CN110417723A - A kind of application login method, device, terminal and storage medium - Google Patents

A kind of application login method, device, terminal and storage medium Download PDF

Info

Publication number
CN110417723A
CN110417723A CN201910252704.0A CN201910252704A CN110417723A CN 110417723 A CN110417723 A CN 110417723A CN 201910252704 A CN201910252704 A CN 201910252704A CN 110417723 A CN110417723 A CN 110417723A
Authority
CN
China
Prior art keywords
user
user information
application
authorization
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910252704.0A
Other languages
Chinese (zh)
Other versions
CN110417723B (en
Inventor
谢嘉雯
邓小俊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Tencent Technology Co Ltd
Original Assignee
Guangzhou Tencent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Tencent Technology Co Ltd filed Critical Guangzhou Tencent Technology Co Ltd
Priority to CN201910252704.0A priority Critical patent/CN110417723B/en
Publication of CN110417723A publication Critical patent/CN110417723A/en
Application granted granted Critical
Publication of CN110417723B publication Critical patent/CN110417723B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The embodiment of the invention discloses a kind of application login method, device, terminal and storage mediums;The embodiment of the present invention can receive the authorization logging request that the first application is initiated;According to authorization logging request triggering the second application display user information list, the user information list includes multiple for logging in the user information of the first application, wherein, multiple user informations include user in the non-genuine user information of real user information and user in the second application in the second application;Selection is for logging in target user's information of the first application from the user information list;When detecting license confirmation instruction, based on the first application described in target user's information registration.The program can promote the safety of user information.

Description

A kind of application login method, device, terminal and storage medium
Technical field
The present invention relates to communication technique fields, and in particular to a kind of application login method, device, terminal and storage medium.
Background technique
Authorization log in, refer to user using one in application, using another application authorization user information log in The application.It is to be logged in using accordingly, it is possible to will appear use due to needing to license to user information in login process The illegal situation such as family information leakage, theft, causes the safety of user information poor.
Summary of the invention
The embodiment of the present invention provides a kind of application login method, device, terminal and storage medium, can be with the peace of user information Quan Xing.
The embodiment of the present invention provides a kind of using login method, comprising:
Receive the authorization logging request that the first application is initiated;
According to authorization logging request triggering the second application display user information list, the user information list includes Multiple user informations for being used to log in the first application, wherein multiple user informations include true use of the user in the second application The non-genuine user information of family information and user in the second application;
Selection is for logging in target user's information of the first application from the user information list;
When detecting license confirmation instruction, based on the first application described in target user's information registration.
Correspondingly, the embodiment of the present invention also provide it is a kind of using entering device, comprising:
Receiving unit, the authorization logging request initiated for receiving the first application;
Display unit, for according to authorization logging request triggering the second application display user information list, the use Family information list includes multiple for logging in the user information of the first application, wherein multiple user informations include user second The non-genuine user information of real user information and user in the second application in;
Selecting unit, for selecting target user's information for logging in the first application from the user information list;
Unit is logged in, for being based on first described in target user's information registration when detecting license confirmation instruction Using.
A kind of terminal provided in an embodiment of the present invention, including processor and memory, the memory are stored with a plurality of finger It enables, the processor loads described instruction, to execute any step using in login method provided in an embodiment of the present invention.
In addition, the embodiment of the present invention also provides a kind of storage medium, the storage medium is stored with a plurality of instruction, the finger It enables and being loaded suitable for processor, to execute the step in any login method provided in an embodiment of the present invention.
The embodiment of the present invention can receive the authorization logging request that the first application is initiated;It is touched according to the authorization logging request Hair the second application display user information list, the user information list include multiple for logging in user's letter of the first application Breath, wherein multiple user informations include user in the second application real user information and user in the second application Non-genuine user information;Selection is for logging in target user's information of the first application from the user information list;Work as detection To when license confirmation instruction, applied based on described in target user's information registration first.The program can use non-real practical Family authorizing information logs in application, occurs the illegal situation such as leak, steal accordingly it is possible to prevent there is real user information, be promoted The safety of user information.
Detailed description of the invention
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment Attached drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for For those skilled in the art, without creative efforts, it can also be obtained according to these attached drawings other attached Figure.
Fig. 1 a is the schematic diagram of a scenario provided in an embodiment of the present invention using login method;
Fig. 1 b is the flow chart provided in an embodiment of the present invention using login method;
Fig. 1 c is login page schematic diagram provided in an embodiment of the present invention;
Fig. 1 d is authorization login page schematic diagram provided in an embodiment of the present invention;
Fig. 1 e is another schematic diagram of authorization login page provided in an embodiment of the present invention;
Fig. 1 f is another schematic diagram of authorization login page provided in an embodiment of the present invention;
Fig. 2 a is the UI interaction schematic diagram that application authorization provided in an embodiment of the present invention logs in;
Fig. 2 b is another UI interaction schematic diagram that application authorization provided in an embodiment of the present invention logs in;
Fig. 2 c is another UI interaction schematic diagram that application authorization provided in an embodiment of the present invention logs in;
Fig. 3 a is another flow diagram that application provided in an embodiment of the present invention logs in;
Fig. 3 b is the flow diagram that user provided in an embodiment of the present invention is logged in using authorization;
Fig. 3 c is that the technology that application authorization provided in an embodiment of the present invention logs in realizes schematic diagram;
Fig. 4 a is the structural schematic diagram provided in an embodiment of the present invention using entering device;
Fig. 4 b is another structural schematic diagram provided in an embodiment of the present invention using entering device;
Fig. 4 c is another structural schematic diagram provided in an embodiment of the present invention using entering device;
Fig. 4 d is another structural schematic diagram provided in an embodiment of the present invention using entering device;
Fig. 5 is the structural schematic diagram of terminal provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, those skilled in the art's every other implementation obtained without creative efforts Example, shall fall within the protection scope of the present invention.
The embodiment of the present invention provides a kind of application login method, device, terminal and storage medium.Wherein, the application apparatus It can integrate in terminal, which can be the equipment such as mobile phone, tablet computer, laptop.
It include terminal and server the embodiment of the invention provides application login system with reference to Fig. 1 a;The terminal and service Device is by network connection, for example, passing through wired or wireless network connection etc..
Wherein, the first application program (referred to as first application) and the second application program (referred to as the is installed in terminal Two applications);Server can be the server of the second application.First application can be different applications from the second application, i.e., different Structure application, in one embodiment, the first application can also be the son application operated in the second application, for example, in the second application Small routine etc..
Small routine refers to that a kind of developed based on certain programmed language is completed, without downloading and installation, so that it may the shifting used Moved end application program, may operate in cross-platform mobile client or application is upper.The maximum feature of small routine be it is easy to use, User, which sweeps, sweeps or searches for i.e. openable application, without manually installing in the operating system of mobile terminal.
When terminal needs to log in first in application, terminal receives the authorization logging request that the first application is initiated;According to authorization Logging request triggering the second application display user information list, user information list include multiple for logging in the use of the first application Family information, wherein multiple user informations include real user information and user of the user in the second application in the second application In non-genuine user information;Selection is for logging in target user's information of the first application from user information list;Work as detection To when license confirmation instruction, applied based on target user's information registration first.
Specifically, when detecting license confirmation instruction, terminal can the message identification based on target user's information from clothes Then device acquisition target user's information of being engaged in is applied based on target user's information registration first.For example, terminal can use target The identity of the message identification of family information, the application identities of the second application and user in the second application encodes, and obtains To authorization code;Target user's information in the second application is obtained from the server of the second application based on authorization code, then, terminal can To be applied based on target user's information registration first.
It is described in detail separately below.It should be noted that the following description sequence is not as excellent to embodiment The restriction of choosing sequence.
The present embodiment will be described from the angle of application entering device, this specifically can integrate using entering device at end The equipment such as end;Wherein, which may include mobile phone, tablet computer, laptop and individual calculus (PC, Personal The equipment such as Computer).
Provided in an embodiment of the present invention a kind of using login method, this method can be executed by the processor of terminal, such as be schemed Shown in 1b, this can be such that using the detailed process of login method
101, the authorization logging request that the first application is initiated is received.
In the embodiment of the present invention, the first application can be different applications, i.e. heterogeneous applications from the second application.Implement one Example in, first application from second application can be two different independent utilities, for example, first application can for game application, Second application can be instant messaging application etc..
In one embodiment, the first application can also be the son application such as small routine operated in some application, for example, The son operated in the second application applies such as small routine.For example, the second application can be instant messaging application, first application Can such as do shopping small routine, game small routine, servlet for the small routine in instant messaging application.
In one embodiment, the first application can also be the business service account in some application, in the second application Business service account, for example instant messaging application in public platform.
In addition, the application can also can be webpage with first, such as game webpage, shopping webpage in some embodiments Deng.
That is, the first application can be the shapes such as application program (APP), webpage, public platform, small routine in the embodiment of the present invention Formula.
Wherein, there are many modes of the first application initiation authorization logging request, for example, in one embodiment, can show The login page of first application, user can trigger the first application by login page and initiate authorization logging request, at this point, using Entering device will receive the authorization logging request.
For example, step " receiving the authorization logging request that the first application is initiated ", may include: the login for showing the first application The page;When detecting that user is directed to the authorization register of login page, authorization logging request is initiated in the first application of triggering, is connect It receives the authorization logging request that the first application is initiated and such as passes through the second application reception authorization logging request.The authorization register can be with Including the operation such as sliding, clicking.
In one embodiment, it for the ease of user login operation, is promoted and logs in efficiency, it can also be in the login of the first application Interface setting authorization logs in control, and user, which can log in control to authorization and be operated (such as slide, click operate), triggers the Authorization logging request is initiated in one application, at this point, can receive to the authorization logging request using entering device.Wherein, it awards The performance that power logs in control show can there are many, for example, can be input frame, icon, button etc..
For example, terminal can show the login page of the first application, the log in page after the application of operation first with reference to Fig. 1 c Face includes that authorization login button is " the second application logs in ";When the user clicks should " second application log in " button can trigger the Authorization logging request is initiated in one application, at this point, terminal will receive the request.
Wherein, authorization logging request can carry the application of the application identities of the first application, authorization application such as the second application The information such as mark.
102, according to authorization logging request triggering the second application display user information list, user information list includes multiple For logging in the user information of the first application, wherein multiple user informations include real user letter of the user in the second application The non-genuine user information of breath and user in the second application.
Wherein, user information list may include multiple for logging in the user information of the first application, user information column At least two be may include in table for logging in the user information of the first application, the quantity of user information can be according to the actual situation Setting.
Wherein, user information may include at least one of information such as head portrait, the pet name, position, gender, for example, can be with Head portrait, the pet name including user.
Wherein, the real user information user information that may include user currently used in the second application, for example, with the Two applications are for instant messaging is applied, and real user information currently can carry out message using instant messaging application for user Used user information when interaction.In practical application, real user information can be newest preservation in the system of the second application User user information, such as newest preservation with user indicate binding user information.For example, the real user of user A is believed Breath can be the user information of the user A of newest preservation in message exchange system.
It will be appreciated that real user information is not intended to the true identity information one with user in the embodiment of the present invention It causes, real user information could be known as.For example, if user currently used pet name, head portrait in the second application, true with user When the name of reality, personal head portrait are inconsistent, the currently used pet name, head portrait are real user information.
Wherein, non-genuine user information is defined relative to real user information, the non-genuine user information be with The user information that real user information distinguishes;The two is different user information.For example, by taking head portrait, the pet name as an example, really User information includes user's head portrait currently used in the second application, the pet name;Non-genuine user information includes being different from user Currently used head portrait, the pet name in the second application.
Wherein, real user information and the difference of non-genuine user information both may include: it is entirely different, for example, head portrait, The pet name is all different, and also may include that part is identical, for example, head portrait is identical, the pet name is not identical etc..
It will be appreciated that non-genuine user information is not intended to use in the second application in the embodiment of the present invention, it can It is used with only being logged in for authorization.
In one embodiment, can be after receiving authorization logging request, terminal obtains the according to authorization logging request The redirected link information of two applications;The second application is opened based on redirected link information, while triggering second application display user's letter Cease list.
In one embodiment, it is logged in for the ease of application, can also show user information list by the page, specifically show The mode of showing may include following several:
(1), the display of the existing non-genuine user information of user information list
Step " shows user information list according to the second application of triggering of authorization logging request ", may include:
According to authorization logging request triggering the second application display authorization login page, authorization login page includes user information List, user information list include user in the second application real user information and user it is non-in the second application Real user information.
For example, terminal can authorize logging request directly to trigger the second application display authorization login page, the authorization page It may include real user information and non-genuine user information, in the case, user in the list including user information list Information list has existed non-genuine user information, which can edit or use for historical time user Non-genuine user information, for example, historical time is edited when authorizing and logging in or the user information that uses.
Authorization login page can also include other information, such as prompting message etc. in one embodiment, can for example mention Awake user can choose different user informations and log in application, or the application message for reminding user to authorize logging request application (Apply Names, icon that the application message such as first of the such as first application is applied), or can also include reminding user's letter The type of breath, such as remind user to log in first and apply the required type of user information used such as head portrait, the pet name, position type.
Wherein, in the user information list in the embodiment of the present invention form of expression of user information may include it is a variety of, than Such as, user information can be shown in the form of control is such as selection control.For example, user information list may include that user information is corresponding Selection control, such as the corresponding selection control of non-real real user, the corresponding selection control of real user.User can be intuitive in this way The corresponding user information of selection control is seen on ground, and can be by being operated to selection control to select to need mesh to be used Mark user information.For example, user can be corresponding to user information in authorization login page when selecting control is to choose class control Control of choosing operated, selected in a manner of choosing for log in application user information.
In one embodiment, user information list can also include information protection control;User can be to information protection control Part is operated to select the authorization login mode for not providing user information, authorizes the information of the first application only under this login mode User Identity including user in the second application, and be based only upon User Identity and log in the first application;It is logging in In the process, user information such as User Identity binding or associated user information in applying without using user second are (such as Head portrait, pet name etc.).
For example, by first application for using a, second application be using b for, terminal receive using a initiate authorization After logging request, it can be opened according to authorization logging request and apply b, while triggered and showing authorization login page using b, such as Fig. 1 d Shown, which includes user information list, which includes real information of the user in application b Such as true head portrait such as " head portrait 1 " and the pet name " teenager ", which can also include non-genuine user information of the user in application b Such as non-genuine head portrait such as " head portrait 2 " and the pet name " quick-witted such as me ".The non-genuine head portrait and the pet name can apply b in advance for user User's authorization login other application of middle editor uses head portrait and the pet name, for example can authorize and step on for historical time such as the last time The head portrait and the pet name edited or used when recording other application.
Wherein, the user information in the user information list in Fig. 1 d can be shown in the form of selecting control, such as Fig. 1 d In, real user information, non-genuine information can be shown in selection control;User can be by selection control selection for stepping on Target user's information of the first application of record.
Wherein, as shown in Figure 1 d, which further includes that " XX user is not in information protection control namely Fig. 1 d There is provided the information such as head portrait and the pet name ".In practical application, user can be operated such as to " XX user does not provide information protection control The information such as head portrait and the pet name " option carries out selection operation, does not provide the authorization login side of the user informations such as head portrait, the pet name with selection Formula authorizes the information of the first application under this login mode, only includes User Identity of the user in the second application, And it is based only upon User Identity and logs in the first application;In login process, it will not authorize or using user in the second application In user information for example User Identity binding or associated user information (such as head portrait, the pet name).
In addition, as shown in Figure 1 d, which can also include authorization requests application i.e. using the information of b, such as The information such as title, application icon and the prompting message for reminding user that different user informations is selected to log in.
(2), user increases the display of non-genuine user information to list newly
In one embodiment, in order to promote the flexibility of user information safety and user's operation, user can also edit non- Real user information uses to authorize to log in.For example, the case where showing user information list by authorization login page Under, it can set user information in the page and increase control, user can carry out the control non-genuine needed for operation editor User information.
For example, step " according to authorization logging request triggering the second application display user information list ", may include:
According to authorization logging request triggering the second application display authorization login page, authorization login page includes user information Increase control and user information list, user information list includes real user information of the user in the second application;
The operation for increasing control for user information based on user, shows user information edit page;
Obtain the non-genuine user information that user passes through user information edit page editor;
The non-genuine user information of editor is added to the user information list of authorization login page;
Authorization login page after triggering the second application display addition.
That is, terminal can first show an initial authorization login page according to authorization logging request, which can be with Increase control and user information list including user information, user can increase new non-real of control editor by the user information Real user's information is logged in authorize.
Wherein, user information increases there are many position of the control in the page, for example, can in user information list, Can be except user information list, for another example, it can also be in positions such as page bottom, tops.
It wherein, may include user the according to user information list in the authorization login page that shows of authorization logging request Real user information in two applications, for example, user information list can only include real user of the user in the second application Information.Wherein, the display mode of user information can refer to above-mentioned introduction, such as be shown in a manner of control.
For example, by first application for using a, second application be using b for, terminal receive using a initiate authorization After logging request, it can be opened according to authorization logging request and apply b, while triggered and showing authorization login page using b, such as Fig. 1 e Shown, which includes that user information increases control i.e. " the newly-built head portrait pet name " button and user information list, should For example true head portrait pet name (such as " head portrait 1 " and " teenager ") of real information that user information list only includes user in application b, with And information protection control is " XX user does not provide the information such as head portrait and the pet name ".
In one embodiment, which can also include non-real real user letter of the user in the second application Breath.That is, in the scene of newly-increased or newly-built user information, user information list in the authorization login page that initial trigger is shown It may include user in the non-genuine user information of real user information, user in the second application in the second application.This is non- Real user information can be the non-genuine user information that historical time user edits or uses, for example, historical time is being awarded The user information edited or used when power logs in.
For example, by first application for using a, second application be using b for, terminal receive using a initiate authorization After logging request, it can be opened according to authorization logging request and apply b, while triggered and showing authorization login page using b, such as Fig. 1 d Shown, which includes that user information increases control i.e. " the newly-built head portrait pet name " button and user information list, should User information list includes real information for example true head portrait of the user in application b such as " head portrait 1 " and the pet name " teenager ", the list It can also include non-genuine user information for example non-genuine head portrait of the user in application b such as " head portrait 2 " and the pet name " quick-witted such as me ". The user that the non-genuine head portrait and the pet name can edit in application b in advance for user authorize log in other application with head portrait and The pet name, such as the head portrait and the pet name that can edit or use when such as the last time authorization logs in other application for historical time.
In addition, user information list can also include some other information, above-mentioned introduction can be specifically referred to, for example, packet Include information protection control;Authorizing login page can also include other information, such as the application message of prompting message, the first application Etc..
Wherein, user information edit page is the page for user's Edit Profile, and user can carry out on the page Operation such as input operation is to edit required user information.When editing completion, terminal is available to pass through the page to user The non-genuine user information of face editor.
In one embodiment, user information edit page may include head portrait edit control and pet name edit control;Head portrait There are many forms of expression of edit control and pet name edit control, for example, the performance of head portrait edit control show can for icon, The forms such as button, pet name edit control can be the forms such as input frame.
In the case where user information edit page is equipped with head portrait, pet name edit control, user can be for the two controls Part is operated to edit head portrait, nickname information.For example, step " obtains user and passes through the non-of user information edit page editor Real user information " may include:
It is directed to the edit operation of head portrait edit control based on user, obtains the head portrait that user edits;
It is directed to the edit operation of pet name edit control based on user, obtains the pet name that user edits.
Wherein, there are many modes of the operation acquisition head portrait based on head portrait edit control, for example, can be according to for head portrait The operation of edit control carries out anamorphose processing (such as personage, background deformation or blurring) to the true head portrait of user, obtains To non-genuine head portrait;For another example, camera can also be called directly to be shot, obtains head portrait.
It for another example, in one embodiment, can also be in user to head portrait edit control for the flexibility of poppet editor A variety of head portrait edit modes are provided when operation, for selection by the user.Specifically, step " is directed to head portrait edit control based on user Edit operation, obtain the head portrait edited of user ", may include:
When detecting trigger action of the user for the operation of head portrait edit control, shows and clap in user information edit page Control is selected according to control and photograph album;
When detecting that user is directed to the trigger action for control of taking pictures, camera is called to be shot, the image based on shooting Obtain the head portrait of user;
When detecting trigger action of the user for photograph album selection control, the image selected from photograph album based on user is obtained Take the head portrait at family.
For example, user's user information in authorization login page shown in Fig. 1 e increases control " newly-built head with reference to Fig. 2 a It, can be with triggering terminal or application b display user information edit page after the picture pet name " push-botton operation (such as click, slide operation) Such as " newly-built personal information " page in Fig. 2 a.Being somebody's turn to do " newly-built personal information " page may include head portrait edit control " head portrait " choosing Item and pet name edit control " pet name " option.
User can carry out operation triggering terminal in " newly-built personal information " page to head portrait edit control " head portrait " option It is middle display take pictures control " take pictures " option and photograph album selection control i.e. " from photograph album selection ".Pass through at this point, user can choose Shooting style constructs head portrait, or selection selects picture construction head portrait from photograph album.
For example, user " can take pictures " to control of taking pictures, option is operated, at this point, terminal will be based on the operation tune Shot with camera, after shooting obtains image, can based on the image of shooting building user head portrait, for example, according to Size as defined in head portrait is adjusted the size of shooting image.
For another example, it is that " selecting from photograph album " operates that user, which can also select photograph album control, at this point, terminal will base In the non-genuine head portrait for the picture construction user that user selects from photograph album, for example, the image to selection provides ruler according to head portrait It is very little to be adjusted.
With reference to Fig. 2 a, user can also input the pet name in " pet name " input frame, at this point, the available user's input of terminal Non-genuine nickname information.For example, after user has edited head portrait " head portrait X " through the above way, it can be in user information The pet name is inputted in " pet name " input frame in edit page i.e. " newly-built personal information " page, such as inputs " quick-witted little Lai ".
In one embodiment, in order to promote user information editorial efficiency, user can also be generated at random in the second application Non-genuine user information.For example, random generation control can be arranged in user information edit page, such user can be by right The random generation control is operated to trigger and generate non-genuine user information at random.
Such as, wherein user information edit page may include random generation control, and step " obtains user and passes through user The non-genuine user information of information editing's page editing " may include: to work as to detect user for the random triggering for generating control When operation, the random non-genuine user information for generating user in the second application.
Wherein, there are many modes for generating non-genuine user information at random, for example, can download user at random from network side The non-genuine user information of information such as head portrait, the pet name as user in the second application.For another example, terminal can local with Machine generates non-genuine user information such as head portrait, the pet name etc..
For example, in one embodiment, several images can be selected to synthesize head portrait in local photograph album, avoided non-real practical Family information such as head portrait and real user information such as head portrait occur consistent.Specifically, step is " random to generate user in the second application Non-genuine user information ", may include:
Several images are randomly choosed from local photograph album;
To being split in every image, the cut zone of every image is obtained;
Image synthesis is carried out to the cut zone of every image, obtains non-genuine head portrait.
For example, user information edit page is that " newly-built personal information " page is additionally provided with user information with reference to Fig. 2 a The random control that generates is " random head portrait and the pet name ";When user is that " random head portrait and the pet name " is grasped to the random generation control After triggering, terminal or application b generate the information such as non-genuine head portrait and the pet name of the user in application b at random.
In one embodiment, in order to promote operating accuracy, when can edit completion with user, by the user information of editor It is added to user information list;It can generally think that editor completes when user needs the information for saving editor.Therefore, Ke Yiyong One information preservation control such as button of family information editing's page setup, user can operate the information preservation control, and triggering is eventually End saves the information of editor and the information of editor is added to user information list.For example, user information edit page also wraps Information preservation control is included, the non-genuine user information of editor " is added to the user information list for authorizing login page " by step, May include:
When detecting preservation operation of the user for information preservation control, the non-genuine user information of editor is saved, with And the non-genuine user information of editor is added to the user information list of authorization login page.
For example, the non-genuine user information of editor can be stored in local by terminal, it can also be by the non-real practical of editor Family information preservation is in server.It, can be by the non-real practical of editor in view of the limitation obtained across application message in practical application For family information preservation in server, application to be logged in so i.e. the first application can obtain non-real real user's letter from server Breath, utilizes the information registration.
For example, with reference to Fig. 2 a, " newly-built personal information " page can also include information preservation control " preservation " button, when with Family can click the button when having edited head portrait and the pet name, at this point, terminal saves the head portrait and the pet name of editor, for example, can be with It is sent to the server using b, which can be stored in the non-genuine user information of editor in independent storage, such as protect There are interfaces to call in the corresponding storage of voucher accesstoken for example tokenkv etc..Terminal can return to display authorization simultaneously Login page, the page include the user information column for the head portrait and pet name (" head portrait X ", " quick-witted little Lai ") for having added editor Table.Specifically, the head portrait of editor and the pet name can be added in user information list by terminal, after triggering is using b display addition Authorization login page.
(3), user's operation generates the display that non-genuine user information is added to user list at random;
For example, in one embodiment, after display authorization login page, user can be triggered non-by the authorization login page Real user information generates, and terminal can generate non-genuine user information at random, and be added in user information list and show.Than Such as, step " according to authorization logging request triggering the second application display user information list " may include:
According to authorization logging request triggering the second application display authorization login page, authorization login page includes user information Increase control and user information list, user information list includes that real user information of the user in the second application is (real one It applies in example, user information list can also include real user information of the user in the second application);
It is random to generate user in the second application when detecting that user increases the trigger action of control for information at random Non-genuine user information;
The non-genuine user information generated at random is added in the user information list of authorization login page and is shown.
With reference to Fig. 2 b, to be using for b using a, the second application, terminal receives awarding using a initiation for the first application After weighing logging request, it can be opened according to authorization logging request and apply b, while triggered and showing authorization login page using b, this is awarded Power login page includes that information increases control " random to generate the head portrait pet name " at random, user information increases control i.e. " newly-built head portrait The pet name " button and user information list, the user information list include that user is applying for example true head portrait of real information in b such as " head portrait 1 " and the pet name " teenager ".
It is that " the newly-built head portrait pet name " button triggers customized head portrait and the pet name that user can increase control by user information Process, specific customized process can be with reference to associated descriptions such as above-mentioned Fig. 2 a.
It is given birth at random in addition, user can also carry out operation triggering terminal to random increase control " random to generate the head portrait pet name " It is added in user information list at non-real real user and shows, as shown in Figure 2 b, generate the head portrait pet name at random when the user clicks " When, terminal can add " the random head portrait 1 " that generates at random and the pet name " XX user 3 " in user information list.
(4), the automated randomized display for generating non-genuine user information and being added to user list:
In one embodiment, it after receiving authorization logging request, can detecte in user information list with the presence or absence of non- Real user information generates non-genuine user information at random and is added in list and show if not having, so that user can select It selects, promotes the efficiency that authorization logs in.
For example, step " according to authorization logging request triggering the second application display user information list ", may include:
User information list is obtained according to authorization logging request, user information list includes the use for logging in the first application Family information;
When detecting user information list there is no when non-genuine user information, random generation user is in the second application Non-genuine user information;
The non-genuine user information generated at random is added in user information list, and triggers the second application display user Information list.
For example, by first application for using a, second application be using b for, terminal receive using a initiate authorization After logging request, user information list of the user in application b can be obtained according to authorization logging request;Detect user information column It whether there is non-genuine user information in table, and if it exists, then display includes the authorization login page of user information list, with reference to figure The page shown in 1d;If it does not exist, non-genuine user information such as head portrait, close of the user in application b can be generated at random Claim, and be added in user information list, terminal, which can be triggered, to be shown using b comprising being added to the non-real real user generated at random The information list of information, as shown in Figure 1 f, the pet name " XX@" and corresponding random head portrait are the pet name generated at random and head in figure Picture.
That is, in embodiments of the present invention, already present non-genuine user information in user information list may include using Family also may include generating at random in current grant login process in historical time editor or the non-genuine user information used Non-genuine user information.
By above step, display includes the user information list of real user information and non-genuine user information.
103, selection is used to log in the first target user's information applied from user information list.
After showing user information list, terminal can select user to log in the first target user applied from list Information.Wherein, target user's information refers to that logging in first applies currently used user information.
Wherein, target user's information can be real user information, or non-genuine user information.
For example, step " selection is for logging in target user's information of the first application from user information list ", can wrap It includes: using the non-genuine user information selected from user information list as the target user's information for being used to log in the first application.
In one embodiment, in the case where showing user information list using authorization login page, step " is believed from user Selection is for logging in target user's information of the first application in breath list ", it may include: based on user for authorization login page Selection operation, from user information list selection for logs in first apply target user's information.
For example, user can carry out selection operation selection target user letter on the page in initial authorization login page Breath for another example completes the authorization login page of display in editor, user can also carry out selection operation selection target on the page User information.
It in some embodiments, can be using the non-genuine user information of default choice as target user's information, for example, in user In the scene for creating non-genuine user information, such as user oneself is newly-built or generates the scene of non-genuine user information at random In, newly-built non-genuine user information can be selected for target user's information from list, such as newly-built non-real of default choice Real user's information is target user's information.
It for example, can after user triggers head portrait pet name editing process by " the newly-built head portrait pet name " button with reference to Fig. 2 a To return to the authorization login page that display increases the newly-built head portrait pet name, at this point, the head portrait that terminal can be created with default choice The pet name applies the target head portrait pet name of a as logging in.As can be seen that the newly-built head portrait pet name is (" head portrait X ", " quick-witted from Fig. 2 a Little Lai ") in by selection state.
In another example when the user clicks when " random to generate the head portrait pet name ", terminal can be in user information list with reference to Fig. 2 b It is middle to add " random head portrait 1 " and the pet name " XX user 3 " generated at random, display authorization login page is returned to, the page is newly-increased The random head portrait pet name " random head portrait 1 " and the pet name " XX user 3 ", at this point, the random head portrait pet name is in by selection state, Ye Jimo Recognizing the head portrait pet name newly-built at random is the target head portrait pet name for login user a.
In one embodiment, in creating non-genuine user information scene, when user information list includes multiple non-genuine User information, target user's information of selection can not be newly-increased or newly-built non-genuine user information, or in list Already present non-genuine user information.For example, terminal can be selected from list based on user for the selection operation of list Existing non-genuine user information is as target user's information.
For example, with reference to Fig. 2 c, for the page shown in Fig. 1 d, which includes that user information increases control That is " the newly-built head portrait pet name " button and user information list, the user information list include real information of the user in application b Such as true head portrait (" head portrait 1 " " teenager "), which can also include that non-genuine user information of the user in application b is for example non-real Real head portrait such as " head portrait 2 " and the pet name " quick-witted such as me ".
After user increases control " the newly-built head portrait pet name " push-botton operation (such as click, slide) to user information in the page, " newly-built personal information " page in user information edit page such as Fig. 2 c can be shown with triggering terminal or application b.It should be " newly-built People's information " page may include head portrait edit control " head portrait " option and pet name edit control " pet name " option.
User can be by " head portrait " option and pet name edit control " pet name " option editor head portrait and the pet name, or passes through " the random head portrait pet name " button generates head portrait and the pet name at random.For example, user is close by head portrait that is customized or generating at random Referred to as " head portrait 4 " " clever XX ";Specifically editing process can refer to information editing's process of above-mentioned Fig. 2 a.It is edited in user Terminal returns to display authorization login page when completion, which includes the true head portrait pet name " head portrait 1 " " teenager ", has been deposited before The non-genuine head portrait pet name " head portrait 2 " " quick-witted as me ", and the newly-built head portrait pet name " head portrait 4 " " clever XX ".At this point, The newly-built head portrait pet name of terminal default choice;But user can carry out selection operation change to the page, for example, user selects The already existing non-genuine head portrait pet name " head portrait 2 " " quick-witted such as me " is used as the target head portrait pet name, applies a for logging in.
In one embodiment, it when the existing non-genuine user information of user information list, can directly select existing Non-genuine user information as target user's information, without creating non-genuine user information.
For example, authorizing the user information list of login includes that real information of the user in application b is for example true with reference to Fig. 1 d Head portrait such as " head portrait 1 " and the pet name " teenager ", the list can also include that non-genuine user information of the user in application b is for example non-real Real head portrait such as " head portrait 2 " and the pet name " quick-witted such as me ".At this point, user can directly select already present non-genuine head portrait " head Picture 2 " and the pet name " quick-witted such as me " are used as the target head portrait pet name, create without carrying out the head portrait pet name.Or terminal default choice is Existing non-genuine user information is target user's information.Fig. 1 d is such as referred to, after display authorizes login page, the head portrait pet name " head portrait 2 " " quick-witted such as me " is in by selection state, namely defaulting the random already present non-genuine head portrait pet name is for logging in The target head portrait pet name of user a.
In one embodiment, real user information can also be selected as target user's information from user information list, For example, user can choose real user information after creating non-genuine user information, for example, with reference to Fig. 2 a, in newly-built head As after the pet name, user is also an option that the true head portrait pet name " head portrait 1 " " teenager " as close using the final head portrait of a for logging in Claim.
Alternatively, in not newly-built user information and in the case where having existed non-genuine user information and real user information, Real user information can be directly selected, without carrying out newly-built process.
104, it when detecting license confirmation instruction, is applied based on target user's information registration first.
For example, when detecting license confirmation instruction, can by the second application to the message identification of target user's information, Identity of the application identities and user of second application in the second application encodes, authorized code (code);Touching The first application of hair obtains interface from the server of the second application based on authorization code and calls voucher (such as accesstoken);Triggering the One application calls voucher to obtain the second target user's information applied from server based on interface;The first application of triggering is based on target User information carries out register.
In one embodiment, terminal can trigger the first application and send acquisition of credentials request to the server of the second application, The request can carry authorization code, the application identities (appid) of the first application and using key (appsecret);Server After the requests have been received, it can be verified to application identities and using key, if verification passes through, server is to authorization Code is decoded operation, obtains decoded information, decoded information include: the message identification of target user's information, second apply answer With the identity of mark and user in the second application.Server can distribute corresponding interface based on decoded information and call Voucher, and it is sent to terminal.The first application of terminal triggering is called voucher to obtain message identification from server and is corresponded to based on interface Target user's information, then, based on target user's information registration first apply.
Wherein, the triggering mode of license confirmation instruction can be a variety of, for example, showing user's letter by authorization login page In the case where ceasing list, user can be by carrying out operation triggering license confirmation instruction to authorization login page, at this point it is possible to examine Measure license confirmation instruction.
In one embodiment, license confirmation control can be set in authorization login page, when user is to license confirmation control License confirmation instruction is triggered when operation.For example, being provided with license confirmation control in authorization login page with reference to Fig. 1 d, Fig. 1 e, Fig. 1 f Part such as " agreement " button and refusal authorization controls such as " refusal " button;When user is in authorization login page selection target user letter Breath triggers license confirmation instruction as that after the head portrait pet name, can be operated such as clicking operation to " agreement " button, at this point, Terminal can detecte the register of license confirmation instruction triggers application b.It, can be right when user needs to refuse authorization to log in Refusal authorization controls such as " refusal " button is operated as clicked triggering refusal authorized order, at this point, terminal will be refused to award Power logs in.
For another example, with reference to Fig. 2 a, when having edited head portrait pet name return display authorization login page, the authorization login page It is provided with license confirmation control such as " agreement " button and refusal authorization controls such as " refusal " button;When user is in authorization log in page It, can be right after face selection target user information such as the head portrait pet name (the head portrait pet name that can such as default editor is the target head portrait pet name) " agreement " button is operated such as clicking operation to trigger license confirmation instruction, at this point, terminal can detecte authorization really Recognize the register of instruction triggers application b.It, can be to refusal authorization controls such as " refusal " when user needs to refuse authorization to log in Button, which is operated, such as clicks triggering refusal authorized order, logs at this point, terminal will refuse authorization.
Equally, user's operation is generated at random under the scene of the automated randomized generation of system, and authorization login page can be set It is equipped with license confirmation control such as " agreement " button and refusal authorization controls such as " refusal " button, so that user triggers license confirmation Instruction or refusal authorized order etc..
From the foregoing, it will be observed that the embodiment of the present invention can receive the authorization logging request that the first application is initiated;It is logged according to authorization Request triggering the second application display user information list, user information list include multiple for logging in user's letter of the first application Breath, wherein multiple user informations include user in the second application real user information and user in the second application Non-genuine user information;Selection is for logging in target user's information of the first application from user information list;It is awarded when detecting When power confirmation instruction, applied based on target user's information registration first.The program can provide non-real in authorization login process Real user can promote the safety of user information to log in third-party application.
The program can also provide a variety of user informations such as real user information, non-genuine user information to log in third Using, under the premise of promoting safety, also improve authorization log in diversity, flexibility.
In addition, the program can also allow for user to edit the non-genuine user information to log in third-party application, user It can edit according to actual needs, can satisfy the demand of user individual and promote the interactivity that authorization logs in.
Citing, is described in further detail by the method according to described in above example below.
The embodiment of the present invention will introduce present invention method so that application entering device is integrated at the terminal as an example.
As shown in Figure 3a, a kind of to apply login method, detailed process is as follows:
301, the first application of terminal triggering initiates authorization logging request to the second application.
For example, terminal shows the login page of the first application, touched based on user for the authorization register of login page The first application of hair initiates authorization logging request to the second application.
302, terminal is according to authorization logging request triggering the second application display authorization login page, the authorization log in page bread It includes user information and increases control and user information list.
Wherein, user information list may include multiple for logging in the user information of the first application;For example, user information List can only include real user information of the user in the second application, for example, authorizing login page with reference to shown in Fig. 2 a.In In one embodiment, user information list may include real user information and non-genuine user information of the user in the second application, For example, with reference to Fig. 1 d etc..The authorization page may include the true head portrait pet name, the non-genuine head portrait pet name.
For example, being instant messaging application, the third party that the first application is instant messaging application with the second application with reference to Fig. 3 b For, after third-party application initiates authorization login, terminal can show authorization log in page with pull-up instant communication client Face;The login page of the authorization may include user information list, which may include user in instant communication client Real user information, also may include non-genuine user information.User can select real user to believe in the list of the page Breath executes step 306, or the existing non-genuine user information of selection, executes step 307.
303, terminal increases the operation of control based on user for user information, shows user information edit page.
For example, increasing control " the newly-built head portrait pet name " button to the user information in authorization login page with reference to Fig. 2 a After operation (such as click, slide), it can be shown with triggering terminal or application b " newly-built in user information edit page such as Fig. 2 a Personal information " the page.Being somebody's turn to do " newly-built personal information " page may include head portrait edit control " head portrait " option and pet name editor control Part " pet name " option.
304, terminal obtains the non-genuine user information that user passes through user information edit page editor.
For example, user can have by head portrait edit control, pet name edit control editor head portrait and the pet name with reference to Fig. 2 a The editing process of body can refer to the description of above-described embodiment.
For another example, with reference to Fig. 2 a, user information edit page is that " newly-built personal information " page is additionally provided with user information Random generation control be " random head portrait and the pet name ";When user is that " random head portrait and the pet name " carries out to the random generation control Operation triggering terminal generates the information such as non-genuine head portrait and the pet name of the user in application b using b at random.
Further, it is also possible to which other random modes for generating the head portrait pet name can specifically refer to the description of above-described embodiment.
305, when detecting for the preservation operation of information preservation control in user information edit page, save editor's Non-genuine user information, and the non-genuine user information of editor is added to the user information list for authorizing login page, and Authorization login page after display addition.
For example, with reference to Fig. 2 a, " newly-built personal information " page can also include information preservation control " preservation " button, when with Family can click the button when having edited head portrait and the pet name, at this point, terminal saves the head portrait and the pet name of editor, for example, can be with It is sent to the server using b, which can be stored in the non-genuine user information of editor in independent storage, such as connect Mouthful call in the corresponding storage of voucher accesstoken for example tokenkv etc..Terminal can return to display authorization log in page simultaneously Face, the page include the head portrait for having added editor and the user information list of the pet name (" head portrait X ", " quick-witted little Lai ").Specifically The head portrait of editor and the pet name can be added in user information list by ground, terminal, and triggering is stepped on using the authorization after b display addition Record the page.
With reference to Fig. 3 b, when user can not select existing non-genuine user information, oneself editor newly-built one non-genuine User information edits head portrait, the pet name such as to log in third-party application;User can protect the information of editor after having edited It deposits.
For example, user can not select the existing true head portrait pet name and non-genuine head portrait close with reference to Fig. 1 d or Fig. 1 e Claim, select the newly-built head portrait pet name, user can click newly-built head portrait pet name button and enter head portrait pet name editing process, detailed process It can and above-mentioned related content shown with reference to Fig. 2 a.When editor completes, user can click " preservation " button to the head portrait of editor The pet name saves, and shows at this point, the head portrait pet name of editor can be added in the list of authorization login page by terminal.
306, terminal selects real user information to use as the target for logging in the first application from user information list Family information, goes to step 308.
For example, with reference to Fig. 3 b, when, there are when real user information, user can directly select really in user information list User information is as target user's information for logging in the first application;For example, with reference to Fig. 1 d or Fig. 1 e, user be can choose very The real head portrait pet name " head portrait 1 " " teenager " is to log in third-party application.Or Fig. 2 a is referred to, user can directly select existing The true head portrait pet name as the target head portrait pet name log in third-party application.
307, terminal selects already present non-real real user as logging in the first application from user information list Target user's information, goes to step 308.
For example, with reference to Fig. 3 b, when, there are when real user information and non-genuine user information, being used in user information list Family can not select real user information, and already present non-genuine user information is as the first application of login in selective listing Target user's information.
When user does not select real user information, selects existing non-genuine user information, user can be in lists Selection needs non-genuine user information to be used;When user agrees to authorize, user clicks license confirmation control in authorization login page When part such as " agreement ", terminal can log in third-party application based on the non-genuine user information of selection.For example, being used with reference to Fig. 1 d Family can choose the existing non-genuine head portrait pet name such as " head portrait 2 " " quick-witted such as me " and log in third-party application.
308, when detecting user for the confirmation operation of license confirmation control in authorization login page, terminal is based on using Target user's information registration first that family is selected from user information list is applied.
In newly-built head portrait pet name scene, with reference to Fig. 3 b, after the head portrait pet name for saving editor, user can pass through operation Agree to authorization, after agreeing to authorization, third-party application can be logged in based on the head portrait pet name currently selected.
For example, Fig. 2 b, after having edited the head portrait pet name, terminal can return to display authorization login page with reference to Fig. 2 a, this When, terminal can default the head portrait pet name of newly-built editor for the target head portrait pet name for logging in the first application;When the user clicks When " agreement " button in the page, terminal can log in the first application based on the target head portrait pet name of default.
In one embodiment, after having edited head portrait pet name display authorization login page, user can not select to default The head portrait pet name log in, other head portrait pet names can also be selected to be logged in the page operation.For example, being compiled with reference to Fig. 2 a After having collected display authorization login page, user can choose the true head portrait pet name " head portrait 1 " " teenager " to log in third party Using.
In the scene for selecting the existing true head portrait pet name or the non-genuine head portrait pet name, with reference to Fig. 1 d or Fig. 1 d, use Family can after selecting the head portrait pet name, click the page in " agreement " button, at this point, terminal can the head portrait based on selection it is close Claim to log in third-party application.
With reference to Fig. 3 c, specifically, when terminal detects the operation of user's license confirmation, i.e., when user agrees to authorization, immediately The message identification of the available target user's information of the application of communication applications i.e. second, the application identities of instant messaging application are (some In embodiment can be third-party application mark) and user second application in identity, then, to these information It carries out encoding authorized code (code).Authorization code, and pull-up third-party application or redirection third are sent to third-party application Fang Yingyong.The background server that third-party application is applied to instant messaging sends Voucher Code acquisition request, which carries authorization Code third-party should identify appid) and apply key (appsecret);Background server can be asked based on Voucher Code acquisition It asks and returns to corresponding interface calling voucher (such as accesstoken) to third-party application.Third-party application can be based on interface tune User information interface (such as userinfo, i.e., in login process for calling background server to provide with voucher (such as accesstoken) Obtain the interface of user information) to obtain the information such as the target user's information such as head portrait pet name from background server, then, based on obtaining The target user's information registration got.
Wherein, background server can (such as KV be deposited with the corresponding storage of query interface calling voucher (such as accesstoken) Storage), call voucher (such as accesstoken) corresponding target user's information to return to third-party application interface.
Scheme provided in an embodiment of the present invention can support user to log in third-party application without using true head portrait, the pet name, The non-genuine information that login same application is selected before user can be stored simultaneously, resets without user, reduces user's Privacy of user data are also ensured while using threshold.
In order to better implement above method, correspondingly, the embodiment of the present invention also provides a kind of using entering device, this is answered It specifically can integrate in terminal with entering device, which can be with equipment such as mobile phone, tablet computer, laptops.
For example, as shown in fig. 4 a, this may include receiving unit 401, display unit 402, selection list using entering device Member 403 and login unit 404, as follows:
Receiving unit 401, the authorization logging request initiated for receiving the first application;
Display unit 402, it is described for showing user information list according to the second application of authorization logging request triggering User information list includes multiple for logging in the first user information applied, wherein multiple user informations include user the The non-genuine user information of real user information and user in the second application in two applications;
Selecting unit 403 is believed for the target user that selection is used to log in the first application from the user information list Breath;
Unit 404 is logged in, for when detecting license confirmation instruction, based on described in target user's information registration the One application.
In one embodiment, display unit 402 can be specifically used for: be answered according to authorization logging request triggering second Login page is authorized with display, the authorization login page includes user information list, and the user information list includes user In the non-genuine user information of real user information and user in the second application in the second application;
The selecting unit 403 can be specifically used for the selection operation based on user for the authorization login page, from Selection is for logging in target user's information of the first application in the user information list.
In one embodiment, with reference to Fig. 4 b, display unit 402 may include:
First display subelement 4021, for according to authorization logging request triggering the second application display authorization log in page Face, the authorization login page include that user information increases control and user information list, and the user information list includes using Real user information of the family in the second application;
Subelement 4022 is edited, for increasing the operation of control, display user's letter for the user information based on user Cease edit page;
Subelement 4023 is obtained, is believed for obtaining user by the non-real real user of the user information edit page editor Breath;
Subelement 4024 is added, for the non-genuine user information of editor to be added to the user of the authorization login page Information list;
Second display subelement 4025, for triggering the authorization login page after the second application display is added.
In one embodiment, the user information edit page further includes information preservation control;Subelement 4024 is added, is used In: when detecting preservation operation of the user for information preservation control, the non-genuine user information of editor is saved, and will compile The non-genuine user information collected is added to the user information list of the authorization login page.
In one embodiment, selecting unit 403 can be specifically used for the choosing based on user for the authorization login page Operation is selected, selection is for logging in target user's information of the first application from the user information list.
In one embodiment, the user information edit page includes head portrait edit control and pet name edit control;It is described Non-genuine user information includes non-genuine head portrait and the pet name;
The acquisition subelement 4023, can be specifically used for:
It is directed to the edit operation of head portrait edit control based on user, obtains the head portrait that user edits;
It is directed to the edit operation of pet name edit control based on user, obtains the pet name that user edits.
In one embodiment, subelement 4023 is obtained, can be specifically used for:
It is aobvious in the user information edit page when detecting trigger action of the user for the operation of head portrait edit control Show take pictures control and photograph album selection control;
When detecting that user is directed to the trigger action for control of taking pictures, camera is called to be shot, the image based on shooting Obtain the head portrait of user;
When detecting trigger action of the user for photograph album selection control, the image selected from photograph album based on user is obtained Take the head portrait at family.
In one embodiment, the user information edit page includes random generation control;The acquisition subelement 4023, It can be specifically used for:
It is random to generate user in the second application when detecting user for the random trigger action for generating control Non-genuine user information.
In one embodiment, the non-genuine user information includes non-genuine head portrait, the acquisition subelement 4023, can To be specifically used for:
Several images are randomly choosed from local photograph album;
To being split in every image, the cut zone of every image is obtained;
Image synthesis is carried out to the cut zone of every image, obtains non-genuine head portrait.
In one embodiment, with reference to Fig. 4 c, display unit 402 may include:
The page shows subelement 4026, for according to authorization logging request triggering the second application display authorization log in page Face, the authorization login page include that information increases control and user information list at random, and the user information list includes using Real user information of the family in the second application;
It is random to generate subelement 4027, for when detecting that user increases the trigger action of control for information at random, The random non-genuine user information for generating user in the second application;
Addition display subelement 4028, for the non-genuine user information generated at random to be added to the authorization log in page It is shown in the user information list in face.
In one embodiment, display unit 402 can be specifically used for:
User information list is obtained according to the authorization logging request, the user information list includes for logging in first The user information of application;
When detecting the user information list there is no when non-genuine user information, random generation user is in the second application In non-genuine user information;
The non-genuine user information generated at random is added in the user information list, and triggers the second application display User information list.
In one embodiment, with reference to Fig. 4 d, unit 404 is logged in, may include:
Coded sub-units 4041, for the message identification by the second application to target user's information, the second application Application identities and user second application in identity encode, authorized code;
First triggering subelement 4042 is obtained based on the authorization code from the server of the second application for triggering the first application Interface is taken to call voucher;
Second triggering subelement 4043 calls voucher to obtain from the server for triggering the first application based on the interface Take target user's information of the second application;
Third triggers subelement 4044, carries out login behaviour based on target user's information for triggering first application Make.
In one embodiment, selecting unit 403 can be specifically used for: non-by what is selected from the user information list Real user information is as target user's information for logging in the first application.
When it is implemented, above each unit can be used as independent entity to realize, any combination can also be carried out, is made It is realized for same or several entities, the specific implementation of above each unit can be found in the embodiment of the method for front, herein not It repeats again.
From the foregoing, it will be observed that the application entering device of the present embodiment can be initiated by receiving unit 401 in the application of reception first Authorization logging request;User information list is shown according to the second application of authorization logging request triggering by display unit 402, The user information list includes multiple for logging in the user information of the first application, wherein multiple user informations include user In the non-genuine user information of real user information and user in the second application in the second application;By selecting unit 403 Selection is for logging in target user's information of the first application from the user information list;Worked as by login unit 404 and is detected When license confirmation instructs, based on the first application described in target user's information registration.The program can use non-real real user Information can prevent real user information from occurring the illegal situation such as leak, steal, and improve the safety of user information.
In addition, the embodiment of the present invention also provides a kind of terminal, as shown in figure 5, it illustrates involved by the embodiment of the present invention Terminal structural schematic diagram, specifically:
The terminal may include one or processor 501, one or more calculating of more than one processing core The components such as memory 502, power supply 503 and the input unit 504 of machine readable storage medium storing program for executing.It will be understood by those skilled in the art that The restriction of the not structure paired terminal of terminal structure shown in Fig. 5 may include than illustrating more or fewer components or group Close certain components or different component layouts.Wherein:
Processor 501 is the control centre of the terminal, using the various pieces of various interfaces and the entire terminal of connection, By running or execute the software program and/or module that are stored in memory 502, and calls and be stored in memory 502 Data, execute terminal various functions and processing data, thus to terminal carry out integral monitoring.Optionally, processor 501 can Including one or more processing cores;Preferably, processor 501 can integrate application processor and modem processor, wherein The main processing operation system of application processor, user interface and application program etc., modem processor mainly handles channel radio Letter.It is understood that above-mentioned modem processor can not also be integrated into processor 501.
Memory 502 can be used for storing software program and module, and processor 501 is stored in memory 502 by operation Software program and module, thereby executing various function application and data processing.Memory 502 can mainly include storage journey Sequence area and storage data area, wherein storing program area can the (ratio of application program needed for storage program area, at least one function Such as sound-playing function, image player function) etc.;Storage data area, which can be stored, uses created data according to terminal Deng.In addition, memory 502 may include high-speed random access memory, it can also include nonvolatile memory, for example, at least One disk memory, flush memory device or other volatile solid-state parts.Correspondingly, memory 502 can also include Memory Controller, to provide access of the processor 501 to memory 502.
Terminal further includes the power supply 503 powered to all parts, it is preferred that power supply 503 can pass through power-supply management system It is logically contiguous with processor 501, to realize the functions such as management charging, electric discharge and power managed by power-supply management system. Power supply 503 can also include one or more direct current or AC power source, recharging system, power failure detection circuit, The random components such as power adapter or inverter, power supply status indicator.
The terminal may also include input unit 504, which can be used for receiving the number or character letter of input Breath, and generation keyboard related with user setting and function control, mouse, operating stick, optics or trackball signal are defeated Enter.
Although being not shown, terminal can also be including display unit etc., and details are not described herein.Specifically in the present embodiment, eventually Processor 501 in end can be corresponding executable by the process of one or more application program according to following instruction File is loaded into memory 502, and the application program being stored in memory 502 is run by processor 501, to realize Various functions are as follows:
Receive the authorization logging request that the first application is initiated;It is used according to authorization logging request triggering the second application display Family information list, the user information list include multiple for logging in the user information of the first application, wherein multiple user's letters Breath includes user in the non-genuine user information of real user information and user in the second application in the second application;From Selection is for logging in target user's information of the first application in the user information list;When detecting license confirmation instruction, Based on the first application described in target user's information registration.
The specific implementation of above each operation can be found in the embodiment of front, and details are not described herein.
From the foregoing, it will be observed that the terminal of the present embodiment can receive the authorization logging request that the first application is initiated;It is awarded according to described Weigh logging request triggering the second application display user information list, the user information list includes multiple first answering for logging in User information, wherein real user information that multiple user informations include user in the second application and user are the Non-genuine user information in two applications;Selection is for logging in target user's letter of the first application from the user information list Breath;When detecting license confirmation instruction, based on the first application described in target user's information registration.The program can use Non-genuine user information can prevent real user information from occurring the illegal situation such as leak, steal, and improve the peace of user information Quan Xing.
It will appreciated by the skilled person that all or part of the steps in the various methods of above-described embodiment can be with It is completed by instructing, or relevant hardware is controlled by instruction to complete, which can store computer-readable deposits in one In storage media, and is loaded and executed by processor.
For this purpose, the embodiment of the present invention also provides a kind of storage medium, wherein being stored with a plurality of instruction, which can be located Reason device is loaded, to execute any step using in login method provided by the embodiment of the present invention.For example, the instruction Following steps can be executed:
Receive the authorization logging request that the first application is initiated;It is used according to authorization logging request triggering the second application display Family information list, the user information list include multiple for logging in the user information of the first application, wherein multiple user's letters Breath includes user in the non-genuine user information of real user information and user in the second application in the second application;From Selection is for logging in target user's information of the first application in the user information list;When detecting license confirmation instruction, Based on the first application described in target user's information registration.
The specific implementation of above each operation can be found in the embodiment of front, and details are not described herein.
Wherein, which may include: read-only memory (ROM, Read Only Memory), random access memory Body (RAM, Random Access Memory), disk or CD etc..
By the instruction stored in the storage medium, any application provided by the embodiment of the present invention can be executed and stepped on Step in recording method, it is thereby achieved that any using achieved by login method provided by the embodiment of the present invention Beneficial effect is detailed in the embodiment of front, and details are not described herein.
It is provided for the embodiments of the invention a kind of application login method, device and storage medium above and has carried out detailed Jie It continues, used herein a specific example illustrates the principle and implementation of the invention, and the explanation of above embodiments is only It is to be used to help understand method and its core concept of the invention;Meanwhile for those skilled in the art, according to the present invention Thought, there will be changes in the specific implementation manner and application range, in conclusion the content of the present specification should not be construed as Limitation of the present invention.

Claims (15)

1. a kind of apply login method characterized by comprising
Receive the authorization logging request that the first application is initiated;
According to authorization logging request triggering the second application display user information list, the user information list includes multiple For logging in the user information of the first application, wherein multiple user informations include real user letter of the user in the second application The non-genuine user information of breath and user in the second application;
Selection is for logging in target user's information of the first application from the user information list;
When detecting license confirmation instruction, based on the first application described in target user's information registration.
2. applying login method as described in claim 1, which is characterized in that answered according to authorization logging request triggering second With display user information list, comprising:
According to authorization logging request triggering the second application display authorization login page, the authorization login page includes user Information list, the user information list include that real user information and user of the user in the second application are answered second Non-genuine user information in;
Selection is for logging in target user's information of the first application from the user information list, comprising: is directed to based on user The selection operation of the authorization login page, selection is for logging in the target user of the first application from the user information list Information.
3. applying login method as described in claim 1, which is characterized in that answered according to authorization logging request triggering second With display user information list, comprising:
According to authorization logging request triggering the second application display authorization login page, the authorization login page includes user Information increases control and user information list, and the user information list includes real user letter of the user in the second application Breath;
The operation for increasing control for the user information based on user, shows user information edit page;
Obtain non-genuine user information of the user by the user information edit page editor;
The non-genuine user information of editor is added to the user information list of the authorization login page;
Authorization login page after triggering the second application display addition.
4. applying login method as claimed in claim 3, which is characterized in that the user information edit page includes that head portrait is compiled Collect control and pet name edit control;The non-genuine user information includes non-genuine head portrait and the pet name;
Obtain non-genuine user information of the user by the user information edit page editor, comprising:
It is directed to the edit operation of head portrait edit control based on user, obtains the head portrait that user edits;
It is directed to the edit operation of pet name edit control based on user, obtains the pet name that user edits.
5. applying login method as claimed in claim 4, which is characterized in that be directed to the editor of head portrait edit control based on user Operation obtains the head portrait that user edits, comprising:
When detecting trigger action of the user for the operation of head portrait edit control, shows and clap in the user information edit page Control is selected according to control and photograph album;
When detecting that user is directed to the trigger action for control of taking pictures, camera is called to be shot, the image based on shooting obtains The head portrait of user;
When detecting trigger action of the user for photograph album selection control, the image selected from photograph album based on user obtains use The head portrait at family.
6. applying login method as claimed in claim 3, which is characterized in that the user information edit page includes random raw At control;
Obtain non-genuine user information of the user by the user information edit page editor, comprising:
When detecting user for the random trigger action for generating control, random generation user is non-in the second application Real user information.
7. applying login method as claimed in claim 6, which is characterized in that the non-genuine user information includes non-genuine Head portrait;
The random non-genuine user information for generating user in the second application, comprising:
Several images are randomly choosed from local photograph album;
To being split in every image, the cut zone of every image is obtained;
Image synthesis is carried out to the cut zone of every image, obtains non-genuine head portrait.
8. applying login method as described in claim 1, which is characterized in that answered according to authorization logging request triggering second With display user information list, comprising:
According to authorization logging request triggering the second application display authorization login page, the authorization login page includes information Random to increase control and user information list, the user information list includes real user letter of the user in the second application Breath;
When detecting that user increases the trigger action of control for information at random, random generation user is non-in the second application Real user information;
The non-genuine user information generated at random is added in the user information list of the authorization login page and is shown.
9. applying login method as described in claim 1, which is characterized in that answered according to authorization logging request triggering second With display user information list, comprising:
User information list is obtained according to the authorization logging request, the user information list includes for logging in the first application User information;
When detecting the user information list there is no when non-genuine user information, random generation user is in the second application Non-genuine user information;
The non-genuine user information generated at random is added in the user information list, and triggers the second application display user Information list.
10. applying login method as claimed in claim 3, which is characterized in that the user information edit page further includes letter Breath saves control;
The non-genuine user information of editor is added to the user information list of the authorization login page, comprising:
When detecting preservation operation of the user for information preservation control, the non-genuine user information of editor is saved, and will The non-genuine user information of editor is added to the user information list of the authorization login page.
11. applying login method as described in claim 1, which is characterized in that based on described in target user's information registration First application, comprising:
By the second application to the message identification of target user's information, the application identities of the second application and user second Identity in is encoded, authorized code;
The first application of triggering obtains interface from the server of the second application based on the authorization code and calls voucher;
The first application of triggering calls voucher to obtain the second target user's information applied from the server based on the interface;
It triggers first application and register is carried out based on target user's information.
12. applying login method as described in claim 1, which is characterized in that select to be used for from the user information list Log in target user's information of the first application, comprising:
Using the non-genuine user information selected from the user information list as the target user for being used to log in the first application Information.
13. a kind of apply entering device characterized by comprising
Receiving unit, the authorization logging request initiated for receiving the first application;
Display unit, for according to authorization logging request triggering the second application display user information list, user's letter Breath list includes multiple for logging in the user information of the first application, wherein multiple user informations include user in the second application In real user information and user second application in non-genuine user information;
Selecting unit, for selecting target user's information for logging in the first application from the user information list;
Unit is logged in, for being applied based on described in target user's information registration first when detecting license confirmation instruction.
14. a kind of terminal, including processor and memory, the memory is stored with a plurality of instruction, and the processor loads institute Instruction is stated, 1 to 12 described in any item steps using in login method are required with perform claim.
15. a kind of storage medium, which is characterized in that the storage medium is stored with a plurality of instruction, and described instruction is suitable for processor It is loaded, 1 to 12 described in any item steps using in login method is required with perform claim.
CN201910252704.0A 2019-03-29 2019-03-29 Application login method, device, terminal and storage medium Active CN110417723B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910252704.0A CN110417723B (en) 2019-03-29 2019-03-29 Application login method, device, terminal and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910252704.0A CN110417723B (en) 2019-03-29 2019-03-29 Application login method, device, terminal and storage medium

Publications (2)

Publication Number Publication Date
CN110417723A true CN110417723A (en) 2019-11-05
CN110417723B CN110417723B (en) 2022-05-06

Family

ID=68357546

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910252704.0A Active CN110417723B (en) 2019-03-29 2019-03-29 Application login method, device, terminal and storage medium

Country Status (1)

Country Link
CN (1) CN110417723B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110958234A (en) * 2019-11-22 2020-04-03 腾讯科技(深圳)有限公司 Application login control method and device and storage medium
CN111405016A (en) * 2020-03-09 2020-07-10 广州华多网络科技有限公司 User information acquisition method and related equipment
CN111970298A (en) * 2020-08-26 2020-11-20 腾讯科技(深圳)有限公司 Application access method and device, storage medium and computer equipment
CN113536402A (en) * 2021-07-19 2021-10-22 军事科学院系统工程研究院网络信息研究所 Peep-proof display method based on front camera shooting target identification
US20220100824A1 (en) * 2020-09-30 2022-03-31 Ricoh Company, Ltd. Service providing system, information processing system, control method, and medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105812398A (en) * 2016-06-06 2016-07-27 百度在线网络技术(北京)有限公司 Remote login authorization method and remote login authorization device
CN107438071A (en) * 2017-07-28 2017-12-05 北京信安世纪科技有限公司 cloud storage security gateway and access method
CN107623690A (en) * 2017-09-27 2018-01-23 上海掌门科技有限公司 Login method, equipment and storage medium
US20180295124A1 (en) * 2016-07-07 2018-10-11 Tencent Technology (Shenzhen) Company Limited Account login connection method and apparatus, and storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105812398A (en) * 2016-06-06 2016-07-27 百度在线网络技术(北京)有限公司 Remote login authorization method and remote login authorization device
US20180295124A1 (en) * 2016-07-07 2018-10-11 Tencent Technology (Shenzhen) Company Limited Account login connection method and apparatus, and storage medium
CN107438071A (en) * 2017-07-28 2017-12-05 北京信安世纪科技有限公司 cloud storage security gateway and access method
CN107623690A (en) * 2017-09-27 2018-01-23 上海掌门科技有限公司 Login method, equipment and storage medium

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110958234A (en) * 2019-11-22 2020-04-03 腾讯科技(深圳)有限公司 Application login control method and device and storage medium
CN111405016A (en) * 2020-03-09 2020-07-10 广州华多网络科技有限公司 User information acquisition method and related equipment
CN111405016B (en) * 2020-03-09 2023-02-17 广州方硅信息技术有限公司 User information acquisition method and related equipment
CN111970298A (en) * 2020-08-26 2020-11-20 腾讯科技(深圳)有限公司 Application access method and device, storage medium and computer equipment
CN111970298B (en) * 2020-08-26 2024-01-05 腾讯科技(深圳)有限公司 Application access method and device, storage medium and computer equipment
US20220100824A1 (en) * 2020-09-30 2022-03-31 Ricoh Company, Ltd. Service providing system, information processing system, control method, and medium
US11886553B2 (en) * 2020-09-30 2024-01-30 Ricoh Company, Ltd. Service providing system, information processing system, control method, and medium
CN113536402A (en) * 2021-07-19 2021-10-22 军事科学院系统工程研究院网络信息研究所 Peep-proof display method based on front camera shooting target identification

Also Published As

Publication number Publication date
CN110417723B (en) 2022-05-06

Similar Documents

Publication Publication Date Title
CN110417723A (en) A kind of application login method, device, terminal and storage medium
WO2015070732A1 (en) Access control system, authorization method and device thereof, and storage medium
WO2017084290A1 (en) Public account two-dimensional code generation method and server, and public account following method, server and terminal
CN109587044A (en) Group creating, method for message interaction and device
CN109918030B (en) File printing method and device
JP2005312056A (en) Communication network system and its control method, mobile object, server, mobile object control program, server control program, and recording medium with the program recorded thereon
EP2521333A2 (en) Methods, Systems, and Apparatus for Content Licensing
CN110348236A (en) A kind of operating right setting method, device and the storage medium of file
CN110945863B (en) Photographing method and terminal equipment
CN107864144A (en) Obtain method and device, computer installation and the storage medium of dynamic password
JP2008047022A (en) Information sharing system by portable terminal device
CN109190369A (en) A kind of camera control method, terminal and computer storage medium
CN109889473A (en) Realize the method and third party's client of information push
CN105554064B (en) The method and device of head portrait is set
CN105656627A (en) Identity verification method, device and system
CN104914806B (en) Via mobile messaging transmission secret/security intermediary system connection people and things
CN110457890A (en) Right management method and device, electronic equipment and storage medium based on multisystem
CN107506423A (en) Photo chooses method, apparatus and storage medium
CN111857498B (en) Data interaction method and device and electronic equipment
CN111338971B (en) Application testing method and device, electronic equipment and storage medium
CN104184652A (en) Method and system for information interaction between terminals
CN107305608A (en) The management method and device of terminal device
CN113221195A (en) Method, device and storage medium for storing business data
CN110990821A (en) Identity type verification method, device and storage medium
CN106354365A (en) Interface selection method and mobile device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant