characterized in that in the Resource Server of the second application determined described in the terminal request to first application access after the permission of shielded user resources, the method also includes:
    According to the second of the determination the application, to first application, this opening Authorized operation carried out updates the historical log information to the terminal.
  22. A kind of open authorization entering device, which is characterized in that described device includes:
    Processing unit, for determining the second application according to the historical log information of the first application, the historical log information is the information that the terminal receives, and the historical log information includes the information of the second application, and the second application is the application that history carries out open authorization to the first application;
    Communication unit; authorization server for from the second application to the determination sends the authorization requests for open to first application authorization login, the permission of shielded user resources in the Resource Server to request the determine described in first application access second application.
  23. A kind of open authorization entering device, which is characterized in that described device includes:
    Processing unit, for determining the second application according to the historical log information of the first application, the historical log information is the information of terminal record, and the historical log information includes the information of the second application, and the second application is the application that history carries out open authorization to the first application;
    Communication unit, the authorization server for the second application to the determination is sent open awarding to first application The authorization requests logged in are weighed, the permission of shielded user resources in the Resource Server to request the determine described in first application access second application.
  24. A kind of terminal, which is characterized in that the terminal includes processor and memory;
    The memory store code;
    The processor executes the code, requires the described in any item methods of 1-12 or 13-21 for perform claim.
  25. A kind of computer readable storage medium storing program, which is characterized in that described program includes instruction, when described instruction is executed by terminal, the terminal perform claim is made to require the method or the described in any item methods of claim 13-21 of any one of 1-12.
  26. A kind of computer program product comprising instruction, which is characterized in that when the computer program product is run at the terminal, the terminal perform claim is made to require the method or the described in any item methods of claim 13-21 of any one of 1-12.
CN201780037019.5A 2017-04-25 2017-06-27 Open authorization method, device and terminal Active CN109314711B (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
CN201710277610X 2017-04-25
CN201710277610 2017-04-25
PCT/CN2017/090311 WO2018196153A1 (en) 2017-04-25 2017-06-27 Open authorization-based method, device, and terminal

Publications (2)

Publication Number Publication Date
CN109314711A true CN109314711A (en) 2019-02-05
CN109314711B CN109314711B (en) 2020-09-11

Family

ID=63917935

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201780037019.5A Active CN109314711B (en) 2017-04-25 2017-06-27 Open authorization method, device and terminal

Country Status (2)

Country Link
CN (1) CN109314711B (en)
WO (1) WO2018196153A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111062024A (en) * 2019-11-25 2020-04-24 泰康保险集团股份有限公司 Application login method and device
WO2022135269A1 (en) * 2020-12-22 2022-06-30 华为技术有限公司 Method for authorizing by using another device, electronic devices and system

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111401395B (en) * 2019-01-02 2023-05-09 中国移动通信有限公司研究院 Data processing method, terminal equipment and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102739708A (en) * 2011-04-07 2012-10-17 腾讯科技(深圳)有限公司 System and method for accessing third party application based on cloud platform
US20140066044A1 (en) * 2012-02-21 2014-03-06 Manoj Ramnani Crowd-sourced contact information and updating system using artificial intelligence
CN105282126A (en) * 2014-07-24 2016-01-27 腾讯科技(北京)有限公司 Login authentication method, terminal and server
CN105429979A (en) * 2015-11-17 2016-03-23 上海礼源网络科技有限公司 Cross-platform user certificating method and intelligent router, Internet surfing system
CN105553972A (en) * 2015-12-14 2016-05-04 苏州天平先进数字科技有限公司 Method of using third-party account to log in to screen locking APP community
CN105847277A (en) * 2016-04-29 2016-08-10 乐视控股(北京)有限公司 Service account share management method and system used for third party application
CN105871838A (en) * 2016-03-30 2016-08-17 努比亚技术有限公司 Third party account login control method and user center platform

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8650253B2 (en) * 2008-02-06 2014-02-11 Sony Online Entertainment Llc System and method for integrating ancillary content into applications
CN105827600B (en) * 2016-03-11 2020-09-29 腾讯科技(深圳)有限公司 Method and device for logging in client

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102739708A (en) * 2011-04-07 2012-10-17 腾讯科技(深圳)有限公司 System and method for accessing third party application based on cloud platform
US20140066044A1 (en) * 2012-02-21 2014-03-06 Manoj Ramnani Crowd-sourced contact information and updating system using artificial intelligence
CN105282126A (en) * 2014-07-24 2016-01-27 腾讯科技(北京)有限公司 Login authentication method, terminal and server
CN105429979A (en) * 2015-11-17 2016-03-23 上海礼源网络科技有限公司 Cross-platform user certificating method and intelligent router, Internet surfing system
CN105553972A (en) * 2015-12-14 2016-05-04 苏州天平先进数字科技有限公司 Method of using third-party account to log in to screen locking APP community
CN105871838A (en) * 2016-03-30 2016-08-17 努比亚技术有限公司 Third party account login control method and user center platform
CN105847277A (en) * 2016-04-29 2016-08-10 乐视控股(北京)有限公司 Service account share management method and system used for third party application

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111062024A (en) * 2019-11-25 2020-04-24 泰康保险集团股份有限公司 Application login method and device
CN111062024B (en) * 2019-11-25 2022-07-19 泰康保险集团股份有限公司 Application login method and device
WO2022135269A1 (en) * 2020-12-22 2022-06-30 华为技术有限公司 Method for authorizing by using another device, electronic devices and system

Also Published As

Publication number Publication date
CN109314711B (en) 2020-09-11
WO2018196153A1 (en) 2018-11-01

Similar Documents

Publication Publication Date Title
US11736292B2 (en) Access token management method, terminal, and server
US20240297882A1 (en) Certificate based profile confirmation
CN110463161B (en) Password state machine for accessing protected resources
US10375054B2 (en) Securing user-accessed applications in a distributed computing environment
US9246921B1 (en) Secure external access to device automation system
US20190268155A1 (en) Method for Ensuring Terminal Security and Device
JP6552519B2 (en) Portal authentication
US10349272B2 (en) Virtual SIM card cloud platform
CN108337677B (en) Network authentication method and device
WO2015074585A1 (en) Account information management method and apparatus in smart tv
CN109815684B (en) Identity authentication method, system, server and storage medium
CN115021991A (en) Single sign-on for unmanaged mobile devices
EP3111615A1 (en) Systems and methods for providing secure access to local network devices
CN109787989B (en) Password modification method, system, target server and storage medium
US11025635B2 (en) Secure remote support authorization
CN105991614A (en) Open authorization, resource access method and device, and a server
US11477186B2 (en) Multi-factor user authentication for network access
CN109314711A (en) A kind of open authorization method, device and terminal
US9356933B2 (en) Implementing policies for an enterprise network using policy instructions that are executed through a local policy framework
US20230275886A1 (en) Critical event triggers for continuous access evaluations during communication sessions
CN112685719B (en) Single sign-on method, device, system, computer equipment and storage medium
EP2511846B1 (en) Method, apparatus and system for obtaining user information
US20240146737A1 (en) Authentication service for automated distribution and revocation of shared credentials
US20230370447A1 (en) System and method for providing application access through an rdp pool service over a zero trust cloud environment
WO2023048733A1 (en) Apparatus and method of a scenario-based permission mechanism for access to a restricted resource

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant